Search alternatives:
resource » source (Expand Search)
Showing 281 - 300 results of 2,685 for search '((( resource OR success) detection functions ) OR ( sources detection function ))', query time: 0.30s Refine Results
  1. 281

    Impact of Artificial Intelligence on Human Resource Management Practices: A Qualitative Study in Hyderabad, Pakistan’s Banking Sector by Sahar Akhtar Mughal, Mohammed Bilal Memon, Faraz Ali Memon

    Published 2025-06-01
    “… Artificial Intelligence (AI) is reshaping the way Human Resource Management (HRM) functions within organizations. …”
    Get full text
    Article
  2. 282

    Reinforcement Learning-Based Resource Allocation Scheme of NR-V2X Sidelink for Joint Communication and Sensing by Zihan Li, Ping Wang, Yamin Shen, Song Li

    Published 2025-01-01
    “…Joint communication and sensing (JCS) is becoming an important trend in 6G, owing to its efficient utilization of spectrums and hardware resources. Utilizing echoes of the same signal can achieve the object location sensing function, in addition to the V2X communication function. …”
    Get full text
    Article
  3. 283
  4. 284

    Research on intrusion detection model based on synchronization of heterogenous executer by YU Hong, ZHU Zhengbin, WEI Shuai, GUO Wei, LAN Julong

    Published 2025-02-01
    “…The test results confirm the conclusion that the detection accuracy of the IDHES model depends solely on the success rate of coordinated attacks by heterogeneous executers and the efficiency of target function synchronization. …”
    Get full text
    Article
  5. 285
  6. 286

    Research on intrusion detection model based on improved MLP algorithm by Qihao Zhao, Fuwei Wang, Weimin Wang, Tianxin Zhang, Haodong Wu, Weijun Ning

    Published 2025-02-01
    “…These patterns can be effectively captured through MLP’s multiple nonlinear transformations, such as ReLU and Sigmoid activation functions, which are especially beneficial for intrusion detection. …”
    Get full text
    Article
  7. 287

    RpiBeh offers a versatile open source solution for rodent behavior tracking and closed loop interventions by Yiqi Sun, Jie Zhang, Qianyun Wang, Jianguang Ni

    Published 2025-08-01
    “…Existing commercial systems are costly and inflexible for customization, while current open-source tools are often lack of real-time functionality and suffer from steep learning curve. …”
    Get full text
    Article
  8. 288

    Transformer-based ECG classification for early detection of cardiac arrhythmias by Sunnia Ikram, Amna Ikram, Harvinder Singh, Malik Daler Ali Awan, Sajid Naveed, Isabel De la Torre Díez, Henry Fabian Gongora, Thania Candelaria Chio Montero

    Published 2025-08-01
    “…Electrocardiogram (ECG) classification plays a critical role in early detection and trocardiogram (ECG) classification plays a critical role in early detection and monitoring cardiovascular diseases. …”
    Get full text
    Article
  9. 289
  10. 290

    A Self-Adaptive Particle Swarm Optimization Based Multiple Source Localization Algorithm in Binary Sensor Networks by Long Cheng, Yan Wang, Shuai Li

    Published 2015-08-01
    “…Then the maximum likelihood estimator is employed to establish the objective function which is used to estimate the location of sources. …”
    Get full text
    Article
  11. 291

    Fast detection method for radionuclides based on Sequential Bayesian approach by WAN Linjian, ZHANG Xuan, ZHANG Chunlei, HUANG Jianwei, LIU Jiacheng, ZHANG Xiaole, LI Dehong, YANG Zhijun

    Published 2025-01-01
    “…Finally, experimental verifications were conducted on the feasibility, detection performance, and universality of the method by placing a set of standard point sources at different distances from the front of a LaBr3(Ce) detection system in both low and natural radiation background environments. …”
    Get full text
    Article
  12. 292

    Assessment of the Integrated Communicable Disease Surveillance and Response System in Thamar Governorate, Yemen by Basem F. Abdel-Aziz, Saddam A.H. Al-Nahari, Ali A. Al-Waleedi, Shymaa M. Elshoura

    Published 2024-12-01
    “…The questionnaire included two sections: assessment of core activities of the IDSR system (structure, case confirmation, data reporting, data analysis, outbreak investigation, epidemic preparedness, epidemic responses, feedback) and assessment of support functions of the IDSR system (supervision, training, coordination, logistics and resources). …”
    Article
  13. 293

    Joint Multifractal Analysis and Source Testing of River Level Records Based on Multifractal Detrended Cross-Correlation Analysis by Liang Wu, Manling Wang, Tongzhou Zhao

    Published 2020-01-01
    “…It is important for the detection of change in multifractality in space. Besides, the cross-correlations in two analyzed series make the analysis of sources of joint multifractality difficult. …”
    Get full text
    Article
  14. 294
  15. 295

    DWS-YOLO: A Lightweight Detector for Blood Cell Detection by Yihai Mao, Hongyi Zhang, Wanqing Wu, Xingen Gao, Zhibin Lin, Juqiang Lin

    Published 2024-12-01
    “…Improved attention, loss function, and suppression enhance detection accuracy, while lightweight C3 module reduces computation time. …”
    Get full text
    Article
  16. 296

    Code vulnerability detection method based on graph neural network by Hao CHEN, Ping YI

    Published 2021-06-01
    “…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
    Get full text
    Article
  17. 297
  18. 298

    Randomization-Driven Hybrid Deep Learning for Diabetic Retinopathy Detection by A. M. Mutawa, G. R. Hemalakshmi, N. B. Prakash, M. Murugappan

    Published 2025-01-01
    “…This study pioneers an innovative framework, using Multi-Scale Discriminative Robust Local Binary Pattern (MS-DRLBP) features, combined with a hybrid Convolutional Neural Network-Radial Basis Function (CNN-RBF) classifier, to enhance the detection of DR. …”
    Get full text
    Article
  19. 299

    Algorithms for Automatic Detection and Location of Infrasound Events in the PSDL System by Asming Vladimir Ernestovich, Fedorov Andrey Viktorovich

    Published 2024-12-01
    “…An algorithm for detecting infrasound signals by calculating the cross-correlation function between records of individual sensors in a array is described. …”
    Get full text
    Article
  20. 300