Search alternatives:
functions » function (Expand Search)
resource » resources (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
Showing 581 - 600 results of 2,583 for search '((( resource OR resources) selection functions ) OR ( source detection functions ))', query time: 0.31s Refine Results
  1. 581

    Arlclustering: an R package for community detection in social networks based on user interaction and association rule learning by Mohamed El-Moussaoui, Mohamed Hanine, Ali Kartit, Tarik Agouti

    Published 2025-07-01
    “…Abstract ARLClustering is an open-source R package for community detection in social networks. …”
    Get full text
    Article
  2. 582
  3. 583

    SOFTWARE COMPONENT DEVELOPMENT FOR PARALLEL GATEWAYS DETECTION AND QUALITY ASSESSMENT IN BPMN MODELS USING FUZZY LOGIC by Andrii Kopp, Ľuboš Cibák, Dmytro Orlovskyi, Dmytro Kudii

    Published 2025-07-01
    “…This features are evaluated using “soft” modeling rules based on fuzzy membership functions. Additionally, an activation function with the 0.5 threshold is used to generate binary quality indicators and calculate an integral quality assessment measure. …”
    Get full text
    Article
  4. 584
  5. 585
  6. 586
  7. 587
  8. 588

    Design of a Non-Destructive Seed Counting Instrument for Rapeseed Pods Based on Transmission Imaging by Shengyong Xu, Rongsheng Xu, Pan Ma, Zhenhao Huang, Shaodong Wang, Zhe Yang, Qingxi Liao

    Published 2024-12-01
    “…Human–machine interaction software based on PyQt5 was developed, integrating functions such as communication between upper and lower machines, image acquisition, storage, and processing. …”
    Get full text
    Article
  9. 589

    Intelligent Firefighting Technology for Drone Swarms with Multi-Sensor Integrated Path Planning: YOLOv8 Algorithm-Driven Fire Source Identification and Precision Deployment Strateg... by Bingxin Yu, Shengze Yu, Yuandi Zhao, Jin Wang, Ran Lai, Jisong Lv, Botao Zhou

    Published 2025-05-01
    “…This study aims to improve the accuracy of fire source detection, the efficiency of path planning, and the precision of firefighting operations in drone swarms during fire emergencies. …”
    Get full text
    Article
  10. 590

    Hybrid Deep Neural Network Optimization with Particle Swarm and Grey Wolf Algorithms for Sunburst Attack Detection by Mohammad Almseidin, Amjad Gawanmeh, Maen Alzubi, Jamil Al-Sawwa, Ashraf S. Mashaleh, Mouhammd Alkasassbeh

    Published 2025-03-01
    “…The strength of DNNs is derived from their ability to model complex functions and to improve detection engines through deeper architecture. …”
    Get full text
    Article
  11. 591
  12. 592

    Computational Temporal Ghost Imaging Using Intensity-Only Detection Over a Single Optical Fiber by Jiang Tang, Yongwen Tang, Kun He, Luluzi Lu, Di Zhang, Mengfan Cheng, Lei Deng, Deming Liu, Minming Zhang

    Published 2018-01-01
    “…We propose a method of computational temporal ghost imaging over a single optical fiber using simple optical intensity detection instead of coherent detection. The transfer function of a temporal ghost imaging system over a single optical fiber is derived, which is a function of the total fiber dispersion and the power density spectrum of the light source. …”
    Get full text
    Article
  13. 593

    5G network slicing function migration mechanism based on particle swarm optimization algorithm by Qiang CHEN, Caixia LIU, Lingshu LI

    Published 2018-08-01
    “…In multi-application scenarios of 5G,data traffic often increases dramatically.Virtual machine resources in network slicing may not meet the normal needs of users.In view of this,a network slicing function migration mechanism aiming at load balancing was proposed.The mechanism simulates the virtual machine into particles based on particle swarm optimization algorithm.In the process of migration,all particles were divided into several subgroups,and particle swarm optimization algorithm was applied within and among groups.According to the historical optimal solution and the current global optimal solution,the particle location was updated,and the best target particles were determined by selecting the smaller particle size of the particle in real time.The mechanism not only improves the convergence speed,but also improves the accuracy of the algorithm.Compared with other migration methods,the results show that the proposed migration mechanism has the advantages of high accuracy and fast convergence.And it can also improve the efficiency of resource utilization,reduce the energy consumption of data center,and has better adaptability.…”
    Get full text
    Article
  14. 594

    Fuzzy-Based Novel Cross-Layer RPL Objective Function for Energy-Aware Routing in IoT by M. R. Poornima, H. S. Vimala, J. Shreyas

    Published 2025-07-01
    “…Abstract Energy consumption remains a critical challenge for low-power, resource-constrained Internet of Things (IoT) devices operating over Low-Power and Lossy Networks (LLNs). …”
    Get full text
    Article
  15. 595

    A fuzzy track-to-track association algorithm with dynamic time warping for trajectory-level vehicle detection by Siqi Wan, Huaqiao Mu, Ke Han, Taesu Cheong, Chi Xie

    Published 2025-03-01
    “…Multi-source track-to-track association (TTTA), which identifies trajectories from multiple sensors or data sources of the same dynamic vehicle, is an important data fusion technique widely applied to vehicle detection in the fields of road, marine, and aviation transportation. …”
    Get full text
    Article
  16. 596

    Vulnerability detection using BERT based LLM model with transparency obligation practice towards trustworthy AI by Jean Haurogné, Nihala Basheer, Shareeful Islam

    Published 2024-12-01
    “…The result shows higher accuracy of 91.8 % for the vulnerability detection and model explainability outcome is highly influenced by “vulnerable”, “function”, ''mysql_tmpdir_list'', “strmov” tokens using both SHAP and LIME framework. …”
    Get full text
    Article
  17. 597

    GloFinder: AI-empowered QuPath plugin for WSI-level glomerular detection, visualization, and curation by Jialin Yue, Tianyuan Yao, Ruining Deng, Siqi Lu, Junlin Guo, Quan Liu, Juming Xiong, Mengmeng Yin, Haichun Yang, Yuankai Huo

    Published 2025-04-01
    “…Artificial intelligence (AI) has demonstrated significant success in automating the detection of glomeruli—key functional units of the kidney—from whole slide images (WSIs) in kidney pathology. …”
    Get full text
    Article
  18. 598
  19. 599
  20. 600

    Let ants find them: Using ants as eDNA samplers for detecting the invasive spotted lanternfly by Wei-Jiun Lin, Fang-Ling Chloe Liu, Lucie Cho, Chin-Cheng Scotty Yang

    Published 2025-04-01
    “…Compared to non-ant insects, ants exhibited higher SLF DNA concentrations, suggesting that honeydew ingestion serves as the primary eDNA source. These findings demonstrate that ants can function as efficient SLF eDNA samplers, providing a scalable and cost-effective alternative to existing SLF detection methods.…”
    Get full text
    Article