Search alternatives:
resource » source (Expand Search)
Showing 681 - 700 results of 3,583 for search '((( resource OR sources) selection function ) OR ( sources detection function ))', query time: 0.32s Refine Results
  1. 681

    Evaluation of a coastal acoustic buoy for cetacean detections, bearing accuracy and exclusion zone monitoring by Kaitlin J. Palmer, Sam Tabbutt, Douglas Gillespie, Jesse Turner, Paul King, Dominic Tollit, Jessica Thompson, Jason Wood

    Published 2022-11-01
    “…Field trials indicated maximum detection ranges from 4–7.3 km depending on source and ambient noise levels. …”
    Get full text
    Article
  2. 682

    Acoustic Emission as a Method for Analyzing Changes and Detecting Damage in Composite Materials During Loading by Katarzyna PANASIUK, Krzysztof DUDZIK, Grzegorz HAJDUKIEWICZ

    Published 2021-08-01
    “…The signal obtained from the sensor was then further processed and used to draw up diagrams of the AE hits, amplitude, root mean square of the AE source signal (RMS) and duration in the function of time. …”
    Get full text
    Article
  3. 683

    Securing Industrial IoT Environments: A Fuzzy Graph Attention Network for Robust Intrusion Detection by Safa Ben Atitallah, Maha Driss, Wadii Boulila, Anis Koubaa

    Published 2025-01-01
    “…The Industrial Internet of Things (IIoT) faces significant cybersecurity threats due to its ever-changing network structures, diverse data sources, and inherent uncertainties, making robust intrusion detection crucial. …”
    Get full text
    Article
  4. 684

    LMGD: Log-Metric Combined Microservice Anomaly Detection Through Graph-Based Deep Learning by Xu Liu, Yuewen Liu, Miaomiao Wei, Peng Xu

    Published 2024-01-01
    “…Therefore, there is an urgent need for fast and accurate anomaly detection capabilities. However, the existing microservice anomaly detection methods do not pay attention to the multi-source data of the microservice system and thus have low accuracy. …”
    Get full text
    Article
  5. 685

    CSW-YOLO: A traffic sign small target detection algorithm based on YOLOv8. by Qian Shen, Yi Li, YuXiang Zhang, Lei Zhang, ShiHao Liu, Jinhua Wu

    Published 2025-01-01
    “…First, the bottleneck of the C2f module in the original yolov8 network is replaced with the residual Faster-Block module in FasterNet, and then the new channel mixer convolution GLU (CGLU) in TransNeXt is combined with it to construct the C2f-faster-CGLU module, reducing the number of model parameters and computational load; Secondly, the SPPF module is combined with the large separable kernel attention (LSKA) to construct the SPPF-LSKA module, which greatly enhances the feature extraction ability of the model; Then, by adding a small target detection layer, the accuracy of small target detection such as traffic signs is greatly improved; Finally, the Inner-IoU and MPDIoU loss functions are integrated to construct WISE-Inner-MPDIoU, which replaces the original CIoU loss function, thereby improving the calculation accuracy. …”
    Get full text
    Article
  6. 686

    VRU-YOLO: A Small Object Detection Algorithm for Vulnerable Road Users in Complex Scenes by Yunxiang Liu, Yuqing Shi

    Published 2025-01-01
    “…Accurate detection of vulnerable road users (VRUs) is critical for enhancing traffic safety and advancing autonomous driving systems. …”
    Get full text
    Article
  7. 687

    AC-YOLO: A lightweight ship detection model for SAR images based on YOLO11. by Rui He, Dezhi Han, Xiang Shen, Bing Han, Zhongdai Wu, Xiaohu Huang

    Published 2025-01-01
    “…However, existing SAR ship detection algorithms encounter two major challenges: limited detection accuracy and high computational cost, primarily due to the wide range of target scales, indistinct contour features, and complex background interference. …”
    Get full text
    Article
  8. 688
  9. 689
  10. 690

    Bifidobacterium animalis subsp. lactis genome resources and metabolite profiling at the strain level and their ability to alleviate anxiety-like behavior in a sleep-deprived mouse... by Yao-Kun Zhang, Liang Zhang, Xue Ni, Shu-Wen Zhang, Min-Zhi Jiang, Si-Lu Zhang, Guo-Xun Xiao, He Jiang, Ming-Xia Bi, Yu-Lin Wang, Chang Liu, Shuang-Jiang Liu

    Published 2025-12-01
    “…In vivo, WLBA3 reduced inflammation and oxidative stress by inhibiting the NLRP3 inflammasome pathway and modulating gut microbiota (e.g., Lactobacillus and Alistipes), which in turn significantly improved weight gain and fatigue resistance, attenuated cognitive function, and anxiety-like behavior. These findings provide insights into the diversity of B. animalis subsp. lactis strain resources and highlight the potential of WLBA3 as a candidate for alleviating sub-health symptoms.…”
    Get full text
    Article
  11. 691

    Dynamic scheduling method of service function chain executors based on the mimic defense architecture by Chuanhuang LI, Jingjing TANG, Yangting CHEN, Rui LEI, Chao CHEN, Weiming WANG

    Published 2022-04-01
    “…Faced with the problem that static and lagging traditional defense technologies cannot effectively deal with new network attacks, according to the theory of mimetic security defense, a defense architecture of mimic service function chain (MSFC) based on the data forwarding level was proposed, and an execution dynamic scheduling method based on the decision feedback was further proposed.The method took the abnormal executor information fed back by the decision maker, the heterogeneity of executors and the actual load of the system as the scheduling influencing factors, so that the scheduling method can be adjusted adaptively according to the actual changes of the network.In addition, the scheduling method used decision feedback to adjust the scheduling time, so as to achieve the best balance between system cost and security, and reduce the resource overhead of the system.Simulation results showed that the scheduling method can select a set of highly heterogeneous actuators that better meet the current network requirements on the basis of balancing the system cost and security, so as to improve the security and reliability of the system.…”
    Get full text
    Article
  12. 692
  13. 693

    Finite mixtures of functional graphical models: Uncovering heterogeneous dependencies in high-dimensional data. by Qihai Liu, Kevin H Lee, Hyun Bin Kang

    Published 2025-01-01
    “…In this work, we propose finite mixtures of functional graphical models (MFGM), which detect the heterogeneous subgroups of the population and estimate single graph for each subgroup by considering the correlation structures. …”
    Get full text
    Article
  14. 694
  15. 695

    Source Process Estimation for the 2024 Mw 7.1 Hyuganada, Japan, Earthquake and Forward Modeling Using N‐net Ocean Bottom Seismometer Data by R. Shibata, H. Kubo, W. Suzuki, S. Aoi, H. Sekiguchi

    Published 2025-05-01
    “…The N‐net seafloor seismograms of the mainshock with a frequency of ∼0.05 Hz recorded east of the source area were reproduced for several stations using the empirical Green's function approach based on the estimated source process data.…”
    Get full text
    Article
  16. 696

    Asynchronous bearing only tracking management approach in distributed multi-function integrated sensors by ZHANG Wei, YANG Qiu, LI Hao

    Published 2024-12-01
    “…The distributed multi-function system requires only one integrated sensor to switch to electronic support measure (ESM) mode within each tracking cycle to update the angle measurement information of target radiation source, while the other integrated sensors still work in the original planned mode and task. …”
    Get full text
    Article
  17. 697

    Securing Wireless Communications with Energy Harvesting and Multi-antenna Diversity by Nguyen Quang Sang, tran Cong Hung, tran Trung Duy, minh Tran, byung Seo Kim

    Published 2025-04-01
    “…Analytical expressions for the Signal-to-Noise Ratios (SNRs) at both the destination D and the eavesdropper E are derived, along with the Probability Density Function (PDF) and Cumulative Distribution Function (CDF) of these SNRs under block Rayleigh fading conditions. …”
    Get full text
    Article
  18. 698
  19. 699
  20. 700

    Uncovering functional deterioration in the rhizosphere microbiome associated with post-green revolution wheat cultivars by Monique E. Smith, Vanessa N. Kavamura, David Hughes, Rodrigo Mendes, George Lund, Ian Clark, Tim H. Mauchline

    Published 2025-06-01
    “…Of the 113 functional genes that were differentially abundant between heritage and modern cultivars, 95% were depleted in modern cultivars and 65% of differentially abundant reads best mapped to genes involved in staurosporine biosynthesis (antibiotic product), plant cell wall degradation (microbial mediation of plant root architecture, overwintering energy source for microbes) and sphingolipid metabolism (signal bioactive molecules). …”
    Get full text
    Article