Showing 41 - 60 results of 1,810 for search '((\ sources detection functions\ ) OR (( (resource OR source) OR resources) detection function\ ))', query time: 0.34s Refine Results
  1. 41

    Dual‐Function Ceramic Pigments for Energy‐Efficient and Secure Autonomous Vehicles by Ik Hoon Jeong, Yong‐Jun Seo, Jum Soo Hwang, Geun Hyeong Kim, Yeong Jae Kim, Gil Ju Lee

    Published 2025-07-01
    “…Consequently, a bi‐function ceramic pigment (BFCP) is fabricated with both superior RC performance and heightened LiDAR detectability compared to commercial pigments. …”
    Get full text
    Article
  2. 42

    Attraction and aversion of noctuid moths to fermented food sources coordinated by olfactory receptors from distinct gene families by Xiao-Qing Hou, Dan-Dan Zhang, Hanbo Zhao, Yang Liu, Christer Löfstedt, Guirong Wang

    Published 2025-01-01
    “…Conclusions Our findings suggest that this functional conservation is an olfactory adaptation that has allowed noctuid moths to extend their diet to fermented food sources.…”
    Get full text
    Article
  3. 43

    Spin-dependent edge detection and imaging enabled by optical circularly polarised states by Jiale Chen, Zhao-xian Chen, Zi-xin Zhou, Yan-qing Lu, Jun-long Kou

    Published 2025-04-01
    “…Furthermore, these two independent functions can be easily switched by altering the circular polarisation state of the light source.…”
    Get full text
    Article
  4. 44

    Design and analysis of intelligent service chain system for network security resource pool by Zenan WANG, Jiahao LI, Chaohong TAN, Dechang PI

    Published 2022-08-01
    “…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
    Get full text
    Article
  5. 45

    Research on multi-sensor fusion detection and tracking technology for autonomous-rail rapid transit tram by PAN Wenbo, YUAN Xiwen, LIN Jun, XIE Guotao, LONG Teng, HUANG Wenyu

    Published 2022-07-01
    “…Firstly, a millimeter-wave radar and LiDAR are used to perceive by single sensor, and the sensing results were merged by using a multi-source fusion algorithm, to generate more accurate detection results. …”
    Get full text
    Article
  6. 46

    Simulation Study on Detection and Localization of a Moving Target Under Reverberation in Deep Water by Jincong Dun, Shihong Zhou, Yubo Qi, Changpeng Liu

    Published 2024-12-01
    “…Deep-water reverberation caused by multiple reflections from the seafloor and sea surface can affect the performance of active sonars. To detect a moving target under reverberation conditions, a reverberation suppression method using multipath Doppler shift in deep water and wideband ambiguity function (WAF) is proposed. …”
    Get full text
    Article
  7. 47

    An Attomolar-Level Optical Device for Monitoring Receptor–Analyte Interactions Without Functionalization Steps: A Case Study of Cytokine Detection by Nunzio Cennamo, Francesco Arcadio, Chiara Marzano, Rosalba Pitruzzella, Mimimorena Seggio, Maria Pesavento, Stefano Toldo, Antonio Abbate, Luigi Zeni

    Published 2025-02-01
    “…The POF-based device was proven to be effective for detecting several interleukins at the attomolar level in a few minutes and without functionalization processes.…”
    Get full text
    Article
  8. 48
  9. 49
  10. 50

    Metal surface defect detection using SLF-YOLO enhanced YOLOv8 model by Yuan Liu, Yilong Liu, Xiaoyan Guo, Xi Ling, Qingyi Geng

    Published 2025-04-01
    “…Abstract This paper addresses the industrial demand for precision and efficiency in metal surface defect detection by proposing SLF-YOLO, a lightweight object detection model designed for resource-constrained environments. …”
    Get full text
    Article
  11. 51

    YOLOGX: an improved forest fire detection algorithm based on YOLOv8 by Caixiong Li, Yue Du, Xing Zhang, Peng Wu

    Published 2025-01-01
    “…To tackle issues, including environmental sensitivity, inadequate fire source recognition, and inefficient feature extraction in existing forest fire detection algorithms, we developed a high-precision algorithm, YOLOGX. …”
    Get full text
    Article
  12. 52
  13. 53

    MTAHG and MTBHG: Modified Approaches for Interpreting Gravity Data by Hazel Deniz Toktay, Hanbing Ai, Ahmad Alvandi, Kejia Su, Jinlei Li

    Published 2025-04-01
    “…This paper proposes two effective edge detection tools: one combining the balanced total horizontal gradient (BHG), and the hyperbolic tangent function, abbreviated as “MTBHG”; and the other combining the tilt angle of the total horizontal gradient (TAHG) and the hyperbolic tangent function, abbreviated as “MTAHG.” …”
    Get full text
    Article
  14. 54

    A statistical approach to assess interspecific consumptive competition and functional redundancy in ephemeral resource uses using camera traps by Yoshihiro Nakashima, Akane Hashizume, Akane Kanda

    Published 2024-07-01
    “…We extended time‐to‐detection occupancy modeling to quantify interspecific consumptive competition and redundancy of ecosystem functions through consumption between two species, while accounting for observation censoring. …”
    Get full text
    Article
  15. 55

    Loss Function Optimization Method and Unsupervised Extraction Approach D-DBSCAN for Improving the Moving Target Perception of 3D Imaging Sonar by Jingfeng Yu, Aigen Huang, Zhongju Sun, Rui Huang, Gao Huang, Qianchuan Zhao

    Published 2025-03-01
    “…Compared to 2D sonar images, 3D sonar images offer superior spatial positioning capabilities, although the data acquisition cost is higher and lacks open source references for data annotation, target detection, and semantic segmentation. …”
    Get full text
    Article
  16. 56

    A near-optimal resource allocation strategy for minimizing the worse-case impact of malicious attacks on cloud networks by Yu-Fang Chen, Frank Yeong-Sung Lin, Kuang-Yen Tai, Chiu-Han Hsiao, Wei-Hsin Wang, Ming-Chi Tsai, Tzu-Lung Sun

    Published 2025-08-01
    “…The proposed model integrates Virtual Machine (VM) initiation decisions and employs the Contest Success Function (CSF) within a two-player max–min game framework to dynamically allocate resources. …”
    Get full text
    Article
  17. 57

    Millimeter-Wave Imaging with Range-Resolved 3D Depth Extraction Using Glow Discharge Detection and Frequency-Modulated Continuous Wave Radar by Arun Ramachandra Kurup, Daniel Rozban, Amir Abramovich, Yitzhak Yitzhaky, Natan Kopeika

    Published 2025-02-01
    “…Reflected signals are processed by the GDD, which functions as a heterodyne receiver, and Fast Fourier Transform (FFT) is used to extract range data. …”
    Get full text
    Article
  18. 58

    Non-Line-of-Sight Location With Gauss Filtering Algorithm Based on a Model of Photon Flight by Yu Ren, Zongliang Xie, Yihan Luo, Shaoxiong Xu, Haotong Ma, Yi Tan

    Published 2020-01-01
    “…Recently, non-line-of-sight (NLOS) detection based on time of flight (TOF) has been investigated. …”
    Get full text
    Article
  19. 59
  20. 60

    QPPLab: A generally applicable software package for detecting, analyzing, and visualizing large-scale quasiperiodic spatiotemporal patterns (QPPs) of brain activity by Nan Xu, Behnaz Yousefi, Nmachi Anumba, Theodore J. LaGrow, Xiaodi Zhang, Shella Keilholz

    Published 2025-02-01
    “…To address these challenges, we present QPPLab, an open-source MATLAB-based toolbox for detecting, analyzing, and visualizing QPPs from fMRI time series. …”
    Get full text
    Article