Search alternatives:
resources » resourcess (Expand Search)
source » sources (Expand Search)
Showing 401 - 420 results of 1,810 for search '(resources OR source) detection function', query time: 0.13s Refine Results
  1. 401
  2. 402

    Detection of VOCs and Biogenic Amines Through Luminescent Zn–Salen Complex-Tethered Pyrenyl Arms by Roberta Puglisi, Caterina Testa, Sara Scuderi, Valentina Greco, Giuseppe Trusso Sfrazzetto, Manuel Petroselli, Andrea Pappalardo

    Published 2024-12-01
    “…Fluorescence titrations and density functional theory (DFT) calculations reveal and explain the high binding affinity of this receptor toward selected amines, demonstrating its potential as an effective tool for amine detection.…”
    Get full text
    Article
  3. 403
  4. 404

    Simple Single-Person Fall Detection Model Using 3D Pose Estimation Mechanisms by Jinmo Yang, R. Young Chul Kim

    Published 2024-01-01
    “…Although various technologies with wearables and vision systems that utilize artificial intelligence (AI) have been developed to detect falls, many AI models are complex and resource-intensive. …”
    Get full text
    Article
  5. 405

    F-OSFA: A Fog Level Generalizable Solution for Zero-Day DDOS Attacks Detection by Muhammad Rashid Minhas, Qaisar M. Shafi, Shoab Ahmed Khan, Tahir Ahmad, Subhan Ullah, Attaullah Buriro, Muhammad Azfar Yaqub

    Published 2025-01-01
    “…The third component is a signature-based resource usage analyzer to counter attacks mimicking normal traffic. …”
    Get full text
    Article
  6. 406

    Enhanced Intrusion Detection in In-Vehicle Networks Using Advanced Feature Fusion and Stacking-Enriched Learning by Ali Altalbe

    Published 2024-01-01
    “…To address this problem, machine learning (ML) based intrusion detection systems (IDSs) have been proposed. However, existing IDSs suffer from low detection accuracy, limited real-time response, and high resource requirements. …”
    Get full text
    Article
  7. 407

    Securing Industrial IoT Environments: A Fuzzy Graph Attention Network for Robust Intrusion Detection by Safa Ben Atitallah, Maha Driss, Wadii Boulila, Anis Koubaa

    Published 2025-01-01
    “…The Industrial Internet of Things (IIoT) faces significant cybersecurity threats due to its ever-changing network structures, diverse data sources, and inherent uncertainties, making robust intrusion detection crucial. …”
    Get full text
    Article
  8. 408

    Smart Fault Detection, Classification, and Localization in Distribution Networks: AI-Driven Approaches and Emerging Technologies by Jianxian Wang, Hazlie Mokhlis, Nurulafiqah Nadzirah Mansor, Hazlee Azil Illias, Agileswari K. Ramasamy, Xingyu Wu, Siqi Wang

    Published 2025-01-01
    “…However, with nations worldwide actively pursuing carbon neutrality and emission peak goals, sustainable energy sources such as solar and wind are increasingly penetrating distribution networks, posing significant challenges to conventional fault detection, classification, and localization techniques due to bidirectional power flows, dynamic fault currents, and rising network complexity. …”
    Get full text
    Article
  9. 409
  10. 410

    Computational Temporal Ghost Imaging Using Intensity-Only Detection Over a Single Optical Fiber by Jiang Tang, Yongwen Tang, Kun He, Luluzi Lu, Di Zhang, Mengfan Cheng, Lei Deng, Deming Liu, Minming Zhang

    Published 2018-01-01
    “…We propose a method of computational temporal ghost imaging over a single optical fiber using simple optical intensity detection instead of coherent detection. The transfer function of a temporal ghost imaging system over a single optical fiber is derived, which is a function of the total fiber dispersion and the power density spectrum of the light source. …”
    Get full text
    Article
  11. 411
  12. 412
  13. 413

    Integrated Machine Learning and Region Growing Algorithms for Enhanced Concrete Crack Detection: A Novel Approach by Wenxuan Yao, Hui Li, Yanlin Li

    Published 2024-10-01
    “…Firstly, the regression method learns the image features of the dataset and the specific region growth threshold, and the regression function is trained by using the open-source dataset to determine the region growth threshold using the characteristics of the images included in the tests. …”
    Get full text
    Article
  14. 414

    Intelligent Firefighting Technology for Drone Swarms with Multi-Sensor Integrated Path Planning: YOLOv8 Algorithm-Driven Fire Source Identification and Precision Deployment Strateg... by Bingxin Yu, Shengze Yu, Yuandi Zhao, Jin Wang, Ran Lai, Jisong Lv, Botao Zhou

    Published 2025-05-01
    “…This study aims to improve the accuracy of fire source detection, the efficiency of path planning, and the precision of firefighting operations in drone swarms during fire emergencies. …”
    Get full text
    Article
  15. 415
  16. 416

    Multivariate GWAS analysis reveals loci associated with liver functions in continental African populations. by Chisom Soremekun, Tafadzwa Machipisa, Opeyemi Soremekun, Fraser Pirie, Nashiru Oyekanmi, Ayesha A Motala, Tinashe Chikowore, Segun Fatumo

    Published 2023-01-01
    “…<h4>Conclusions</h4>Using multivariate GWAS method improves the power to detect novel genotype-phenotype associations for liver functions not found with the standard univariate GWAS in the same dataset.…”
    Get full text
    Article
  17. 417
  18. 418

    A fuzzy track-to-track association algorithm with dynamic time warping for trajectory-level vehicle detection by Siqi Wan, Huaqiao Mu, Ke Han, Taesu Cheong, Chi Xie

    Published 2025-03-01
    “…Multi-source track-to-track association (TTTA), which identifies trajectories from multiple sensors or data sources of the same dynamic vehicle, is an important data fusion technique widely applied to vehicle detection in the fields of road, marine, and aviation transportation. …”
    Get full text
    Article
  19. 419

    Vulnerability detection using BERT based LLM model with transparency obligation practice towards trustworthy AI by Jean Haurogné, Nihala Basheer, Shareeful Islam

    Published 2024-12-01
    “…The result shows higher accuracy of 91.8 % for the vulnerability detection and model explainability outcome is highly influenced by “vulnerable”, “function”, ''mysql_tmpdir_list'', “strmov” tokens using both SHAP and LIME framework. …”
    Get full text
    Article
  20. 420

    Let ants find them: Using ants as eDNA samplers for detecting the invasive spotted lanternfly by Wei-Jiun Lin, Fang-Ling Chloe Liu, Lucie Cho, Chin-Cheng Scotty Yang

    Published 2025-04-01
    “…Compared to non-ant insects, ants exhibited higher SLF DNA concentrations, suggesting that honeydew ingestion serves as the primary eDNA source. These findings demonstrate that ants can function as efficient SLF eDNA samplers, providing a scalable and cost-effective alternative to existing SLF detection methods.…”
    Get full text
    Article