Showing 2,861 - 2,880 results of 3,103 for search '"Autonomism"', query time: 0.08s Refine Results
  1. 2861
  2. 2862
  3. 2863
  4. 2864
  5. 2865
  6. 2866
  7. 2867
  8. 2868
  9. 2869

    Multiple underwater target positioning with optimally placed acoustic surface sensor networks by David Moreno-Salinas, Antonio Manuel Pascoal, Joaquín Aranda

    Published 2018-05-01
    “…The latter may include moored systems, autonomous vehicles, and even human divers. For reasons that have to do with the unavailability of Global Positioning System underwater, cost reduction, and simplicity of operation, there is currently a surge of interest in the development of range-based multiple target localization systems that rely on the computation of the distances between the targets and a number of sensor nodes deployed at the ocean surface, equipped with acoustic range measuring devices. …”
    Get full text
    Article
  10. 2870

    Relationship of the gene pool of the Khants with the peoples of Western Siberia, Cis-Urals and the Altai-Sayan Region according to the data on the polymorphism of autosomic locus a... by V. N. Kharkov, N. A. Kolesnikov, L. V. Valikhova, A. A. Zarubin, M. G. Svarovskaya, A. V. Marusin, I. Yu. Khitrinskaya, V. A. Stepanov

    Published 2023-03-01
    “…Khanty are indigenous Siberian people living on the territory of Western Siberia, mainly on the territory of the Khanty-Mansiysk and Yamalo-Nenets Autonomous Okrugs. The present study is aimed at a comprehensive analysis of the structure of the Khanty gene pool and their comparison with other populations of the indigenous population of Southern and Western Siberia. …”
    Get full text
    Article
  11. 2871

    Mathematical modelling-based blockchain with attention deep learning model for cybersecurity in IoT-consumer electronics by Hayam Alamro, Mohammed Maray, Jawhara Aljabri, Saad Alahmari, Monir Abdullah, Jehad Saad Alqurni, Faiz Abdullah Alotaibi, Abdelmoneim Ali Mohamed

    Published 2025-02-01
    “…Prepared with sophisticated sensors and onboard processing abilities, these drones autonomously examine aerial imagery to identify and classify possible risks like suspicious activities, unauthorized personnel, or vehicles. …”
    Get full text
    Article
  12. 2872

    Obstacle Avoidance for Ship Navigation Safety Combining Heuristic Search Algorithm and Improved ACO Algorithm by Dan Wang, Yan Jing

    Published 2024-12-01
    “…This method not only provides a new solution for navigation safety, but also provides a theoretical basis and practical guidance for future autonomous navigation and decision-making of intelligent ships, which has important application value and promotion potential. …”
    Get full text
    Article
  13. 2873

    Co-Optimization of Operational and Intelligent Completion Parameters of CO<sub>2</sub> Water-Alternating-Gas Injection Processes in Carbonate Reservoirs by Xili Deng, Jingxuan Wang, Xiangguo Zhao, Liangyu Rao, Yongbin Zhao, Xiaofei Sun

    Published 2025-01-01
    “…The results show that compared with the spiral inflow control device (SICD), autonomous inflow control device (AICD), labyrinth inflow control device (LICD), and annular interval control valve (AICV), the nozzle inflow control device (NICD) is the best type of intelligent completion device for MRC wells. …”
    Get full text
    Article
  14. 2874

    Challenges in developing a split drive targeting dsx for the genetic control of the invasive malaria vector Anopheles stephensi by Mireia Larrosa-Godall, Joshua X. D. Ang, Philip T. Leftwich, Estela Gonzalez, Lewis Shackleford, Katherine Nevard, Rob Noad, Michelle A. E. Anderson, Luke Alphey

    Published 2025-02-01
    “…Results The drive was able to home in a super-Mendelian rate comparable to those obtained by an autonomous drive in this species. Although inheritance rates as high as 99.8% were observed, potentially providing very potent gene drive, dominant effects on male and female fertility were observed, which would be sufficient to hinder spread of such a drive. …”
    Get full text
    Article
  15. 2875
  16. 2876

    Efficient Method for Robust Backdoor Detection and Removal in Feature Space Using Clean Data by Donik Vrsnak, Marko Subasic, Sven Loncaric

    Published 2025-01-01
    “…These attacks pose a significant security threat in critical applications, such as street sign or pedestrian recognition for autonomous vehicles, biometric authentication, image retrieval, semantic labeling, etc. …”
    Get full text
    Article
  17. 2877
  18. 2878
  19. 2879
  20. 2880