Search alternatives:
functions » function (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
Showing 541 - 560 results of 2,583 for search '((( resources OR resources) selection functions ) OR ( source detection functions ))', query time: 0.32s Refine Results
  1. 541
  2. 542

    Asynchronous bearing only tracking management approach in distributed multi-function integrated sensors by ZHANG Wei, YANG Qiu, LI Hao

    Published 2024-12-01
    “…The distributed multi-function system requires only one integrated sensor to switch to electronic support measure (ESM) mode within each tracking cycle to update the angle measurement information of target radiation source, while the other integrated sensors still work in the original planned mode and task. …”
    Get full text
    Article
  3. 543
  4. 544
  5. 545
  6. 546

    CHILDREN’S MAP READING ABILITIES IN RELATION TO DISTANCE PERCEPTION, TRAVEL TIME AND LANDSCAPE by Aikaterini APOSTOLOPOULOU, Aikaterini KLONARI

    Published 2022-01-01
    “… Children’s cognition of distance is influenced by functional distance and estimations of travel time which increases with the presence of natura l or artificial barriers. …”
    Get full text
    Article
  7. 547
  8. 548
  9. 549

    Acoustic Emission as a Method for Analyzing Changes and Detecting Damage in Composite Materials During Loading by Katarzyna PANASIUK, Krzysztof DUDZIK, Grzegorz HAJDUKIEWICZ

    Published 2021-08-01
    “…The signal obtained from the sensor was then further processed and used to draw up diagrams of the AE hits, amplitude, root mean square of the AE source signal (RMS) and duration in the function of time. …”
    Get full text
    Article
  10. 550

    SILVERRUSH. XIV. Lyα Luminosity Functions and Angular Correlation Functions from 20,000 Lyα Emitters at z ∼ 2.2–7.3 from up to 24 deg2 HSC-SSP and CHORUS Surveys: Linking the Postr... by Hiroya Umeda, Masami Ouchi, Satoshi Kikuta, Yuichi Harikane, Yoshiaki Ono, Takatoshi Shibuya, Akio K. Inoue, Kazuhiro Shimasaku, Yongming Liang, Akinori Matsumoto, Shun Saito, Haruka Kusakabe, Yuta Kageura, Minami Nakane

    Published 2025-01-01
    “…We present luminosity functions (LFs) and angular correlation functions (ACFs) derived from 18,960 Ly α emitters (LAEs) at z  = 2.2−7.3 over a wide survey area of ≲24 deg ^2 that are identified in the narrowband data of the HSC-SSP and CHORUS surveys. …”
    Get full text
    Article
  11. 551

    LMGD: Log-Metric Combined Microservice Anomaly Detection Through Graph-Based Deep Learning by Xu Liu, Yuewen Liu, Miaomiao Wei, Peng Xu

    Published 2024-01-01
    “…Therefore, there is an urgent need for fast and accurate anomaly detection capabilities. However, the existing microservice anomaly detection methods do not pay attention to the multi-source data of the microservice system and thus have low accuracy. …”
    Get full text
    Article
  12. 552

    Cross-Domain Communication Method Based on Load Balancing for SDNs by Xiaomao Wang, Yi Zhou, Feng Dan, Xian Yang

    Published 2025-02-01
    “…Therefore, the multi-domain control plane needs to consider more network resource states during the path selection, such as link weights, load saturation, and resource occupancy rates, in order to select the optimal paths to maximize the satisfaction of data plane requirements while maintaining network load balance. …”
    Get full text
    Article
  13. 553

    AC-YOLO: A lightweight ship detection model for SAR images based on YOLO11. by Rui He, Dezhi Han, Xiang Shen, Bing Han, Zhongdai Wu, Xiaohu Huang

    Published 2025-01-01
    “…However, existing SAR ship detection algorithms encounter two major challenges: limited detection accuracy and high computational cost, primarily due to the wide range of target scales, indistinct contour features, and complex background interference. …”
    Get full text
    Article
  14. 554

    Evaluating machine learning-based intrusion detection systems with explainable AI: enhancing transparency and interpretability by Vincent Zibi Mohale, Ibidun Christiana Obagbuwa

    Published 2025-05-01
    “…Machine Learning (ML)-based Intrusion Detection Systems (IDS) are integral to securing modern IoT networks but often suffer from a lack of transparency, functioning as “black boxes” with opaque decision-making processes. …”
    Get full text
    Article
  15. 555

    Securing Industrial IoT Environments: A Fuzzy Graph Attention Network for Robust Intrusion Detection by Safa Ben Atitallah, Maha Driss, Wadii Boulila, Anis Koubaa

    Published 2025-01-01
    “…The Industrial Internet of Things (IIoT) faces significant cybersecurity threats due to its ever-changing network structures, diverse data sources, and inherent uncertainties, making robust intrusion detection crucial. …”
    Get full text
    Article
  16. 556

    Detection of Greenhouse and Typical Rural Buildings with Efficient Weighted YOLOv8 in Hebei Province, China by Bingkun Wang, Zhiyuan Liu, Jiangbo Xi, Siyan Gao, Ming Cong, Haixing Shang

    Published 2025-05-01
    “…However, in rural and mountainous areas, the resolution and accessibility of remote sensing satellite images from a single source are poor, making it difficult to detect greenhouses and rural buildings effectively and automatically. …”
    Get full text
    Article
  17. 557

    A High‐Quality Reference Genome and Comparative Genomics of the Widely Farmed Banded Cricket (Gryllodes sigillatus) Identifies Selective Breeding Targets by Shangzhe Zhang, Kristin R. Duffield, Bert Foquet, Jose L. Ramirez, Ben M. Sadd, Scott K. Sakaluk, John Hunt, Nathan W. Bailey

    Published 2025-03-01
    “…The high‐quality G. sigillatus genome assembly plus accompanying comparative genomic analyses serve as foundational resources for both applied and basic research on insect farming and behavioural biology, enabling researchers to pinpoint trait‐associated genetic variants, unravel functional pathways governing those phenotypes, and accelerate selective breeding efforts to increase the efficacy of large‐scale insect farming operations.…”
    Get full text
    Article
  18. 558

    Evaluation of a coastal acoustic buoy for cetacean detections, bearing accuracy and exclusion zone monitoring by Kaitlin J. Palmer, Sam Tabbutt, Douglas Gillespie, Jesse Turner, Paul King, Dominic Tollit, Jessica Thompson, Jason Wood

    Published 2022-11-01
    “…Field trials indicated maximum detection ranges from 4–7.3 km depending on source and ambient noise levels. …”
    Get full text
    Article
  19. 559

    User preference–based QoS-aware service function placement in IoT-Edge cloud by Briytone Mutichiro, Younghan Kim

    Published 2021-05-01
    “…We formulate the service function placement at the edge problem. We employ user service request patterns in terms of user preference and service selection probability to model service placement. …”
    Get full text
    Article
  20. 560