Search alternatives:
source » sources (Expand Search)
resource » resources (Expand Search)
Showing 441 - 460 results of 1,810 for search '((\ source detection functions\ ) OR (( resource OR resource) detection function\ ))', query time: 0.27s Refine Results
  1. 441

    Improved Building Information Modeling Based Method for Prioritizing Clash Detection in the Building Construction Design Phase by Iman Bitaraf, Ali Salimpour, Pedram Elmi, Ali Akbar Shirzadi Javid

    Published 2024-11-01
    “…The proposed method substantially improves clash detection and prioritization efficiency and accuracy, yielding considerable benefits in project management and resource allocation.…”
    Get full text
    Article
  2. 442

    YOLOv10-kiwi: a YOLOv10-based lightweight kiwifruit detection model in trellised orchards by Jie Ren, Wendong Wang, Yuan Tian, Jinrong He

    Published 2025-08-01
    “…To address the challenge of real-time kiwifruit detection in trellised orchards, this paper proposes YOLOv10-Kiwi, a lightweight detection model optimized for resource-constrained devices. …”
    Get full text
    Article
  3. 443

    MDA-DETR: Enhancing Offending Animal Detection with Multi-Channel Attention and Multi-Scale Feature Aggregation by Haiyan Zhang, Huiqi Li, Guodong Sun, Feng Yang

    Published 2025-01-01
    “…Conflicts between humans and animals in agricultural and settlement areas have recently increased, resulting in significant resource loss and risks to human and animal lives. …”
    Get full text
    Article
  4. 444

    Source Process Estimation for the 2024 Mw 7.1 Hyuganada, Japan, Earthquake and Forward Modeling Using N‐net Ocean Bottom Seismometer Data by R. Shibata, H. Kubo, W. Suzuki, S. Aoi, H. Sekiguchi

    Published 2025-05-01
    “…The N‐net seafloor seismograms of the mainshock with a frequency of ∼0.05 Hz recorded east of the source area were reproduced for several stations using the empirical Green's function approach based on the estimated source process data.…”
    Get full text
    Article
  5. 445
  6. 446
  7. 447

    Ibai mag blinds blindana tiuhan? (Luke 6,39). Pragmatic functions and syntactic strategies in the Gothic left sentence periphery by Marina Buzzoni

    Published 2025-01-01
    “…The interference role of the Greek and Latin source texts will also be taken into consideration, mainly in order to ascertain whether the grammaticalization processes which those elements underwent were either induced or implemented by the models. …”
    Get full text
    Article
  8. 448

    Ibai mag blinds blindana tiuhan? (Luke 6,39). Pragmatic functions and syntactic strategies in the Gothic left sentence periphery by Marina Buzzoni

    Published 2025-01-01
    “…The interference role of the Greek and Latin source texts will also be taken into consideration, mainly in order to ascertain whether the grammaticalization processes which those elements underwent were either induced or implemented by the models. …”
    Get full text
    Article
  9. 449

    Cost-Sensitive Radial Basis Function Neural Network Classifier for Software Defect Prediction by P. Kumudha, R. Venkatesan

    Published 2016-01-01
    “…Effective prediction of software modules, those that are prone to defects, will enable software developers to achieve efficient allocation of resources and to concentrate on quality assurance activities. …”
    Get full text
    Article
  10. 450

    Arlclustering: an R package for community detection in social networks based on user interaction and association rule learning by Mohamed El-Moussaoui, Mohamed Hanine, Ali Kartit, Tarik Agouti

    Published 2025-07-01
    “…Abstract ARLClustering is an open-source R package for community detection in social networks. …”
    Get full text
    Article
  11. 451
  12. 452
  13. 453

    SOFTWARE COMPONENT DEVELOPMENT FOR PARALLEL GATEWAYS DETECTION AND QUALITY ASSESSMENT IN BPMN MODELS USING FUZZY LOGIC by Andrii Kopp, Ľuboš Cibák, Dmytro Orlovskyi, Dmytro Kudii

    Published 2025-07-01
    “…This features are evaluated using “soft” modeling rules based on fuzzy membership functions. Additionally, an activation function with the 0.5 threshold is used to generate binary quality indicators and calculate an integral quality assessment measure. …”
    Get full text
    Article
  14. 454
  15. 455
  16. 456

    Enhancing Shiga toxin detection using surface plasmon resonance a study of antibody immobilization strategies by Zahra Karbalaee, Ali Hossein Rezayan, Ramezan Ali Taheri, Seyed Ali Mirhosseini, Mohammad Barshan-Tashnizi

    Published 2025-05-01
    “…The approach demonstrates particular promise for rapid, label-free detection of bacterial toxins in resource-limited settings.…”
    Get full text
    Article
  17. 457
  18. 458

    Design of a Non-Destructive Seed Counting Instrument for Rapeseed Pods Based on Transmission Imaging by Shengyong Xu, Rongsheng Xu, Pan Ma, Zhenhao Huang, Shaodong Wang, Zhe Yang, Qingxi Liao

    Published 2024-12-01
    “…Human–machine interaction software based on PyQt5 was developed, integrating functions such as communication between upper and lower machines, image acquisition, storage, and processing. …”
    Get full text
    Article
  19. 459

    Intelligent Firefighting Technology for Drone Swarms with Multi-Sensor Integrated Path Planning: YOLOv8 Algorithm-Driven Fire Source Identification and Precision Deployment Strateg... by Bingxin Yu, Shengze Yu, Yuandi Zhao, Jin Wang, Ran Lai, Jisong Lv, Botao Zhou

    Published 2025-05-01
    “…This study aims to improve the accuracy of fire source detection, the efficiency of path planning, and the precision of firefighting operations in drone swarms during fire emergencies. …”
    Get full text
    Article
  20. 460

    Hybrid Deep Neural Network Optimization with Particle Swarm and Grey Wolf Algorithms for Sunburst Attack Detection by Mohammad Almseidin, Amjad Gawanmeh, Maen Alzubi, Jamil Al-Sawwa, Ashraf S. Mashaleh, Mouhammd Alkasassbeh

    Published 2025-03-01
    “…The strength of DNNs is derived from their ability to model complex functions and to improve detection engines through deeper architecture. …”
    Get full text
    Article