Search alternatives:
resource » source (Expand Search)
Showing 41 - 60 results of 2,685 for search '(( sources detection functions ) OR (( resource OR success) detection function ))', query time: 0.36s Refine Results
  1. 41
  2. 42

    PFW-YOLO Lightweight Helmet Detection Algorithm by Yue Hong, Hao Wang, Shuo Guo

    Published 2025-01-01
    “…However, due to the limited arithmetic and storage resources of edge-end devices, and the traditional detection algorithms have problems such as the number of parameters and large computational volume, the detection algorithms are difficult to be deployed practically. …”
    Get full text
    Article
  3. 43
  4. 44

    The Cosmic Evolution of Fast Radio Bursts Inferred from the CHIME/FRB Baseband Catalog 1 by Om Gupta, Paz Beniamini, Pawan Kumar, Steven L. Finkelstein

    Published 2025-01-01
    “…Testing two types of redshift evolution models suggests a likely combination of young and old formation channels. $3{1}_{-21}^{+31}$ % of FRB sources may track star formation, or correspondingly, FRB sources may have delay times of $1.9{4}_{-1.31}^{+1.54}$ Gyr. …”
    Get full text
    Article
  5. 45
  6. 46

    Sustainable Valorization of Jackfruit Peel Waste: Bio‐Functional and Structural Characterization by Rangina Brahma, Subhajit Ray, Prakash Kumar Nayak, Kandi Shridhar

    Published 2025-03-01
    “…ABSTRACT The sustainable utilization of agricultural waste holds immense promise in addressing environmental concerns and promoting resource efficiency. In this context, jackfruit (Artocarpus heterophyllus) peel waste emerges as a valuable yet underexplored resource. …”
    Get full text
    Article
  7. 47

    Optimizing Pre-Trained Code Embeddings With Triplet Loss for Code Smell Detection by Ali Nizam, Ertugrul Islamoglu, Omer Kerem Adali, Musa Aydin

    Published 2025-01-01
    “…Although code embedding-based systems have been successfully applied to various source code analysis tasks, further research is required to enhance code embedding for better code analysis capabilities, aiming to surpass the performance and functionality of static code analysis tools. …”
    Get full text
    Article
  8. 48

    Design and analysis of intelligent service chain system for network security resource pool by Zenan WANG, Jiahao LI, Chaohong TAN, Dechang PI

    Published 2022-08-01
    “…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
    Get full text
    Article
  9. 49

    Germ Cell Dysfunction is Universal in Adolescent Male Patients with β-thalassemia Following Earlier Successful Hematopoietic Stem Cell Transplantation by Nuttha Piriyapokin, Pat Mahachoklertwattana, Preamrudee Poomthavorn, Usanarat Anurathapan, Wararat Chiangjong

    Published 2025-06-01
    “…Objective: To assess gonadal function in adolescent male patients with β-thalassemia who underwent earlier successful hematopoietic stem cell transplantation (HSCT). …”
    Get full text
    Article
  10. 50

    Deep learning vulnerability detection method based on optimized inter-procedural semantics of programs by Yan LI, Weizhong QIANG, Zhen LI, Deqing ZOU, Hai JIN

    Published 2023-12-01
    “…In recent years, software vulnerabilities have been causing a multitude of security incidents, and the early discovery and patching of vulnerabilities can effectively reduce losses.Traditional rule-based vulnerability detection methods, relying upon rules defined by experts, suffer from a high false negative rate.Deep learning-based methods have the capability to automatically learn potential features of vulnerable programs.However, as software complexity increases, the precision of these methods decreases.On one hand, current methods mostly operate at the function level, thus unable to handle inter-procedural vulnerability samples.On the other hand, models such as BGRU and BLSTM exhibit performance degradation when confronted with long input sequences, and are not adept at capturing long-term dependencies in program statements.To address the aforementioned issues, the existing program slicing method has been optimized, enabling a comprehensive contextual analysis of vulnerabilities triggered across functions through the combination of intra-procedural and inter-procedural slicing.This facilitated the capture of the complete causal relationship of vulnerability triggers.Furthermore, a vulnerability detection task was conducted using a Transformer neural network architecture equipped with a multi-head attention mechanism.This architecture collectively focused on information from different representation subspaces, allowing for the extraction of deep features from nodes.Unlike recurrent neural networks, this approach resolved the issue of information decay and effectively learned the syntax and semantic information of the source program.Experimental results demonstrate that this method achieves an F1 score of 73.4% on a real software dataset.Compared to the comparative methods, it shows an improvement of 13.6% to 40.8%.Furthermore, it successfully detects several vulnerabilities in open-source software, confirming its effectiveness and applicability.…”
    Get full text
    Article
  11. 51

    Improved UAV Target Detection Model for RT-DETR by Yong He, Yufan Pang, Guolin Ou, Renfeng Xiao, Yifan Tang

    Published 2025-01-01
    “…Furthermore, the Focaler-MPDIoU loss function has been developed to address the challenge of suboptimal localization accuracy for hard-to-detect targets and diminutive targets. …”
    Get full text
    Article
  12. 52

    Detecting and routing of dust event using remote sensing and numerical modeling in Isfahan Province by Mehdii Jafari, Gholamreza Zehtabian, Hasan Ahmadi, Tayebeh Mesbahzadeh, Ali Akbar Norouzi

    Published 2020-03-01
    “…In addition, numerical weather models alone are not capable of storm detection, which requires the use of dust detection methods based on data remote sensing. …”
    Get full text
    Article
  13. 53

    A powerful molecular marker to detect mutations at sorghum LOW GERMINATION STIMULANT 1 by Adedayo O. Adeyanju, Patrick J. Rich, Gebisa Ejeta

    Published 2025-03-01
    “…The LGS1 marker is useful for both detecting sources of lgs1 and introgressing Striga resistance into new genetic backgrounds.…”
    Get full text
    Article
  14. 54
  15. 55

    A statistical approach to assess interspecific consumptive competition and functional redundancy in ephemeral resource uses using camera traps by Yoshihiro Nakashima, Akane Hashizume, Akane Kanda

    Published 2024-07-01
    “…We extended time‐to‐detection occupancy modeling to quantify interspecific consumptive competition and redundancy of ecosystem functions through consumption between two species, while accounting for observation censoring. …”
    Get full text
    Article
  16. 56

    Aptamer-Functionalized Gold Nanoparticle Assay for Rapid Visual Detection of Norovirus in Stool Samples by Maytawan Thanunchai, Sirikwan Sangboonruang, Natthawat Semakul, Kattareeya Kumthip, Niwat Maneekarn, Khajornsak Tragoolpua

    Published 2025-06-01
    “…Detection relies on MgCl<sub>2</sub>-induced changes in the color and absorbance of these aptamer-functionalized AuNPs. …”
    Get full text
    Article
  17. 57

    Robotic arm target detection algorithm combined with deep learning by ZHANG Lei, ZHANG Wang, YUAN Yuan

    Published 2024-12-01
    “…Existing target detection algorithms deployed on robotic arms would occupy a large amount of system resources, have poor real-time detection performance, and have a large number of model parameters. …”
    Get full text
    Article
  18. 58

    Detection of Sensitive Malicious Android Functionalities Using Inter-Component Control-Flow Analysis by Rati Bhan, Parvez Faruki, Rajendra Pamula

    Published 2025-01-01
    “…The paper proposes a robust inter-component communication (ICC) based detection approach to identify such hidden functionality exploited by adversaries. …”
    Get full text
    Article
  19. 59
  20. 60

    Detection of Greenhouse and Typical Rural Buildings with Efficient Weighted YOLOv8 in Hebei Province, China by Bingkun Wang, Zhiyuan Liu, Jiangbo Xi, Siyan Gao, Ming Cong, Haixing Shang

    Published 2025-05-01
    “…The large-scale detection of greenhouses and rural buildings is important for natural resource surveys and farmland protection. …”
    Get full text
    Article