Search alternatives:
resource » resources (Expand Search)
source » sources (Expand Search)
Showing 1 - 20 results of 14,134 for search '(resource OR source) detection', query time: 0.24s Refine Results
  1. 1

    EVALUATION OF MEASURES TO DETECT MISAPPROPRIATION OF RESOURCES by Anastasiya V. Vasileva

    Published 2016-08-01
    “…The article presents the methodological and technical foundations of the study evaluating the effectiveness of measures to detect misuse of resources. The focus is on the algorithm steps to prepare information and conduct calculations to identify the misuse of resources. …”
    Get full text
    Article
  2. 2

    Lithological Interface Detection Using an Impact Source by Xu Jian, Hongtao Li, Gao Li, Pan Fang, Xu Yang, Wei Qiao

    Published 2020-01-01
    “…An impact source equipped with the advantage of long detection distances can recognize lithological interfaces. …”
    Get full text
    Article
  3. 3

    The Eyes: A Source of Information for Detecting Deepfakes by Elisabeth Tchaptchet, Elie Fute Tagne, Jaime Acosta, Danda B. Rawat, Charles Kamhoua

    Published 2025-04-01
    “…And our experimental results on the CelebA dataset and images generated by ProGAN also demonstrated that our algorithm achieved a detection accuracy of 0.870 and a sensitivity of 0.901. …”
    Get full text
    Article
  4. 4

    Compact Source Detection in Multichannel Microwave Surveys: From SZ Clusters to Polarized Sources by Diego Herranz, Francisco Argüeso, Pedro Carvalho

    Published 2012-01-01
    “…We describe the state-of-the art status of multifrequency detection techniques for compact sources in microwave astronomy. …”
    Get full text
    Article
  5. 5

    Assessing Fracture Detection: A Comparison of Minimal-Resource and Standard-Resource Plain Radiographic Interpretations by Iskandar Zakaria, Teuku Muhammad Yus, Safrizal Rahman, Azhari Gani, Muhammad Ariq Ersan

    Published 2025-03-01
    “…<b>Conclusions:</b> The standard-resource method is superior in detecting fractures compared to the minimal-resource method. …”
    Get full text
    Article
  6. 6

    Knowledge Distillation in Object Detection for Resource-Constrained Edge Computing by Arief Setyanto, Theopilus Bayu Sasongko, Muhammad Ainul Fikri, Dhani Ariatmanto, I. Made Artha Agastya, Rakandhiya Daanii Rachmanto, Affan Ardana, In Kee Kim

    Published 2025-01-01
    “…Although state-of-the-art deep learning-based OD methods achieve high detection rates, their large model size and high computational demands often hinder deployment on resource-constrained edge devices. …”
    Get full text
    Article
  7. 7
  8. 8

    Misinformation Detection: A Review for High and Low-Resource Languages by Seani Rananga, Bassey Isong, Abiodun Modupe, Vukosi Marivate

    Published 2024-12-01
    Subjects: “…misinformation detection, low-resource languages, high-resource languages, african languages.…”
    Get full text
    Article
  9. 9

    Resource control conflict detection mechanism in trustworthy and controllable network by QU Yan-sheng, LUO Jun-zhou, LI Wei, WANG Peng, TAN Jing

    Published 2010-01-01
    Subjects: “…resource control;trustworthy and controllable network;conflict detection;policy…”
    Get full text
    Article
  10. 10

    Recent Advances and Perspectives on the Sources and Detection of Antibiotics in Aquatic Environments by Yanbo Zeng, Fengqin Chang, Qi Liu, Lizeng Duan, Donglin Li, Hucai Zhang

    Published 2022-01-01
    “…Additionally, the comprehensive quality evaluation of various detection methods, including the linear detection range, detection limit (LOD), and recovery rate, is discussed, and the future of this research field is also prospected.…”
    Get full text
    Article
  11. 11

    Astronomical Pointlike Source Detection via Deep Feature Matching by Ma Long, Xin Jiarong, Du Jiangbin, Zhao Jiayao, Wang Xiaotian, Zhang Yu

    Published 2024-01-01
    “…This study introduces PSDetNet, an innovative deep neural network tailored for the autonomous detection of pointlike astronomical sources by leveraging feature-matching techniques. …”
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Resource scheduling based on routing tree and detection matrix for Internet of things by Hongying Bai, Xiaotong Zhang, Yuxin Liu, Yingdong Xie

    Published 2021-03-01
    “…This article proposes a new efficient resource scheduling based on routing tree and detection matrix for Internet of things. …”
    Get full text
    Article
  17. 17
  18. 18

    PHILDER: Lightweight Framework for Intelligent Phishing Detection on Resource-Limited Devices by Guilherme Dantas Bispo, Cesar Augusto Borges de Andrade, Gabriela Mayumi Saiki, Raquel Valadares Borges, Andre Luiz Marques Serrano, Geraldo Pereira Rocha Filho, Vinicius Pereira Goncalves

    Published 2025-01-01
    “…This paper proposes a deep learning-based approach for the automatic detection of phishing in emails, the PHILDER (PHishing Intelligent Lightweight DEtection on Resource-limited devices) model. …”
    Get full text
    Article
  19. 19

    Automatic detection and extraction of key resources from tables in biomedical papers by Ibrahim Burak Ozyurt, Anita Bandrowski

    Published 2025-03-01
    “…Conclusions Our pipelines allow the detection and extraction of key resources from tables with much higher accuracy, enabling the deployment of automated research resource extraction tools on BioRxiv to help authors correct unidentifiable key resources detected in their articles and improve the reproducibility of their findings. …”
    Get full text
    Article
  20. 20

    Contrastive Learning Algorithm for Low-Resource Cryptographic Attack Event Detection by Peng Luo, Rangjia Cai, Yuanbo Guo

    Published 2025-01-01
    Subjects: “…Cryptographic attack event detection…”
    Get full text
    Article