Search alternatives:
resourcess » resource (Expand Search)
Showing 1 - 20 results of 1,810 for search '(( sources detection functions ) OR (( resourcess OR resources) detection function ))', query time: 0.37s Refine Results
  1. 1

    Metal surface defect detection using SLF-YOLO enhanced YOLOv8 model by Yuan Liu, Yilong Liu, Xiaoyan Guo, Xi Ling, Qingyi Geng

    Published 2025-04-01
    “…Abstract This paper addresses the industrial demand for precision and efficiency in metal surface defect detection by proposing SLF-YOLO, a lightweight object detection model designed for resource-constrained environments. …”
    Get full text
    Article
  2. 2

    ABDviaMSIFAT: Abnormal Crowd Behavior Detection Utilizing a Multi-Source Information Fusion Technique by Ali Ahmad Hamid, S. Amirhassan Monadjemi, Bijan Shoushtarian

    Published 2025-01-01
    “…To solve this issue, we suggest a new method that combines data from various sources with different characteristics to enhance the precision of detecting human behavior in crowds. …”
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Fine-grained building function recognition with street-view images and GIS map data via geometry-aware semi-supervised learning by Weijia Li, Jinhua Yu, Dairong Chen, Yi Lin, Runmin Dong, Xiang Zhang, Conghui He, Haohuan Fu

    Published 2025-03-01
    “…In this work, we propose a geometry-aware semi-supervised method for fine-grained building function recognition, which effectively uses multi-source geoinformation data to achieve accurate function recognition in both single-city and cross-city scenarios. …”
    Get full text
    Article
  6. 6

    Identification and Mining of Functional Components of Polyphenols in Fruits of <i>Malus</i> Germplasm Resources Based on Multivariate Analysis by Dajiang Wang, Guangyi Wang, Xiang Lu, Zhao Liu, Simiao Sun, Hanxin Guo, Wen Tian, Zichen Li, Lin Wang, Lianwen Li, Yuan Gao, Kun Wang

    Published 2024-10-01
    “…These results provide us with information regarding the polyphenol composition and content of the wild apple resources and local cultivars. The high polyphenol content resources obtained by screening can be used as raw materials for the extraction of polyphenol components and functional fruit juice processing and can also be used as parents for functional fruit creation and variety breeding.…”
    Get full text
    Article
  7. 7

    Toward Compliance and Transparency in Raw Material Sourcing With Blockchain and Edge AI by Abderrahim Khiari, Anas Osman, Massimo Vecchio, Mattia Antonini, Miguel Pincheira

    Published 2025-01-01
    “…This low-power device enables real-time detection of shipment anomalies such as tampering or unauthorized access, even in offline and resource-limited environments. …”
    Get full text
    Article
  8. 8

    Potential Source Density Function: A New Tool for Identifying Air Pollution Sources by In Sun Kim, Yong Pyo Kim, Daehyun Wee

    Published 2022-01-01
    “…Abstract Potential source density function (PSDF) is developed to identify, that is, locate and quantify, source areas of ambient trace species based on Gaussian process regression (GPR), a machine-learning technique. …”
    Get full text
    Article
  9. 9
  10. 10
  11. 11
  12. 12

    An enhancement filter utilizing the modified arctangent function for the structural and tectonic interpretation of causative sources: Application to WGM2012 gravity data from the R... by Fengjun WU, Xin-Ai XU

    Published 2025-06-01
    “…In this study, we propose the Modified Arctangent Function (MAT), which enhances gravity source edge detection by integrating the total horizontal gradient with a modified arctangent function. …”
    Get full text
    Article
  13. 13

    Resource scheduling based on routing tree and detection matrix for Internet of things by Hongying Bai, Xiaotong Zhang, Yuxin Liu, Yingdong Xie

    Published 2021-03-01
    “…This article proposes a new efficient resource scheduling based on routing tree and detection matrix for Internet of things. …”
    Get full text
    Article
  14. 14

    Source Detection and Functional Connectivity of the Sensorimotor Cortex during Actual and Imaginary Limb Movement: A Preliminary Study on the Implementation of eConnectome in Motor Imagery Protocols by Alkinoos Athanasiou, Chrysa Lithari, Konstantina Kalogianni, Manousos A. Klados, Panagiotis D. Bamidis

    Published 2012-01-01
    “…Event-Related Desynchronization/Synchronization (ERD/ERS) of the mu-rhythm was used to evaluate MI performance. Source detection and FCNs were studied with eConnectome. …”
    Get full text
    Article
  15. 15

    Feature dependence graph based source code loophole detection method by Hongyu YANG, Haiyun YANG, Liang ZHANG, Xiang CHENG

    Published 2023-01-01
    “…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
    Get full text
    Article
  16. 16

    Feature dependence graph based source code loophole detection method by Hongyu YANG, Haiyun YANG, Liang ZHANG, Xiang CHENG

    Published 2023-01-01
    “…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
    Get full text
    Article
  17. 17

    Selenium Accumulating Leafy Vegetables Are a Potential Source of Functional Foods by Petro E. Mabeyo, Mkabwa L. K. Manoko, Amra Gruhonjic, Paul A. Fitzpatrick, Göran Landberg, Máté Erdélyi, Stephen S. Nyandoro

    Published 2015-01-01
    “…., Cucurbita maxima, Ipomoea batatas, Solanum villosum, Solanum scabrum, and Vigna unguiculata were explored for their capabilities to accumulate selenium when grown on selenium enriched soil and for use as a potential source of selenium enriched functional foods. Their selenium contents were determined by spectrophotometry using the complex of 3,3′-diaminobenzidine hydrochloride (DABH) as a chromogen. …”
    Get full text
    Article
  18. 18

    A Joint Optimization Method for Cooperative Detection Resources Based on Channel Capacity by Wenda Yang, Minggong Wu, Xiangxi Wen, Kexin Bi

    Published 2022-01-01
    “…Aiming at the resource optimization problem in the cooperative detection task, the objective function is constructed based on the channel capacity, and the artificial bee colony (ABC) algorithm is improved to realize the joint optimization of the UAV swarm trajectory and radiation power. …”
    Get full text
    Article
  19. 19

    Go Source Code Vulnerability Detection Method Based on Graph Neural Network by Lisha Yuan, Yong Fang, Qiang Zhang, Zhonglin Liu, Yijia Xu

    Published 2025-06-01
    “…With the widespread application of the Go language, the demand for vulnerability detection in Go programs is increasing. Existing detection models and methods have deficiencies in extracting source code features of Go programs and mainly focus on detecting concurrency vulnerabilities. …”
    Get full text
    Article
  20. 20