Search alternatives:
resourcessssss » resourcesssssss (Expand Search)
resource » resources (Expand Search)
source » sources (Expand Search)
resourcessssss » resourcesssssss (Expand Search)
resource » resources (Expand Search)
source » sources (Expand Search)
-
901
-
902
How to trace the origins of short-lived atmospheric species: an Arctic example
Published 2025-05-01“…Knowing the exact modeled tracer emission sources in WRF-Chem enables a precise quantification of the source detection accuracy. …”
Get full text
Article -
903
-
904
-
905
Effective disinfecting of negative pressure pipelines of DCUs reduces the risk of cross infection in dental care
Published 2024-12-01“…Objectives Microbial contamination of various accessory parts of the dental chair units (DCUs) is an essential source of cross infection, while the accessories of the crucial suction function are usually overlooked. …”
Get full text
Article -
906
Mineral identification in thin sections using a lightweight and attention mechanism
Published 2025-04-01“…Mineral identification is foundational to geological survey research, mineral resource exploration, and mining engineering. Considering the diversity of mineral types and the challenge of achieving high recognition accuracy for similar features, this study introduces a mineral detection method based on YOLOv8-SBI. …”
Get full text
Article -
907
RDSM: Underwater multi-AUV relay deployment and selection mechanism in 3D space
Published 2024-01-01Get full text
Article -
908
Double-transmitting and Sextuple-receiving Borehole Transient Electromagnetic Method and Experimental Study
Published 2017-04-01Get full text
Article -
909
A lightweight transformer based multi task learning model with dynamic weight allocation for improved vulnerability prediction
Published 2025-08-01“…Traditional methods, such as single-task learning and ensemble approaches, often struggle with these challenges, particularly in detecting rare but critical vulnerabilities. To address this, we propose the MTLPT: Multi-Task Learning with Position Encoding and Lightweight Transformer for Vulnerability Prediction, a novel multi-task learning framework that leverages custom lightweight Transformer blocks and position encoding layers to effectively capture long-range dependencies and complex patterns in source code. …”
Get full text
Article -
910
THE SOLUTION TO THE EQUATION OF THE SHOCK WAVE BURGERS IN THE PTC MATHCAD ENVIRONMENT
Published 2022-08-01“…However, this error is detected through the values of the nonlinear term included in the differential equation, which is determined according to the binomial representation through the quadratic forms of the matrix of the trial function. …”
Get full text
Article -
911
Special Issue on Contemporary Research Studies in Operations Research, Business Analytics, and Business Intelligence
Published 2025-06-01“…The global market's increasing demand, diverse resource supply options, global competition, and environmental protection needs are driving organizations to adopt sustainable strategies. …”
Get full text
Article -
912
Predicting protein synergistic effect in Arabidopsis using epigenome profiling
Published 2024-10-01“…QHistone accurately identifies histone modifications associated with specific known proteins, and allows users to computationally validate their results using gene expression data from various plant tissues. These functions demonstrate an useful approach to utilizing epigenome data for gene regulation analysis, making QHistone a valuable resource for the scientific community ( https://qhistone.paoyang.ipmb.sinica.edu.tw ).…”
Get full text
Article -
913
Optimizing maize germination forecasts with random forest and data fusion techniques
Published 2024-11-01“…Traditional methods for detecting seed germination rates often involve lengthy experiments that result in damaged seeds. …”
Get full text
Article -
914
Characteristics of chemically induced liver progenitors derived from a pig model of metabolic dysfunction-associated steatotic liver disease.
Published 2024-01-01“…In contrast, markers of functional MH after re-differentiation were only detected in the healthy group. …”
Get full text
Article -
915
Experimental study on solution possibilities of multiextremal optimization problems through heuristic methods
Published 2015-12-01“…Each method can provide any desired accuracy of the extremum problem solution, and it utilizes an acceptable time resource.…”
Get full text
Article -
916
Specific performance of IDT edge fingers
Published 2014-05-01“…The theory shows that the edge strips of the system works differently as compared with these positioned inside the system. The familiar δ-function model however, can still be applied provided that the δ-sources of SAW are properly scaled and shifted from their position at the centres of the strips. …”
Get full text
Article -
917
Attack traffic allocation and load balancing mechanism for SDN
Published 2025-03-01“…The traffic allocation problem was modeled as a Markov decision process (MDP), where the reward function included both resource consumption and delay. …”
Get full text
Article -
918
Multifaceted roles of Galectins: from carbohydrate binding to targeted cancer therapy
Published 2025-03-01Get full text
Article -
919
In-band network telemetry system based on high-performance packet processing architecture VPP
Published 2021-03-01“…An in-band network telemetry-based system was built based on VPP, a high-performance virtual network forwarding architecture/device, via reorganizing the data plane pipeline processing modules.Moreover, a network-wide telemetry mechanism was further developed via embedding source routing into the probe packet header for specifying the route of probe packets.Finally, a virtual network topology was built with performance evaluation conducted.The evaluation shows that the telemetry system can monitor the network in a high precision of every 0.13 ms, detecting link congestion in real time with minor performance overhead.Given virtual network devices have been widely deployed in data centers, the proposed scheme is expected to improve the reliability of multi-tenancy and network function virtualization in data centers via high-precision, network-wide virtual link telemetry coverage.…”
Get full text
Article -
920
Optimizing Trade-Offs in Reliability, Security, and Freshness for Integrated Communication, Sensing, and Over-the-Air Computing
Published 2025-01-01“…Specifically, considering statistical CSI, the target detection and AirComp aggregation errors are derived, and the upper bound of the security information age violation probability is obtained using stochastic network calculus and moment generating function theory. …”
Get full text
Article