Search alternatives:
resource » source (Expand Search)
functions » function (Expand Search)
Showing 341 - 360 results of 2,685 for search '((( success OR resource) detection functions ) OR ( sources detection functions ))', query time: 0.34s Refine Results
  1. 341

    TEDVIL: Leveraging Transformer-Based Embeddings for Vulnerability Detection in Lifted Code by Gary A. McCully, John D. Hastings, Shengjie Xu

    Published 2025-01-01
    “…Notably, these results are achieved when the embedding model is trained with a dataset of just 48,000 functions, demonstrating effectiveness in resource-constrained settings. …”
    Get full text
    Article
  2. 342

    Comparative Analysis of Deep Learning Models for Intrusion Detection in IoT Networks by Abdullah Waqas, Sultan Daud Khan, Zaib Ullah, Mohib Ullah, Habib Ullah

    Published 2025-07-01
    “…However, the constrained processing capacities and resource limitations of IoT networks make them especially susceptible to cyber threats. …”
    Get full text
    Article
  3. 343

    High-Sensitivity, Low Detection Limit, and Fast Ammonia Detection of Ag-NiFe<sub>2</sub>O<sub>4</sub> Nanocomposite and DFT Study by Xianfeng Hao, Yuehang Sun, Zongwei Liu, Gongao Jiao, Dongzhi Zhang

    Published 2025-07-01
    “…This study facilitates the rapid detection of food spoilage and promotes the development of portable food safety detection devices.…”
    Get full text
    Article
  4. 344
  5. 345

    Improving dependability with low power fault detection model for skinny-hash. by Sonal Arvind Barge, Gerardine Immaculate Mary

    Published 2024-01-01
    “…Two fault detection approaches are proposed to detect faults in cryptographic algorithms running on IoT devices. …”
    Get full text
    Article
  6. 346

    Vulnerability detection method for blockchain smart contracts based on metamorphic testing by Jinfu CHEN, Zhenxin WANG, Saihua CAI, Qiaowei FENG, Yuhao CHEN, Rongtian XU, KwakuKudjo Patrick

    Published 2023-10-01
    “…Aimed at the defects of existing test methods, a vulnerability detection method for blockchain smart contracts based on metamorphic testing was proposed, which could generate test cases for specific functions in blockchain smart contracts to detect possible vulnerabilities.According to the possible security vulnerabilities, different metamorphosis relationships were designed and then metamorphic testing was performed.Through verifying whether the metamorphic relationship between the source test case and the subsequent test case was satisfied, whether the smart contract had related security vulnerabilities was judged.The experimental results show that the proposed method can effectively detect the security vulnerabilities in the smart contracts.…”
    Get full text
    Article
  7. 347

    An investigation of the distribution of gaze estimation errors in head mounted gaze trackers using polynomial functions by Diako Mardanbegi, Andrew T. N. Kurauchi, Carlos H. Morimoto

    Published 2018-06-01
    “…In this paper we investigate the behavior of the gaze estimation error distribution throughout the image of the scene camera when using polynomial functions. Using simulated scenarios, we describe effects of four different sources of error: interpolation, extrapolation, parallax, and radial distortion. …”
    Get full text
    Article
  8. 348

    Optimization of train obstacle detection based on zone media controller unit by ZHOU Liming, HU Jiaqiao, SHEN Tuo

    Published 2024-11-01
    “…In addition, the need for comprehensive train detection including pantograph-catenary systems and running gears, lead to an increased number of on-board devices, resulting in fewer computational resources available for each detection system, and complicating equipment installation and maintenance. …”
    Get full text
    Article
  9. 349

    CNN based 2D object detection techniques: a review by Badri Raj Lamichhane, Gun Srijuntongsiri, Teerayut Horanont

    Published 2025-04-01
    “…It analyzes 1-stage, 2-stage, and hybrid approaches for object recognition, localization, classification, and identification, focusing on CNN architecture, backbone design, and loss functions. The findings reveal that while 2-stage and hybrid methods achieve superior accuracy and detection precision, 1-stage methods offer faster processing and lower computational complexity, making them advantageous in specific real-time applications.…”
    Get full text
    Article
  10. 350

    Downstream Semantic Segmentation Model for Low-Level Surface Crack Detection by Thitirat Siriborvornratanakul

    Published 2022-01-01
    “…The most successful downstream model we found is trained by the focal loss function without using the pretrained weights that are accompanied by the base model. …”
    Get full text
    Article
  11. 351

    A Route to the Colorimetric Detection of Alpha-Fetoprotein Based on a Smartphone by Junjie Liu, Qingfubo Geng, Zhaoxin Geng

    Published 2024-08-01
    “…Alpha-fetoprotein (AFP) is a key marker for early cancer detection and assessment. However, the current detection methods struggle to balance accuracy with the need for decentralized medical treatment. …”
    Get full text
    Article
  12. 352

    Interpretable Chinese Fake News Detection With Chain-of-Thought and In-Context Learning by Bingyi Liu, Anqi Wang, Chengqian Xia

    Published 2025-01-01
    “…The spread of fake news through on-line platforms poses a significant threat to public trust and social stability, especially in resource-constrained Chinese domains. Existing Fake News Detection (FND) models often lack transparency, functioning as &#x201C;black boxes&#x201D; that limit their practical utility. …”
    Get full text
    Article
  13. 353

    Advanced intrusion detection in internet of things using graph attention networks by Aamir S. Ahanger, Sajad M. Khan, Faheem Masoodi, Ayodeji Olalekan Salau

    Published 2025-03-01
    “…Common Internet of Things safety features like encryption, authentication, and access control frequently fall short of meeting their desired functions. In this paper, we present a novel perspective to IoT security by using a Graph-based (GB) algorithm to construct a graph that is evaluated with a graph-based learning Intrusion Detection System (IDS) incorporating a Graph Attention Network (GAT). …”
    Get full text
    Article
  14. 354

    Water quality anomaly detection research based on GRU-PINN model by Zhao Xinyu

    Published 2025-01-01
    “…Maintaining high-quality water resources is essential for sustainable urban water resource management and public health. …”
    Get full text
    Article
  15. 355

    A DFT insight into the potential of cycloparaphenylenes as efficient sensors for detecting Paracetamol by Wael A. Mahdi, Adel Alhowyan, Ahmad J. Obaidullah

    Published 2025-03-01
    “…This study presents a computational investigation into the sensing capabilities of methylene-bridged [n]cycloparaphenylene ([n]MCPP, where n= 6, 8, and 10) nanorings for the detection of paracetamol using density functional theory (DFT) calculations. …”
    Get full text
    Article
  16. 356

    Study on lightweight strategies for L-YOLO algorithm in road object detection by Ji Hong, Kuntao Ye, Shubin Qiu

    Published 2025-03-01
    “…The demand for real-time, efficient object detection systems is growing. However, traditional algorithms often suffer from large parameter sizes and high computational costs, limiting their applicability in resource-constrained environments. …”
    Get full text
    Article
  17. 357

    Synthesis and properties of carbon quantum dots as an antimicrobial agent and detection of ciprofloxacin by Fangzhou Shen, Zhaoyang Lu, Kangli Yan, Kang Luo, Shuchen Pei, Pu Xiang

    Published 2025-08-01
    “…This study introduces a novel approach for the fabrication of N-CQDs derived from natural botanical sources, underscoring their potential dual functionality as fluorescent sensors and antimicrobial materials.…”
    Get full text
    Article
  18. 358

    Formulation of solution to prevent lysis time erythrocyte and detecting blood type by Ria Amelia, Elfira Maya Sari

    Published 2025-01-01
    “…Conclusion: CPD solution successfully prevents erythrocyte lysis for a longer time compared to other solutions and functions in detecting blood type antibodies.…”
    Get full text
    Article
  19. 359

    SR-DETR: Target Detection in Maritime Rescue from UAV Imagery by Yuling Liu, Yan Wei

    Published 2025-06-01
    “…These outcomes highlight the practicality and reliability of our method in detecting individuals overboard, contributing to more precise and resource-efficient solutions for real-time maritime rescue efforts.…”
    Get full text
    Article
  20. 360

    SWMD-YOLO: A Lightweight Model for Tomato Detection in Greenhouse Environments by Quan Wang, Ye Hua, Qiongdan Lou, Xi Kan

    Published 2025-06-01
    “…This study proposes SWMD-YOLO, a lightweight multi-scale detection network optimized for greenhouse scenarios. …”
    Get full text
    Article