-
241
Reinforcement Learning-Based Resource Allocation Scheme of NR-V2X Sidelink for Joint Communication and Sensing
Published 2025-01-01“…Joint communication and sensing (JCS) is becoming an important trend in 6G, owing to its efficient utilization of spectrums and hardware resources. Utilizing echoes of the same signal can achieve the object location sensing function, in addition to the V2X communication function. …”
Get full text
Article -
242
LE-YOLO: A Lightweight and Enhanced Algorithm for Detecting Surface Defects on Particleboard
Published 2025-07-01Get full text
Article -
243
Assessment of the Integrated Communicable Disease Surveillance and Response System in Thamar Governorate, Yemen
Published 2024-12-01“…The questionnaire included two sections: assessment of core activities of the IDSR system (structure, case confirmation, data reporting, data analysis, outbreak investigation, epidemic preparedness, epidemic responses, feedback) and assessment of support functions of the IDSR system (supervision, training, coordination, logistics and resources). …”
Article -
244
YOLO-PEL: The Efficient and Lightweight Vehicle Detection Method Based on YOLO Algorithm
Published 2025-03-01“…YOLOv8-PEL shows outstanding performance in detection accuracy, computational efficiency, and generalization capability, making it suitable for real-time and resource-constrained applications. …”
Get full text
Article -
245
Algorithms for Automatic Detection and Location of Infrasound Events in the PSDL System
Published 2024-12-01“…An algorithm for detecting infrasound signals by calculating the cross-correlation function between records of individual sensors in a array is described. …”
Get full text
Article -
246
Detection, Parameter Estimation and Direction Finding of Periodic Pulse Signals
Published 2025-07-01“…Simple-to-implement algorithms for detecting periodic pulse signals, evaluating their parameters, and direction finding of the source have been developed. …”
Get full text
Article -
247
Code vulnerability detection method based on graph neural network
Published 2021-06-01“…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
Get full text
Article -
248
Exploring RNA cargo in extracellular vesicles for pleural mesothelioma detection
Published 2025-02-01“…Conclusions This is the first study to characterize the transcriptomic profile of EVs secreted by PM primary cell cultures, demonstrating their potential as biomarker source for early detection. Further investigation of the functional role of PM-EVs will provide new insights into disease biology and therapeutic avenues.…”
Get full text
Article -
249
Distribution and functional significance of KLF15 in mouse cerebellum
Published 2025-01-01Get full text
Article -
250
Research on intrusion detection model based on improved MLP algorithm
Published 2025-02-01“…These patterns can be effectively captured through MLP’s multiple nonlinear transformations, such as ReLU and Sigmoid activation functions, which are especially beneficial for intrusion detection. …”
Get full text
Article -
251
Transformer-based ECG classification for early detection of cardiac arrhythmias
Published 2025-08-01“…Electrocardiogram (ECG) classification plays a critical role in early detection and trocardiogram (ECG) classification plays a critical role in early detection and monitoring cardiovascular diseases. …”
Get full text
Article -
252
Performance Analysis of Diabetes Detection Using Machine Learning Classifiers
Published 2024-10-01Get full text
Article -
253
Fast detection method for radionuclides based on Sequential Bayesian approach
Published 2025-01-01“…Finally, experimental verifications were conducted on the feasibility, detection performance, and universality of the method by placing a set of standard point sources at different distances from the front of a LaBr3(Ce) detection system in both low and natural radiation background environments. …”
Get full text
Article -
254
Toward global rooftop PV detection with Deep Active Learning
Published 2024-12-01“…It is crucial to know the location of rooftop PV systems to monitor the regional progress toward sustainable societies and to ensure the integration of decentralized energy resources into the electricity grid. However, locations of PV are often unknown, which is why a large number of studies have proposed variants of Deep Learning to detect PV panels in remote sensing data using supervised Deep Learning. …”
Get full text
Article -
255
DWS-YOLO: A Lightweight Detector for Blood Cell Detection
Published 2024-12-01“…Improved attention, loss function, and suppression enhance detection accuracy, while lightweight C3 module reduces computation time. …”
Get full text
Article -
256
Radar Detection Simulation by Digital Twins of Target and Antenna System
Published 2025-03-01“…The signal-to-noise dynamic dependence of the given radar system, space object, and observation scenario, presented by their digital models, was calculated. The function of detection probability density was calculated, which demonstrated an insufficient detection capacity of a radar system in the case of observation of such type of objects.Conclusion. …”
Get full text
Article -
257
A Lightweight Citrus Object Detection Method in Complex Environments
Published 2025-05-01“…Aiming at the limitations of current citrus detection methods in complex orchard environments, especially the problems of poor model adaptability and high computational complexity under different lighting, multiple occlusions, and dense fruit conditions, this study proposes an improved citrus detection model, YOLO-PBGM, based on You Only Look Once v7 (YOLOv7). …”
Get full text
Article -
258
Improved CSW-YOLO Model for Bitter Melon Phenotype Detection
Published 2024-11-01“…The diversity of bitter melon shapes has a direct impact on its market acceptance and consumer preferences, making precise identification of bitter melon germplasm resources crucial for breeding work. To address the limitations of time-consuming and less accurate traditional manual identification methods, there is a need to enhance the automation and intelligence of bitter melon phenotype detection. …”
Get full text
Article -
259
Survey on key technologies for protective DNS service
Published 2024-10-01“…The domain name system (DNS) is a naming service for Internet resources that provides the function of converting from domain names to IP addresses. …”
Get full text
Article -
260
Schizophrenia Detection and Classification: A Systematic Review of the Last Decade
Published 2024-11-01“…Research has been sourced from multiple databases and screened using predefined inclusion criteria. …”
Get full text
Article