Showing 301 - 320 results of 1,810 for search '(( resource detection function ) OR (( source OR sources) detection function ))', query time: 0.31s Refine Results
  1. 301
  2. 302

    Optimization of train obstacle detection based on zone media controller unit by ZHOU Liming, HU Jiaqiao, SHEN Tuo

    Published 2024-11-01
    “…In addition, the need for comprehensive train detection including pantograph-catenary systems and running gears, lead to an increased number of on-board devices, resulting in fewer computational resources available for each detection system, and complicating equipment installation and maintenance. …”
    Get full text
    Article
  3. 303

    A review of deep learning models to detect malware in Android applications by Elliot Mbunge, Benhildah Muchemwa, John Batani, Nobuhle Mbuyisa

    Published 2023-12-01
    “…Smartphone applications use permissions to allow users to utilize different functionalities, making them susceptible to malicious software (malware). …”
    Get full text
    Article
  4. 304

    Ti3C2Tx@Pt nanocomposite based colorimetric and electrochemical dual-mode platform for glucose detection by Xuming Sun, Mingyan Zhang, Jinlong Chang, Linyan Xie, Qiongqiong Ren, Wenshuai Jiang, Zhen Jin, Shiqi Pan, Xiuli Yang, Wu Ren

    Published 2025-06-01
    “…Glucose is the main source of energy in cellular metabolism and is essential for normal cellular function and growth. …”
    Get full text
    Article
  5. 305

    Myoglobin expression improves T-cell metabolism and antitumor effector function by Haifeng C Xu, Diran Herebian, Ertan Mayatepek, Dirk Brenner, Aleksandra A Pandyra, Philipp A Lang, Sascha Dietrich, Julia Werner, Georgios Theodorakis, Ichiro Katahira, Mitrajit Ghosh, Michal Gorzkiewicz, Luisa de Sousa Santos, Ann Kathrin Bergmann, Max Anstötz, Anne Busch, Carsten Berndt

    Published 2025-06-01
    “…Although T cells expressing Mb exhibited increased expression of effector cytokines, PD-1 was still detected and targetable by anti-PD-1 monoclonal antibodies, which in combination with transfer of Mb-expressing T cells demonstrated maximal efficacy in delaying tumor growth.Conclusion Taken together, we show that expression of Mb in T cells can increase their metabolism, infiltration into the tumor tissue, and effector function against cancer cells.…”
    Get full text
    Article
  6. 306

    A Feature-Selective Independent Component Analysis Method for Functional MRI by Yi-Ou Li, Tülay Adali, Vince D. Calhoun

    Published 2007-01-01
    “…In this work, we propose a simple and effective scheme to incorporate prior knowledge about the sources of interest (SOIs) in independent component analysis (ICA) and apply the method to estimate brain activations from functional magnetic resonance imaging (fMRI) data. …”
    Get full text
    Article
  7. 307

    Multi task detection method for operating status of belt conveyor based on DR-YOLOM by Yongan LI, Tengjie CHEN, Hongwei WANG, Zhihao ZHANG

    Published 2025-06-01
    “…Secondly, as the model requires target recognition and segmentation of different types of tasks, an efficient layer aggregation network (RepGFPN) with skip layer connection structure is adopted to optimize the feature fusion part, greatly improving the detection accuracy of the model for different detection tasks while controlling the number of model parameters and inference speed; Finally, to address the detection tasks of three different label shapes, the Inner CIOU loss function is introduced to compensate for the weak generalization ability of the CIoU loss function in different detection tasks. …”
    Get full text
    Article
  8. 308

    Quantifying Truthfulness: A Probabilistic Framework for Atomic Claim-Based Misinformation Detection by Fahim Sufi, Musleh Alsulami

    Published 2025-05-01
    “…This paper addresses this gap by proposing a novel probabilistic framework that decomposes complex assertions into semantically atomic claims and computes their veracity through a structured evaluation of source credibility and evidence frequency. Each atomic unit is matched against a curated corpus of 11,928 cyber-related news entries using a binary alignment function, and its truthfulness is quantified via a composite score integrating both source reliability and support density. …”
    Get full text
    Article
  9. 309

    An optimization method of multiscale storage tank target detection introducing an attention mechanism by Wenjia Sun, Chunchun Hu, Nianxue Luo, Qiansheng Zhao

    Published 2024-01-01
    “…As containers for chemical storage, storage tanks are potential sources of hazards. Conducting target detection for hazard risk analysis is essential. …”
    Get full text
    Article
  10. 310

    Social Network Community Detection by Combining Self-Organizing Maps and Genetic Algorithms by Mehdi Ellouze

    Published 2021-01-01
    “…Social networks have become an important source of information from which we can extract valuable indicators that can be used in many fields such as marketing, statistics, and advertising among others. …”
    Get full text
    Article
  11. 311

    Research on Underwater Target Detection Technology Based on SMV-YOLOv11n by Dongcheng Liao, Yijun Shen, Jinyu Ou, Yanlian Du

    Published 2025-01-01
    “…High-precision underwater object detection is a crucial component for improving the efficiency of marine resource development. …”
    Get full text
    Article
  12. 312

    Video Analysis and Frame Prediction Based on Improved Object Detection and ConvGRU by Xijuan Wang, Ru Chen

    Published 2025-01-01
    “…The loss function and average accuracy mean have been improved, with a maximum detection accuracy of 0.947. …”
    Get full text
    Article
  13. 313

    Object detection with afordable robustness for UAV aerial imagery: model and providing method by Viacheslav Moskalenko, Artem Korobov, Yuriy Moskalenko

    Published 2024-08-01
    “…The model and method for ensuring the robustness of resource-constrained neural network systems for object detection in aerial video surveillance. …”
    Get full text
    Article
  14. 314
  15. 315

    3L-YOLO: A Lightweight Low-Light Object Detection Algorithm by Zhenqi Han, Zhen Yue, Lizhuang Liu

    Published 2024-12-01
    “…Existing methods often use image enhancement to improve detection, which results in a large amount of computational resource consumption. …”
    Get full text
    Article
  16. 316

    Automatic detection of foreign object intrusion along railway tracks based on MACENet. by Xichun Chen, Yu Tian, Ming Li, Bin Lv, Shuo Zhang, Zixian Qu, Jianqing Wu, Shiya Cheng

    Published 2025-01-01
    “…Ensuring high accuracy and efficiency in foreign object intrusion detection along railway lines is critical for guaranteeing railway operational safety under limited resource conditions. …”
    Get full text
    Article
  17. 317

    Rice disease detection method based on multi-scale dynamic feature fusion by Qian Fan, Runhao Chen, Bin Li

    Published 2025-05-01
    “…These optimizations enable efficient deployment on resource-constrained mobile devices, making the model highly suitable for real-time disease detection in practical agricultural scenarios where hardware limitations are critical. …”
    Get full text
    Article
  18. 318

    A Comprehensive Approach for Detecting and Handling MitM-ARP Spoofing Attacks by Standy Oei, Yohanes Suyanto, Reza Pulungan

    Published 2025-01-01
    “…In the host, we employ a combination of ping Round-Trip Time (RTT) anomaly detection, the SendARP function, static entry, and ping confirmation to detect and mitigate attacks. …”
    Get full text
    Article
  19. 319

    Real time wire rope detection method based on Rockchip RK3588 by Mengpeng Qian, Yong Wang, Shaoqing Liu, Zhanghou Xu, Zhenshan Ji, Ming Chen, Hailong Wu, Zuchao Zhang

    Published 2025-08-01
    “…To enhance non-destructive wire rope inspection, a Mini-YOLO model was developed by integrating MobileNetV3, the Coordinate Attention (CA) mechanism, and a novel loss function, Inner-IoU, into the YOLOv8 framework. This paper’s innovation lies not in creating algorithmic components from scratch, but in their synergistic integration and targeted optimization to solve the specific challenges of real-time defect detection on resource-constrained edge devices. …”
    Get full text
    Article
  20. 320

    An improved lightweight tiny-person detection network based on YOLOv8: IYFVMNet by Fan Yang, Lihu Pan, Hongyan Cui, Linliang Zhang

    Published 2025-04-01
    “…IntroductionIn the aviation field, drone search and rescue is a highly urgent task involving small target detection. In such a resource-constrained scenario, there are challenges of low accuracy and high computational requirements.MethodsThis paper proposes IYFVMNet, an improved lightweight detection network based on YOLOv8. …”
    Get full text
    Article