Search alternatives:
resource » source (Expand Search)
Showing 381 - 400 results of 2,992 for search '((\ sources selection functions\ ) OR (( (sources OR sources) OR resource) detection function\ ))', query time: 0.38s Refine Results
  1. 381

    A lightweight personnel detection method for underground coal mines by Shuai WANG, Wei YANG, Yuxiang LI, Jiaqi WU, Wei YANG

    Published 2025-04-01
    “…Introduce SIoU instead of the original loss function to accelerate model convergence. Finally, the introduction of the Ghost module to optimize the backbone network can reduce the computational and parametric quantities of the model without losing the model performance, improve the detection speed, and make the model easier to be deployed on resource-constrained devices. …”
    Get full text
    Article
  2. 382
  3. 383

    A Benchmark Review of YOLO Algorithm Developments for Object Detection by Zhengmao Hua, Kaviya Aranganadin, Cheng-Cheng Yeh, Xinhe Hai, Chen-Yun Huang, Tsan-Chuen Leung, Hua-Yi Hsu, Yung-Chiang Lan, Ming-Chieh Lin

    Published 2025-01-01
    “…You Only Look Once (YOLO) has established itself as a prominent object detection framework due to its excellent balance between speed and accuracy. …”
    Get full text
    Article
  4. 384

    Lightweight detection algorithms for small targets on unmanned mining trucks by Shuoqi CHENG, Yilihamu·YAERMAIMAITI, Lirong XIE, Xiyu LI, Ying MA

    Published 2025-07-01
    “…Accurate target category detection is a prerequisite for obstacle avoidance decisions, and model lightweighting facilitates deployment in resource-limited conditions. …”
    Get full text
    Article
  5. 385

    Research on intrusion detection model based on improved MLP algorithm by Qihao Zhao, Fuwei Wang, Weimin Wang, Tianxin Zhang, Haodong Wu, Weijun Ning

    Published 2025-02-01
    “…These patterns can be effectively captured through MLP’s multiple nonlinear transformations, such as ReLU and Sigmoid activation functions, which are especially beneficial for intrusion detection. …”
    Get full text
    Article
  6. 386
  7. 387

    Features of Bearing on Underwater Object Using Phase Information of a Differential Stereo Sensor by V. A. Shirokov, A. I. Bazhenova, V. N. Milich

    Published 2024-06-01
    “…Taking into account the factor of smoothness and continuity of the object's trajectory makes it possible to qualitatively correct the selection of the maximum of the cross-correlation function of the stereo sensor signals. …”
    Get full text
    Article
  8. 388

    A rapid and accurate method for Helicobacter pylori detection via integrating LAMP assay with CRISPR/Cas12b detection by one-step in one-pot by Yeqian Zhang, Tao Liu, Puhua Zhang, Bo Ni, Xingang Wang, Long Bai, Wei Sun, Yujing Guan, Xiang Xia, Hui Cao, Jiayi Gu

    Published 2025-08-01
    “…Conventional diagnostic methods, such as PCR and culture, require specialized equipment and expertise, limiting their applicability in resource-limited settings. There is a pressing need for a rapid, cost-effective, and user-friendly diagnostic platform for HP detection, particularly in point-of-care settings.MethodsWe developed an integrated detection platform combining loop-mediated isothermal amplification (LAMP) with the CRISPR/Cas12b system in a single, one-step, one-pot reaction. …”
    Get full text
    Article
  9. 389
  10. 390

    Code vulnerability detection method based on graph neural network by Hao CHEN, Ping YI

    Published 2021-06-01
    “…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
    Get full text
    Article
  11. 391

    Data‐Driven Materials Research and Development for Functional Coatings by Kai Xu, Xuelian Xiao, Linjing Wang, Ming Lou, Fangming Wang, Changheng Li, Hui Ren, Xue Wang, Keke Chang

    Published 2024-11-01
    “…In this paper, recent advances in data‐driven materials research and development (R&D) for functional coatings, highlighting the importance, data sources, working processes, and applications of this paradigm are summarized. …”
    Get full text
    Article
  12. 392

    Algorithms for Automatic Detection and Location of Infrasound Events in the PSDL System by Asming Vladimir Ernestovich, Fedorov Andrey Viktorovich

    Published 2024-12-01
    “…An algorithm for detecting infrasound signals by calculating the cross-correlation function between records of individual sensors in a array is described. …”
    Get full text
    Article
  13. 393

    Enhancing Antioxidant Benefits of Kombucha Through Optimized Glucuronic Acid by Selected Symbiotic Fermentation Culture by Yu-Chieh Chou, Hui-Wen Lin, Chung-Yi Wang, Chen-Che Hsieh, Shella Permatasari Santoso, Shin-Ping Lin, Kuan-Chen Cheng

    Published 2024-10-01
    “…To optimize the glucuronic acid content in kombucha, various strain combinations by selecting fermented sources were accomplished. According to the experimental results, kombucha produced through co-fermentation with <i>Pichia anomala</i> and <i>Komagataeibacter hansenii</i>, with glucose-added black tea as the carbon source, exhibited the highest glucuronic acid production. …”
    Get full text
    Article
  14. 394
  15. 395

    Detection, Parameter Estimation and Direction Finding of Periodic Pulse Signals by V. B. Manelis, I. S. Faustov, V. A. Kozmin

    Published 2025-07-01
    “…Simple-to-implement algorithms for detecting periodic pulse signals, evaluating their parameters, and direction finding of the source have been developed. …”
    Get full text
    Article
  16. 396

    A Lightweight Transformer Model for Defect Detection in Electroluminescence Images of Photovoltaic Cells by Yang Yang, Jing Zhang, Xin Shu, Lei Pan, Ming Zhang

    Published 2024-01-01
    “…To ensure solar panels function well, efficient and accurate defect detection of PV modules is essential. …”
    Get full text
    Article
  17. 397

    Transformer-based ECG classification for early detection of cardiac arrhythmias by Sunnia Ikram, Amna Ikram, Harvinder Singh, Malik Daler Ali Awan, Sajid Naveed, Isabel De la Torre Díez, Henry Fabian Gongora, Thania Candelaria Chio Montero

    Published 2025-08-01
    “…Electrocardiogram (ECG) classification plays a critical role in early detection and trocardiogram (ECG) classification plays a critical role in early detection and monitoring cardiovascular diseases. …”
    Get full text
    Article
  18. 398
  19. 399

    Peculiarities of the Functioning of the Taboo Lexicon in the Modern Western Cinematography by S. A. Pankratova

    Published 2023-02-01
    “…The implementation presupposes analysis of taboo lexical units, revealing their functioning features as regards to acceptable implementation of the taboo and to depict the possible ways of optimization of its use in modern cinema.Methodology and sources. …”
    Get full text
    Article
  20. 400

    The role of vesicle trafficking genes in osteoblast differentiation and function by Hui Zhu, Yingying Su, Jamie Wang, Joy Y. Wu

    Published 2023-09-01
    “…The top 3 annotations are all associated with endoplasmic reticulum and Golgi vesicle transport. We selected 22 trafficking genes that have not been well characterized in bone for functional validation in MC3T3-E1 pre-osteoblasts. …”
    Get full text
    Article