Showing 281 - 300 results of 1,810 for search '((\ (source OR sources) detection functions\ ) OR (( resource OR resource) detection function\ ))', query time: 0.39s Refine Results
  1. 281

    Survey on key technologies for protective DNS service by MA Yongzheng, LI Hongtao, MA Zhongsheng, HU Weihong, ZHANG Zhongxian

    Published 2024-10-01
    “…The domain name system (DNS) is a naming service for Internet resources that provides the function of converting from domain names to IP addresses. …”
    Get full text
    Article
  2. 282

    Neural Posterior Estimation for Cataloging Astronomical Images with Spatially Varying Backgrounds and Point Spread Functions by Aakash Patel, Tianqing Zhang, Camille Avestruz, Jeffrey Regier, The LSST Dark Energy Science Collaboration

    Published 2025-01-01
    “…In experiments with semisynthetic images, we evaluate the method on key cataloging tasks: light source detection, star/galaxy separation, and flux measurement. …”
    Get full text
    Article
  3. 283

    Study on lightweight strategies for L-YOLO algorithm in road object detection by Ji Hong, Kuntao Ye, Shubin Qiu

    Published 2025-03-01
    “…The demand for real-time, efficient object detection systems is growing. However, traditional algorithms often suffer from large parameter sizes and high computational costs, limiting their applicability in resource-constrained environments. …”
    Get full text
    Article
  4. 284

    Water quality anomaly detection research based on GRU-PINN model by Zhao Xinyu

    Published 2025-01-01
    “…Maintaining high-quality water resources is essential for sustainable urban water resource management and public health. …”
    Get full text
    Article
  5. 285
  6. 286

    SR-DETR: Target Detection in Maritime Rescue from UAV Imagery by Yuling Liu, Yan Wei

    Published 2025-06-01
    “…These outcomes highlight the practicality and reliability of our method in detecting individuals overboard, contributing to more precise and resource-efficient solutions for real-time maritime rescue efforts.…”
    Get full text
    Article
  7. 287

    SWMD-YOLO: A Lightweight Model for Tomato Detection in Greenhouse Environments by Quan Wang, Ye Hua, Qiongdan Lou, Xi Kan

    Published 2025-06-01
    “…This study proposes SWMD-YOLO, a lightweight multi-scale detection network optimized for greenhouse scenarios. …”
    Get full text
    Article
  8. 288

    Comparative Analysis of Deep Learning Models for Intrusion Detection in IoT Networks by Abdullah Waqas, Sultan Daud Khan, Zaib Ullah, Mohib Ullah, Habib Ullah

    Published 2025-07-01
    “…However, the constrained processing capacities and resource limitations of IoT networks make them especially susceptible to cyber threats. …”
    Get full text
    Article
  9. 289

    RipFinder: real-time rip current detection on mobile devices by Fahim Khan, Akila de Silva, Ashleigh Palinkas, Gregory Dusek, James Davis, Alex Pang

    Published 2025-05-01
    “…To address this, we propose a client-server ML model-based computer vision system designed specifically to improve rip current detection accuracy. This novel approach enables the app to function with or without internet connectivity, proving particularly beneficial in regions without lifeguards or internet access. …”
    Get full text
    Article
  10. 290

    LiteTom-RTDETR: A Lightweight Real-Time Tomato Detection System for Plant Factories by Wenshuai Liu, Qingzheng Liu, Wenyong Quan, Junli Wang, Xiaomin Yao, Qiang Liu, Yuxiang Tian

    Published 2025-06-01
    “…The accuracy and speed of tomato detection were increased to facilitate fully automated harvesting by improving the Real-Time Detection Transformer (RTDETR) to develop a new lightweight tomato detection model called LiteTom-RTDETR. …”
    Get full text
    Article
  11. 291

    Vulnerability detection method for blockchain smart contracts based on metamorphic testing by Jinfu CHEN, Zhenxin WANG, Saihua CAI, Qiaowei FENG, Yuhao CHEN, Rongtian XU, KwakuKudjo Patrick

    Published 2023-10-01
    “…Aimed at the defects of existing test methods, a vulnerability detection method for blockchain smart contracts based on metamorphic testing was proposed, which could generate test cases for specific functions in blockchain smart contracts to detect possible vulnerabilities.According to the possible security vulnerabilities, different metamorphosis relationships were designed and then metamorphic testing was performed.Through verifying whether the metamorphic relationship between the source test case and the subsequent test case was satisfied, whether the smart contract had related security vulnerabilities was judged.The experimental results show that the proposed method can effectively detect the security vulnerabilities in the smart contracts.…”
    Get full text
    Article
  12. 292

    Pavement Disease Visual Detection by Structure Perception and Feature Attention Network by Bin Lv, Shuo Zhang, Haixia Gong, Hongbo Zhang, Bin Dong, Jianzhu Wang, Cong Du, Jianqing Wu

    Published 2025-01-01
    “…Balancing detection performance and computational efficiency is critical for sustainable pavement disease detection in energy-constrained scenarios. …”
    Get full text
    Article
  13. 293

    Ultra-sensitive terahertz photonic crystal fiber sensor for detection of tuberculosis by Md. Safiul Islam, A.H.M. Iftekharul Ferdous, Abdullah Al Mamun, Md. Shamim Anower, Md. Jakir Hossen, Syed Udoy Ahmed

    Published 2025-06-01
    “…This sensing unit under consideration can function within the terahertz frequency range. Consequently, it serves as a valuable resource for healthcare providers, enhancing their diagnostic capabilities for prompt treatment and improved patient outcomes. …”
    Get full text
    Article
  14. 294

    A Route to the Colorimetric Detection of Alpha-Fetoprotein Based on a Smartphone by Junjie Liu, Qingfubo Geng, Zhaoxin Geng

    Published 2024-08-01
    “…Alpha-fetoprotein (AFP) is a key marker for early cancer detection and assessment. However, the current detection methods struggle to balance accuracy with the need for decentralized medical treatment. …”
    Get full text
    Article
  15. 295

    Interpretable Chinese Fake News Detection With Chain-of-Thought and In-Context Learning by Bingyi Liu, Anqi Wang, Chengqian Xia

    Published 2025-01-01
    “…The spread of fake news through on-line platforms poses a significant threat to public trust and social stability, especially in resource-constrained Chinese domains. Existing Fake News Detection (FND) models often lack transparency, functioning as “black boxes” that limit their practical utility. …”
    Get full text
    Article
  16. 296

    Synthesis and properties of carbon quantum dots as an antimicrobial agent and detection of ciprofloxacin by Fangzhou Shen, Zhaoyang Lu, Kangli Yan, Kang Luo, Shuchen Pei, Pu Xiang

    Published 2025-08-01
    “…This study introduces a novel approach for the fabrication of N-CQDs derived from natural botanical sources, underscoring their potential dual functionality as fluorescent sensors and antimicrobial materials.…”
    Get full text
    Article
  17. 297

    The Bright Feature Transform for Prominent Point Scatterer Detection and Tone Mapping by Gregory D. Vetaw, Suren Jayasuriya

    Published 2025-03-01
    “…We then modify the BFT to present a difference of trigonometric functions to mitigate speckle scatterers and other random noise sources found in the imagery. …”
    Get full text
    Article
  18. 298
  19. 299

    TEDVIL: Leveraging Transformer-Based Embeddings for Vulnerability Detection in Lifted Code by Gary A. McCully, John D. Hastings, Shengjie Xu

    Published 2025-01-01
    “…Notably, these results are achieved when the embedding model is trained with a dataset of just 48,000 functions, demonstrating effectiveness in resource-constrained settings. …”
    Get full text
    Article
  20. 300

    LNT-YOLO: A Lightweight Nighttime Traffic Light Detection Model by Syahrul Munir, Huei-Yung Lin

    Published 2025-06-01
    “…These results underscore the model’s feasibility and robustness compared to other state-of-the-art object detection models. The source code and dataset will be available through the GitHub repository.…”
    Get full text
    Article