Showing 21 - 40 results of 2,992 for search '(( sources selection function ) OR (( resource OR source) detection functions ))', query time: 0.30s Refine Results
  1. 21
  2. 22

    An enhancement filter utilizing the modified arctangent function for the structural and tectonic interpretation of causative sources: Application to WGM2012 gravity data from the R... by Fengjun WU, Xin-Ai XU

    Published 2025-06-01
    “…In this study, we propose the Modified Arctangent Function (MAT), which enhances gravity source edge detection by integrating the total horizontal gradient with a modified arctangent function. …”
    Get full text
    Article
  3. 23

    Resource scheduling based on routing tree and detection matrix for Internet of things by Hongying Bai, Xiaotong Zhang, Yuxin Liu, Yingdong Xie

    Published 2021-03-01
    “…This article proposes a new efficient resource scheduling based on routing tree and detection matrix for Internet of things. …”
    Get full text
    Article
  4. 24

    Source Detection and Functional Connectivity of the Sensorimotor Cortex during Actual and Imaginary Limb Movement: A Preliminary Study on the Implementation of eConnectome in Motor Imagery Protocols by Alkinoos Athanasiou, Chrysa Lithari, Konstantina Kalogianni, Manousos A. Klados, Panagiotis D. Bamidis

    Published 2012-01-01
    “…Event-Related Desynchronization/Synchronization (ERD/ERS) of the mu-rhythm was used to evaluate MI performance. Source detection and FCNs were studied with eConnectome. …”
    Get full text
    Article
  5. 25

    Feature dependence graph based source code loophole detection method by Hongyu YANG, Haiyun YANG, Liang ZHANG, Xiang CHENG

    Published 2023-01-01
    “…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
    Get full text
    Article
  6. 26

    Feature dependence graph based source code loophole detection method by Hongyu YANG, Haiyun YANG, Liang ZHANG, Xiang CHENG

    Published 2023-01-01
    “…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
    Get full text
    Article
  7. 27
  8. 28
  9. 29

    Spin-dependent edge detection and imaging enabled by optical circularly polarised states by Jiale Chen, Zhao-xian Chen, Zi-xin Zhou, Yan-qing Lu, Jun-long Kou

    Published 2025-04-01
    “…By harnessing the chiral selectivity of the C-points, a high-CD PCS imager can provide two sets of optical transfer functions (OTFs) to facilitate both edge detection and bright-field imaging. …”
    Get full text
    Article
  10. 30

    Selenium Accumulating Leafy Vegetables Are a Potential Source of Functional Foods by Petro E. Mabeyo, Mkabwa L. K. Manoko, Amra Gruhonjic, Paul A. Fitzpatrick, Göran Landberg, Máté Erdélyi, Stephen S. Nyandoro

    Published 2015-01-01
    “…., Cucurbita maxima, Ipomoea batatas, Solanum villosum, Solanum scabrum, and Vigna unguiculata were explored for their capabilities to accumulate selenium when grown on selenium enriched soil and for use as a potential source of selenium enriched functional foods. Their selenium contents were determined by spectrophotometry using the complex of 3,3′-diaminobenzidine hydrochloride (DABH) as a chromogen. …”
    Get full text
    Article
  11. 31

    Derivation of pressure distribution models for horizontal well using source function by J.O. Oloro, E.S. Adewole

    Published 2019-05-01
    “…In this work, ten (10) models for pressure distribution for horizontal well under different boundary variation were derived following these steps for each of the models:(i) choosing a boundary condition for each axis (ii) selecting the appropriate source function for each axis and (iii)applying Newman product rule to arrive at the pressure expression. …”
    Get full text
    Article
  12. 32

    A Joint Optimization Method for Cooperative Detection Resources Based on Channel Capacity by Wenda Yang, Minggong Wu, Xiangxi Wen, Kexin Bi

    Published 2022-01-01
    “…Aiming at the resource optimization problem in the cooperative detection task, the objective function is constructed based on the channel capacity, and the artificial bee colony (ABC) algorithm is improved to realize the joint optimization of the UAV swarm trajectory and radiation power. …”
    Get full text
    Article
  13. 33

    Go Source Code Vulnerability Detection Method Based on Graph Neural Network by Lisha Yuan, Yong Fang, Qiang Zhang, Zhonglin Liu, Yijia Xu

    Published 2025-06-01
    “…With the widespread application of the Go language, the demand for vulnerability detection in Go programs is increasing. Existing detection models and methods have deficiencies in extracting source code features of Go programs and mainly focus on detecting concurrency vulnerabilities. …”
    Get full text
    Article
  14. 34
  15. 35
  16. 36

    Systematic investigation of photon strength functions with monochromatic γ-ray beams by Gheorghe Ioana, Aumann Thomas, Baumann Martin, van Beek Patrick, Kuchenbrod Philipp, Lalić Nikolina, Scheit Heiko, Symochko Dmytro, Wang Hongwei, Fan Gongtao, Nishio Katsuhisa, Ohtsuki Tsutomu, Suzaki Fumi, Hirose Kentaro, Inagaki Makoto, Ari-izumi Takashi, Garrote Frank L. Bello, Bjørøen Marianne, Eriksen Tomas, Ingeberg Vetle Wegner, Paulsen Wanja, Pedersen Line G., Reaz Fardous, Belyshev Sergey, Stopani Konstantin, Lui Yiu-Wing, Filipescu Dan, Tudora Anabella, Goriely Stephane, Miyamoto Shuji, Utsunomiya Hiroaki

    Published 2025-01-01
    “…Following the main objective of the IAEA Coordinated Research Project on Photonuclear Data and Photon Strength Functions (Code F41032; Duration 2016-2019), new measurements of photoneutron and photofission cross sections in the Giant Dipole Resonance energy region have been performed at the laser Compton-scattering γ-ray source of the NewSUBARU synchrotron radiation facility. …”
    Get full text
    Article
  17. 37
  18. 38

    Anomaly Usage Behavior Detection Based on Multi-Source Water and Electricity Consumption Information by Wenqing Zhou, Chaoqiang Chen, Qin Yan, Bin Li, Kang Liu, Yingjun Zheng, Hongming Yang, Hui Xiao, Sheng Su

    Published 2025-01-01
    “…Current resident anomaly detection technologies rely on single-source energy data, lacking detailed behavior pattern analysis. …”
    Get full text
    Article
  19. 39

    Prediction of Wafer Performance: Use of Functional Outlier Detection and Regression by Kyusoon Kim, Seunghee Oh, Kiwook Bae, Hee-Seok Oh

    Published 2025-01-01
    “…To exploit the consecutive nature of OES data, we propose a prediction method based on a functional approach using multivariate functional partial least squares regression, coupled with dimension reduction and a novel outlier detection technique via functional independent component analysis. …”
    Get full text
    Article
  20. 40

    Nitrogen-functionalized modulation of iron nanoparticles promotes selective hydrogenation of carbon dioxide by Xianbiao Wang, Jun Qian, Zixuan Lu, Jie Huang, Liru Zheng, Yong Jiang, Mengdie Cai, Yuxue Wei, Lisheng Guo, Song Sun

    Published 2025-03-01
    “…Nitrogen-functionalized iron nanoparticles were prepared using a one-pot hydrothermal process. …”
    Get full text
    Article