Search alternatives:
source » sources (Expand Search)
resource » resources (Expand Search)
resourcess » resourcesss (Expand Search)
source » sources (Expand Search)
resource » resources (Expand Search)
resourcess » resourcesss (Expand Search)
-
21
Advances in preparation and application of coal-based functional nanomaterials
Published 2025-07-01“…China’s energy resource endowment, characterized by “abundant coal but scarce oil”, establishes coal’s fundamental role in the national energy system. …”
Get full text
Article -
22
Introduction of AI Technology for Objective Physical Function Assessment
Published 2024-11-01“…This paper explored how artificial intelligence (AI) could predict physical function scores from various patient data sources and reviewed methods to measure objective physical function using this technology. …”
Get full text
Article -
23
A Lightweight Transformer Model for Defect Detection in Electroluminescence Images of Photovoltaic Cells
Published 2024-01-01“…To ensure solar panels function well, efficient and accurate defect detection of PV modules is essential. …”
Get full text
Article -
24
A fluorescence-enhanced inverse opal sensing film for multi-sources detection of formaldehyde
Published 2025-05-01Get full text
Article -
25
Anomaly Usage Behavior Detection Based on Multi-Source Water and Electricity Consumption Information
Published 2025-01-01“…Current resident anomaly detection technologies rely on single-source energy data, lacking detailed behavior pattern analysis. …”
Get full text
Article -
26
Prediction of Wafer Performance: Use of Functional Outlier Detection and Regression
Published 2025-01-01“…To exploit the consecutive nature of OES data, we propose a prediction method based on a functional approach using multivariate functional partial least squares regression, coupled with dimension reduction and a novel outlier detection technique via functional independent component analysis. …”
Get full text
Article -
27
Functionalized hydrogel-based colorimetric sensor for Cu2+ detection
Published 2025-01-01“…., highly toxic and bioaccumulative contaminants in water sources, has become a critical environmental concern. …”
Get full text
Article -
28
Improved UAV Target Detection Model for RT-DETR
Published 2025-01-01“…Furthermore, the Focaler-MPDIoU loss function has been developed to address the challenge of suboptimal localization accuracy for hard-to-detect targets and diminutive targets. …”
Get full text
Article -
29
MIF-YOLO: An Enhanced YOLO with Multi-Source Image Fusion for Autonomous Dead Chicken Detection
Published 2025-12-01“…Addressing the paucity of automated systems for the detection of dead poultry within large-scale agricultural settings, characterized by the onerous and time-consuming manual inspection processes, this study introduces an enhanced YOLO algorithm with multi-source image fusion (MIF-YOLO) for the autonomous identification of dead chicken. …”
Get full text
Article -
30
Sources of uncertainty in DNA metabarcoding of whole communities: Implications for its use in biomonitoring
Published 2025-08-01Get full text
Article -
31
Advances in choroid-glaucoma structural-functional correlations using swept-source optical coherence tomography
Published 2025-08-01“…Understanding the role of the choroid in glaucoma may lead to the development of new therapeutic approaches and thus facilitate the early detection, diagnosis and treatment of glaucoma.…”
Get full text
Article -
32
Human-Machine Function Allocation Method for Submersible Fault Detection Tasks
Published 2024-11-01Get full text
Article -
33
PFW-YOLO Lightweight Helmet Detection Algorithm
Published 2025-01-01“…However, due to the limited arithmetic and storage resources of edge-end devices, and the traditional detection algorithms have problems such as the number of parameters and large computational volume, the detection algorithms are difficult to be deployed practically. …”
Get full text
Article -
34
Sustainable Valorization of Jackfruit Peel Waste: Bio‐Functional and Structural Characterization
Published 2025-03-01“…ABSTRACT The sustainable utilization of agricultural waste holds immense promise in addressing environmental concerns and promoting resource efficiency. In this context, jackfruit (Artocarpus heterophyllus) peel waste emerges as a valuable yet underexplored resource. …”
Get full text
Article -
35
-
36
Design and analysis of intelligent service chain system for network security resource pool
Published 2022-08-01“…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
Get full text
Article -
37
Detecting and routing of dust event using remote sensing and numerical modeling in Isfahan Province
Published 2020-03-01“…In addition, numerical weather models alone are not capable of storm detection, which requires the use of dust detection methods based on data remote sensing. …”
Get full text
Article -
38
-
39
-
40