Search alternatives:
functions » function (Expand Search)
Showing 861 - 880 results of 2,295 for search '((( resourcessssss OR resources) detection functions ) OR ( sources selection functions ))', query time: 0.34s Refine Results
  1. 861

    Investigation of the Impact of Light Colour on Surface Colour Perception: A Case Study on Red Surfaces by Havva Gül Sümer, Leyla Dokuzer Öztürk

    Published 2025-07-01
    “…These results offer valuable insights for the selection of suitable light sources not only for art exhibition spaces but also for other environments featuring colourful objects. …”
    Get full text
    Article
  2. 862
  3. 863

    Urban Hierarchy Migration Model and Impact Mechanism of Graduates Admitted to the Guangdong Provincial Civil Service Examination by Wu Jinghao, Liu Ye, Tang Honglin

    Published 2025-02-01
    “…The decision-making and selection process in the selection mechanism for the migration mode of newly recruited graduates in the civil service examination is complex and dynamic, involving the interaction of multiple factors, such as government policy guidance, job characteristics, personal factors, and urban conditions, with objective limitations, personal abilities and resources, and subjective willingness. …”
    Get full text
    Article
  4. 864

    Accelerated Modeling of Transients in Electromagnetic Devices Based on Magnetoelectric Substitution Circuits by Sergii Tykhovod, Ihor Orlovskyi

    Published 2025-01-01
    “…The purpose of the work: The objective of this work is to develop a highly effective method for calculating electromagnetic transient processes in a coil with a ferromagnetic magnetic core connected to a voltage source. The method involves the use of nonlinear magnetoelectric substitution circuits for electromagnetic devices and a spectral method for representing solution functions using orthogonal polynomials. …”
    Get full text
    Article
  5. 865

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  6. 866

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  7. 867

    Research on a traffic flow statistical algorithm based on YBOVDT and SAM2 by Yuanyuan Wang, Zheng Ding, Jiange Liu, Kexiao Wu, Md Sharid Kayes Dipu, Tingmei Ma, Yonghao Ma, Haiyan Zhang

    Published 2025-05-01
    “…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
    Get full text
    Article
  8. 868
  9. 869
  10. 870

    Design of the Field Protection and Signal Priority at Intersection System for Autonomous-rail Rapid Transit by SHI Yangyang, LIU Guangyong, WU Jinyong

    Published 2022-06-01
    “…It provides auxiliary driving information for the driver through automation equipment, realizes the functions of route protection, virtual section occupied/unoccupied detection, signal control, entering/leaving station detection, platform door linkage control, berth status detection and management in deport and so on, which improves system security and reduces driver working intensity. …”
    Get full text
    Article
  11. 871

    Gut microbiome composition and diversity of wild-caught and hatchery-bred milkfish (Chanos chanos) fry by Gardel Xyza L. Silvederio, Therese F. Javellana, Ande Bryle N. Genciana, Maria Alexandra G. Fontanilla, Rex Ferdinand M. Traifalgar, Fredson H. Huervana, Carmelo S. del Castillo

    Published 2025-09-01
    “…Milkfish is the most produced finfish in the Philippines, with approximately 75 % of its fry sourced from hatcheries. Despite numerous studies on gut microbiota of wild and cultured fish species, the diversity and functional roles of the milkfish fry gut microbiome remain poorly understood. …”
    Get full text
    Article
  12. 872

    Internal Speech in Natural Discourse Communication: A Systematic Review and Modeling by Лариса Калмикова, Наталія Харченко, Георгій Калмиков, Інна Мисан, Віктор Коцур

    Published 2025-04-01
    “…The qualitative data selection, described in this paper, produced a corpus of data concerning the inner speech phenomena as deep stages of the processes of speaking and comprehension. …”
    Get full text
    Article
  13. 873

    When, where, and how prey pair antipredator behaviors to natural and anthropogenic mortality risks by Michael E. Egan, Abigail M. Weber, Nicole Gorman, Michael W. Eichholz, Daniel Skinner, Peter E. Schlichting, Guillaume Bastille-Rousseau

    Published 2025-07-01
    “…We used hidden Markov models to determine whether each covariate impacted the probability of transitioning between behavioral states and selection functions to determine whether deer spatially avoided each covariate. …”
    Get full text
    Article
  14. 874
  15. 875
  16. 876

    CREDIT POLICY OF A COMMERCIAL BANK IN CONDITIONS OF UNCERTAINTY OF THE ECONOMIC ENVIRONMENT by О. Kovalova, M. Iorgachova

    Published 2021-11-01
    “…The article examines the concept of «credit policy» through the prism of the functions outlined in the development strategy of the banking institution, which is primarily aimed at maximizing resources for rapid response to uncertainties of the external and internal environment. …”
    Get full text
    Article
  17. 877

    PATH PLANNING AND OBSTACLE AVOIDANCE METHODS FOR AUTONOMOUS MOBILE ROBOTS by Ihor Berizka

    Published 2024-12-01
    “…The modification of the classical artificial potential field method using the Gaussian function to describe repulsive forces is an example of optimizing the method for systems with constrained resources. …”
    Get full text
    Article
  18. 878

    T cell-related diagnostic model and the underlying mechanism related to PRF1-mediated glycolysis in sepsis: evidences from single-cell, bulk transcriptomics, and experiment validat... by Fu Tian, Hui Chen, Zhicheng Huang, Kai Qiu

    Published 2025-08-01
    “…Methods Through downloading the single-cell RNA-sequencing (scRNA-seq) and RNA-seq data from online source, a series of bioinformatics methods including principal component analysis (PCA), differential expression analysis, and least absolute shrinkage and selection operator (LASSO) was used for selection of the T cell-related signatures. …”
    Get full text
    Article
  19. 879

    Developing a Comprehensive Physical Education Curriculum in Secondary Schools: Identifying and Exploring the Key Components of Content by Yurij Vaskov

    Published 2022-12-01
    “…A systematic review of relevant literature was conducted using publications from the Vernadskyi National Library and sources in the Google search system. Keywords were used for the search in accordance with the topic of the study, and 26 sources were selected for analysis. …”
    Get full text
    Article
  20. 880

    A thorough assessment of 10-MDP primers in modern dental adhesive systems by Ahmed A Abduljawad, Harraa SM Salih, Omar F Tawfiq

    Published 2024-09-01
    “…Study selection: Studies investigating the efficacy of 10-MDP primers were included. …”
    Get full text
    Article