Search alternatives:
resource » source (Expand Search)
Showing 481 - 500 results of 3,214 for search '((\ sources selection function\ ) OR (( resource OR success) detection functions\ ))', query time: 0.34s Refine Results
  1. 481

    Near-source wastewater surveillance of SARS-CoV-2, norovirus, influenza virus and RSV across five different sites in the UK. by Jay C Bullen, Mina Mohaghegh, Fatima Tahir, Charlotte Hammer, Jacob Sims, Frederico Myers, Lucas Eisinger, Ali Reza Kasmati, Claire F Trant

    Published 2025-01-01
    “…To address this, we conducted wastewater surveillance at five sites for SARS-CoV-2 and two sites for norovirus GI, norovirus GII, influenza A virus, influenza B virus, and human respiratory syncytial virus (RSV A and RSV B). Sites were selected for contrasting functions: an office, charity centre, museum, university, and care home. …”
    Get full text
    Article
  2. 482

    Metagenomic and phylogenetic analyses reveal gene-level selection constrained by bacterial phylogeny, surrounding oxalate metabolism in the gut microbiota by Sromona D. Mukherjee, Mangesh Suryavanshi, John Knight, Dirk Lange, Aaron W. Miller

    Published 2025-06-01
    “…The frc gene was primarily allocated to the Pseudomonodota phylum, particularly the Bradyrhizobium genus, which is a species capable of utilizing oxalate as a sole carbon and energy source. Collectively evidence provides strong support that, for oxalate metabolism, evolutionary selection occurs at the gene level, through horizontal gene transfer, rather than at the species level.IMPORTANCEA critical function of the gut microbiota is to neutralize dietary toxins, such as oxalate, which is highly prevalent in plant-based foods and is not degraded by host enzymes. …”
    Get full text
    Article
  3. 483
  4. 484

    Detecting and routing of dust event using remote sensing and numerical modeling in Isfahan Province by Mehdii Jafari, Gholamreza Zehtabian, Hasan Ahmadi, Tayebeh Mesbahzadeh, Ali Akbar Norouzi

    Published 2020-03-01
    “…The purpose of this research was to analyze the statistical data and identify the days with dust, the source of dust entering the Isfahan area, and identify the route of its movement. …”
    Get full text
    Article
  5. 485

    Classification of SERS spectra for agrochemical detection using a neural network with engineered features by Mateo Frausto-Avila, Monserrat Ochoa-Elias, Jose Pablo Manriquez-Amavizca, María del Carmen González-López, Gonzalo Ramírez-García, Mario Alan Quiroz-Juárez

    Published 2025-01-01
    “…Surface-Enhanced Raman Spectroscopy (SERS) substrates offer a promising solution for the sensitive and specific detection of agrochemicals, enabling timely interventions to mitigate their harmful effects on humans and ecosystems. …”
    Get full text
    Article
  6. 486
  7. 487

    Serum albumin nanoparticles: Ligand functionalization for enhanced targeted therapeutics in precision medicine by Sakshi Shahapurmath, Bhuvaneshwari R. Sharannavar, Rahul Koli

    Published 2025-09-01
    “…This review provides a comprehensive analysis of recent advancements in the functionalization of albumin nanoparticles with diverse ligands to enhance targeting specificity and therapeutic efficacy. …”
    Get full text
    Article
  8. 488
  9. 489
  10. 490

    DP-YOLO: A Lightweight Real-Time Detection Algorithm for Rail Fastener Defects by Lihua Chen, Qi Sun, Ziyang Han, Fengwen Zhai

    Published 2025-03-01
    “…To enable accurate and efficient real-time detection of rail fastener defects under resource-constrained environments, we propose DP-YOLO, an advanced lightweight algorithm based on YOLOv5s with four key optimizations. …”
    Get full text
    Article
  11. 491

    Leveraging large language models for automated detection of velopharyngeal dysfunction in patients with cleft palate by Myranda Uselton Shirk, Catherine Dang, Jaewoo Cho, Hanlin Chen, Lily Hofstetter, Jack Bijur, Claiborne Lucas, Andrew James, Ricardo-Torres Guzman, Andrea Hiller, Noah Alter, Amy Stone, Maria Powell, Matthew E. Pontell, Matthew E. Pontell

    Published 2025-03-01
    “…BackgroundHypernasality, a hallmark of velopharyngeal insufficiency (VPI), is a speech disorder with significant psychosocial and functional implications. Conventional diagnostic methods rely heavily on specialized expertise and equipment, posing challenges in resource-limited settings. …”
    Get full text
    Article
  12. 492

    Employing SAE-GRU deep learning for scalable botnet detection in smart city infrastructure by Usman Tariq, Tariq Ahamed Ahanger

    Published 2025-04-01
    “…These findings enhance the understanding of IoT security by offering a scalable and resource-efficient solution for botnet detection. The functional investigation establishes a foundation for future research into adaptive security mechanisms that address emerging threats and highlights the practical potential of advanced deep learning techniques in safeguarding next-generation smart city ecosystems.…”
    Get full text
    Article
  13. 493
  14. 494

    GESC-YOLO: Improved Lightweight Printed Circuit Board Defect Detection Based Algorithm by Xiangqiang Kong, Guangmin Liu, Yanchen Gao

    Published 2025-05-01
    “…Simultaneously, the model size is reduced by 25.4%, the parameter count is cut down by 28.6%, and the computational resource consumption is reduced by 26.8%. This successfully achieves the harmonization of detection precision and model lightweighting.…”
    Get full text
    Article
  15. 495

    A lightweight algorithm for steel surface defect detection using improved YOLOv8 by Shuangbao Ma, Xin Zhao, Li Wan, Yapeng Zhang, Hongliang Gao

    Published 2025-03-01
    “…Finally, the SIoU (Simplified IoU ) is used to replace the traditional CIoU loss function, which can make the anchor frame more fast and accurate in the regression process, to improve the stability and the robustness of detection. …”
    Get full text
    Article
  16. 496

    SurfaceVision: An Automated Module for Surface Fault Detection in 3D Printed Products by Laukesh Kumar, Manoj Kumar Satyarthi

    Published 2025-01-01
    “…The traditional method currently requires visual information processing devices or continuous monitoring of the process via a camera, which is very resource consuming and costly. Machine learning techniques being used for automatic detection of the faults suffer in real time conditions with inefficient fault detection due to the inability of adaptation to real time changes in the printing process. …”
    Get full text
    Article
  17. 497

    CMCD: A Consistency Model-Based Change Detection Method for Remote Sensing Images by Xiongjie Li, Weiying Xie, Jiaqing Zhang, Yunsong Li

    Published 2025-01-01
    “…While denoising diffusion probabilistic models have shown preliminary success in this area, the quality of the generated change maps remains unsatisfactory. …”
    Get full text
    Article
  18. 498

    Deep learning vulnerability detection method based on optimized inter-procedural semantics of programs by Yan LI, Weizhong QIANG, Zhen LI, Deqing ZOU, Hai JIN

    Published 2023-12-01
    “…In recent years, software vulnerabilities have been causing a multitude of security incidents, and the early discovery and patching of vulnerabilities can effectively reduce losses.Traditional rule-based vulnerability detection methods, relying upon rules defined by experts, suffer from a high false negative rate.Deep learning-based methods have the capability to automatically learn potential features of vulnerable programs.However, as software complexity increases, the precision of these methods decreases.On one hand, current methods mostly operate at the function level, thus unable to handle inter-procedural vulnerability samples.On the other hand, models such as BGRU and BLSTM exhibit performance degradation when confronted with long input sequences, and are not adept at capturing long-term dependencies in program statements.To address the aforementioned issues, the existing program slicing method has been optimized, enabling a comprehensive contextual analysis of vulnerabilities triggered across functions through the combination of intra-procedural and inter-procedural slicing.This facilitated the capture of the complete causal relationship of vulnerability triggers.Furthermore, a vulnerability detection task was conducted using a Transformer neural network architecture equipped with a multi-head attention mechanism.This architecture collectively focused on information from different representation subspaces, allowing for the extraction of deep features from nodes.Unlike recurrent neural networks, this approach resolved the issue of information decay and effectively learned the syntax and semantic information of the source program.Experimental results demonstrate that this method achieves an F1 score of 73.4% on a real software dataset.Compared to the comparative methods, it shows an improvement of 13.6% to 40.8%.Furthermore, it successfully detects several vulnerabilities in open-source software, confirming its effectiveness and applicability.…”
    Get full text
    Article
  19. 499

    Design of Ultrasonic Flaw Detection Data Processing System Based on LabVIEW and FPGA by TAN Qunlin, ZHANG Dongfang, XIA Lang, HU Liang, ZHONG Sheng

    Published 2022-04-01
    “…LabVIEW FPGA is an embedded graphical development environment suitable for measurement and control field with high development efficiency, good code readability and rich library functions. Nevertheless,it mainly supports the FPGA board of national instrument company. …”
    Get full text
    Article
  20. 500