Search alternatives:
sourcess » success (Expand Search)
Showing 281 - 300 results of 2,089 for search '(( sources detection functions ) OR (( sourcess OR source) selection function ))', query time: 0.33s Refine Results
  1. 281

    The Host Galaxies of Pulsar Timing Array Sources: Converting Supermassive Black Hole Binary Parameters into Electromagnetic Observables by Niccolò Veronesi, Maria Charisi, Stephen R. Taylor, Jessie Runnoe, Daniel J. D’Orazio

    Published 2025-01-01
    “…However, the large uncertainty in source localization will make the identification of its host environment challenging. …”
    Get full text
    Article
  2. 282
  3. 283

    Feature selection using a multi-strategy improved parrot optimization algorithm in software defect prediction by Qi Fei, Guisheng Yin, Zhian Sun

    Published 2025-04-01
    “…Finally, to further enhance the classification performance of defect prediction, a heterogeneous data stacking ensemble learning algorithm (HEDSE) based on feature selection is proposed. Experimental evaluations on 16 open-source software defect datasets indicate that the proposed HEDSE outperforms existing methods, providing a novel and effective solution for software defect prediction. …”
    Get full text
    Article
  4. 284

    MDV ClimEx: An open-source tool for exploring climate anomalies in the McMurdo Dry Valleys of Antarctica by Renée F. Brown, Gavin P. Wagner

    Published 2025-12-01
    “…Here, we introduce MDV ClimEx, an open-source, interactive web application designed for user-driven exploration of long-term meteorological records from the MDVs. …”
    Get full text
    Article
  5. 285
  6. 286

    A Lightweight Transformer Model for Defect Detection in Electroluminescence Images of Photovoltaic Cells by Yang Yang, Jing Zhang, Xin Shu, Lei Pan, Ming Zhang

    Published 2024-01-01
    “…To ensure solar panels function well, efficient and accurate defect detection of PV modules is essential. …”
    Get full text
    Article
  7. 287

    Biphoton Waveforms of Photon Pair from Velocity‐Selective Atoms in a Doppler‐Broadened Atomic Ensemble by Hansol Jeong, Heewoo Kim, Danbi Kim, Han Seb Moon

    Published 2025-06-01
    “…Here, the beat phenomenon in the autocorrelation function of the telecom‐wavelength photon due to the velocity‐selective classes of the atoms in a Doppler‐broadened atomic ensemble of the cascade‐type 5S1/2–5P3/2–4D5/2 transition of 87Rb is reported. …”
    Get full text
    Article
  8. 288

    Location- and feature-based selection histories make independent, qualitatively distinct contributions to urgent visuomotor performance by Emily E Oor, Emilio Salinas, Terrence R Stanford

    Published 2025-06-01
    “…Although less well studied, selection history, which reflects multiple facets of experience with recent events, is increasingly recognized as a distinct source of attentional bias. …”
    Get full text
    Article
  9. 289

    Neural Posterior Estimation for Cataloging Astronomical Images with Spatially Varying Backgrounds and Point Spread Functions by Aakash Patel, Tianqing Zhang, Camille Avestruz, Jeffrey Regier, The LSST Dark Energy Science Collaboration

    Published 2025-01-01
    “…In experiments with semisynthetic images, we evaluate the method on key cataloging tasks: light source detection, star/galaxy separation, and flux measurement. …”
    Get full text
    Article
  10. 290
  11. 291

    Determination of selection criteria for yield traits to improve okra (Abelmoschus esculentus L. Moench) breeding in Indonesia by H. A. Reswari, M. Syukur, A. W. Ritonga, W. Nurcholis

    Published 2025-03-01
    “…Moench, commonly known as okra, is increasingly cultivated in Indonesia due to its recognition as a functional food source. Current efforts in breeding new okra varieties are focused on high productivity, yet minimal information is available regarding selection criteria. …”
    Get full text
    Article
  12. 292

    Synthesis and properties of carbon quantum dots as an antimicrobial agent and detection of ciprofloxacin by Fangzhou Shen, Zhaoyang Lu, Kangli Yan, Kang Luo, Shuchen Pei, Pu Xiang

    Published 2025-08-01
    “…This study introduces a novel approach for the fabrication of N-CQDs derived from natural botanical sources, underscoring their potential dual functionality as fluorescent sensors and antimicrobial materials.…”
    Get full text
    Article
  13. 293

    scikit-fda: A Python Package for Functional Data Analysis by Carlos Ramos-Carreño, José Luis Torrecilla, Miguel Carbajo-Berrocal, Pablo Marcos, Alberto Suárez

    Published 2024-05-01
    “…In particular, it conforms to the scikit-learn application programming interface so as to take advantage of the functionality for machine learning provided by this package: Pipelines, model selection, and hyperparameter tuning, among others. …”
    Get full text
    Article
  14. 294

    The Bright Feature Transform for Prominent Point Scatterer Detection and Tone Mapping by Gregory D. Vetaw, Suren Jayasuriya

    Published 2025-03-01
    “…We then modify the BFT to present a difference of trigonometric functions to mitigate speckle scatterers and other random noise sources found in the imagery. …”
    Get full text
    Article
  15. 295

    Assessing the stability of indoor farming systems using data outlier detection by Jean Pompeo, Ziwen Yu, Chi Zhang, Songzi Wu, Ying Zhang, Celina Gomez, Melanie Correll

    Published 2025-03-01
    “…The residual analysis highlighted that outliers could be attributed to potential issues such as sensor noise, drift, or other sources of uncertainty in data collection. Across different trials, the system displayed varying degrees of resistance to cumulative Agr.Ops, with some trials showing increased resilience over time.DiscussionThe alternative decomposition method used effectively identified outliers and provided valuable insights into the functionality of the system under different operational loads. …”
    Get full text
    Article
  16. 296
  17. 297

    Enhancing the power quality in radial electrical systems using optimal sizing and selective allocation of distributed generations. by Bachirou Bogno, Deli Goron, Nisso Nicodem, S Shanmugan, Dieudonné Kidmo Kaoga, Kitmo, Akhlaque Ahmad Khan, Yasser Fouad, Michel Aillerie

    Published 2024-01-01
    “…Accordingly, a proposed configuration system is shown in this work to inject multiple renewable energy sources (MRES) from selected regulated nodes. The feasibility of the proposed system is evaluated using particle swarm optimization (PSO), which was used to locate stable nodes and locations, sensitive to voltage fluctuations. …”
    Get full text
    Article
  18. 298

    A Three-Dimensional Complex Measurement Model-Based Avionic Radio-Frequency Power Source Health Assessment Method by Lin Huo, Shiqi Li, Simiao Fei, Chuan Lyu

    Published 2020-01-01
    “…According to the function and structure characteristics of radio-frequency power source, the health characterization parameters are then obtained and the health assessment parameter system is established. …”
    Get full text
    Article
  19. 299

    Identification of resistance sources and genomic regions regulating Septoria tritici blotch resistance in South Asian bread wheat germplasm by Manjeet Kumar, Xinyao He, Sudhir Navathe, Umesh Kamble, Madhu Patial, Pawan Kumar Singh

    Published 2025-03-01
    “…Therefore, dissection of the genetic architecture of adult‐plant resistance with genome‐wide association mapping and selection of resistant sources for adult plant STB resistance were carried out on a panel of South Asian germplasm. …”
    Get full text
    Article
  20. 300

    Vulnerability detection method for blockchain smart contracts based on metamorphic testing by Jinfu CHEN, Zhenxin WANG, Saihua CAI, Qiaowei FENG, Yuhao CHEN, Rongtian XU, KwakuKudjo Patrick

    Published 2023-10-01
    “…Aimed at the defects of existing test methods, a vulnerability detection method for blockchain smart contracts based on metamorphic testing was proposed, which could generate test cases for specific functions in blockchain smart contracts to detect possible vulnerabilities.According to the possible security vulnerabilities, different metamorphosis relationships were designed and then metamorphic testing was performed.Through verifying whether the metamorphic relationship between the source test case and the subsequent test case was satisfied, whether the smart contract had related security vulnerabilities was judged.The experimental results show that the proposed method can effectively detect the security vulnerabilities in the smart contracts.…”
    Get full text
    Article