Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
resource » source (Expand Search)
resources » sources (Expand Search)
functions » function (Expand Search)
resource » source (Expand Search)
resources » sources (Expand Search)
functions » function (Expand Search)
-
1
Identification and Mining of Functional Components of Polyphenols in Fruits of <i>Malus</i> Germplasm Resources Based on Multivariate Analysis
Published 2024-10-01“…These results provide us with information regarding the polyphenol composition and content of the wild apple resources and local cultivars. The high polyphenol content resources obtained by screening can be used as raw materials for the extraction of polyphenol components and functional fruit juice processing and can also be used as parents for functional fruit creation and variety breeding.…”
Get full text
Article -
2
Resource scheduling based on routing tree and detection matrix for Internet of things
Published 2021-03-01“…This article proposes a new efficient resource scheduling based on routing tree and detection matrix for Internet of things. …”
Get full text
Article -
3
A Joint Optimization Method for Cooperative Detection Resources Based on Channel Capacity
Published 2022-01-01“…Aiming at the resource optimization problem in the cooperative detection task, the objective function is constructed based on the channel capacity, and the artificial bee colony (ABC) algorithm is improved to realize the joint optimization of the UAV swarm trajectory and radiation power. …”
Get full text
Article -
4
Design and analysis of intelligent service chain system for network security resource pool
Published 2022-08-01“…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
Get full text
Article -
5
A statistical approach to assess interspecific consumptive competition and functional redundancy in ephemeral resource uses using camera traps
Published 2024-07-01“…We extended time‐to‐detection occupancy modeling to quantify interspecific consumptive competition and redundancy of ecosystem functions through consumption between two species, while accounting for observation censoring. …”
Get full text
Article -
6
Nanotechnologies associated to floral resources in agri-food sector
Published 2018-01-01Get full text
Article -
7
A near-optimal resource allocation strategy for minimizing the worse-case impact of malicious attacks on cloud networks
Published 2025-08-01“…The proposed model integrates Virtual Machine (VM) initiation decisions and employs the Contest Success Function (CSF) within a two-player max–min game framework to dynamically allocate resources. …”
Get full text
Article -
8
Using an ensemble approach to predict habitat of Dusky Grouse ( Dendragapus obscurus ) in Montana, USA
Published 2024-12-01“…Our goal was to explore relationships between Dusky Grouse use and habitat characteristics, and then generate a state-wide map predicting Dusky Grouse habitat in Montana using two methods: resource selection functions and random forest classifiers. …”
Get full text
Article -
9
Research on Interference Resource Optimization Based on Improved Whale Optimization Algorithm
Published 2025-01-01“…In this problem, this paper establishes an interference resource optimization model with radar detection probability, interference effectiveness, and interference bandwidth utilization as the objective functions. …”
Get full text
Article -
10
A review on WSN based resource constrained smart IoT systems
Published 2025-05-01“…Abstract In Wireless Sensor Network (i.e. WSN) based resource constrained Internet of Things (i.e. IoT) environments, efficient data forwarding is achieved through cluster based mechanisms, where cluster heads facilitate communication among themselves and with the sink node. …”
Get full text
Article -
11
SELECTION FEATURES OF THE FIELDS REPRESENTATION FOR THE ADDITIONAL SOURCES OF THE PARTIAL DOMAINS
Published 2010-06-01Get full text
Article -
12
Consistent Modeling of Transport Processes and Travel Times—Coupling Soil Hydrologic Processes With StorAge Selection Functions
Published 2024-01-01Subjects: Get full text
Article -
13
On Data Selection and Regularization for Underdetermined Vibro-Acoustic Source Identification
Published 2025-06-01“…The number of hologram points in near-field acoustical holography (NAH) for a vibro-acoustic system plays a vital role in conditioning the transfer function between the source and measuring points. The requirement for many overdetermined hologram points for extended sources to obtain high accuracy poses a problem for the practical applications of NAH. …”
Get full text
Article -
14
-
15
A lightweight framework to secure IoT devices with limited resources in cloud environments
Published 2025-07-01“…This paper proposes a lightweight decision tree-based intrusion detection framework suitable for real-time anomaly detection in a resource-constrained IoT environment. …”
Get full text
Article -
16
Modeling and Recognizing Policy Conflicts with Resource Access Requests on Protected Health Information
Published 2017-07-01“…A conformance verification function detects erroneous, clashing or mutually susceptible rules early during the policy planning phase. …”
Get full text
Article -
17
Hybrid Islanding Detection of an Inverter-Based High-Noise Microgrid
Published 2025-01-01Get full text
Article -
18
A Decision Support System for Optimal Building Cold Source Selection
Published 2022-01-01“…Based on existing approaches to construction project evaluation and the selection of cold source systems, we establish an evaluation index for building cold source system functional models and network structures. …”
Get full text
Article -
19
Innovation as a Source of Ensuring the Sustainable Development of the Enterprise
Published 2024-09-01“…The author determines the factors of importance of innovative development in the context of sustainable development and the main functions it performs. The stages of innovative development in the context of sustainable development of enterprise are formed, among which it is worth highlighting the following: analysis and assessment of the current state of enterprise; generation and selection of ideas; development of an innovation strategy; implementation of innovative solutions, monitoring and evaluation of efficiency, adjustment and improvement of strategy, communication of results and involvement of stakeholders. …”
Get full text
Article -
20
A Comprehensive Resource for Exploring Antiphage Defense: DefenseFinder Webservice,Wiki and Databases
Published 2024-09-01“…To overcome these challenges, we present a hub of resources on defense systems, including: 1) an updated version of DefenseFinder with a web-service search function, 2) a community-curated repository of knowledge on the systems, and 3) precomputed databases, which include annotations done on RefSeq genomes and structure predictions generated by AlphaFold. …”
Get full text
Article