Search alternatives:
resources » resourcess (Expand Search)
source » sources (Expand Search)
Showing 161 - 180 results of 2,583 for search '((( resources OR resources) selection function ) OR ( source detection functions ))', query time: 0.28s Refine Results
  1. 161
  2. 162

    Multilingual Investigation of Cross-Project Code Clones in Open-Source Software for Internet of Things Systems by Wenqing Zhu, Norihiro Yoshida, Yutaka Matsubara, Hiroaki Takada

    Published 2024-01-01
    “…We collected 122 IoT system repositories in nine languages from GitHub and grouped them according to their primary functionality in IoT systems. We used MSCCD, a multilingual code clone detector to detect Type-3 code clones for each group. …”
    Get full text
    Article
  3. 163

    An effective method for anomaly detection in industrial Internet of Things using XGBoost and LSTM by Zhen Chen, ZhenWan Li, Jia Huang, ShengZheng Liu, HaiXia Long

    Published 2024-10-01
    “…We select the optimal threshold and loss function, which are part of our optimal model, by comparing metrics such as accuracy, precision, recall, False Alarm Rate (FAR), Area Under the Receiver Operating Characteristic Curve (AUC-ROC), and Area Under the Precision–Recall Curve (AUC-PR) values. …”
    Get full text
    Article
  4. 164
  5. 165

    Analytical method for determining coordinates of the radiation source in a homogeneous medium by H. V. Velichko

    Published 2015-12-01
    “…Sensors (not less than five) detect the passage of the wave front and do not fix the phase of the transmitted wave. …”
    Get full text
    Article
  6. 166

    Multi-View Cluster Structure Guided One-Class BLS-Autoencoder for Intrusion Detection by Qifan Yang, Yu-Ang Chen, Yifan Shi

    Published 2025-07-01
    “…Multi-view OCC approaches usually require collecting multi-view traffic data from all sources and have difficulty detecting intrusion independently in each view. …”
    Get full text
    Article
  7. 167
  8. 168

    Leader’s discourse in responding to natural disaster: an appraisal analysis by T. Thyrhaya Zein, T. Syarfina, Muhammad Yusuf

    Published 2024-12-01
    “…The leader’s discourse is utilized as research data, extracted from five selected speeches by Edy Rahmayadi retrieved from mass media official YouTube. …”
    Get full text
    Article
  9. 169
  10. 170
  11. 171
  12. 172
  13. 173

    A Pre-Selection–Enhanced Arbiter PUF for Strengthening PUF-Based Authentication by Rizka Reza Pahlevi, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada

    Published 2025-01-01
    “…Physical Unclonable Functions (PUFs) have emerged as a compelling solution for hardware-based authentication, yet arbiter PUFs often require additional mechanisms to address reliability challenges and vulnerabilities to attacks. …”
    Get full text
    Article
  14. 174
  15. 175

    Presenting A Model for Managing Agricultural, Industrial, And Household Water Consumption in Iran by Combining System Dynamics and Genetic Algorithm by Maryam Movaseghi Gilani, Mohammad Ali Afshar Kazemi, Mohamad Ali Keramati

    Published 2025-03-01
    “…<p><strong>Introduction:</strong> In this study, the country's water resources management system has been modeled using a system dynamics approach. …”
    Get full text
    Article
  16. 176

    The Cosmic Evolution of Fast Radio Bursts Inferred from the CHIME/FRB Baseband Catalog 1 by Om Gupta, Paz Beniamini, Pawan Kumar, Steven L. Finkelstein

    Published 2025-01-01
    “…Testing two types of redshift evolution models suggests a likely combination of young and old formation channels. $3{1}_{-21}^{+31}$ % of FRB sources may track star formation, or correspondingly, FRB sources may have delay times of $1.9{4}_{-1.31}^{+1.54}$ Gyr. …”
    Get full text
    Article
  17. 177
  18. 178
  19. 179
  20. 180

    Research on multi-sensor fusion detection and tracking technology for autonomous-rail rapid transit tram by PAN Wenbo, YUAN Xiwen, LIN Jun, XIE Guotao, LONG Teng, HUANG Wenyu

    Published 2022-07-01
    “…Firstly, a millimeter-wave radar and LiDAR are used to perceive by single sensor, and the sensing results were merged by using a multi-source fusion algorithm, to generate more accurate detection results. …”
    Get full text
    Article