Search alternatives:
functions » function (Expand Search)
Showing 521 - 540 results of 2,583 for search '((( resourcessss OR resources) selection functions ) OR ( sources detection functions ))', query time: 0.32s Refine Results
  1. 521

    Cross-Domain Communication Method Based on Load Balancing for SDNs by Xiaomao Wang, Yi Zhou, Feng Dan, Xian Yang

    Published 2025-02-01
    “…Therefore, the multi-domain control plane needs to consider more network resource states during the path selection, such as link weights, load saturation, and resource occupancy rates, in order to select the optimal paths to maximize the satisfaction of data plane requirements while maintaining network load balance. …”
    Get full text
    Article
  2. 522

    A Wind Power Density Forecasting Model Based on RF-DBO-VMD Feature Selection and BiGRU Optimized by the Attention Mechanism by Bixiong Luo, Peng Zuo, Lijun Zhu, Wei Hua

    Published 2025-02-01
    “…This paper proposes a novel WPD forecasting model based on RF-DBO-VMD feature selection and BiGRU optimized by an attention mechanism. …”
    Get full text
    Article
  3. 523

    Implementation and Effectiveness of community-based resources to increase cervical cancer screening uptake among women living in sub-Saharan Africa: A protocol for systematic revie... by Danladi B Adamu, Nicole Robertson, David Weller, Christine Campbell

    Published 2019-08-01
    “… # Methods We will systematically search selected databases and websites from 1980 to date for published and grey literature including citation and reference list tracking, on studies with a community focus carried out in sub-Saharan Africa, without language restrictions. …”
    Get full text
    Article
  4. 524

    Acoustic Emission as a Method for Analyzing Changes and Detecting Damage in Composite Materials During Loading by Katarzyna PANASIUK, Krzysztof DUDZIK, Grzegorz HAJDUKIEWICZ

    Published 2021-08-01
    “…The signal obtained from the sensor was then further processed and used to draw up diagrams of the AE hits, amplitude, root mean square of the AE source signal (RMS) and duration in the function of time. …”
    Get full text
    Article
  5. 525
  6. 526

    Detection of Greenhouse and Typical Rural Buildings with Efficient Weighted YOLOv8 in Hebei Province, China by Bingkun Wang, Zhiyuan Liu, Jiangbo Xi, Siyan Gao, Ming Cong, Haixing Shang

    Published 2025-05-01
    “…However, in rural and mountainous areas, the resolution and accessibility of remote sensing satellite images from a single source are poor, making it difficult to detect greenhouses and rural buildings effectively and automatically. …”
    Get full text
    Article
  7. 527

    LMGD: Log-Metric Combined Microservice Anomaly Detection Through Graph-Based Deep Learning by Xu Liu, Yuewen Liu, Miaomiao Wei, Peng Xu

    Published 2024-01-01
    “…Therefore, there is an urgent need for fast and accurate anomaly detection capabilities. However, the existing microservice anomaly detection methods do not pay attention to the multi-source data of the microservice system and thus have low accuracy. …”
    Get full text
    Article
  8. 528

    Evaluation of a coastal acoustic buoy for cetacean detections, bearing accuracy and exclusion zone monitoring by Kaitlin J. Palmer, Sam Tabbutt, Douglas Gillespie, Jesse Turner, Paul King, Dominic Tollit, Jessica Thompson, Jason Wood

    Published 2022-11-01
    “…Field trials indicated maximum detection ranges from 4–7.3 km depending on source and ambient noise levels. …”
    Get full text
    Article
  9. 529

    AC-YOLO: A lightweight ship detection model for SAR images based on YOLO11. by Rui He, Dezhi Han, Xiang Shen, Bing Han, Zhongdai Wu, Xiaohu Huang

    Published 2025-01-01
    “…However, existing SAR ship detection algorithms encounter two major challenges: limited detection accuracy and high computational cost, primarily due to the wide range of target scales, indistinct contour features, and complex background interference. …”
    Get full text
    Article
  10. 530

    Evaluating machine learning-based intrusion detection systems with explainable AI: enhancing transparency and interpretability by Vincent Zibi Mohale, Ibidun Christiana Obagbuwa

    Published 2025-05-01
    “…Machine Learning (ML)-based Intrusion Detection Systems (IDS) are integral to securing modern IoT networks but often suffer from a lack of transparency, functioning as “black boxes” with opaque decision-making processes. …”
    Get full text
    Article
  11. 531

    A High‐Quality Reference Genome and Comparative Genomics of the Widely Farmed Banded Cricket (Gryllodes sigillatus) Identifies Selective Breeding Targets by Shangzhe Zhang, Kristin R. Duffield, Bert Foquet, Jose L. Ramirez, Ben M. Sadd, Scott K. Sakaluk, John Hunt, Nathan W. Bailey

    Published 2025-03-01
    “…The high‐quality G. sigillatus genome assembly plus accompanying comparative genomic analyses serve as foundational resources for both applied and basic research on insect farming and behavioural biology, enabling researchers to pinpoint trait‐associated genetic variants, unravel functional pathways governing those phenotypes, and accelerate selective breeding efforts to increase the efficacy of large‐scale insect farming operations.…”
    Get full text
    Article
  12. 532
  13. 533

    Multimodal imaging analysis and structure-function correlation in patients exposed to pentosan polysulfate sodium by Sandra Hoyek, Eleni Konstantinou, Francesco Romano, Darren Chen, Celine Chaaya, Magdalena G. Krzystolik, Daniel Hu, Rachel Huckfeldt, Demetrios G. Vavvas, Leo A. Kim, Jason Lee, Elise De, John B. Miller, Nimesh A. Patel

    Published 2025-07-01
    “…Purpose: To study the anatomic and functional retinal changes in patients exposed to pentosan polysulfate (PPS) using multimodal imaging and mesopic microperimetry. …”
    Get full text
    Article
  14. 534
  15. 535
  16. 536
  17. 537

    Source Process Estimation for the 2024 Mw 7.1 Hyuganada, Japan, Earthquake and Forward Modeling Using N‐net Ocean Bottom Seismometer Data by R. Shibata, H. Kubo, W. Suzuki, S. Aoi, H. Sekiguchi

    Published 2025-05-01
    “…The N‐net seafloor seismograms of the mainshock with a frequency of ∼0.05 Hz recorded east of the source area were reproduced for several stations using the empirical Green's function approach based on the estimated source process data.…”
    Get full text
    Article
  18. 538
  19. 539

    Advancements in Nanostructured Functional Constituent Materials for Gas Sensing Applications: A Comprehensive Review by Ivana Panžić, Arijeta Bafti, Floren Radovanović-Perić, Davor Gašparić, Zhen Shi, Arie Borenstein, Vilko Mandić

    Published 2025-02-01
    “…By providing a comprehensive and up-to-date analysis, this review serves as a valuable resource for researchers and engineers, offering insights that can drive the next generation of high-performance, reliable, and selective gas sensors.…”
    Get full text
    Article
  20. 540

    Dynamic scheduling method of service function chain executors based on the mimic defense architecture by Chuanhuang LI, Jingjing TANG, Yangting CHEN, Rui LEI, Chao CHEN, Weiming WANG

    Published 2022-04-01
    “…Faced with the problem that static and lagging traditional defense technologies cannot effectively deal with new network attacks, according to the theory of mimetic security defense, a defense architecture of mimic service function chain (MSFC) based on the data forwarding level was proposed, and an execution dynamic scheduling method based on the decision feedback was further proposed.The method took the abnormal executor information fed back by the decision maker, the heterogeneity of executors and the actual load of the system as the scheduling influencing factors, so that the scheduling method can be adjusted adaptively according to the actual changes of the network.In addition, the scheduling method used decision feedback to adjust the scheduling time, so as to achieve the best balance between system cost and security, and reduce the resource overhead of the system.Simulation results showed that the scheduling method can select a set of highly heterogeneous actuators that better meet the current network requirements on the basis of balancing the system cost and security, so as to improve the security and reliability of the system.…”
    Get full text
    Article