Search alternatives:
functions » function (Expand Search)
resourcessssss » resourcesssssss (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
Showing 861 - 880 results of 2,295 for search '((( resourcessssss OR resources) detection functions ) OR ( source selection functions ))', query time: 0.30s Refine Results
  1. 861

    Integrating Food Preference Profiling, Behavior Change Strategies, and Machine Learning for Cardiovascular Disease Prevention in a Personalized Nutrition Digital Health Interventio... by Hana Fitria Navratilova, Anthony David Whetton, Nophar Geifman

    Published 2025-08-01
    “…Intervention functions were designed using the Behavior Change Wheel, and behavior change techniques were selected for the DHI features. …”
    Get full text
    Article
  2. 862

    Generation of Spatial Structure of Urban Parks Based on Spatial Analysis of Agent-Based Models by Huizi KONG, Tianming LIU, Jiajie LIAO, Liu CUI

    Published 2025-03-01
    “…By adjusting model parameters, the foraging paths of slime molds in the designed site are simulated, and their spatial function distribution is analyzed. The simulation environment is based on multi-source data analysis and involves setting particle growth points, food locations, and environmental obstacles. …”
    Get full text
    Article
  3. 863

    An Optimization Algorithm for Forward-Scatter Radar Network Node Deployment Based on BFGS and Improved NSGA-II by Yuqing Zheng, Xiaofeng Ai, Zhiming Xu, Jing Wu, Feng Zhao

    Published 2025-04-01
    “…A multi-objective optimization model was subsequently established with the objective functions of minimizing node cost and maximizing spatial detection area. …”
    Get full text
    Article
  4. 864

    Cryopreservation and culture strategies for testicular tissue and cells in small and large animals by Valeria Vurchio, Martina Colombo, Rolando Pasquariello, Gaia Cecilia Luvoni

    Published 2025-07-01
    “…Spermatogenic cells from cryopreserved testicular tissue can be cultured in vitro and resume their functions after thawing, contributing to the preservation of fertility and genetic resources in both small and large animals. …”
    Get full text
    Article
  5. 865
  6. 866
  7. 867

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  8. 868

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  9. 869

    Research on a traffic flow statistical algorithm based on YBOVDT and SAM2 by Yuanyuan Wang, Zheng Ding, Jiange Liu, Kexiao Wu, Md Sharid Kayes Dipu, Tingmei Ma, Yonghao Ma, Haiyan Zhang

    Published 2025-05-01
    “…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
    Get full text
    Article
  10. 870
  11. 871

    Design of the Field Protection and Signal Priority at Intersection System for Autonomous-rail Rapid Transit by SHI Yangyang, LIU Guangyong, WU Jinyong

    Published 2022-06-01
    “…It provides auxiliary driving information for the driver through automation equipment, realizes the functions of route protection, virtual section occupied/unoccupied detection, signal control, entering/leaving station detection, platform door linkage control, berth status detection and management in deport and so on, which improves system security and reduces driver working intensity. …”
    Get full text
    Article
  12. 872

    The On-Chip D-LMS Filter Design Method of Wireless Sensor Node Based on FPGA by Jian Li, Maojin Li, Ming Meng, Zepeng Liu

    Published 2020-01-01
    “…In the real-time position technology of underground shallow source, the signal denoising performance of wireless sensor nodes directly determines the location speed and accuracy of underground burst point. …”
    Get full text
    Article
  13. 873

    Battery Energy Storage System Placement And Sizing In Distribution Networks by Sorokin Dmitry

    Published 2024-01-01
    “…The methodology is applicable to BESS which implement the functions of ensuring the reliability of power supply to consumers (use of BESS as a backup or emergency source of power supply), as well as the function of regulating voltage levels in the electrical network (regulating reactive power by the BESS inverter).…”
    Get full text
    Article
  14. 874

    Manufacturing Consent for the 2018 Elections in Venezuela and Colombia by Alan MacLeod

    Published 2018-12-01
    “…Furthermore, by conducting a series of 27 interviews with journalists covering the two countries, it finds evidence to support Herman and Chomsky’s theories about the pre-selection of journalists and how ownership and management, sources and flak influence the output of media. …”
    Get full text
    Article
  15. 875

    Vocal constraints on song amplitude in star finches Bathilda ruficauda by Hana Goto, Masayo Soma, Ayumi Mizuno, Henrik Brumm

    Published 2025-07-01
    “…This suggests that the frequency-amplitude correlation is a more general phenomenon in bird vocalisations, independent of the overall source amplitude of a species. While the evolution of birdsong is often viewed as constrained by neural costs and body size, or selective pressures from predators and social aggression, our results emphasise the importance of understanding phonetic features as well. …”
    Get full text
    Article
  16. 876

    Thermal analysis and multi-objective optimization of equal-area microfluidic cooling systems by Yucheng Wang, Antong Bi, Yue Yao, Weiting Chen, Kaiyu Chen, Shenxin Yu, Jiangang Yu, Chao Wang, Wei Li, Shaoxi Wang

    Published 2025-09-01
    “…Four distinct microchannel designs were selected to explore how variations in structure impact thermal management efficiency. …”
    Get full text
    Article
  17. 877

    When, where, and how prey pair antipredator behaviors to natural and anthropogenic mortality risks by Michael E. Egan, Abigail M. Weber, Nicole Gorman, Michael W. Eichholz, Daniel Skinner, Peter E. Schlichting, Guillaume Bastille-Rousseau

    Published 2025-07-01
    “…We used hidden Markov models to determine whether each covariate impacted the probability of transitioning between behavioral states and selection functions to determine whether deer spatially avoided each covariate. …”
    Get full text
    Article
  18. 878

    Quantifying degradation in animal acoustic signals with the R package baRulho by Marcelo Araya‐Salas, Erin E. Grabarczyk, Marcos Quiroz‐Oliva, Adrián García‐Rodríguez, Alejandro Rico‐Guevara

    Published 2025-03-01
    “…Abstract Animal acoustic signals are shaped by selection to convey information based on their tempo, intensity, and frequency. …”
    Get full text
    Article
  19. 879
  20. 880