Search alternatives:
functions » function (Expand Search)
resourcess » resourcesss (Expand Search)
resource » resources (Expand Search)
source » sources (Expand Search)
functions » function (Expand Search)
resourcess » resourcesss (Expand Search)
resource » resources (Expand Search)
source » sources (Expand Search)
-
121
A Generalized Method for Sentiment Analysis across Different Sources
Published 2021-01-01“…In this study, a rule and lexical-based procedure is proposed together with unsupervised machine learning to implement sentiment analysis with an improved generalization ability across different sources. To deal with sources devoid of syntactic and grammatical structure, the approach incorporates a ruled-based technique for emoticon detection, word contraction expansion, noise removal, and lexicon-based text preprocessing using lexical features such as part of speech (POS), stop words, and lemmatization for local context analysis. …”
Get full text
Article -
122
Productivity, activity of digestive and antioxidant enzymes of carp (Cyprinus carpio Linnaeus, 1758) as a result of the use of inulin in low-nutrient feeds
Published 2025-06-01“…The practical use of the knowledge gained outlines the possibility of optimizing the production of fish when introducing resource-saving technologies in aquaculture.…”
Get full text
Article -
123
Image Deconvolution to Resolve Astronomical X-Ray Sources in Close Proximity: The <i>NuSTAR</i> Images of SXP 15.3 and SXP 305
Published 2025-03-01“…The broad point spread function of the <i>NuSTAR</i> telescope makes resolving astronomical X-ray sources a challenging task, especially for off-axis observations. …”
Get full text
Article -
124
Evaluation of Intrusion Detection Systems in Cyber Security using Fuzzy OffLogic and MCDM Approach
Published 2025-06-01Get full text
Article -
125
Source localization based on time delay estimation in complex environment
Published 2014-01-01“…In order to improve the performance of source localization in noisy and reverberant environments,a novel time delay estimation (TDE) method was proposed.This method is called acoustical transfer function ratio based on statistical model (ATFR-SM).In the proposed algorithm,the noise reduction method based on the statistical model was adopted to reduce the effect of noise on acoustical transfer Function (ATF).In the ATF method,the power spectral density (PSD) was smoothed and whitened to reduce the effect of reverberations.voice activity detection (VAD) was used to distinguish the speech period from the noise period,and the TDE was performed in the speech period to improve the estimation accuracy.Moreover,the proposed TDE method and the linear closed-form method for source localization were combined to constitute a source localization system.The results of performance evaluation show that,in both the noisy and reverberant conditions,the lower percentage of abnormal points (PAP) and lower root mean square error (RMSE) can be achieved by the proposed TDE method than those of the reference methods.Meanwhile,the source localization has higher accuracy than the reference methods.…”
Get full text
Article -
126
Source reconstruction accuracy of MEG and EEG Bayesian inversion approaches.
Published 2012-01-01“…Still, no correct network detection is possible without reliable source localization. …”
Get full text
Article -
127
Research on Interference Resource Optimization Based on Improved Whale Optimization Algorithm
Published 2025-01-01“…In this problem, this paper establishes an interference resource optimization model with radar detection probability, interference effectiveness, and interference bandwidth utilization as the objective functions. …”
Get full text
Article -
128
New source of cellulase production using a metagenomic technique
Published 2019-12-01“…The soil metagenome is an affluent source for the discovery of new natural products. …”
Get full text
Article -
129
Non-Line-of-Sight Location With Gauss Filtering Algorithm Based on a Model of Photon Flight
Published 2020-01-01“…Recently, non-line-of-sight (NLOS) detection based on time of flight (TOF) has been investigated. …”
Get full text
Article -
130
A review on WSN based resource constrained smart IoT systems
Published 2025-05-01“…DL), D2D communication, Computer Vision, and Network Function Virtualization (i.e. NFV). Additionally, it emphasizes assessing and offloading specific IoT application functions onto the network’s edge to enhance performance. …”
Get full text
Article -
131
Rice Disease Detection: TLI-YOLO Innovative Approach for Enhanced Detection and Mobile Compatibility
Published 2025-04-01“…This study aims to develop a rice disease detection model that is highly accurate, resource efficient, and suitable for mobile deployment to address the limitations of existing technologies. …”
Get full text
Article -
132
Phenotypic variation of Thenus spp. (Decapoda, Scyllaridae) in the waters of southern Thailand and Malaysia using multivariate morphometric analysis
Published 2025-01-01“… Thenus spp. are slipper lobsters which are commercially significant as a food source with good aquaculture potential. This study focuses on collecting population information on Thenus orientalis and Thenus indicus from selected sites in southern Thailand and Malaysia to inform sustainable fisheries management about the resources. …”
Get full text
Article -
133
Development of Time-Reversal Method for Impact Source Identification on Plate Structures
Published 2013-01-01“…Numerical verification for finite-size isotropic plates under low velocity impacts is performed to demonstrate the versatility of T-R method for impact source identification. The tradeoff between accuracy of the impact location detection and calibration spacing is studied in detail. …”
Get full text
Article -
134
Source reconstruction via deposition measurements of an undeclared radiological atmospheric release
Published 2025-08-01“…The inversion consists of Bayesian and cost-function-based algorithms to reconstruct the initial source properties. …”
Get full text
Article -
135
A model for the early identification of sources of airborne pathogens in an outdoor environment.
Published 2013-01-01“…In regional likelihood rankings including all large dairy farms, the suspected goat farms consistently ranked first. The two-source simulation study showed that detection of sources is most clear if the distance between the sources is either relatively small or relatively large.…”
Get full text
Article -
136
Shedding light on biochemical changes in single neuron-like pheochromocytoma cells following exposure to synchrotron sourced terahertz radiation using synchrotron source Fourier tr...
Published 2025-01-01“…To investigate the metabolic response of PC 12 cells after synchrotron THz radiation exposure, we utilized the FTIR microscope at the Infrared Microspectroscopy IRM beamline, which offers high photon flux and diffraction-limited spatial resolution enabling the detection of functional group variations in biological molecules at a single-cell level. …”
Get full text
Article -
137
Antibacterial Effect of Bacteriocinogenic Enterococci from Different Sources on Listeria monocytogenes
Published 2020-03-01“…Additionally, the present study detected that inhibitory activity was strain-specific. …”
Get full text
Article -
138
The aftermath of trauma on resting state source-level MEG microstate dynamics
Published 2025-12-01“…Background: Traumatic events can disrupt psychological functioning, leading to conditions such as post-traumatic stress disorder (PTSD). …”
Get full text
Article -
139
Multi-tool copy number detection highlights common body size-associated variants in miniature pig breeds from different geographical regions
Published 2025-03-01“…In total, 34 homozygous CNVs overlapped with exonic regions in all samples, suggesting a role in expressing specific phenotypes such as uniform growth patterns, fertility, or metabolic function. In addition, 386 copy number variation regions (CNVRs) shared by all breeds were detected, covering 33.6 Mb (1.48% of the autosomal genome). …”
Get full text
Article -
140
A lightweight framework to secure IoT devices with limited resources in cloud environments
Published 2025-07-01“…This paper proposes a lightweight decision tree-based intrusion detection framework suitable for real-time anomaly detection in a resource-constrained IoT environment. …”
Get full text
Article