Search alternatives:
resource » source (Expand Search)
resources » sources (Expand Search)
Showing 241 - 260 results of 1,810 for search '(( sources detection functions ) OR (( resource OR resources) detection function ))', query time: 0.25s Refine Results
  1. 241

    Joint Multifractal Analysis and Source Testing of River Level Records Based on Multifractal Detrended Cross-Correlation Analysis by Liang Wu, Manling Wang, Tongzhou Zhao

    Published 2020-01-01
    “…It is important for the detection of change in multifractality in space. Besides, the cross-correlations in two analyzed series make the analysis of sources of joint multifractality difficult. …”
    Get full text
    Article
  2. 242

    Algorithms for Automatic Detection and Location of Infrasound Events in the PSDL System by Asming Vladimir Ernestovich, Fedorov Andrey Viktorovich

    Published 2024-12-01
    “…An algorithm for detecting infrasound signals by calculating the cross-correlation function between records of individual sensors in a array is described. …”
    Get full text
    Article
  3. 243

    Code vulnerability detection method based on graph neural network by Hao CHEN, Ping YI

    Published 2021-06-01
    “…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
    Get full text
    Article
  4. 244

    Detection, Parameter Estimation and Direction Finding of Periodic Pulse Signals by V. B. Manelis, I. S. Faustov, V. A. Kozmin

    Published 2025-07-01
    “…Simple-to-implement algorithms for detecting periodic pulse signals, evaluating their parameters, and direction finding of the source have been developed. …”
    Get full text
    Article
  5. 245

    Exploring RNA cargo in extracellular vesicles for pleural mesothelioma detection by Agnieszka Kraft, Michaela B. Kirschner, Vanessa Orlowski, Manuel Ronner, Caroline Bodmer, Valentina Boeva, Isabelle Opitz, Mayura Meerang

    Published 2025-02-01
    “…Conclusions This is the first study to characterize the transcriptomic profile of EVs secreted by PM primary cell cultures, demonstrating their potential as biomarker source for early detection. Further investigation of the functional role of PM-EVs will provide new insights into disease biology and therapeutic avenues.…”
    Get full text
    Article
  6. 246

    Schizophrenia Detection and Classification: A Systematic Review of the Last Decade by Arghyasree Saha, Seungmin Park, Zong Woo Geem, Pawan Kumar Singh

    Published 2024-11-01
    “…The SZ symptoms can significantly impair daily functioning, underscoring the need for advanced diagnostic tools. …”
    Get full text
    Article
  7. 247

    The Host Galaxies of Pulsar Timing Array Sources: Converting Supermassive Black Hole Binary Parameters into Electromagnetic Observables by Niccolò Veronesi, Maria Charisi, Stephen R. Taylor, Jessie Runnoe, Daniel J. D’Orazio

    Published 2025-01-01
    “…However, the large uncertainty in source localization will make the identification of its host environment challenging. …”
    Get full text
    Article
  8. 248
  9. 249

    Survey on key technologies for protective DNS service by MA Yongzheng, LI Hongtao, MA Zhongsheng, HU Weihong, ZHANG Zhongxian

    Published 2024-10-01
    “…The domain name system (DNS) is a naming service for Internet resources that provides the function of converting from domain names to IP addresses. …”
    Get full text
    Article
  10. 250
  11. 251

    Water quality anomaly detection research based on GRU-PINN model by Zhao Xinyu

    Published 2025-01-01
    “…Maintaining high-quality water resources is essential for sustainable urban water resource management and public health. …”
    Get full text
    Article
  12. 252
  13. 253

    Neural Posterior Estimation for Cataloging Astronomical Images with Spatially Varying Backgrounds and Point Spread Functions by Aakash Patel, Tianqing Zhang, Camille Avestruz, Jeffrey Regier, The LSST Dark Energy Science Collaboration

    Published 2025-01-01
    “…In experiments with semisynthetic images, we evaluate the method on key cataloging tasks: light source detection, star/galaxy separation, and flux measurement. …”
    Get full text
    Article
  14. 254

    Improving dependability with low power fault detection model for skinny-hash. by Sonal Arvind Barge, Gerardine Immaculate Mary

    Published 2024-01-01
    “…Two fault detection approaches are proposed to detect faults in cryptographic algorithms running on IoT devices. …”
    Get full text
    Article
  15. 255

    Study on lightweight strategies for L-YOLO algorithm in road object detection by Ji Hong, Kuntao Ye, Shubin Qiu

    Published 2025-03-01
    “…The demand for real-time, efficient object detection systems is growing. However, traditional algorithms often suffer from large parameter sizes and high computational costs, limiting their applicability in resource-constrained environments. …”
    Get full text
    Article
  16. 256

    The Bright Feature Transform for Prominent Point Scatterer Detection and Tone Mapping by Gregory D. Vetaw, Suren Jayasuriya

    Published 2025-03-01
    “…We then modify the BFT to present a difference of trigonometric functions to mitigate speckle scatterers and other random noise sources found in the imagery. …”
    Get full text
    Article
  17. 257

    SWMD-YOLO: A Lightweight Model for Tomato Detection in Greenhouse Environments by Quan Wang, Ye Hua, Qiongdan Lou, Xi Kan

    Published 2025-06-01
    “…This study proposes SWMD-YOLO, a lightweight multi-scale detection network optimized for greenhouse scenarios. …”
    Get full text
    Article
  18. 258

    SR-DETR: Target Detection in Maritime Rescue from UAV Imagery by Yuling Liu, Yan Wei

    Published 2025-06-01
    “…These outcomes highlight the practicality and reliability of our method in detecting individuals overboard, contributing to more precise and resource-efficient solutions for real-time maritime rescue efforts.…”
    Get full text
    Article
  19. 259

    RipFinder: real-time rip current detection on mobile devices by Fahim Khan, Akila de Silva, Ashleigh Palinkas, Gregory Dusek, James Davis, Alex Pang

    Published 2025-05-01
    “…To address this, we propose a client-server ML model-based computer vision system designed specifically to improve rip current detection accuracy. This novel approach enables the app to function with or without internet connectivity, proving particularly beneficial in regions without lifeguards or internet access. …”
    Get full text
    Article
  20. 260

    Comparative Analysis of Deep Learning Models for Intrusion Detection in IoT Networks by Abdullah Waqas, Sultan Daud Khan, Zaib Ullah, Mohib Ullah, Habib Ullah

    Published 2025-07-01
    “…However, the constrained processing capacities and resource limitations of IoT networks make them especially susceptible to cyber threats. …”
    Get full text
    Article