Search alternatives:
functions » function (Expand Search)
Showing 381 - 400 results of 3,583 for search '((( resource OR source) selection functions ) OR ( sources detection functions ))', query time: 0.35s Refine Results
  1. 381

    Sensory integration research: priority scientific directions based on the analysis of Web of Science Core Collection resources by Olha Podrihalo, Wladyslaw Jagiello, Guo Xiaohong, Leonid Podrigalo, Tetiana Yermakova, Miroslawa Cieslicka

    Published 2023-12-01
    “…The bibliometric database Web of Science Core Collection (WoS) was analyzed. 388 sources that met the search criteria for 2013-2023 were selected for primary analysis. …”
    Get full text
    Article
  2. 382

    Web 2.0 as Catalyst: Virtually Reaching Out to Users and Connecting Them to Library Resources and Services. by Norah Xiao

    Published 2008-11-01
    “…These Web 2.0 technologies function as catalysts which help lower human barriers between my users and me, enable me to reach my users virtually, and attract users to resources from the library as well as various services I provided [ABSTRACT FROM AUTHOR] …”
    Get full text
    Article
  3. 383

    Antioxidant Peptides Derived from Woody Oil Resources: Mechanisms of Redox Protection and Emerging Therapeutic Opportunities by Jia Tu, Jie Peng, Li Wen, Changzhu Li, Zhihong Xiao, Ying Wu, Zhou Xu, Yuxi Hu, Yan Zhong, Yongjun Miao, Jingjing Xiao, Sisi Liu

    Published 2025-06-01
    “…Antioxidant peptides derived from woody oil resource by-products exhibit strong free radical scavenging abilities and offer potential applications in functional foods, nutraceuticals, and cosmetics. …”
    Get full text
    Article
  4. 384

    Optimization of D2D emergency communication resources for UAV relay based on DA-STD3 by Xiaofang Deng, Zijian Deng, Lin Zheng, Chao Yang, Chuanxu Chen

    Published 2024-11-01
    “…By designing the reward function and training mechanism, we can achieve good power control and reduce communication interference. …”
    Get full text
    Article
  5. 385

    Exploring the impact of GeoGebra on preservice teachers’ proficiency in teaching grade 10 parabola functions by Abongile Ngwabe, Marc Schafer

    Published 2025-07-01
    “…This paper investigates the development of teaching proficiency among preservice teachers in Grade 10 parabola functions through the use of GeoGebra. A significant number of preservice teachers encounter challenges in effectively teaching parabola functions due to limited resources for illustrating complex mathematical relationships, which can impede both their teaching proficiency and the students' conceptual understanding. …”
    Get full text
    Article
  6. 386
  7. 387

    Selection for domestication favored taxa characterized by fast growth and tolerance of high intraspecific density by Rafael Rubio deCasas, Irene Martín‐Brull, Ruben Milla, Francisco J. Ocaña‐Calahorro

    Published 2025-05-01
    “…We conclude that early agriculturalists selected for domestication wild legumes that performed well in dense monocultures and were more effective in resource capture. …”
    Get full text
    Article
  8. 388

    Hardcoded vulnerability detection approach for IoT device firmware by Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU

    Published 2022-10-01
    “…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
    Get full text
    Article
  9. 389
  10. 390

    The functions of religion and science in utopian thinking in the middle ages and the early modern period by Hope Steffen

    Published 2024-01-01
    “…The selection of sources includes both widely-known utopian texts and materials that are rarely used in discussions of utopian thinking. …”
    Get full text
    Article
  11. 391

    RDSM: Underwater multi-AUV relay deployment and selection mechanism in 3D space by Yafei Liu, Na Liu, Hao Li, Yi Jiang, Junwu zhu

    Published 2024-01-01
    “…Underwater Wireless Sensor Networks (UWSNs) are widely used in naval military field and marine resource exploration. However, challenges such as resource inefficiency and unbalanced energy consumption severely hinder their practical applications. …”
    Get full text
    Article
  12. 392

    Bias‐Independent True Random Number Generator Circuit using Memristor Noise Signals as Entropy Source by Jinwoo Park, Hyunjoong Kim, Hyungjin Kim

    Published 2025-06-01
    “…Finally, the performance of the designed TRNG circuit is evaluated using autocorrelation functions and National Institute of Standards and Technology tests, confirming its capability to produce random number bitstreams.…”
    Get full text
    Article
  13. 393
  14. 394

    Near extinction of the HBV quasispecies driven by the hard selective sweep in chronic hepatitis B by Daiqiang Lu, Andong He, Guichan Liao, Renyu Zhou, Zichun Cheng, Ka Cheuk Yip, Xiufang Wang, Wei Cao, Jiaojiao Peng, Ruiman Li, Jie Peng, Feng Gao

    Published 2025-08-01
    “…The nearly identical viral population suggests that all these viruses are from a single source. Predominant mutations were identified in known T cell epitopes but not in epitopes for neutralizing antibodies, indicating that the hard selective sweep is most likely driven by T cell selection pressure. …”
    Get full text
    Article
  15. 395

    Topology Optimization of the Network with Renewable Energy Sources Generation Based on a Modified Adapted Genetic Algorithm by A. M. Bramm, A. I. Khalyasmaa, S. A. Eroshenko, P. V. Matrenin, N. A. Papkova, D. A. Sekatski

    Published 2022-08-01
    “…The proposed genetic algorithm used two different functions of interbreeding, the function of mutation, selection of the best individuals and mass mutation (complete population renewal). …”
    Get full text
    Article
  16. 396

    Evaluating habitat selection of François’ langur in the karst mountains of China: Implications for conservation strategies by Jialiang Han, Xing Fan, Guy Michael Williams, Qixian Zou, Bingnan Dong

    Published 2024-12-01
    “…Using species presence data and environmental variables, we analyzed habitat selection through a resource selection function (RSF). …”
    Get full text
    Article
  17. 397

    Machine Learning and Feature Selection-Enabled Optimized Technique for Heart Disease Classification and Prediction by P. Nancy, Prasad Raghunath Mutkule, Kalpana Sunil Thakre, Ajay S. Ladkat, S.B.G. Tilak Babu, Sunil L. Bangare, Mohd Naved

    Published 2024-08-01
    “…It comes as no surprise that cardiovascular disease is a leading source of morbidity and death in contemporary society. …”
    Get full text
    Article
  18. 398

    Myeloma mesenchymal stem cells’ bioenergetics afford a novel selective therapeutic target by Oded Komemi, Elina Orbuch, Osnat Jarchowsky-Dolberg, Yaron Shraga Brin, Shelly Tartakover-Matalon, Metsada Pasmanik-Chor, Michael Lishner, Liat Drucker

    Published 2025-04-01
    “…Fission/fusion dynamics regulate mitochondria function. Proteomics demonstrates excessive mitochondrial processes in BM-MSCs from MM patients compared to normal donors (ND). …”
    Get full text
    Article
  19. 399

    Kriging-Based Variable Screening Method for Aircraft Optimization Problems with Expensive Functions by Yadong Wang, Xinyao Duan, Jiang Wang, Jin Guo, Minglei Han

    Published 2025-06-01
    “…The computational complexity of airfoil optimization for aircraft wing designs typically involves high-dimensional parameter spaces defined by geometric variables, where each Computational Fluid Dynamics (CFD) simulation cycle may require significant processing resources. Therefore, performing variable selection to identify influential inputs becomes crucial for minimizing the number of necessary model evaluations, particularly when dealing with complex systems exhibiting nonlinear and poorly understood input–output relationships. …”
    Get full text
    Article
  20. 400

    Optimization of CNN Activation Functions using Xception for South Sulawesi Batik Classification by Aswan Aswan, Eva Yulia Puspaningrum, Billy Eden William Asrul

    Published 2025-09-01
    “…The results demonstrate that selecting an optimal activation function substantially enhances convolutional neural network classification of complex batik patterns. …”
    Get full text
    Article