Search alternatives:
resource » source (Expand Search)
Showing 101 - 120 results of 2,685 for search '(( sources detection functions\ ) OR (( success OR resource) detection function\ ))', query time: 0.38s Refine Results
  1. 101
  2. 102

    Design and Validation of a Lightweight Entropy-Based Intrusion Detection Algorithm for Automotive CANs by Jiacheng Chen, Zhifu Wang

    Published 2025-06-01
    “…Experimental results demonstrate robust performance under low computational resources, achieving high detection accuracy with high recall (>80%) even at 10% bus load fluctuation thresholds. …”
    Get full text
    Article
  3. 103

    Software with artificial intelligence-derived algorithms for detecting and analysing lung nodules in CT scans: systematic review and economic evaluation by Julia Geppert, Peter Auguste, Asra Asgharzadeh, Hesam Ghiasvand, Mubarak Patel, Anna Brown, Surangi Jayakody, Emma Helm, Dan Todkill, Jason Madan, Chris Stinton, Daniel Gallacher, Sian Taylor-Phillips, Yen-Fu Chen

    Published 2025-05-01
    “…Information required to populate the models included the prevalence of lung nodules, risk of lung cancer with different nodule sizes, sensitivity and specificity for nodule detection, nodule type and size distributions in different population, resource use, costs and utilities. …”
    Get full text
    Article
  4. 104

    Vehicle detection method based on multi-layer selective feature for UAV aerial images by Yinbao Ma, Yuyu Meng, Jiuyuan Huo

    Published 2025-07-01
    “…For the detection head, a Generalized Wasserstein Distance Loss (GWDLoss) function is proposed to quantify positional and scale discrepancies, improving the adaptability of bounding box regression to geometric variations. …”
    Get full text
    Article
  5. 105
  6. 106

    THE SUCCESS OF SATELLITE GRAVIMETRY IN GEOPHYSICAL INVESTIGATIONS by Ahmad Alhassan, Okoro Ernest chidi, Mohammed Auwal Adamu, Salisu Tata, Muhammad Shettima Nur, Auwal Aliyu, Yusuf Abdulhameed

    Published 2024-03-01
    “…The successful geophysical researches carried out using satellite acquired gravity data from existing literature were also discussed. …”
    Get full text
    Article
  7. 107

    Hard-coded backdoor detection method based on semantic conflict by Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU

    Published 2023-02-01
    “…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
    Get full text
    Article
  8. 108
  9. 109

    DRBD-YOLOv8: A Lightweight and Efficient Anti-UAV Detection Model by Panpan Jiang, Xiaohua Yang, Yaping Wan, Tiejun Zeng, Mingxing Nie, Zhenghai Liu

    Published 2024-11-01
    “…Achieving real-time detection with high accuracy, while accommodating the limited resources of edge-computing devices poses a significant challenge for anti-UAV detection. …”
    Get full text
    Article
  10. 110

    An Improved Diagnosis Approach for Short-Circuit Fault Diagnosis in MPC-Based Current Source Inverter System by Jonggrist Jongudomkarn, Pirat Khunkitti, Apirat Siritaratiwat

    Published 2025-01-01
    “…Due to its excellent dynamic performance, the model predictive current control (MPC) method is widely adopted in power inverter systems, such as current source inverters (CSI). However, short-circuit faults in power switches are common in CSI systems, leading to a periodic output current distortion. …”
    Get full text
    Article
  11. 111

    Leveraging Multimodal Large Language Models (MLLMs) for Enhanced Object Detection and Scene Understanding in Thermal Images for Autonomous Driving Systems by Huthaifa I. Ashqar, Taqwa I. Alhadidi, Mohammed Elhenawy, Nour O. Khanfar

    Published 2024-10-01
    “…Two primary research questions are addressed: the capacity of these models to detect and enumerate objects within thermal images, and to determine whether pairs of image sources represent the same scene. …”
    Get full text
    Article
  12. 112

    Attraction and aversion of noctuid moths to fermented food sources coordinated by olfactory receptors from distinct gene families by Xiao-Qing Hou, Dan-Dan Zhang, Hanbo Zhao, Yang Liu, Christer Löfstedt, Guirong Wang

    Published 2025-01-01
    “…Conclusions Our findings suggest that this functional conservation is an olfactory adaptation that has allowed noctuid moths to extend their diet to fermented food sources.…”
    Get full text
    Article
  13. 113
  14. 114

    Dual‐Function Ceramic Pigments for Energy‐Efficient and Secure Autonomous Vehicles by Ik Hoon Jeong, Yong‐Jun Seo, Jum Soo Hwang, Geun Hyeong Kim, Yeong Jae Kim, Gil Ju Lee

    Published 2025-07-01
    “…Consequently, a bi‐function ceramic pigment (BFCP) is fabricated with both superior RC performance and heightened LiDAR detectability compared to commercial pigments. …”
    Get full text
    Article
  15. 115
  16. 116

    Multi-View Cluster Structure Guided One-Class BLS-Autoencoder for Intrusion Detection by Qifan Yang, Yu-Ang Chen, Yifan Shi

    Published 2025-07-01
    “…Multi-view OCC approaches usually require collecting multi-view traffic data from all sources and have difficulty detecting intrusion independently in each view. …”
    Get full text
    Article
  17. 117
  18. 118
  19. 119

    Regional Frequency Analysis Using L-Moments for Determining Daily Rainfall Probability Distribution Function and Estimating the Annual Wastewater Discharges by Pau Estrany-Planas, Pablo Blanco-Gómez, Juan I. Ortiz-Vallespí, Javier Orihuela-Martínez, Víctor Vilarrasa

    Published 2025-06-01
    “…In the evaluation of the prediction capacity, the selected cluster of 7 stations performed in the first quartile of the 120 possible combinations of 7 stations, both for the detection of the occurrence of rainfall—in terms of Probability of Detection (POD), False Alarm Ratio (FAR), Critical Success Index (CSI) and Bias Score (BS) statistics—and for the accuracy of rainfall—according to Root Mean Square Error (RMSE), Nash–Sutcliffe Efficiency coefficient (NSE) and Percent Bias (PBIAS). …”
    Get full text
    Article
  20. 120