Search alternatives:
functions » function (Expand Search)
Showing 661 - 680 results of 2,992 for search '((( resource OR source) detection functions ) OR ( sources selection functions ))', query time: 0.28s Refine Results
  1. 661

    Elucidating the role of compositional and processing variables in tailoring the technological functionalities of plant protein ingredients by Lorenzo Barozzi, Stella Plazzotta, Ada Nucci, Lara Manzocco

    Published 2025-01-01
    “…However, other extraction, purification, and drying methods can be properly combined, resulting in specific PP ingredient functionalities. Overall, this review highlights that, besides protein purity and source, knowledge of the processing history is required to select PP ingredients with desired functionalities.…”
    Get full text
    Article
  2. 662

    Securing Wireless Communications with Energy Harvesting and Multi-antenna Diversity by Nguyen Quang Sang, tran Cong Hung, tran Trung Duy, minh Tran, byung Seo Kim

    Published 2025-04-01
    “…A time-switching protocol enables the source node S to alternate between energy harvesting and secure data transmission. …”
    Get full text
    Article
  3. 663
  4. 664
  5. 665

    SOFTWARE COMPONENT DEVELOPMENT FOR PARALLEL GATEWAYS DETECTION AND QUALITY ASSESSMENT IN BPMN MODELS USING FUZZY LOGIC by Andrii Kopp, Ľuboš Cibák, Dmytro Orlovskyi, Dmytro Kudii

    Published 2025-07-01
    “…This features are evaluated using “soft” modeling rules based on fuzzy membership functions. Additionally, an activation function with the 0.5 threshold is used to generate binary quality indicators and calculate an integral quality assessment measure. …”
    Get full text
    Article
  6. 666

    A High‐Quality Reference Genome and Comparative Genomics of the Widely Farmed Banded Cricket (Gryllodes sigillatus) Identifies Selective Breeding Targets by Shangzhe Zhang, Kristin R. Duffield, Bert Foquet, Jose L. Ramirez, Ben M. Sadd, Scott K. Sakaluk, John Hunt, Nathan W. Bailey

    Published 2025-03-01
    “…The high‐quality G. sigillatus genome assembly plus accompanying comparative genomic analyses serve as foundational resources for both applied and basic research on insect farming and behavioural biology, enabling researchers to pinpoint trait‐associated genetic variants, unravel functional pathways governing those phenotypes, and accelerate selective breeding efforts to increase the efficacy of large‐scale insect farming operations.…”
    Get full text
    Article
  7. 667

    Estimating Leaf Chlorophyll Fluorescence Parameters Using Partial Least Squares Regression with Fractional-Order Derivative Spectra and Effective Feature Selection by Jie Zhuang, Quan Wang

    Published 2025-02-01
    “…Among the feature selection algorithms, the least absolute shrinkage and selection operator (LASSO) and stepwise regression (Stepwise) methods outperformed others. …”
    Get full text
    Article
  8. 668
  9. 669
  10. 670
  11. 671
  12. 672
  13. 673
  14. 674

    Design of a Non-Destructive Seed Counting Instrument for Rapeseed Pods Based on Transmission Imaging by Shengyong Xu, Rongsheng Xu, Pan Ma, Zhenhao Huang, Shaodong Wang, Zhe Yang, Qingxi Liao

    Published 2024-12-01
    “…Human–machine interaction software based on PyQt5 was developed, integrating functions such as communication between upper and lower machines, image acquisition, storage, and processing. …”
    Get full text
    Article
  15. 675
  16. 676

    Intelligent Firefighting Technology for Drone Swarms with Multi-Sensor Integrated Path Planning: YOLOv8 Algorithm-Driven Fire Source Identification and Precision Deployment Strateg... by Bingxin Yu, Shengze Yu, Yuandi Zhao, Jin Wang, Ran Lai, Jisong Lv, Botao Zhou

    Published 2025-05-01
    “…This study aims to improve the accuracy of fire source detection, the efficiency of path planning, and the precision of firefighting operations in drone swarms during fire emergencies. …”
    Get full text
    Article
  17. 677

    Hybrid Deep Neural Network Optimization with Particle Swarm and Grey Wolf Algorithms for Sunburst Attack Detection by Mohammad Almseidin, Amjad Gawanmeh, Maen Alzubi, Jamil Al-Sawwa, Ashraf S. Mashaleh, Mouhammd Alkasassbeh

    Published 2025-03-01
    “…The strength of DNNs is derived from their ability to model complex functions and to improve detection engines through deeper architecture. …”
    Get full text
    Article
  18. 678

    Computational Temporal Ghost Imaging Using Intensity-Only Detection Over a Single Optical Fiber by Jiang Tang, Yongwen Tang, Kun He, Luluzi Lu, Di Zhang, Mengfan Cheng, Lei Deng, Deming Liu, Minming Zhang

    Published 2018-01-01
    “…We propose a method of computational temporal ghost imaging over a single optical fiber using simple optical intensity detection instead of coherent detection. The transfer function of a temporal ghost imaging system over a single optical fiber is derived, which is a function of the total fiber dispersion and the power density spectrum of the light source. …”
    Get full text
    Article
  19. 679

    Application of the Analytic Hierarchy Process Method to Select the Final Solution for Multi-Criteria Optimization of the Structure of a Hybrid Generation System with Energy Storage by Andrzej Tomczewski, Stanisław Mikulski, Jan Szymenderski

    Published 2024-12-01
    “…This paper concerns the application of the AHP (analytic hierarchy process) multi-criteria decision support method for the final selection of the structure of a hybrid power system with RESs (renewable energy sources) and EES (electrical energy storage) from a set of solutions obtained through multi-criteria optimization. …”
    Get full text
    Article
  20. 680

    FCMI-YOLO: An efficient deep learning-based algorithm for real-time fire detection on edge devices. by Junjie Lu, Yuchen Zheng, Liwei Guan, Bing Lin, Wenzao Shi, Junyan Zhang, Yunping Wu

    Published 2025-01-01
    “…The rapid development of Internet of Things (IoT) technology and deep learning has propelled the deployment of vision-based fire detection algorithms on edge devices, significantly exacerbating the trade-off between accuracy and inference speed under hardware resource constraints. …”
    Get full text
    Article