Search alternatives:
resource » source (Expand Search)
Showing 161 - 180 results of 2,992 for search '(( sources selection function ) OR (( resource OR sources) detection functions ))', query time: 0.32s Refine Results
  1. 161

    Sources of Life Strengths Appraisal Scale: A Multidimensional Approach to Assessing Older Adults’ Perceived Sources of Life Strengths by Prem S. Fry, Dominique L. Debats

    Published 2014-01-01
    “…A 24-month followup of a randomly selected sample confirmed that the nine-scale appraisal measure (SLSAS) is a promising instrument for appraising older adults’ sources of life strengths in dealing with stresses of daily life’s functioning and also a robust measure for predicting outcomes of resilience, autonomy, and well-being for this age group. …”
    Get full text
    Article
  2. 162
  3. 163

    Loss Function Optimization Method and Unsupervised Extraction Approach D-DBSCAN for Improving the Moving Target Perception of 3D Imaging Sonar by Jingfeng Yu, Aigen Huang, Zhongju Sun, Rui Huang, Gao Huang, Qianchuan Zhao

    Published 2025-03-01
    “…Compared to 2D sonar images, 3D sonar images offer superior spatial positioning capabilities, although the data acquisition cost is higher and lacks open source references for data annotation, target detection, and semantic segmentation. …”
    Get full text
    Article
  4. 164

    Spatial behavior of mesocarnivores living in seasonal ecosystems: A case study in arid landscapes in northern-central Chile by Darío Moreira-Arce, Pablo M. Vergara, Alex Oporto, Alberto J. Alaniz, Claudia Hidalgo-Corrotea, Alfredo H. Zúñiga, Alejo Gutiérrez, Sebastián Moreno, Daniela Araya, Simone Ciuti

    Published 2025-01-01
    “…Home ranges and Resource Selection Functions were fitted to the GPS data of seven foxes tracked year-round and related to ecological landscape and site-level attributes derived from remote sensing. …”
    Get full text
    Article
  5. 165

    An Optimized FPGA-Based FDIR System for Sensor Fault Detection in Satellite Attitude Estimation by Xianliang Chen, Zhicheng Xie, Jiashu Wu, Xiaofeng Wu

    Published 2025-01-01
    “…To solve this problem, a Fault Detection, Isolation, and Recovery (FDIR) was proposed, which integrates an adaptive unscented Kalman filter (AUKF), a radial basis function (RBF) neural network for fault detection, and a QUEST-based estimator. …”
    Get full text
    Article
  6. 166

    Varying Activity and the Burst Properties of FRB 20240114A Probed with GMRT Down to 300 MHz by Ajay Kumar, Yogesh Maan, Yash Bhusare

    Published 2024-01-01
    “…All of the bursts we detect are faint (<10 Jy ms) and thus probe the lower end of the energy distribution. …”
    Get full text
    Article
  7. 167
  8. 168
  9. 169

    YOLOv11-GSF: an optimized deep learning model for strawberry ripeness detection in agriculture by Haoran Ma, Qian Zhao, Runqing Zhang, Chunxu Hao, Wenhui Dong, Xiaoying Zhang, Fuzhong Li, Xiaoqin Xue, Gongqing Sun

    Published 2025-08-01
    “…To overcome these limitations, this paper introduces YOLOv11-GSF, a real-time strawberry ripeness detection algorithm based on YOLOv11, which incorporates several innovative features: a Ghost Convolution (GhostConv) convolution method for generating rich feature maps through lightweight linear transformations, thereby reducing computational overhead and enhancing resource utilization; a C3K2-SG module that combines self-moving point convolution (SMPConv) and convolutional gated linear units (CGLU) to better capture the local features of strawberry ripeness; and a F-PIoUv2 loss function inspired by Focaler IoU and PIoUv2, utilizing adaptive penalty factors and interval mapping to expedite model convergence and optimize ripeness classification. …”
    Get full text
    Article
  10. 170

    Western spotted skunk spatial ecology in the temperate rainforests of the Pacific Northwest by Marie I. Tosa, Damon B. Lesmeister, Taal Levi

    Published 2024-08-01
    “…Using these home ranges, we fitted a resource selection function using environmental covariates that we assigned to various hypotheses such as resources, predator avoidance, thermal tolerance, and disturbance. …”
    Get full text
    Article
  11. 171

    Neural network for step anomaly detection in head motion during fMRI using meta-learning adaptation by N.S. Davydov, V.V. Evdokimova, P.G. Serafimovich, V.I. Protsenko, A.G. Khramov, A.V. Nikonorov

    Published 2023-12-01
    “…Quality assessment and artifact detection in functional magnetic resonance imaging (fMRI) data is essential for clinical applications and brain research. …”
    Get full text
    Article
  12. 172

    Anisotropic Diffusion of e± in Pulsar Halos over Multiple Coherence of Magnetic Fields by Kai Yan, Sha Wu, Ruo-Yu Liu

    Published 2025-01-01
    “…Also, the halo’s morphology may appear less asymmetric, especially after being smoothed by the point-spread function of instruments. This largely relaxes the tension between the asymmetric morphology of halos predicted by the model and the lack of apparent asymmetric halos detected so far. …”
    Get full text
    Article
  13. 173

    Fine-grained building function recognition with street-view images and GIS map data via geometry-aware semi-supervised learning by Weijia Li, Jinhua Yu, Dairong Chen, Yi Lin, Runmin Dong, Xiang Zhang, Conghui He, Haohuan Fu

    Published 2025-03-01
    “…In this work, we propose a geometry-aware semi-supervised method for fine-grained building function recognition, which effectively uses multi-source geoinformation data to achieve accurate function recognition in both single-city and cross-city scenarios. …”
    Get full text
    Article
  14. 174

    MTAHG and MTBHG: Modified Approaches for Interpreting Gravity Data by Hazel Deniz Toktay, Hanbing Ai, Ahmad Alvandi, Kejia Su, Jinlei Li

    Published 2025-04-01
    “…This paper proposes two effective edge detection tools: one combining the balanced total horizontal gradient (BHG), and the hyperbolic tangent function, abbreviated as “MTBHG”; and the other combining the tilt angle of the total horizontal gradient (TAHG) and the hyperbolic tangent function, abbreviated as “MTAHG.” …”
    Get full text
    Article
  15. 175
  16. 176

    Reusable and robust fuzzy extractor for CRS-dependent sources by Yucheng Ma, Peisong Shen, Xue Tian, Kewei Lv, Chi Chen

    Published 2025-01-01
    “…Abstract Fuzzy extractors allow for the extraction and reproduction of a nearly uniform string from a noisy and non-uniform source. Reusable and robust fuzzy extractors further require that the output string should remain pseudorandom under multiple extractions and any modification of public value should be detectable. …”
    Get full text
    Article
  17. 177
  18. 178

    SDES-YOLO: A high-precision and lightweight model for fall detection in complex environments by Xiangqian Huang, Xiaoming Li, Limengzi Yuan, Zhao Jiang, Hongwei Jin, Wanghao Wu, Ru Cai, Meilian Zheng, Hongpeng Bai

    Published 2025-01-01
    “…These results indicate that SDES-YOLO successfully combines efficiency and precision in fall detection. Through these innovations, SDES-YOLO not only improves detection accuracy but also optimizes computational efficiency, making it effective even in resource-constrained environments.…”
    Get full text
    Article
  19. 179

    Millimeter-Wave Imaging with Range-Resolved 3D Depth Extraction Using Glow Discharge Detection and Frequency-Modulated Continuous Wave Radar by Arun Ramachandra Kurup, Daniel Rozban, Amir Abramovich, Yitzhak Yitzhaky, Natan Kopeika

    Published 2025-02-01
    “…Reflected signals are processed by the GDD, which functions as a heterodyne receiver, and Fast Fourier Transform (FFT) is used to extract range data. …”
    Get full text
    Article
  20. 180

    Reinforcement Q-Learning-Based Adaptive Encryption Model for Cyberthreat Mitigation in Wireless Sensor Networks by Sreeja Balachandran Nair Premakumari, Gopikrishnan Sundaram, Marco Rivera, Patrick Wheeler, Ricardo E. Pérez Guzmán

    Published 2025-03-01
    “…The proposed model leverages a deep learning-based anomaly detection system to classify network states into low, moderate, or high threat levels, which guides encryption policy selection. …”
    Get full text
    Article