Search alternatives:
resource » source (Expand Search)
functions » function (Expand Search)
Showing 1,081 - 1,100 results of 2,685 for search '((( resource OR success) detection functions ) OR ( sources detection functions ))', query time: 0.29s Refine Results
  1. 1081
  2. 1082
  3. 1083
  4. 1084
  5. 1085
  6. 1086

    Feature selection using a multi-strategy improved parrot optimization algorithm in software defect prediction by Qi Fei, Guisheng Yin, Zhian Sun

    Published 2025-04-01
    “…Software defect detection is a critical research topic in the field of software engineering, aiming to identify potential defects during the development process to improve software quality and reduce maintenance costs. …”
    Get full text
    Article
  7. 1087

    Modern Concepts of Clinical and Diagnostic Criteria for Premature Ovarian Failure (Literature Review) by M. D. Salimova, Ya. G. Nadelyaeva, I. N. Danusevich

    Published 2021-01-01
    “…An information search was carried out using Internet resources (PubMed, Web of Science, eLibrary.Ru), literary sources for the period 2015–2019 were analyzed. …”
    Get full text
    Article
  8. 1088

    MGSurvE: A framework to optimize trap placement for genetic surveillance of mosquito populations. by Héctor M Sánchez C, David L Smith, John M Marshall

    Published 2024-05-01
    “…For these projects, monitoring will be required to detect unintended spread of gene drive mosquitoes beyond field sites, and the emergence of alternative alleles, such as drive-resistant alleles or non-functional effector genes, within intervention sites. …”
    Get full text
    Article
  9. 1089

    Properties of financial potential as economic analysis object by O.M. Dzyubenko

    Published 2017-12-01
    “…The article substantiates the importance of financial potential because it is also considered one of the factors that determines the success of an enterprise. The article considers the properties of financial potential from the point of view of functional orientation, classification features and principles. …”
    Get full text
    Article
  10. 1090

    An Optimization Algorithm for Forward-Scatter Radar Network Node Deployment Based on BFGS and Improved NSGA-II by Yuqing Zheng, Xiaofeng Ai, Zhiming Xu, Jing Wu, Feng Zhao

    Published 2025-04-01
    “…A multi-objective optimization model was subsequently established with the objective functions of minimizing node cost and maximizing spatial detection area. …”
    Get full text
    Article
  11. 1091

    Editorial by Teddy Surya Gunawan

    Published 2025-05-01
    “…Contributions on flexible antenna designs, mobile applications for dyslexic learners, and modified grey relational analysis further showcase how electronics and AI are increasingly embedded in daily societal functions. In Materials and Manufacturing Engineering, the research on MSW-derived biochar for iron production and voltage-induced void formation in boiler tubes exemplifies innovation in resource utilization and reliability of industrial systems. …”
    Get full text
    Article
  12. 1092

    Robot Arm Control System for Assisted Feeding of People With Disabilities in Their Upper Limbs by Daniella Arnáez, Fiorela Manco, José Oliden, Guillermo Kemper

    Published 2022-08-01
    “…When carrying out the tests with rice, 80% success was obtained, while in the case of oatmeal, 98.9% success was achieved.…”
    Get full text
    Article
  13. 1093

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  14. 1094

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  15. 1095

    Design of the Field Protection and Signal Priority at Intersection System for Autonomous-rail Rapid Transit by SHI Yangyang, LIU Guangyong, WU Jinyong

    Published 2022-06-01
    “…It provides auxiliary driving information for the driver through automation equipment, realizes the functions of route protection, virtual section occupied/unoccupied detection, signal control, entering/leaving station detection, platform door linkage control, berth status detection and management in deport and so on, which improves system security and reduces driver working intensity. …”
    Get full text
    Article
  16. 1096

    Automated Segmentation of Acute Ischemic Stroke Using Attention U-net with Patch Mechanism by CINAR, N., UCAN, M., KAYA, B., KAYA, M.

    Published 2025-02-01
    “…This paper addresses ischemic stroke detection using deep learning techniques to interpret medical images like MRI and CT scans, with a focus on segmentation. …”
    Get full text
    Article
  17. 1097

    Research on a traffic flow statistical algorithm based on YBOVDT and SAM2 by Yuanyuan Wang, Zheng Ding, Jiange Liu, Kexiao Wu, Md Sharid Kayes Dipu, Tingmei Ma, Yonghao Ma, Haiyan Zhang

    Published 2025-05-01
    “…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
    Get full text
    Article
  18. 1098

    Forecasting Cumulonimbus Clouds: Evaluation of New Operational Convective Index Using Lightning and Precipitation Data by Margarida Belo-Pereira

    Published 2025-05-01
    “…<i>IndexCON</i> performs well in the warm season (May–October), with a probability of detection (POD) of 70%, a false alarm ratio (FAR) of 30% and a probability of false detection (POFD) less than 5%, leading to a Critical Success Index (CSI) above 0.55. …”
    Get full text
    Article
  19. 1099

    Green Chemistry Method for Analyzing Bisphenol A in Milk by Angela M. Encerrado Manriquez, Wen-Yee Lee

    Published 2025-01-01
    “…., its ability to mimic hormone functions). Studies have reported that BPA can leach into various food sources, including milk, a dietary staple for infants. …”
    Get full text
    Article
  20. 1100

    Fine-grained access control method for private data in android system by Gang Liu, Guofang Zhang, Quan Wang, Shaomin Ji, Lizhi Zhang

    Published 2019-03-01
    “…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
    Get full text
    Article