Search alternatives:
resource » source (Expand Search)
resources » sources (Expand Search)
functions » function (Expand Search)
Showing 541 - 560 results of 2,583 for search '((( resource OR resources) selection functions ) OR ( sources detection functions ))', query time: 0.36s Refine Results
  1. 541

    Securing Industrial IoT Environments: A Fuzzy Graph Attention Network for Robust Intrusion Detection by Safa Ben Atitallah, Maha Driss, Wadii Boulila, Anis Koubaa

    Published 2025-01-01
    “…The Industrial Internet of Things (IIoT) faces significant cybersecurity threats due to its ever-changing network structures, diverse data sources, and inherent uncertainties, making robust intrusion detection crucial. …”
    Get full text
    Article
  2. 542

    SILVERRUSH. XIV. Lyα Luminosity Functions and Angular Correlation Functions from 20,000 Lyα Emitters at z ∼ 2.2–7.3 from up to 24 deg2 HSC-SSP and CHORUS Surveys: Linking the Postr... by Hiroya Umeda, Masami Ouchi, Satoshi Kikuta, Yuichi Harikane, Yoshiaki Ono, Takatoshi Shibuya, Akio K. Inoue, Kazuhiro Shimasaku, Yongming Liang, Akinori Matsumoto, Shun Saito, Haruka Kusakabe, Yuta Kageura, Minami Nakane

    Published 2025-01-01
    “…We present luminosity functions (LFs) and angular correlation functions (ACFs) derived from 18,960 Ly α emitters (LAEs) at z  = 2.2−7.3 over a wide survey area of ≲24 deg ^2 that are identified in the narrowband data of the HSC-SSP and CHORUS surveys. …”
    Get full text
    Article
  3. 543

    Cross-Domain Communication Method Based on Load Balancing for SDNs by Xiaomao Wang, Yi Zhou, Feng Dan, Xian Yang

    Published 2025-02-01
    “…Therefore, the multi-domain control plane needs to consider more network resource states during the path selection, such as link weights, load saturation, and resource occupancy rates, in order to select the optimal paths to maximize the satisfaction of data plane requirements while maintaining network load balance. …”
    Get full text
    Article
  4. 544

    Dual Function Radar and Communication Waveform Design Based on Sub-pulse Hybrid Modulation by Yu LIU, Junhao ZHANG, Xue YAO, Xianxiang YU, Guolong CUI

    Published 2025-08-01
    “…To address the low data rate issue in the design of Dual-Function Radar-Communication (DFRC) waveforms with radar detection as the primary function, this paper proposes an information modulation method for multiple sub-pulse structure waveforms called Sub-pulse Hybrid Modulation (SHM). …”
    Get full text
    Article
  5. 545

    A Surrogate Piecewise Linear Loss Function for Contextual Stochastic Linear Programs in Transport by Qi Hong, Mo Jia, Xuecheng Tian, Zhiyuan Liu, Shuaian Wang

    Published 2025-06-01
    “…These results highlight the potential of our framework to enhance decision-making processes that rely on predictive insights in transportation systems, particularly in routing, scheduling, and resource allocation problems where uncertainty plays a critical role. …”
    Get full text
    Article
  6. 546

    Identification of Genomic Variants and Candidate Genes for Reproductive Traits and Growth Traits in Pishan Red Sheep Using Whole-Genome Resequencing by Maimaitijiang Muhetapa, Mengting Zhu, Aladaer Qi, Sulaiman Yiming

    Published 2025-05-01
    “…In this study, we performed whole-genome resequencing of Pishan red sheep, generating 9084.81 Gb of raw data and identifying 53,968,686 high-quality single-nucleotide polymorphisms (SNPs). Through selective sweep analysis, 92 genomic regions under selection were detected, containing 90 positional candidate genes significantly associated with growth, reproduction, and immune functions. …”
    Get full text
    Article
  7. 547

    Cascaded Directional Coupler-Based Triplexer Working on Spectroscopically Relevant Wavelengths for Multiple Gas Detection by Ajmal Thottoli, Gabriele Biagi, Artem S. Vorobev, Antonella D’Orazio, Giovanni Magno, Liam O’Faolain

    Published 2025-02-01
    “…The triplexer’s functions focus on enhancing the coupling efficiency and selectivity, while facilitating the on-chip integration of diode lasers. …”
    Get full text
    Article
  8. 548

    Harnessing Deep Learning With AlexNet for Tomato Leaf Disease Detection in the Indian Himalayan Terrain by Ruchika Sharma, Sameena Naaz, Pankaj Vaidya

    Published 2025-01-01
    “…Agriculture is essential for living in the Indian Himalayan region (IHR), as it functions as the main occupation and source of income. …”
    Get full text
    Article
  9. 549

    A Wind Power Density Forecasting Model Based on RF-DBO-VMD Feature Selection and BiGRU Optimized by the Attention Mechanism by Bixiong Luo, Peng Zuo, Lijun Zhu, Wei Hua

    Published 2025-02-01
    “…Accurate prediction of wind power density (WPD) holds significant practical importance for wind farms, grid operators, and the entire wind power industry, as it facilitates informed decision-making, optimized resource allocation, and enhanced system performance. …”
    Get full text
    Article
  10. 550

    CSW-YOLO: A traffic sign small target detection algorithm based on YOLOv8. by Qian Shen, Yi Li, YuXiang Zhang, Lei Zhang, ShiHao Liu, Jinhua Wu

    Published 2025-01-01
    “…The model achieves precision on par with existing mainstream algorithms, while being simpler, significantly reducing computational requirements, and being more suitable for small target detection tasks. The source code and test results of the models used in this study are available at https://github.com/lyzzzzyy/CSW-YOLO.git.…”
    Get full text
    Article
  11. 551

    Detection of VOCs and Biogenic Amines Through Luminescent Zn–Salen Complex-Tethered Pyrenyl Arms by Roberta Puglisi, Caterina Testa, Sara Scuderi, Valentina Greco, Giuseppe Trusso Sfrazzetto, Manuel Petroselli, Andrea Pappalardo

    Published 2024-12-01
    “…Biogenic amines, resulting from the natural decarboxylation of amino acids, are released into the environment from both natural and industrial sources. Several methods have been developed so far to detect amines in the environment. …”
    Get full text
    Article
  12. 552

    VRU-YOLO: A Small Object Detection Algorithm for Vulnerable Road Users in Complex Scenes by Yunxiang Liu, Yuqing Shi

    Published 2025-01-01
    “…Accurate detection of vulnerable road users (VRUs) is critical for enhancing traffic safety and advancing autonomous driving systems. …”
    Get full text
    Article
  13. 553
  14. 554

    Functional Elements of Entrusted Professional Activities for Dental Educators: Protocol for a Scoping Review by Noraini Abu Bakar, Nurhanis Syazni Roslan, Muhammad Ainul Haq, Yasmin Mustafa Byrnes, Muhamad Saiful Bahri Yusoff

    Published 2025-06-01
    “…ObjectiveThis paper presents a scoping review protocol aimed at systematically elucidating the extent, range, and nature of the literature on EPAs for dental educators, as evaluated in the included resources. This review seeks to answer the following research question: what are the key functional elements of EPAs for dental educators as described in the existing literature? …”
    Get full text
    Article
  15. 555
  16. 556

    Smart Fault Detection, Classification, and Localization in Distribution Networks: AI-Driven Approaches and Emerging Technologies by Jianxian Wang, Hazlie Mokhlis, Nurulafiqah Nadzirah Mansor, Hazlee Azil Illias, Agileswari K. Ramasamy, Xingyu Wu, Siqi Wang

    Published 2025-01-01
    “…However, with nations worldwide actively pursuing carbon neutrality and emission peak goals, sustainable energy sources such as solar and wind are increasingly penetrating distribution networks, posing significant challenges to conventional fault detection, classification, and localization techniques due to bidirectional power flows, dynamic fault currents, and rising network complexity. …”
    Get full text
    Article
  17. 557
  18. 558
  19. 559

    Dynamic scheduling method of service function chain executors based on the mimic defense architecture by Chuanhuang LI, Jingjing TANG, Yangting CHEN, Rui LEI, Chao CHEN, Weiming WANG

    Published 2022-04-01
    “…Faced with the problem that static and lagging traditional defense technologies cannot effectively deal with new network attacks, according to the theory of mimetic security defense, a defense architecture of mimic service function chain (MSFC) based on the data forwarding level was proposed, and an execution dynamic scheduling method based on the decision feedback was further proposed.The method took the abnormal executor information fed back by the decision maker, the heterogeneity of executors and the actual load of the system as the scheduling influencing factors, so that the scheduling method can be adjusted adaptively according to the actual changes of the network.In addition, the scheduling method used decision feedback to adjust the scheduling time, so as to achieve the best balance between system cost and security, and reduce the resource overhead of the system.Simulation results showed that the scheduling method can select a set of highly heterogeneous actuators that better meet the current network requirements on the basis of balancing the system cost and security, so as to improve the security and reliability of the system.…”
    Get full text
    Article
  20. 560