Search alternatives:
functions » function (Expand Search)
resource » resources (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
Showing 541 - 560 results of 2,583 for search '((( resource OR resources) selection functions ) OR ( source detection functions ))', query time: 0.39s Refine Results
  1. 541

    Identification of Genomic Variants and Candidate Genes for Reproductive Traits and Growth Traits in Pishan Red Sheep Using Whole-Genome Resequencing by Maimaitijiang Muhetapa, Mengting Zhu, Aladaer Qi, Sulaiman Yiming

    Published 2025-05-01
    “…In this study, we performed whole-genome resequencing of Pishan red sheep, generating 9084.81 Gb of raw data and identifying 53,968,686 high-quality single-nucleotide polymorphisms (SNPs). Through selective sweep analysis, 92 genomic regions under selection were detected, containing 90 positional candidate genes significantly associated with growth, reproduction, and immune functions. …”
    Get full text
    Article
  2. 542
  3. 543

    Acoustic Emission as a Method for Analyzing Changes and Detecting Damage in Composite Materials During Loading by Katarzyna PANASIUK, Krzysztof DUDZIK, Grzegorz HAJDUKIEWICZ

    Published 2021-08-01
    “…The signal obtained from the sensor was then further processed and used to draw up diagrams of the AE hits, amplitude, root mean square of the AE source signal (RMS) and duration in the function of time. …”
    Get full text
    Article
  4. 544

    A Wind Power Density Forecasting Model Based on RF-DBO-VMD Feature Selection and BiGRU Optimized by the Attention Mechanism by Bixiong Luo, Peng Zuo, Lijun Zhu, Wei Hua

    Published 2025-02-01
    “…Accurate prediction of wind power density (WPD) holds significant practical importance for wind farms, grid operators, and the entire wind power industry, as it facilitates informed decision-making, optimized resource allocation, and enhanced system performance. …”
    Get full text
    Article
  5. 545

    SILVERRUSH. XIV. Lyα Luminosity Functions and Angular Correlation Functions from 20,000 Lyα Emitters at z ∼ 2.2–7.3 from up to 24 deg2 HSC-SSP and CHORUS Surveys: Linking the Postr... by Hiroya Umeda, Masami Ouchi, Satoshi Kikuta, Yuichi Harikane, Yoshiaki Ono, Takatoshi Shibuya, Akio K. Inoue, Kazuhiro Shimasaku, Yongming Liang, Akinori Matsumoto, Shun Saito, Haruka Kusakabe, Yuta Kageura, Minami Nakane

    Published 2025-01-01
    “…We present luminosity functions (LFs) and angular correlation functions (ACFs) derived from 18,960 Ly α emitters (LAEs) at z  = 2.2−7.3 over a wide survey area of ≲24 deg ^2 that are identified in the narrowband data of the HSC-SSP and CHORUS surveys. …”
    Get full text
    Article
  6. 546

    LMGD: Log-Metric Combined Microservice Anomaly Detection Through Graph-Based Deep Learning by Xu Liu, Yuewen Liu, Miaomiao Wei, Peng Xu

    Published 2024-01-01
    “…Therefore, there is an urgent need for fast and accurate anomaly detection capabilities. However, the existing microservice anomaly detection methods do not pay attention to the multi-source data of the microservice system and thus have low accuracy. …”
    Get full text
    Article
  7. 547
  8. 548

    AC-YOLO: A lightweight ship detection model for SAR images based on YOLO11. by Rui He, Dezhi Han, Xiang Shen, Bing Han, Zhongdai Wu, Xiaohu Huang

    Published 2025-01-01
    “…However, existing SAR ship detection algorithms encounter two major challenges: limited detection accuracy and high computational cost, primarily due to the wide range of target scales, indistinct contour features, and complex background interference. …”
    Get full text
    Article
  9. 549

    Evaluating machine learning-based intrusion detection systems with explainable AI: enhancing transparency and interpretability by Vincent Zibi Mohale, Ibidun Christiana Obagbuwa

    Published 2025-05-01
    “…Machine Learning (ML)-based Intrusion Detection Systems (IDS) are integral to securing modern IoT networks but often suffer from a lack of transparency, functioning as “black boxes” with opaque decision-making processes. …”
    Get full text
    Article
  10. 550

    Securing Industrial IoT Environments: A Fuzzy Graph Attention Network for Robust Intrusion Detection by Safa Ben Atitallah, Maha Driss, Wadii Boulila, Anis Koubaa

    Published 2025-01-01
    “…The Industrial Internet of Things (IIoT) faces significant cybersecurity threats due to its ever-changing network structures, diverse data sources, and inherent uncertainties, making robust intrusion detection crucial. …”
    Get full text
    Article
  11. 551

    Functional Elements of Entrusted Professional Activities for Dental Educators: Protocol for a Scoping Review by Noraini Abu Bakar, Nurhanis Syazni Roslan, Muhammad Ainul Haq, Yasmin Mustafa Byrnes, Muhamad Saiful Bahri Yusoff

    Published 2025-06-01
    “…ObjectiveThis paper presents a scoping review protocol aimed at systematically elucidating the extent, range, and nature of the literature on EPAs for dental educators, as evaluated in the included resources. This review seeks to answer the following research question: what are the key functional elements of EPAs for dental educators as described in the existing literature? …”
    Get full text
    Article
  12. 552

    Detection of Greenhouse and Typical Rural Buildings with Efficient Weighted YOLOv8 in Hebei Province, China by Bingkun Wang, Zhiyuan Liu, Jiangbo Xi, Siyan Gao, Ming Cong, Haixing Shang

    Published 2025-05-01
    “…However, in rural and mountainous areas, the resolution and accessibility of remote sensing satellite images from a single source are poor, making it difficult to detect greenhouses and rural buildings effectively and automatically. …”
    Get full text
    Article
  13. 553

    Evaluation of a coastal acoustic buoy for cetacean detections, bearing accuracy and exclusion zone monitoring by Kaitlin J. Palmer, Sam Tabbutt, Douglas Gillespie, Jesse Turner, Paul King, Dominic Tollit, Jessica Thompson, Jason Wood

    Published 2022-11-01
    “…Field trials indicated maximum detection ranges from 4–7.3 km depending on source and ambient noise levels. …”
    Get full text
    Article
  14. 554
  15. 555
  16. 556

    Dynamic scheduling method of service function chain executors based on the mimic defense architecture by Chuanhuang LI, Jingjing TANG, Yangting CHEN, Rui LEI, Chao CHEN, Weiming WANG

    Published 2022-04-01
    “…Faced with the problem that static and lagging traditional defense technologies cannot effectively deal with new network attacks, according to the theory of mimetic security defense, a defense architecture of mimic service function chain (MSFC) based on the data forwarding level was proposed, and an execution dynamic scheduling method based on the decision feedback was further proposed.The method took the abnormal executor information fed back by the decision maker, the heterogeneity of executors and the actual load of the system as the scheduling influencing factors, so that the scheduling method can be adjusted adaptively according to the actual changes of the network.In addition, the scheduling method used decision feedback to adjust the scheduling time, so as to achieve the best balance between system cost and security, and reduce the resource overhead of the system.Simulation results showed that the scheduling method can select a set of highly heterogeneous actuators that better meet the current network requirements on the basis of balancing the system cost and security, so as to improve the security and reliability of the system.…”
    Get full text
    Article
  17. 557

    Dual Function Radar and Communication Waveform Design Based on Sub-pulse Hybrid Modulation by Yu LIU, Junhao ZHANG, Xue YAO, Xianxiang YU, Guolong CUI

    Published 2025-08-01
    “…To address the low data rate issue in the design of Dual-Function Radar-Communication (DFRC) waveforms with radar detection as the primary function, this paper proposes an information modulation method for multiple sub-pulse structure waveforms called Sub-pulse Hybrid Modulation (SHM). …”
    Get full text
    Article
  18. 558
  19. 559
  20. 560

    Finite mixtures of functional graphical models: Uncovering heterogeneous dependencies in high-dimensional data. by Qihai Liu, Kevin H Lee, Hyun Bin Kang

    Published 2025-01-01
    “…In this work, we propose finite mixtures of functional graphical models (MFGM), which detect the heterogeneous subgroups of the population and estimate single graph for each subgroup by considering the correlation structures. …”
    Get full text
    Article