Search alternatives:
functions » function (Expand Search)
Showing 81 - 100 results of 2,992 for search '((( resource OR source) detection functions ) OR ( sources selection functions ))', query time: 0.33s Refine Results
  1. 81

    Investigating the impact of the regularization parameter on EEG resting-state source reconstruction and functional connectivity using real and simulated data by F. Leone, A. Caporali, A. Pascarella, C. Perciballi, O. Maddaluno, A. Basti, P. Belardinelli, L. Marzetti, G. Di Lorenzo, V. Betti

    Published 2024-12-01
    “…Accurate EEG source localization is crucial for mapping resting-state network dynamics and it plays a key role in estimating source-level functional connectivity. …”
    Get full text
    Article
  2. 82
  3. 83
  4. 84
  5. 85
  6. 86
  7. 87
  8. 88

    PFW-YOLO Lightweight Helmet Detection Algorithm by Yue Hong, Hao Wang, Shuo Guo

    Published 2025-01-01
    “…However, due to the limited arithmetic and storage resources of edge-end devices, and the traditional detection algorithms have problems such as the number of parameters and large computational volume, the detection algorithms are difficult to be deployed practically. …”
    Get full text
    Article
  9. 89

    Design and analysis of intelligent service chain system for network security resource pool by Zenan WANG, Jiahao LI, Chaohong TAN, Dechang PI

    Published 2022-08-01
    “…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
    Get full text
    Article
  10. 90
  11. 91
  12. 92
  13. 93
  14. 94
  15. 95

    Fermented, Freeze-Dried Snacks from <i>Lactarius deliciosus</i> as a Source of Functional Compounds and Lactic Acid Bacteria by Kavya Venugopal, Paweł Satora, Katarzyna Kała, Katarzyna Sułkowska-Ziaja, Agnieszka Szewczyk, Beata Ostachowicz, Bożena Muszyńska, Emilia Bernaś

    Published 2025-03-01
    “…After 6 months of storage, mushroom products were a good source of functional compounds, especially LAB, minerals, indoles, lovastatin, antioxidants (phenolic compounds), and dietary fibre. …”
    Get full text
    Article
  16. 96

    Multilingual Investigation of Cross-Project Code Clones in Open-Source Software for Internet of Things Systems by Wenqing Zhu, Norihiro Yoshida, Yutaka Matsubara, Hiroaki Takada

    Published 2024-01-01
    “…We collected 122 IoT system repositories in nine languages from GitHub and grouped them according to their primary functionality in IoT systems. We used MSCCD, a multilingual code clone detector to detect Type-3 code clones for each group. …”
    Get full text
    Article
  17. 97

    Acoustic modelling of surface sources. Part II. Piston model, asymmetrical function of vibration velocity, discretizing error, axisymmetrical problem by A. BRAŃSKI

    Published 2014-01-01
    “…Then the model of the source consists of an array of driving pistons. In order to select the optimal position of the boundary between the pistons, the measure of the divergence/convergence between directivity function of the model and exact was analysed. …”
    Get full text
    Article
  18. 98
  19. 99

    Analytical method for determining coordinates of the radiation source in a homogeneous medium by H. V. Velichko

    Published 2015-12-01
    “…Sensors (not less than five) detect the passage of the wave front and do not fix the phase of the transmitted wave. …”
    Get full text
    Article
  20. 100

    Multi-View Cluster Structure Guided One-Class BLS-Autoencoder for Intrusion Detection by Qifan Yang, Yu-Ang Chen, Yifan Shi

    Published 2025-07-01
    “…Multi-view OCC approaches usually require collecting multi-view traffic data from all sources and have difficulty detecting intrusion independently in each view. …”
    Get full text
    Article