Showing 221 - 240 results of 1,810 for search '(( sources detection functions ) OR (( source OR resources) detection function ))', query time: 0.37s Refine Results
  1. 221
  2. 222
  3. 223
  4. 224

    Intelligent Firefighting Technology for Drone Swarms with Multi-Sensor Integrated Path Planning: YOLOv8 Algorithm-Driven Fire Source Identification and Precision Deployment Strateg... by Bingxin Yu, Shengze Yu, Yuandi Zhao, Jin Wang, Ran Lai, Jisong Lv, Botao Zhou

    Published 2025-05-01
    “…This study aims to improve the accuracy of fire source detection, the efficiency of path planning, and the precision of firefighting operations in drone swarms during fire emergencies. …”
    Get full text
    Article
  5. 225

    A fuzzy track-to-track association algorithm with dynamic time warping for trajectory-level vehicle detection by Siqi Wan, Huaqiao Mu, Ke Han, Taesu Cheong, Chi Xie

    Published 2025-03-01
    “…Multi-source track-to-track association (TTTA), which identifies trajectories from multiple sensors or data sources of the same dynamic vehicle, is an important data fusion technique widely applied to vehicle detection in the fields of road, marine, and aviation transportation. …”
    Get full text
    Article
  6. 226

    Computational Temporal Ghost Imaging Using Intensity-Only Detection Over a Single Optical Fiber by Jiang Tang, Yongwen Tang, Kun He, Luluzi Lu, Di Zhang, Mengfan Cheng, Lei Deng, Deming Liu, Minming Zhang

    Published 2018-01-01
    “…We propose a method of computational temporal ghost imaging over a single optical fiber using simple optical intensity detection instead of coherent detection. The transfer function of a temporal ghost imaging system over a single optical fiber is derived, which is a function of the total fiber dispersion and the power density spectrum of the light source. …”
    Get full text
    Article
  7. 227

    SOFTWARE COMPONENT DEVELOPMENT FOR PARALLEL GATEWAYS DETECTION AND QUALITY ASSESSMENT IN BPMN MODELS USING FUZZY LOGIC by Andrii Kopp, Ľuboš Cibák, Dmytro Orlovskyi, Dmytro Kudii

    Published 2025-07-01
    “…This features are evaluated using “soft” modeling rules based on fuzzy membership functions. Additionally, an activation function with the 0.5 threshold is used to generate binary quality indicators and calculate an integral quality assessment measure. …”
    Get full text
    Article
  8. 228
  9. 229

    Integrated Machine Learning and Region Growing Algorithms for Enhanced Concrete Crack Detection: A Novel Approach by Wenxuan Yao, Hui Li, Yanlin Li

    Published 2024-10-01
    “…Firstly, the regression method learns the image features of the dataset and the specific region growth threshold, and the regression function is trained by using the open-source dataset to determine the region growth threshold using the characteristics of the images included in the tests. …”
    Get full text
    Article
  10. 230

    Three-Dimensional Real-Scene-Enhanced GNSS/Intelligent Vision Surface Deformation Monitoring System by Yuanrong He, Weijie Yang, Qun Su, Qiuhua He, Hongxin Li, Shuhang Lin, Shaochang Zhu

    Published 2025-04-01
    “…The system integrates GNSS monitoring terminals and multi-source meteorological sensors to accurately capture minute displacements at monitoring points and multi-source Internet of Things (IoT) data, which are then automatically stored in MySQL databases. …”
    Get full text
    Article
  11. 231

    Arlclustering: an R package for community detection in social networks based on user interaction and association rule learning by Mohamed El-Moussaoui, Mohamed Hanine, Ali Kartit, Tarik Agouti

    Published 2025-07-01
    “…Abstract ARLClustering is an open-source R package for community detection in social networks. …”
    Get full text
    Article
  12. 232
  13. 233
  14. 234

    Vulnerability detection using BERT based LLM model with transparency obligation practice towards trustworthy AI by Jean Haurogné, Nihala Basheer, Shareeful Islam

    Published 2024-12-01
    “…The result shows higher accuracy of 91.8 % for the vulnerability detection and model explainability outcome is highly influenced by “vulnerable”, “function”, ''mysql_tmpdir_list'', “strmov” tokens using both SHAP and LIME framework. …”
    Get full text
    Article
  15. 235

    Highly Efficient Biphoton Generation from Thin Dense Atomic Ensemble by Heewoo Kim, Hansol Jeong, Han Seb Moon

    Published 2025-04-01
    “…Strongly correlated bright biphotons are generated via spontaneous four‐wave mixing from a dense atomic ensemble based on the 6S1/2–6P3/2–6D5/2 transition of 133Cs. Biphoton source achieves a detected biphoton count rate of 100 kilo‐counts per second, a heralding efficiency of 15%, and a maximum normalized crosscorrelation function value of 100 between the signal and idler photons, despite the low detector efficiency of a silicon avalanche photodetector being less than 25% at 917 nm. …”
    Get full text
    Article
  16. 236
  17. 237

    Lightweight Small Target Detection Algorithm Based on YOLOv8 Network Improvement by Xiaoyi Hao, Ting Li

    Published 2025-01-01
    “…Thirdly, it presents the FocalEloU-Loss function, which significantly enhances detection accuracy by refining bounding box predictions. …”
    Get full text
    Article
  18. 238

    Let ants find them: Using ants as eDNA samplers for detecting the invasive spotted lanternfly by Wei-Jiun Lin, Fang-Ling Chloe Liu, Lucie Cho, Chin-Cheng Scotty Yang

    Published 2025-04-01
    “…Compared to non-ant insects, ants exhibited higher SLF DNA concentrations, suggesting that honeydew ingestion serves as the primary eDNA source. These findings demonstrate that ants can function as efficient SLF eDNA samplers, providing a scalable and cost-effective alternative to existing SLF detection methods.…”
    Get full text
    Article
  19. 239
  20. 240