Suggested Topics within your search.
Suggested Topics within your search.
-
501
A Hybrid and Modular Integration Concept for Anomaly Detection in Industrial Control Systems
Published 2025-04-01“…Therefore, in this paper, we present a modular and hybrid concept that enables the integration of efficient and effective anomaly detection while optimising the use of available resources under consideration of industrial requirements. …”
Get full text
Article -
502
Quantifying Truthfulness: A Probabilistic Framework for Atomic Claim-Based Misinformation Detection
Published 2025-05-01“…This paper addresses this gap by proposing a novel probabilistic framework that decomposes complex assertions into semantically atomic claims and computes their veracity through a structured evaluation of source credibility and evidence frequency. Each atomic unit is matched against a curated corpus of 11,928 cyber-related news entries using a binary alignment function, and its truthfulness is quantified via a composite score integrating both source reliability and support density. …”
Get full text
Article -
503
Optimizing Pre-Trained Code Embeddings With Triplet Loss for Code Smell Detection
Published 2025-01-01“…Although code embedding-based systems have been successfully applied to various source code analysis tasks, further research is required to enhance code embedding for better code analysis capabilities, aiming to surpass the performance and functionality of static code analysis tools. …”
Get full text
Article -
504
Developing a Machine Vision System to Detect Weeds from Potato Plant
Published 2018-03-01Get full text
Article -
505
An Efficient Algorithm for Small Livestock Object Detection in Unmanned Aerial Vehicle Imagery
Published 2025-06-01Get full text
Article -
506
Social Network Community Detection by Combining Self-Organizing Maps and Genetic Algorithms
Published 2021-01-01“…To this end, many research works in the literature offer users some tools that can help them take advantage of this mine of information. Community detection is one of these tools and aims to detect a set of entities that share some features within a social network. …”
Get full text
Article -
507
An enhanced lightweight model for apple leaf disease detection in complex orchard environments
Published 2025-03-01“…However, in complex natural environments, factors such as light variations, shading from branches and leaves, and overlapping disease spots often result in reduced accuracy in detecting apple diseases. To address the challenges of detecting small-target diseases on apple leaves in complex backgrounds and difficulty in mobile deployment, we propose an enhanced lightweight model, ELM-YOLOv8n.To mitigate the high consumption of computational resources in real-time deployment of existing models, we integrate the Fasternet Block into the C2f of the backbone network and neck network, effectively reducing the parameter count and the computational load of the model. …”
Get full text
Article -
508
Application of VGG16 in Automated Detection of Bone Fractures in X-Ray Images
Published 2025-02-01“…The training and testing phases utilized an 80:20 split of the data, employing binary cross-entropy as the loss function and the Adam optimizer for efficient weight updates. …”
Get full text
Article -
509
Video Analysis and Frame Prediction Based on Improved Object Detection and ConvGRU
Published 2025-01-01“…The loss function and average accuracy mean have been improved, with a maximum detection accuracy of 0.947. …”
Get full text
Article -
510
First Detection of Low-frequency Striae in Interplanetary Type III Radio Bursts
Published 2025-01-01“…By combining high-resolution radio observations with well-calibrated in situ electron velocity distribution function data from the Wind spacecraft, we characterized the plasma properties of the burst source region near 0.32 au. …”
Get full text
Article -
511
A Comprehensive Approach for Detecting and Handling MitM-ARP Spoofing Attacks
Published 2025-01-01“…In the host, we employ a combination of ping Round-Trip Time (RTT) anomaly detection, the SendARP function, static entry, and ping confirmation to detect and mitigate attacks. …”
Get full text
Article -
512
Stimuli Selection Criteria for the Experiment “Visual Perception of Imitative Words in Native and Non-Native Language by the Method Lexical Decision”
Published 2020-11-01“…The authors also use psycho-semantic methods such as the method of lexical decision. The main sources of stimuli selection are The Russia Etymological Dictionary by M. …”
Get full text
Article -
513
New Horizon in Selective Tocols Extraction from Deodorizer Distillates Under Mild Conditions by Using Deep Eutectic Solvents
Published 2025-03-01“…The basic principles of intermolecular interactions (H-bond, van der Walls bond, and misfit interaction) between DESs or their components with tocols are discussed to understand the mechanism by which DESs selectively extract tocols from the mixture. This is mainly observed to be a function of the intrinsic properties of DESs and/or tocols, which could be beneficial for tuning the appropriate DESs for extracting tocols selectively and effectively under mild operation conditions. …”
Get full text
Article -
514
Passport fee – its legal nature, structure, functions and purpose of proceeds
Published 2023-03-01“…Author identifies its legal nature, performed functions and analyses rules of collection of this fee which are regulated in the provisions of the Passport Documents Act. …”
Get full text
Article -
515
Automatic Recognition of Authors Identity in Persian based on Systemic Functional Grammar
Published 2024-09-01“…First, a corpus composed of documents written by seven contemporary Iranian authors was collected. Second, a list of function words was extracted from the corpus. Moreover, conjunction, modality and comment adjunct system networks were applied to form a lexicon using linguistics resources. …”
Get full text
Article -
516
A Susceptible Cell‐Selective Delivery (SCSD) of mRNA‐Encoded Cas13d Against Influenza Infection
Published 2025-03-01“…Given that the virus targets cells with specific receptors but is not limited to a single organ, a Susceptible Cell Selective Delivery (SCSD) system is developed by modifying a lipid nanoparticle with a peptide mimicking the function of the hemagglutinin of influenza virus to target sialic acid receptors. …”
Get full text
Article -
517
Failure Law of Sandstone and Identification of Premonitory Deterioration Information Based on Digital Image Correlation–Acoustic Emission Multi-Source Information Fusion
Published 2025-02-01“…Additionally, by introducing the derivative functions of the multi-source information function for quantitative analysis, a comprehensive evaluation method was proposed based on the multi-source information fusion monitoring to forewarn red sandstone failure by levels during loading. …”
Get full text
Article -
518
-
519
The functions of religion and science in utopian thinking in the middle ages and the early modern period
Published 2024-01-01“…The selection of sources includes both widely-known utopian texts and materials that are rarely used in discussions of utopian thinking. …”
Get full text
Article -
520
Automated Dead Chicken Detection in Poultry Farms Using Knowledge Distillation and Vision Transformers
Published 2024-12-01“…Then, a deep learning classifier, enhanced through knowledge distillation, confirms whether the detected stationary object is indeed a chicken. EfficientNet-B0 is employed as the teacher model, while DeiT-Tiny functions as the student model, balancing high accuracy and computational efficiency. …”
Get full text
Article