Suggested Topics within your search.
Suggested Topics within your search.
-
1
EVALUATION OF MEASURES TO DETECT MISAPPROPRIATION OF RESOURCES
Published 2016-08-01“…The article presents the methodological and technical foundations of the study evaluating the effectiveness of measures to detect misuse of resources. The focus is on the algorithm steps to prepare information and conduct calculations to identify the misuse of resources. …”
Get full text
Article -
2
Lithological Interface Detection Using an Impact Source
Published 2020-01-01“…An impact source equipped with the advantage of long detection distances can recognize lithological interfaces. …”
Get full text
Article -
3
The Eyes: A Source of Information for Detecting Deepfakes
Published 2025-04-01“…And our experimental results on the CelebA dataset and images generated by ProGAN also demonstrated that our algorithm achieved a detection accuracy of 0.870 and a sensitivity of 0.901. …”
Get full text
Article -
4
Compact Source Detection in Multichannel Microwave Surveys: From SZ Clusters to Polarized Sources
Published 2012-01-01“…We describe the state-of-the art status of multifrequency detection techniques for compact sources in microwave astronomy. …”
Get full text
Article -
5
Assessing Fracture Detection: A Comparison of Minimal-Resource and Standard-Resource Plain Radiographic Interpretations
Published 2025-03-01“…<b>Conclusions:</b> The standard-resource method is superior in detecting fractures compared to the minimal-resource method. …”
Get full text
Article -
6
Knowledge Distillation in Object Detection for Resource-Constrained Edge Computing
Published 2025-01-01“…Although state-of-the-art deep learning-based OD methods achieve high detection rates, their large model size and high computational demands often hinder deployment on resource-constrained edge devices. …”
Get full text
Article -
7
Resource control conflict detection mechanism in trustworthy and controllable network
Published 2010-01-01Subjects: “…resource control…”
Get full text
Article -
8
Misinformation Detection: A Review for High and Low-Resource Languages
Published 2024-12-01Subjects: “…misinformation detection, low-resource languages, high-resource languages, african languages.…”
Get full text
Article -
9
Resource control conflict detection mechanism in trustworthy and controllable network
Published 2010-01-01Subjects: “…resource control;trustworthy and controllable network;conflict detection;policy…”
Get full text
Article -
10
Recent Advances and Perspectives on the Sources and Detection of Antibiotics in Aquatic Environments
Published 2022-01-01“…Additionally, the comprehensive quality evaluation of various detection methods, including the linear detection range, detection limit (LOD), and recovery rate, is discussed, and the future of this research field is also prospected.…”
Get full text
Article -
11
Astronomical Pointlike Source Detection via Deep Feature Matching
Published 2024-01-01“…This study introduces PSDetNet, an innovative deep neural network tailored for the autonomous detection of pointlike astronomical sources by leveraging feature-matching techniques. …”
Get full text
Article -
12
How Much is the Source Mismatch an Important Problem for Deepfake Detection?
Published 2025-01-01Get full text
Article -
13
A Robust Resource-Aware Framework for YOLO-Based Object Detection in Dynamic and Multi-Platform Resource-Constrained Environments
Published 2025-01-01Subjects: “…Resource-aware framework…”
Get full text
Article -
14
Resource efficient Internet-of-Things intrusion detection with spiking neural networks
Published 2024-11-01Get full text
Article -
15
Anomaly detection on compressed data in resource-constrained smart water meters
Published 2022-09-01Get full text
Article -
16
Resource scheduling based on routing tree and detection matrix for Internet of things
Published 2021-03-01“…This article proposes a new efficient resource scheduling based on routing tree and detection matrix for Internet of things. …”
Get full text
Article -
17
Efficient Anomaly Detection for Edge Clouds: Mitigating Data and Resource Constraints
Published 2024-01-01Subjects: “…Anomaly detection…”
Get full text
Article -
18
PHILDER: Lightweight Framework for Intelligent Phishing Detection on Resource-Limited Devices
Published 2025-01-01“…This paper proposes a deep learning-based approach for the automatic detection of phishing in emails, the PHILDER (PHishing Intelligent Lightweight DEtection on Resource-limited devices) model. …”
Get full text
Article -
19
Automatic detection and extraction of key resources from tables in biomedical papers
Published 2025-03-01“…Conclusions Our pipelines allow the detection and extraction of key resources from tables with much higher accuracy, enabling the deployment of automated research resource extraction tools on BioRxiv to help authors correct unidentifiable key resources detected in their articles and improve the reproducibility of their findings. …”
Get full text
Article -
20
Contrastive Learning Algorithm for Low-Resource Cryptographic Attack Event Detection
Published 2025-01-01Subjects: “…Cryptographic attack event detection…”
Get full text
Article