Showing 321 - 340 results of 1,810 for search '((\ sources detection functions\ ) OR (( resources OR resources) detection function\ ))', query time: 0.30s Refine Results
  1. 321

    Automatic Recognition of Authors Identity in Persian based on Systemic Functional Grammar by Fatemeh Soltanzadeh, Azadeh Mirzaei, Mohammad Bahrani, Shahram Modarres Khiabani

    Published 2024-09-01
    “…First, a corpus composed of documents written by seven contemporary Iranian authors was collected. Second, a list of function words was extracted from the corpus. Moreover, conjunction, modality and comment adjunct system networks were applied to form a lexicon using linguistics resources. …”
    Get full text
    Article
  2. 322

    Surface Defect Detection for Small Samples of Particleboard Based on Improved Proximal Policy Optimization by Haifei Xia, Haiyan Zhou, Mingao Zhang, Qingyi Zhang, Chenlong Fan, Yutu Yang, Shuang Xi, Ying Liu

    Published 2025-04-01
    “…The method integrates the variable action space and the composite reward function and achieves the balanced optimization of different types of defect detection performance by adjusting the scaling and translation amplitude of the detection region. …”
    Get full text
    Article
  3. 323

    SSB: Smart Contract Security Detection Tool Suitable for Industrial Control Scenarios by Ci Tao, Shuai He, Xingqiu Shen

    Published 2025-07-01
    “…The framework’s ability to model industrial invariants—covering security, functionality, consistency, time-related, and resource consumption aspects—provides a robust mechanism to prevent critical errors like unauthorized access or premature equipment operation. …”
    Get full text
    Article
  4. 324

    Portable cotton swab biosensor for rapid naked-eye detection of Helicobacter pylori by Ghadeer.A.R.Y. Suaifan, Asmaa Alnajajrah, Ward Abu Jbara, Amr A. El-Mousa, Fahid Abu Jbara, Doha A.I. Al-Omari, Mayadah B. Shehadeh

    Published 2025-09-01
    “…These findings support the biosensor's utility as a point-of-care diagnostic tool in low-resource settings for the early detection and surveillance of H. pylori infections.…”
    Get full text
    Article
  5. 325

    Gold nanobiosensors and Machine Learning: Pioneering breakthroughs in precision breast cancer detection by Soheil Sadr, Ashkan Hajjafari, Abbas Rahdar, Sadanand Pandey, Parian Poorjafari Jafroodi, Narges Lotfalizadeh, Mahdi Soroushianfar, Shahla Salimpour Kavasebi, Zelal Kharaba, Sonia Fathi-karkan, Hassan Borji

    Published 2024-12-01
    “…These sensors take advantage of the unique optical and electric properties that gold nanoparticles have, enabling them to achieve an accurate molecular level of detection. Gold nanobiosensors have been significantly developed through innovations like signal amplification and surface functionalization, integrated with the use of advanced imaging techniques. …”
    Get full text
    Article
  6. 326

    Quantifying Truthfulness: A Probabilistic Framework for Atomic Claim-Based Misinformation Detection by Fahim Sufi, Musleh Alsulami

    Published 2025-05-01
    “…This paper addresses this gap by proposing a novel probabilistic framework that decomposes complex assertions into semantically atomic claims and computes their veracity through a structured evaluation of source credibility and evidence frequency. Each atomic unit is matched against a curated corpus of 11,928 cyber-related news entries using a binary alignment function, and its truthfulness is quantified via a composite score integrating both source reliability and support density. …”
    Get full text
    Article
  7. 327

    Optimizing Pre-Trained Code Embeddings With Triplet Loss for Code Smell Detection by Ali Nizam, Ertugrul Islamoglu, Omer Kerem Adali, Musa Aydin

    Published 2025-01-01
    “…Although code embedding-based systems have been successfully applied to various source code analysis tasks, further research is required to enhance code embedding for better code analysis capabilities, aiming to surpass the performance and functionality of static code analysis tools. …”
    Get full text
    Article
  8. 328

    Social Network Community Detection by Combining Self-Organizing Maps and Genetic Algorithms by Mehdi Ellouze

    Published 2021-01-01
    “…To this end, many research works in the literature offer users some tools that can help them take advantage of this mine of information. Community detection is one of these tools and aims to detect a set of entities that share some features within a social network. …”
    Get full text
    Article
  9. 329
  10. 330

    Application of VGG16 in Automated Detection of Bone Fractures in X-Ray Images by Resky Adhyaksa, Bedy Purnama

    Published 2025-02-01
    “…The training and testing phases utilized an 80:20 split of the data, employing binary cross-entropy as the loss function and the Adam optimizer for efficient weight updates. …”
    Get full text
    Article
  11. 331

    Video Analysis and Frame Prediction Based on Improved Object Detection and ConvGRU by Xijuan Wang, Ru Chen

    Published 2025-01-01
    “…The loss function and average accuracy mean have been improved, with a maximum detection accuracy of 0.947. …”
    Get full text
    Article
  12. 332

    First Detection of Low-frequency Striae in Interplanetary Type III Radio Bursts by Vratislav Krupar, Eduard P. Kontar, Jan Soucek, Lynn B. Wilson III, Adam Szabo, Oksana Kruparova, Hamish A. S. Reid, Mychajlo Hajos, David Pisa, Ondrej Santolik, Milan Maksimovic, Jolene S. Pickett

    Published 2025-01-01
    “…By combining high-resolution radio observations with well-calibrated in situ electron velocity distribution function data from the Wind spacecraft, we characterized the plasma properties of the burst source region near 0.32 au. …”
    Get full text
    Article
  13. 333

    A Comprehensive Approach for Detecting and Handling MitM-ARP Spoofing Attacks by Standy Oei, Yohanes Suyanto, Reza Pulungan

    Published 2025-01-01
    “…In the host, we employ a combination of ping Round-Trip Time (RTT) anomaly detection, the SendARP function, static entry, and ping confirmation to detect and mitigate attacks. …”
    Get full text
    Article
  14. 334

    Near-source wastewater surveillance of SARS-CoV-2, norovirus, influenza virus and RSV across five different sites in the UK. by Jay C Bullen, Mina Mohaghegh, Fatima Tahir, Charlotte Hammer, Jacob Sims, Frederico Myers, Lucas Eisinger, Ali Reza Kasmati, Claire F Trant

    Published 2025-01-01
    “…The key findings are (1) near-source wastewater detections were linked to local events (staff sickness, enhanced cleaning, changing populations); (2) wastewater detections decreased in the order norovirus GII > norovirus GI > SARS-CoV-2 ≈ influenza A ≈ RSV A > influenza B ≈ RSV B; (3) correlation between near-source wastewater data and national surveillance data increases as a function of catchment size and viral prevalence (examples include the SARS-CoV-2 BA.4/BA.5 variant peak at a museum and wastewater tracking the winter norovirus season); (4) strong weekday periodicity in near-source wastewater SARS-CoV-2 detections, with the correlation against COVID-19 case numbers increasing when modelling variable lag times between faecal shedding onset and clinical diagnosis (R2 = 0.45 increases to 0.84-0.86); (5) a log-linear relationship between the frequency of wastewater SARS-CoV-2 detection and log(catchment size⋅viral prevalence) (R2 = 0.6914-0.9066). …”
    Get full text
    Article
  15. 335

    MSSA: multi-stage semantic-aware neural network for binary code similarity detection by Bangrui Wan, Jianjun Zhou, Ying Wang, Feng Chen, Ying Qian

    Published 2025-01-01
    “…Binary code similarity detection (BCSD) aims to identify whether a pair of binary code snippets is similar, which is widely used for tasks such as malware analysis, patch analysis, and clone detection. …”
    Get full text
    Article
  16. 336

    A lightweight UAV target detection algorithm based on improved YOLOv8s model by Fubao Ma, Ran Zhang, Bowen Zhu, Xirui Yang

    Published 2025-05-01
    “…Furthermore, the original loss function is replaced with SIoU to enhance detection accuracy. …”
    Get full text
    Article
  17. 337

    A Lightweight Network for UAV Multi-Scale Feature Fusion-Based Object Detection by Sheng Deng, Yaping Wan

    Published 2025-03-01
    “…To tackle the issues of small target sizes, missed detections, and false alarms in aerial drone imagery, alongside the constraints posed by limited hardware resources during model deployment, a streamlined object detection approach is proposed to enhance the performance of YOLOv8s. …”
    Get full text
    Article
  18. 338

    Research on underwater disease target detection method of inland waterway based on deep learning by Tao Yu, Yu Xie, Jinsong Luo, Wei Zhu, Jie Liu

    Published 2025-04-01
    “…Abstract Aiming at the problems of low detection accuracy and poor generalization ability of underwater disease targets in inland waterways, an underwater disease target detection algorithm for inland waterways based on improved YOLOv5 is designed, which is denoted as YOLOv5-GBCE. …”
    Get full text
    Article
  19. 339

    Lightweight and Accurate YOLOv7-Based Ensembles With Knowledge Distillation for Urinary Sediment Detection by Keita Sasaki, Hiroki Nishikawa, Ittetsu Taniguchi, Takao Onoye

    Published 2025-01-01
    “…Urine sediment analysis plays an important role in evaluating kidney function. In addition to improving detection accuracy, reducing model size is also a key challenge, especially when considering deployment on medical devices where computational resources are limited. …”
    Get full text
    Article
  20. 340

    Enhancing Drone Detection via Transformer Neural Network and Positive–Negative Momentum Optimizers by Pavel Lyakhov, Denis Butusov, Vadim Pismennyy, Ruslan Abdulkadirov, Nikolay Nagornov, Valerii Ostrovskii, Diana Kalita

    Published 2025-06-01
    “…The developed algorithms for training NN architectures improved the accuracy of drone detection by achieving the global extremum of the loss function in fewer epochs using positive–negative pulse-based optimization algorithms. …”
    Get full text
    Article