Suggested Topics within your search.
Suggested Topics within your search.
-
781
BiEHFFNet: A Water Body Detection Network for SAR Images Based on Bi-Encoder and Hybrid Feature Fusion
Published 2025-07-01“…Water body detection in synthetic aperture radar (SAR) imagery plays a critical role in applications such as disaster response, water resource management, and environmental monitoring. …”
Get full text
Article -
782
Karbon dots (C-dots) dari Bahan Hayati untuk Deteksi Logam Berat
Published 2023-05-01“…This study aims to review carbon nanoparticles derived from natural sources for detecting heavy metals. C-dots derived from biological sources have been widely studied as selective heavy metal detection. …”
Get full text
Article -
783
Software with artificial intelligence-derived algorithms for detecting and analysing lung nodules in CT scans: systematic review and economic evaluation
Published 2025-05-01“…Information required to populate the models included the prevalence of lung nodules, risk of lung cancer with different nodule sizes, sensitivity and specificity for nodule detection, nodule type and size distributions in different population, resource use, costs and utilities. …”
Get full text
Article -
784
A Lightweight Method for Road Defect Detection in UAV Remote Sensing Images with Complex Backgrounds and Cross-Scale Fusion
Published 2025-06-01“…Moreover, the CAA attention mechanism is employed to strengthen the model’s global feature extraction abilities; (2) a cross-scale feature fusion strategy known as GFPN is developed to tackle the problem of diverse target scales in road damage detection; (3) to reduce computational resource consumption, a lightweight detection head called EP-Detect has been specifically designed to decrease the model’s computational complexity and the number of parameters; and (4) the model’s localization capability for road damage targets is enhanced by integrating an optimized regression loss function called WiseIoUv3. …”
Get full text
Article -
785
-
786
Context-dependent PSIICOS: A novel framework for functional connectivity estimation accounting for task-related power leakage
Published 2025-08-01“…The results demonstrate that CD-PSIICOS outperforms the original PSIICOS in suppressing artifacts at the lower projection ranks, maintaining robust detection of functional networks across theta and gamma frequency bands. …”
Get full text
Article -
787
A Method for Service Function Chain Migration Based on Server Failure Prediction in Mobile Edge Computing Environment
Published 2025-01-01“…However, traditional hardware-based middleboxes limit flexibility and scalability, leading to the adoption of Network Function Virtualization (NFV). NFV enables the deployment of network functions as software, optimizing resource allocation and reducing costs. …”
Get full text
Article -
788
RE-YOLO: An apple picking detection algorithm fusing receptive-field attention convolution and efficient multi-scale attention.
Published 2025-01-01“…The accuracy of current apple picking detection algorithms is still limited when the distribution is dense and occlusion exists, and there is a significant challenge in deploying current high accuracy detection models on edge devices with limited computational resources. …”
Get full text
Article -
789
SILVERRUSH. XIV. Lyα Luminosity Functions and Angular Correlation Functions from 20,000 Lyα Emitters at z ∼ 2.2–7.3 from up to 24 deg2 HSC-SSP and CHORUS Surveys: Linking the Postr...
Published 2025-01-01“…We present luminosity functions (LFs) and angular correlation functions (ACFs) derived from 18,960 Ly α emitters (LAEs) at z = 2.2−7.3 over a wide survey area of ≲24 deg ^2 that are identified in the narrowband data of the HSC-SSP and CHORUS surveys. …”
Get full text
Article -
790
VIRify: An integrated detection, annotation and taxonomic classification pipeline using virus-specific protein profile hidden Markov models.
Published 2023-08-01“…Overall, we demonstrate that VIRify is a novel and powerful resource that offers an enhanced capability to detect a broad range of viral contigs and taxonomically classify them.…”
Get full text
Article -
791
Innovative Sandia Frequency Shift Islanding Detection for Microgrids Using Interval Type-II Fuzzy Logic and VP-PSO Optimization
Published 2025-01-01“…Using probability density functions (PDFs), multiple uncertainty scenarios were generated, with representative scenarios selected via Monte Carlo simulation (MCS) for IDM development. …”
Get full text
Article -
792
Improved smart city security using a deep maxout network-based intrusion detection system with walrus optimization
Published 2025-03-01“…Methods This research addresses the need for robust intrusion detection systems (IDS) tailored to the unique challenges of securing public transportation within smart cities. …”
Get full text
Article -
793
A Small-Sample Target Detection Method of Side-Scan Sonar Based on CycleGAN and Improved YOLOv8
Published 2025-02-01Get full text
Article -
794
First Stability Characterization for a CZT Detection System in an e<sup>+</sup>e<sup>−</sup> Collider Environment
Published 2024-11-01“…Additionally, this study introduces a validated model of the response function of the detector. The relative deviations from the nominal values for the source transitions, obtained by fitting the entire spectrum with a background function and the previously introduced response function, are reported. …”
Get full text
Article -
795
-
796
Detection of power theft in sensitive stations based on generalized robust distance metric and multi-classification support vector machine
Published 2025-04-01“…Through training and optimization, the support vector machine outputs the detection results of electricity stealing behavior according to the decision function, and realizes the accurate detection of electricity stealing behavior. …”
Get full text
Article -
797
Enhancing Cybersecurity Through Fusion of Optimization With Deep Wavelet Neural Networks on Denial of Wallet Attack Detection in Serverless Computing
Published 2025-01-01“…Deep learning (DL) models show strong potential in detecting DoW attacks, where attackers disrupt services by exploiting system resources. …”
Get full text
Article -
798
DETECTION AND SYSTEMATIZATION OF SIGNS AND MARKERS OF MODIFICATIONS IN MEDIA CONTENT FOR THE DEVELOPMENT OF A METHODOLOGY TO ENHANCING CRITICAL THINKING IN THE ERA OF DEEPFAKES
Published 2024-02-01“…The paper focuses on creating a comprehensive framework for detecting manipulated content and identifying indicators such as pixelization, unnatural expressions, etc. …”
Get full text
Article -
799
-
800
Characterising the metabolic functionality of the preterm neonatal gut microbiome prior to the onset of necrotising enterocolitis: a pilot study
Published 2024-12-01“…The microbiota of NEC and control infants showed similar wide-ranging metabolic functionalities. All 94 carbon sources were utilised to varying extents but NEC and control samples clustered separately by supervised ordination based on carbon source utilisation profiles. …”
Get full text
Article