Showing 381 - 400 results of 590 for search '"Deployment environment', query time: 0.06s Refine Results
  1. 381

    Brand Awareness and Competitive Advantage among Beer Products in Kabale District, South Western Uganda by Moses, Agaba, Eliab Mpora, Byamukama, Eton, Marus

    Published 2020
    “…In the current business environment firms are required to be more competitive and hostile. …”
    Get full text
    Article
  2. 382

    Brand Awareness and Competitive Advantage among Beer Products in Kabale District, South Western Uganda by Moses, Agaba, Eliab Mpora, Byamukama, Eton, Marus

    Published 2022
    “…In the current business environment firms are required to be more competitive and hostile. …”
    Get full text
    Article
  3. 383

    Dynamic Foraging in Swarm Robotics: A Hybrid Approach with Modular Design and Deep Reinforcement Learning Intelligence by Ali Hammoud, Alaa Iskandar, Béla Kovács

    Published 2025-01-01
    “…The proposed system is built on a 3D environment using the Webots simulator. Through a modular approach, we address complex foraging challenges characterized by a non-static environment and objectives. …”
    Get full text
    Article
  4. 384

    A Lightweight YOLO Model for Rice Panicle Detection in Fields Based on UAV Aerial Images by Zixuan Song, Songtao Ban, Dong Hu, Mengyuan Xu, Tao Yuan, Xiuguo Zheng, Huifeng Sun, Sheng Zhou, Minglu Tian, Linyi Li

    Published 2024-12-01
    “…However, intensive planting, complex growth environments, and the overlapping of rice panicles and leaves in paddy fields pose significant challenges for precise panicle detection. …”
    Get full text
    Article
  5. 385

    Application of SDR base station in network upgrade by Erchao HE, Pengjin GENG, Huili ZHANG

    Published 2016-11-01
    “…Based on the unique technical characteristics and existing equipment ability of the SDR base station,and the main problems in deploying SDR base station,faced with the network developing environment and operating conditions for operators,the main application scene of SDR base station was put forward,and the new ideas of using GL1800 to construct light-state network in city and county scene were discussed.…”
    Get full text
    Article
  6. 386

    Resuscitative endovascular balloon occlusion of the aorta in trauma management: a comprehensive study of clinical indications and challenges by Tongporn Wannatoop, Peerayuht Phuangphung, Tanut Sornmanapong

    Published 2024-07-01
    “…These outcomes highlight the critical importance of enhanced training in patient assessment to ensure the safe and effective deployment of REBOA, particularly in resource-limited environments such as ongoing trauma resuscitation and prehospital care.Level of evidence Level III.…”
    Get full text
    Article
  7. 387

    Improving Driver Assistance in Intelligent Transportation Systems: An Agent-Based Evidential Reasoning Approach by M. Benalla, B. Achchab, H. Hrimech

    Published 2020-01-01
    “…In order to improve the knowledge base of advanced driver assistance systems (ADAS), ITS are strongly concerned with data fusion techniques of all kinds of sensors deployed over the traffic network. Driver assistance is devoid of a comprehensive evidential reasoning system on contextual information, more specifically when a combination involves inside and outside sensory information of the driving environment. …”
    Get full text
    Article
  8. 388

    Hierarchical Spatial Clustering in Multihop Wireless Sensor Networks by Zhidan Liu, Wei Xing, Yongchao Wang, Dongming Lu

    Published 2013-11-01
    “…Wireless sensor networks have been widely deployed for environment monitoring. The resource-limited sensor nodes usually transmit the sensing readings to Sink node collaboratively in a multihop manner to conserve energy. …”
    Get full text
    Article
  9. 389

    An Improved Fast Flocking Algorithm with Obstacle Avoidance for Multiagent Dynamic Systems by Jialiang Wang, Hai Zhao, Yuanguo Bi, Shiliang Shao, Qian Liu, Xingchi Chen, Ruofan Zeng, Yu Wang, Le Ha

    Published 2014-01-01
    “…Compared with other technologies to perform the localization of quad-rotor helicopter, this paper innovatively constructs a smart environment by deploying some wireless sensor network (WSN) nodes using the proposed localization algorithm. …”
    Get full text
    Article
  10. 390
  11. 391

    Towards a Traceability System Based on RFID Technology to Check the Content of Pallets within Electronic Devices Supply Chain by Ignacio Angulo, Asier Perallos, Leire Azpilicueta, Francisco Falcone, Unai Hernandez-Jayo, Asier Moreno, Ignacio Julio García Zuazola

    Published 2013-01-01
    “…Most of the existing solutions have been designed without considering the difficulties of deploying traceability systems in the storehouses currently working, not dealing with specific needs, such as environment characteristics or time required to be handled by workers. …”
    Get full text
    Article
  12. 392
  13. 393

    Applied pharmacogenetics to predict response to treatment of first psychotic episode: study protocol by Sergi Mas, Sergi Mas, Sergi Mas, Laura Julià, Manuel J. Cuesta, Manuel J. Cuesta, Manuel J. Cuesta, Benedicto Crespo-Facorro, Benedicto Crespo-Facorro, Benedicto Crespo-Facorro, Benedicto Crespo-Facorro, Javier Vázquez-Bourgon, Javier Vázquez-Bourgon, Javier Vázquez-Bourgon, Carlos Spuch, Carlos Spuch, Ana Gonzalez-Pinto, Ana Gonzalez-Pinto, Angela Ibañez, Angela Ibañez, Judith Usall, Judith Usall, Cristina Romero-López-Alberca, Cristina Romero-López-Alberca, Ana Catalan, Ana Catalan, Ana Catalan, Ana Catalan, Ana Catalan, Anna Mané, Anna Mané, Anna Mané, Anna Mané, Miquel Bernardo, Miquel Bernardo, Miquel Bernardo, Miquel Bernardo

    Published 2025-01-01
    “…These predictors will integrate, through machine learning techniques, pharmacogenetic (measured as polygenic risk scores) and epigenetic data together with clinical, sociodemographic, environmental, and neuroanatomical data. To do this, the FarmaPRED-PEP project will use data from two already recruited cohorts: the PEPS cohort from the “Genotype-Phenotype Interaction and Environment. …”
    Get full text
    Article
  14. 394

    Multi-type low-rate DDoS attack detection method based on hybrid deep learning by Lijuan LI, Man LI, Hongjun BI, Huachun ZHOU

    Published 2022-02-01
    “…Low-Rate distributed denial of service (DDoS) attack attacks the vulnerabilities in the adaptive mechanism of network protocols, posing a huge threat to the quality of network services.Low-Rate DDoS attack was characterized by high secrecy, low attack rate, and periodicity.Existing detection methods have the problems of single detection type and low identification accuracy.In order to solve them, a multi-type low-rate DDoS attack detection method based on hybrid deep learning was proposed.Different types of low-rate DDoS attacks and normal traffic in different scenarios under 5G environment were simulated.Traffic was collected at the network entrance and its traffic characteristic information was extracted to obtain multiple types of low-rate DDoS attack data sets.From the perspective of statistical threshold and feature engineering, the characteristics of different types of low-rate DDoS attacks were analyzed respectively, and the effective feature set of 40-dimension low-rate DDoS attacks was obtained.CNN-RF hybrid deep learning algorithm was used for offline training based on the effective feature set, and the performance of this algorithm was compared with LSTM-Light GBM and LSTM-RF algorithms.The CNN-RF detection model was deployed on the gateway to realize the online detection of multiple types of low-rate DDoS attacks, and the performance was evaluated by using the newly defined error interception rate and malicious traffic detection rate indexes.The results show that the proposed method can detect four types of low-rate DDoS attacks online, including Slow Headers attack, Slow Body attack, Slow Read attack and Shrew attack, and the error interception rate reaches 11.03% in 120 s time window.The detection rate of malicious traffic reaches 96.22%.It can be judged by the results that the proposed method can significantly reduce the intensity of low-rate DDoS attack traffic at the network entrance, and can be deployed and applied in the actual environment.…”
    Get full text
    Article
  15. 395

    Fiber‐Integrated Diamond Quantum Sensor for High‐Voltage Current Measurements by Qihui Liu, Shaoxiong Nie, Xiao Peng, Yaochen Zhu, Nan Wang, Yuqiang Hu, Xin Luo, Chun li, Maoheng Jing, Chunji Zhang, Wei Liu, Hao Chen, Jiangong Cheng, Zhenyu Wu

    Published 2025-01-01
    “…Current sensors in high‐voltage grids are required to accommodate harsh environments and provide accurate measurements of several kiloamperes. …”
    Get full text
    Article
  16. 396
  17. 397

    Un exemple de créativité ordinaire au bénéfice d’une dynamique inclusive by Olivier Kheroufi-Andriot

    Published 2022-09-01
    “…A young child boarding in a Therapeutic, Educational and Pedagogical Institute (ITEP) is again enrolled in an elementary school class in the so-called "ordinary" school environment, and the purpose of this article is to highlight "little things » deployed by the actors registered in this situation of inclusion. …”
    Get full text
    Article
  18. 398

    Continuous underground observation of the geomagnetic field in Xuzhou City, North China, and its time-varying characteristics by Mei Han, Mei Han, Lianghui Guo, Lianghui Guo, Lianghui Guo, Yun Wang, Yun Wang, Xiang Wang, Xiang Wang

    Published 2025-01-01
    “…Underground space in Xuzhou City, North China, has become a favorable site for continuous geomagnetic observation to reveal geomagnetic-field variations and to monitor seismic activity due to its distinct advantage of an “ultra-quiet” and “ultra-clean” environment with low electromagnetic interference. In order to evaluate the underground electromagnetic environment at the Longdong coal mine area (LCMA) in Xuzhou City and establish an underground geomagnetic observatory, we conducted a pilot experiment of continuous geomagnetic observations synchronously underground and on the ground during May 2023. …”
    Get full text
    Article
  19. 399

    Architecture and Solution of Lightweight TURN for C2C Communication by Aijun Wang, Bing Liu

    Published 2015-12-01
    “…An architecture and solution of lightweight TURN(TURN-Lite) which was suitable for C2C communication scenarios in complex network environment was described. It could simplify the communication processes used by current TURN solution and made full use of the data conversion and transfer capability of distributed data transfer devices(such as CGN/CDN)which had already deployed in current network, opened up network capabilities and provided efficient data transfer services for C2C communication applications developers.…”
    Get full text
    Article
  20. 400

    TS-PAID: A Two-Stage PUF-Based Lightweight Authentication Protocol for Internet of Drones by Shehzad Ashraf Chaudhry, Azeem Irshad, Bander A. Alzahrani, Ahmad Alhindi, Mohd Shariq, Ashok Kumar Das

    Published 2025-01-01
    “…Owing to energy, storage and computational resource-constraints, the complex and heavy cryptographic solutions could not be directly deployed in IoD environment. Several authentication protocols for IoD system can be witnessed however with limitations. …”
    Get full text
    Article