Search alternatives:
resource » resources (Expand Search)
resourcess » resourcesss (Expand Search)
source » sources (Expand Search)
Showing 761 - 780 results of 1,810 for search '((( resource OR resourcess) detection functions ) OR ( source detection function ))', query time: 0.30s Refine Results
  1. 761

    Where there’s smoke there is fire: Türkiye and the international illegal wildlife trade by Özgün Emre Can

    Published 2025-06-01
    “…By guiding policymakers, conservationists, and authorities, the study fosters international cooperation, optimal resource use, and endangered species protection. International wildlife trafficking can occur when detection and law enforcement measures fail in both the countries of origin and destination, and, where relevant, in transit countries, showing the necessity for governments worldwide to make the international illegal wildlife trade a priority.…”
    Get full text
    Article
  2. 762

    Distribution, behavior and diet of the Asiatic black bear in human modified landscapes by Hadi Fahimi, Mahmood Soofi, Nahid Ahmadi, Ali T. Qashqaei, Hamidreza Heidari, Haaken Bungum, Bent Rech, Jonas Trepel, Matthias Waltert

    Published 2024-11-01
    “…Elevation, precipitation, village density, and PA size did not substantially influence occupancy. Black bear detection probability became 100 % only above 14 km survey effort, indicating its overall rarity, and bears were much more easily detected during and after rainfall. …”
    Get full text
    Article
  3. 763

    Learning Transferable Convolutional Proxy by SMI-Based Matching Technique by Wei Jin, Nan Jia

    Published 2020-01-01
    “…The classification responses are also smoothened by manifolds of both the source domain and proxy space. By minimizing an objective function of SMI, classification error, and manifold regularization, we learn the convolutional networks of both source and target domains. …”
    Get full text
    Article
  4. 764

    An Optimization Algorithm for Forward-Scatter Radar Network Node Deployment Based on BFGS and Improved NSGA-II by Yuqing Zheng, Xiaofeng Ai, Zhiming Xu, Jing Wu, Feng Zhao

    Published 2025-04-01
    “…A multi-objective optimization model was subsequently established with the objective functions of minimizing node cost and maximizing spatial detection area. …”
    Get full text
    Article
  5. 765

    Editorial by Teddy Surya Gunawan

    Published 2025-05-01
    “…Contributions on flexible antenna designs, mobile applications for dyslexic learners, and modified grey relational analysis further showcase how electronics and AI are increasingly embedded in daily societal functions. In Materials and Manufacturing Engineering, the research on MSW-derived biochar for iron production and voltage-induced void formation in boiler tubes exemplifies innovation in resource utilization and reliability of industrial systems. …”
    Get full text
    Article
  6. 766

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  7. 767

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  8. 768

    Design of the Field Protection and Signal Priority at Intersection System for Autonomous-rail Rapid Transit by SHI Yangyang, LIU Guangyong, WU Jinyong

    Published 2022-06-01
    “…It provides auxiliary driving information for the driver through automation equipment, realizes the functions of route protection, virtual section occupied/unoccupied detection, signal control, entering/leaving station detection, platform door linkage control, berth status detection and management in deport and so on, which improves system security and reduces driver working intensity. …”
    Get full text
    Article
  9. 769

    An Improved Fitting Method for Predicting the Zernike Coefficient–Wavelength Curves by Fang Wang, Qiyuan Zhang, Haoyu Wang, Dayong Zhu, Huaikang Zhu, Wenxin Jia, Sen Han

    Published 2021-01-01
    “…Broadband transmitted wavefront measurement is a detection method that uses transmitted wavefronts at a few specific wavelengths though a function of Zernike coefficients and wavelength to predict other transmitted wavefronts at any wavelength within a certain range. …”
    Get full text
    Article
  10. 770
  11. 771

    A Novel Method for Traceability of Crude Oil Leakage on Offshore Platforms Based on Improved YOLOv5 Model Multi-Target Identification and Correlation Analysis by Zhenghua Wang, Shihai Zhang, Chongnian Qu, Zongyi Zhang, Feng Sun

    Published 2025-01-01
    “…Based on the positional relationship between the spilled crude oil target and the source target detection anchor frame, the possible source targets are classified into three association levels and assigned different association weights. …”
    Get full text
    Article
  12. 772

    Microalgal Metabolomes and Recent Biotechnological Advances for Their Industrial Application by Dinesh Kumar Saini, Geetanjali Manchanda, Ratiram Gomaji Chaudhary, Raghvendra Pratap Singh

    Published 2024-10-01
    “…In recent decades, microalgae have emerged as new sustainable resources for the production of various bioactive and biochemical compounds. …”
    Get full text
    Article
  13. 773

    Exploring the Complexities of Seafood: From Benefits to Contaminants by Bettina Taylor, Kelvin Fynn Ofori, Ali Parsaeimehr, Gulsun Akdemir Evrendilek, Tahera Attarwala, Gulnihal Ozbay

    Published 2025-04-01
    “…Seafood plays a vital role in human diets worldwide, serving as an important source of high-quality protein, omega-3 fatty acids, and essential vitamins and minerals that promote health and prevent various chronic conditions. …”
    Get full text
    Article
  14. 774

    Research on a traffic flow statistical algorithm based on YBOVDT and SAM2 by Yuanyuan Wang, Zheng Ding, Jiange Liu, Kexiao Wu, Md Sharid Kayes Dipu, Tingmei Ma, Yonghao Ma, Haiyan Zhang

    Published 2025-05-01
    “…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
    Get full text
    Article
  15. 775

    Investigating the AGN-neutrino connection with public IceCube data by Kuhlmann Julian, Capel Francesca

    Published 2025-01-01
    “…We present the first application of a newly developed hierarchical Bayesian analysis framework for the detection of point-like sources of high-energy neutrinos. …”
    Get full text
    Article
  16. 776

    Bearing Small Sample Fault Diagnosis based on Data Generation and Transfer Learning by Dinghui Wu, Qin Fang, Chuyi Wu

    Published 2020-11-01
    “…First, the source dataset is trained on the training network to obtain the source model, and then a small amount of drive-end data is used as the target dataset to fine-tuning to obtain the target model. …”
    Get full text
    Article
  17. 777
  18. 778

    Fine-grained access control method for private data in android system by Gang Liu, Guofang Zhang, Quan Wang, Shaomin Ji, Lizhi Zhang

    Published 2019-03-01
    “…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
    Get full text
    Article
  19. 779

    Advanced signal processing algorithm for fault classification and localization in VSC-HVDC based Offshore wind farm by Rehana Perveen

    Published 2025-06-01
    “…This work provides real-time validation on the RTDS platform by the use of S-transform, Ensemble Empirical Mode Decomposition (EEMD), and SVM, for quick and reliable detection of AC/DC faults. Next for classification, features extracted through intrinsic mode function decomposed by EMD and EEMD and classified distinctly using support vector machine techniques. …”
    Get full text
    Article
  20. 780

    Ultra-high-energy γ-ray emission associated with the tail of a bow-shock pulsar wind nebula

    Published 2025-04-01
    “…The source energy spectrum extended up to 300 TeV, which was well fitted by a log-parabola function with N0 = (1.93 ± 0.23) × 10−16 TeV−1 cm−2 s−1, α = 2.14 ± 0.27, and β = 1.20 ± 0.41 at E0 = 30 TeV. …”
    Get full text
    Article