Showing 301 - 320 results of 1,810 for search '(( resource detection functions ) OR (( source OR sources) detection function ))', query time: 0.23s Refine Results
  1. 301

    Plug-and-Play Robust Aerial Object Detection Under Hazy Conditions by Wei Wu, Hao Chang, Zhiwen Chen, Zhu Li

    Published 2024-01-01
    “…Moreover, we also propose a detection feature pyramid loss function to more accurately restore object features. …”
    Get full text
    Article
  2. 302

    A review of deep learning models to detect malware in Android applications by Elliot Mbunge, Benhildah Muchemwa, John Batani, Nobuhle Mbuyisa

    Published 2023-12-01
    “…Android applications are indispensable resources that facilitate communication, health monitoring, planning, data sharing and synchronization, social interaction, business and financial transactions. …”
    Get full text
    Article
  3. 303

    A Universal Tire Detection Method Based on Improved YOLOv8 by Chi Guo, Mingxia Chen, Junjie Wu, Haipeng Hu, Luobing Huang, Junjie Li

    Published 2024-01-01
    “…However, traditional methods of tire defect detection have encountered problems such as slow detection speed, complex tire defect backgrounds, and limited hardware resources. …”
    Get full text
    Article
  4. 304
  5. 305

    Lightweight obstacle detection for unmanned mining trucks in open-pit mines by Guangwei Liu, Jian Lei, Zhiqing Guo, Senlin Chai, Chonghui Ren

    Published 2025-03-01
    “…In addition, this paper also adopts the amplitude-based layer adaptive sparse pruning algorithm (LAMP) to further compress the model size while maintaining efficient detection performance. Through this pruning strategy, the model further reduces its dependence on computing resources while maintaining key performance. …”
    Get full text
    Article
  6. 306

    Ti3C2Tx@Pt nanocomposite based colorimetric and electrochemical dual-mode platform for glucose detection by Xuming Sun, Mingyan Zhang, Jinlong Chang, Linyan Xie, Qiongqiong Ren, Wenshuai Jiang, Zhen Jin, Shiqi Pan, Xiuli Yang, Wu Ren

    Published 2025-06-01
    “…Glucose is the main source of energy in cellular metabolism and is essential for normal cellular function and growth. …”
    Get full text
    Article
  7. 307

    Myoglobin expression improves T-cell metabolism and antitumor effector function by Haifeng C Xu, Diran Herebian, Ertan Mayatepek, Dirk Brenner, Aleksandra A Pandyra, Philipp A Lang, Sascha Dietrich, Julia Werner, Georgios Theodorakis, Ichiro Katahira, Mitrajit Ghosh, Michal Gorzkiewicz, Luisa de Sousa Santos, Ann Kathrin Bergmann, Max Anstötz, Anne Busch, Carsten Berndt

    Published 2025-06-01
    “…Although T cells expressing Mb exhibited increased expression of effector cytokines, PD-1 was still detected and targetable by anti-PD-1 monoclonal antibodies, which in combination with transfer of Mb-expressing T cells demonstrated maximal efficacy in delaying tumor growth.Conclusion Taken together, we show that expression of Mb in T cells can increase their metabolism, infiltration into the tumor tissue, and effector function against cancer cells.…”
    Get full text
    Article
  8. 308

    A Feature-Selective Independent Component Analysis Method for Functional MRI by Yi-Ou Li, Tülay Adali, Vince D. Calhoun

    Published 2007-01-01
    “…In this work, we propose a simple and effective scheme to incorporate prior knowledge about the sources of interest (SOIs) in independent component analysis (ICA) and apply the method to estimate brain activations from functional magnetic resonance imaging (fMRI) data. …”
    Get full text
    Article
  9. 309

    Quantifying Truthfulness: A Probabilistic Framework for Atomic Claim-Based Misinformation Detection by Fahim Sufi, Musleh Alsulami

    Published 2025-05-01
    “…This paper addresses this gap by proposing a novel probabilistic framework that decomposes complex assertions into semantically atomic claims and computes their veracity through a structured evaluation of source credibility and evidence frequency. Each atomic unit is matched against a curated corpus of 11,928 cyber-related news entries using a binary alignment function, and its truthfulness is quantified via a composite score integrating both source reliability and support density. …”
    Get full text
    Article
  10. 310

    An optimization method of multiscale storage tank target detection introducing an attention mechanism by Wenjia Sun, Chunchun Hu, Nianxue Luo, Qiansheng Zhao

    Published 2024-01-01
    “…As containers for chemical storage, storage tanks are potential sources of hazards. Conducting target detection for hazard risk analysis is essential. …”
    Get full text
    Article
  11. 311

    Social Network Community Detection by Combining Self-Organizing Maps and Genetic Algorithms by Mehdi Ellouze

    Published 2021-01-01
    “…Social networks have become an important source of information from which we can extract valuable indicators that can be used in many fields such as marketing, statistics, and advertising among others. …”
    Get full text
    Article
  12. 312

    Multi task detection method for operating status of belt conveyor based on DR-YOLOM by Yongan LI, Tengjie CHEN, Hongwei WANG, Zhihao ZHANG

    Published 2025-06-01
    “…A single network is used to simultaneously recognize large-sized coal blocks, detect belt edges, and detect coal flow status. Compared with using a separate model for each task, integrating three different necks and heads into a model with a shared backbone can save a lot of computing resources and inference time. …”
    Get full text
    Article
  13. 313

    Video Analysis and Frame Prediction Based on Improved Object Detection and ConvGRU by Xijuan Wang, Ru Chen

    Published 2025-01-01
    “…The loss function and average accuracy mean have been improved, with a maximum detection accuracy of 0.947. …”
    Get full text
    Article
  14. 314
  15. 315

    A Comprehensive Approach for Detecting and Handling MitM-ARP Spoofing Attacks by Standy Oei, Yohanes Suyanto, Reza Pulungan

    Published 2025-01-01
    “…In the host, we employ a combination of ping Round-Trip Time (RTT) anomaly detection, the SendARP function, static entry, and ping confirmation to detect and mitigate attacks. …”
    Get full text
    Article
  16. 316

    Optimizing Pre-Trained Code Embeddings With Triplet Loss for Code Smell Detection by Ali Nizam, Ertugrul Islamoglu, Omer Kerem Adali, Musa Aydin

    Published 2025-01-01
    “…Although code embedding-based systems have been successfully applied to various source code analysis tasks, further research is required to enhance code embedding for better code analysis capabilities, aiming to surpass the performance and functionality of static code analysis tools. …”
    Get full text
    Article
  17. 317

    Automated identification of soil functional components based on NanoSIMS data by Yahan Hu, Johann Maximilian Zollner, Carmen Höschen, Martin Werner, Steffen A. Schweizer

    Published 2024-12-01
    “…The tool is provided as an open-source software toolbox (NanoT). In addition, a two-step unsupervised segmentation method was developed to identify soil functional components based on NanoSIMS analyses. …”
    Get full text
    Article
  18. 318
  19. 319

    First Detection of Low-frequency Striae in Interplanetary Type III Radio Bursts by Vratislav Krupar, Eduard P. Kontar, Jan Soucek, Lynn B. Wilson III, Adam Szabo, Oksana Kruparova, Hamish A. S. Reid, Mychajlo Hajos, David Pisa, Ondrej Santolik, Milan Maksimovic, Jolene S. Pickett

    Published 2025-01-01
    “…By combining high-resolution radio observations with well-calibrated in situ electron velocity distribution function data from the Wind spacecraft, we characterized the plasma properties of the burst source region near 0.32 au. …”
    Get full text
    Article
  20. 320

    Securing Electric Vehicle Performance: Machine Learning-Driven Fault Detection and Classification by Mahbub Ul Islam Khan, Md. Ilius Hasan Pathan, Mohammad Mominur Rahman, Md. Maidul Islam, Mohammed Arfat Raihan Chowdhury, Md. Shamim Anower, Md. Masud Rana, Md. Shafiul Alam, Mahmudul Hasan, Md. Shohanur Islam Sobuj, Md. Babul Islam, Veerpratap Meena, Francesco Benedetto

    Published 2024-01-01
    “…The motors of EVs store and consume electrical power from renewable energy (RE) sources through interfacing connections using power electronics technology to provide mechanical power through rotation. …”
    Get full text
    Article