Search alternatives:
resourcessss » resourcesssss (Expand Search)
resource » resources (Expand Search)
source » sources (Expand Search)
Showing 901 - 920 results of 1,810 for search '((( resourcessss OR resource) detection functions ) OR ( source detection function ))', query time: 0.30s Refine Results
  1. 901
  2. 902

    How to trace the origins of short-lived atmospheric species: an Arctic example by A. Da Silva, L. Marelle, J.-C. Raut, Y. Gramlich, K. Siegel, K. Siegel, S. L. Haslett, S. L. Haslett, C. Mohr, C. Mohr, J. L. Thomas

    Published 2025-05-01
    “…Knowing the exact modeled tracer emission sources in WRF-Chem enables a precise quantification of the source detection accuracy. …”
    Get full text
    Article
  3. 903
  4. 904
  5. 905

    Effective disinfecting of negative pressure pipelines of DCUs reduces the risk of cross infection in dental care by Xuerong Lv, Ke Yan, Xiang Han, Feiyang Wang, Yuzhuo Ma, Shougang Zhang, Xiaoqian Wang

    Published 2024-12-01
    “…Objectives Microbial contamination of various accessory parts of the dental chair units (DCUs) is an essential source of cross infection, while the accessories of the crucial suction function are usually overlooked. …”
    Get full text
    Article
  6. 906

    Mineral identification in thin sections using a lightweight and attention mechanism by Xin Zhang, Wei Dang, Jun Liu, Zijuan Yin, Guichao Du, Yawen He, Yankai Xue

    Published 2025-04-01
    “…Mineral identification is foundational to geological survey research, mineral resource exploration, and mining engineering. Considering the diversity of mineral types and the challenge of achieving high recognition accuracy for similar features, this study introduces a mineral detection method based on YOLOv8-SBI. …”
    Get full text
    Article
  7. 907
  8. 908
  9. 909

    A lightweight transformer based multi task learning model with dynamic weight allocation for improved vulnerability prediction by Lan Liu, Zhanfa Hui, Guiming Chen, Tingfeng Cai, Chiyu Zhou

    Published 2025-08-01
    “…Traditional methods, such as single-task learning and ensemble approaches, often struggle with these challenges, particularly in detecting rare but critical vulnerabilities. To address this, we propose the MTLPT: Multi-Task Learning with Position Encoding and Lightweight Transformer for Vulnerability Prediction, a novel multi-task learning framework that leverages custom lightweight Transformer blocks and position encoding layers to effectively capture long-range dependencies and complex patterns in source code. …”
    Get full text
    Article
  10. 910

    THE SOLUTION TO THE EQUATION OF THE SHOCK WAVE BURGERS IN THE PTC MATHCAD ENVIRONMENT by R. E. Oleynikova

    Published 2022-08-01
    “…However, this error is detected through the values of the nonlinear term included in the differential equation, which is determined according to the binomial representation through the quadratic forms of the matrix of the trial function. …”
    Get full text
    Article
  11. 911

    Special Issue on Contemporary Research Studies in Operations Research, Business Analytics, and Business Intelligence by Viswanath Kumar Ganesan, S. Vinodh, Malolan Sundararaman, M. Vimala Rani, M. Mathirajan

    Published 2025-06-01
    “…The global market's increasing demand, diverse resource supply options, global competition, and environmental protection needs are driving organizations to adopt sustainable strategies. …”
    Get full text
    Article
  12. 912

    Predicting protein synergistic effect in Arabidopsis using epigenome profiling by Chih-Hung Hsieh, Ya-Ting Sabrina Chang, Ming-Ren Yen, Jo-Wei Allison Hsieh, Pao-Yang Chen

    Published 2024-10-01
    “…QHistone accurately identifies histone modifications associated with specific known proteins, and allows users to computationally validate their results using gene expression data from various plant tissues. These functions demonstrate an useful approach to utilizing epigenome data for gene regulation analysis, making QHistone a valuable resource for the scientific community ( https://qhistone.paoyang.ipmb.sinica.edu.tw ).…”
    Get full text
    Article
  13. 913

    Optimizing maize germination forecasts with random forest and data fusion techniques by Lili Wu, Yuqing Xing, Kaiwen Yang, Wenqiang Li, Guangyue Ren, Debang Zhang, Huiping Fan

    Published 2024-11-01
    “…Traditional methods for detecting seed germination rates often involve lengthy experiments that result in damaged seeds. …”
    Get full text
    Article
  14. 914
  15. 915

    Experimental study on solution possibilities of multiextremal optimization problems through heuristic methods by Rudolf A. Neydorf, Ivan V. Chernogorov, Orkhan Takhir Yarakhmedov, Victor V. Polyakh

    Published 2015-12-01
    “…Each method can provide any desired accuracy of the extremum problem solution, and it utilizes an acceptable time resource.…”
    Get full text
    Article
  16. 916

    Specific performance of IDT edge fingers by E. DANICKI, T, GAFKA

    Published 2014-05-01
    “…The theory shows that the edge strips of the system works differently as compared with these positioned inside the system. The familiar δ-function model however, can still be applied provided that the δ-sources of SAW are properly scaled and shifted from their position at the centres of the strips. …”
    Get full text
    Article
  17. 917

    Attack traffic allocation and load balancing mechanism for SDN by LI Man, ZHOU Huachun, XU Qi, DENG Shuangxing, ZOU Tao, ZHANG Ruyun

    Published 2025-03-01
    “…The traffic allocation problem was modeled as a Markov decision process (MDP), where the reward function included both resource consumption and delay. …”
    Get full text
    Article
  18. 918
  19. 919

    In-band network telemetry system based on high-performance packet processing architecture VPP by Tian PAN, Xingchen LIN, Jiao ZHANG, Tao HUANG, Yunjie LIU

    Published 2021-03-01
    “…An in-band network telemetry-based system was built based on VPP, a high-performance virtual network forwarding architecture/device, via reorganizing the data plane pipeline processing modules.Moreover, a network-wide telemetry mechanism was further developed via embedding source routing into the probe packet header for specifying the route of probe packets.Finally, a virtual network topology was built with performance evaluation conducted.The evaluation shows that the telemetry system can monitor the network in a high precision of every 0.13 ms, detecting link congestion in real time with minor performance overhead.Given virtual network devices have been widely deployed in data centers, the proposed scheme is expected to improve the reliability of multi-tenancy and network function virtualization in data centers via high-precision, network-wide virtual link telemetry coverage.…”
    Get full text
    Article
  20. 920

    Optimizing Trade-Offs in Reliability, Security, and Freshness for Integrated Communication, Sensing, and Over-the-Air Computing by Tianyu Ren, Miao Zhang, Fangyu Wang, Kaiyuan Zheng

    Published 2025-01-01
    “…Specifically, considering statistical CSI, the target detection and AirComp aggregation errors are derived, and the upper bound of the security information age violation probability is obtained using stochastic network calculus and moment generating function theory. …”
    Get full text
    Article