Search alternatives:
resourcessssss » sourcessssss (Expand Search)
resource » source (Expand Search)
Showing 881 - 900 results of 1,810 for search '((( resourcessssss OR resource) detection function ) OR ( sources detection function ))', query time: 0.27s Refine Results
  1. 881

    Editorial by Teddy Surya Gunawan

    Published 2025-05-01
    “…Contributions on flexible antenna designs, mobile applications for dyslexic learners, and modified grey relational analysis further showcase how electronics and AI are increasingly embedded in daily societal functions. In Materials and Manufacturing Engineering, the research on MSW-derived biochar for iron production and voltage-induced void formation in boiler tubes exemplifies innovation in resource utilization and reliability of industrial systems. …”
    Get full text
    Article
  2. 882
  3. 883

    How to trace the origins of short-lived atmospheric species: an Arctic example by A. Da Silva, L. Marelle, J.-C. Raut, Y. Gramlich, K. Siegel, K. Siegel, S. L. Haslett, S. L. Haslett, C. Mohr, C. Mohr, J. L. Thomas

    Published 2025-05-01
    “…Knowing the exact modeled tracer emission sources in WRF-Chem enables a precise quantification of the source detection accuracy. …”
    Get full text
    Article
  4. 884

    Automated hypocenter determination of tectonic tremors in the Nankai subduction zone using convolutional neural networks combined with semblance analysis by Amane Sugii, Yoshihiro Hiramatsu, Takahiko Uchide, Kazutoshi Imanishi

    Published 2024-12-01
    “…The trained CNN model achieved high accuracy, with both precision and recall exceeding 97%, and correctly detected 96% of distant earthquakes. The probability of tectonic tremor as a function of the signal-to-noise ratio (SNR) increased steeply from 10 to 90% at an SNR of 4. …”
    Get full text
    Article
  5. 885
  6. 886

    Advanced signal processing algorithm for fault classification and localization in VSC-HVDC based Offshore wind farm by Rehana Perveen

    Published 2025-06-01
    “…This work provides real-time validation on the RTDS platform by the use of S-transform, Ensemble Empirical Mode Decomposition (EEMD), and SVM, for quick and reliable detection of AC/DC faults. Next for classification, features extracted through intrinsic mode function decomposed by EMD and EEMD and classified distinctly using support vector machine techniques. …”
    Get full text
    Article
  7. 887

    Maximum Entropy Principle Based on Bank Customer Account Validation Using the Spark Method by Xiaorong Qiu, Ye Xu, Yingzhong Shi, S. Kannadhasan Deepa, S. Balakumar

    Published 2023-01-01
    “…This approach will have a mapping from clustering and feature extraction to classification for accurate detection. Based on the analysis and simulation, it is observed that the proposed approach SNN-MFP has 87% accuracy and is 84.71% more functional than the classical method of using only the SNN. …”
    Get full text
    Article
  8. 888

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  9. 889

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  10. 890

    Renal Biopsy Pathological Tissue Segmentation: A Comprehensive Review and Experimental Analysis by Yan Liu, Taiping Wang, Xinxin He, Wei Wang, Qiang He, Juan Jin

    Published 2025-01-01
    “…This study provides a novel technical framework for precise renal pathological tissue segmentation and lays the foundation for future lesion detection and intelligent diagnostic applications.…”
    Get full text
    Article
  11. 891

    Research on a traffic flow statistical algorithm based on YBOVDT and SAM2 by Yuanyuan Wang, Zheng Ding, Jiange Liu, Kexiao Wu, Md Sharid Kayes Dipu, Tingmei Ma, Yonghao Ma, Haiyan Zhang

    Published 2025-05-01
    “…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
    Get full text
    Article
  12. 892

    Baseline levels of microplastics in agricultural soils obscure the effects of additional microplastics from recycled fertilizers by Collin J. Weber, Dominika Kundel, Andreas Fliessbach, Else K. Bünemann, Moritz Bigalke

    Published 2025-07-01
    “…Whilst it was observed from the fluxes that digestate can be a substantial source of microplastics to soils, the comparatively short time of application and the high background at our investigated sites leads to a obscured effect where digestate inputs serve a limited function.…”
    Get full text
    Article
  13. 893

    Quality and content evaluation of thyroid eye disease treatment information on TikTok and Bilibili by Haisheng Wang, Huahong Zhang, Jiamin Cao, Feng Zhang, Wei Xiong

    Published 2025-07-01
    “…Abstract Thyroid eye disease (TED) is an autoimmune condition that commonly impacts patients’ visual function, appearance, and psychological well-being. …”
    Get full text
    Article
  14. 894

    Fine-grained access control method for private data in android system by Gang Liu, Guofang Zhang, Quan Wang, Shaomin Ji, Lizhi Zhang

    Published 2019-03-01
    “…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
    Get full text
    Article
  15. 895

    Direction of Arrival Estimation Based on the Multistage Nested Wiener Filter by Xiaodong He, Bin Tang

    Published 2015-02-01
    “…The computation of the proposed method is simple, and the number of detectable signal sources could exceed the number of antenna elements.…”
    Get full text
    Article
  16. 896

    Research on Multipoint Leak Location of Gas Pipeline Based on Variational Mode Decomposition and Relative Entropy by Yongmei Hao, Zhanghao Du, Juncheng Jiang, ZhiXiang Xing, Xinming Yan, Shuli Wang, Yongchao Rao

    Published 2020-01-01
    “…Pipeline leak detection has always been a relatively difficult technical problem; especially in urban pipeline leak detection, there are still many problems to be solved. …”
    Get full text
    Article
  17. 897

    Implementation of stochastic signal processing algorithms in radar CAD by M. Yu. Konopel'kin, S. V. Petrov, D. A. Smirnyagina

    Published 2022-10-01
    “…A simulation model of a sector surveillance radar with a digital antenna array was created in the radar CAD visual functional editor. The passive channel included the following algorithms: algorithm for detecting stochastic signals; algorithm for estimating the number of stochastic signals; direction finding algorithm for stochastic signal sources; adaptive spatial filtering algorithm. …”
    Get full text
    Article
  18. 898
  19. 899

    The role of internal auditors in preventing financial fraud in the Republic of Serbia by Jeremić Nebojša, Jakovljević Nemanja

    Published 2023-01-01
    “…By exploring the practices and challenges faced by internal auditors, this paper aims to provide valuable insights and recommendations to strengthen the effectiveness of internal audit functions in detecting and preventing financial fraud. …”
    Get full text
    Article
  20. 900

    Retracted: Study on Modeling Method of Forest Tree Image Recognition Based on CCD and Theodolite by Yeqiong Shi, Sainan Wang, Shuna Zhou, M. M. Kamruzzaman

    Published 2020-01-01
    “…Forest vegetation is the main body that constitutes forest resources. Accurate identification of the types of forest trees can lay the foundation for the research and utilization of forest resources. …”
    Get full text
    Article