Search alternatives:
resource » source (Expand Search)
Showing 941 - 960 results of 2,295 for search '((( sourcessssssssss OR resource) detection function ) OR ( sources selection function ))', query time: 0.29s Refine Results
  1. 941
  2. 942

    Real-World Efficacy of Explainable Artificial Intelligence using the SAGE Framework and Scenario-Based Design by Eleanor Mill, Wolfgang Garn, Chris Turner

    Published 2024-12-01
    “…The paper then employs a functionally-grounded evaluation method to assess its effectiveness. …”
    Get full text
    Article
  3. 943

    The effectiveness of Pilates exercise in people with chronic low back pain: a systematic review. by Cherie Wells, Gregory S Kolt, Paul Marshall, Bridget Hill, Andrea Bialocerkowski

    Published 2014-01-01
    “…<h4>Study selection</h4>Two independent reviewers were involved in the selection of evidence. …”
    Get full text
    Article
  4. 944

    Impact of health literacy in patients with chronic musculoskeletal disease--systematic review. by Yoon K Loke, Ina Hinz, Xia Wang, Gill Rowlands, David Scott, Charlotte Salter

    Published 2012-01-01
    “…We assessed risk of bias from participant selection, methods of measuring health literacy and functional outcomes, missing data, and potential for confounding.…”
    Get full text
    Article
  5. 945

    The effectiveness and safety of acupuncture for post-stroke depression: An overview of systematic reviews by Run-qing Miao, Feng-ya Zhu, Tian-yu Wang, Shao Yin, Chen Shuai, Tao Li, Zhi Li, Lan Luo, Bin Yang

    Published 2025-08-01
    “…The search covered publications from database inception to September 10, 2024. Literature selection and data extraction were independently performed by two reviewers. …”
    Get full text
    Article
  6. 946

    Engineering Circuit Analysis / by Hayt, William H. (William Hart), Jr., 1920-1999

    Published 2012
    Table of Contents: “…Mesh Analysis: A Comparison -- 4.6.Computer-Aided Circuit Analysis -- Summary And Review -- Reading Further -- Exercises -- ch. 5 Handy Circuit Analysis Techniques -- 5.1.Linearity and Superposition -- 5.2.Source Transformations -- 5.3.Thevenin and Norton Equivalent Circuits -- 5.4.Maximum Power Transfer -- 5.5.Delta-Wye Conversion -- 5.6.Selecting an Approach: A Summary of Various Techniques -- Summary And Review -- Reading Further -- Exercises -- ch. 6 The Operational Amplifier -- 6.1.Background -- 6.2.The Ideal Op Amp: A Cordial Introduction -- 6.3.Cascaded Stages -- 6.4.Circuits for Voltage and Current Sources -- 6.5.Practical Considerations -- 6.6.Comparators and the Instrumentation Amplifier -- Summary And Review -- Reading Further -- Exercises -- ch. 7 Capacitors And Inductors -- 7.1.The Capacitor -- 7.2.The Inductor -- 7.3.Inductance and Capacitance Combinations -- 7.4.Consequences of Linearity -- 7.5.Simple Op Amp Circuits with Capacitors -- 7.6.Duality -- 7.7.Modeling Capacitors and Inductors with PSpice -- Summary And Review -- Reading Further -- Exercises -- ch. 8 Basic Rl And Rc Circuits -- 8.1.The Source-Free RL Circuit -- 8.2.Properties of the Exponential Response -- 8.3.The Source-Free RC Circuit -- 8.4.A More General Perspective -- 8.5.The Unit-Step Function -- 8.6.Driven RL Circuits -- 8.7.Natural and Forced Response -- 8.8.Driven AC Circuits -- 8.9.Predicting the Response of Sequentially Switched Circuits -- Summary And Review -- Reading Further -- Exercises -- ch. 9 The Rcl Circuit -- 9.1.The Source-Free Parallel Circuit -- 9.2.The Overdamped Parallel RLC Circuit -- 9.3.Critical Damping -- 9.4.The Underdamped Parallel RLC Circuit -- 9.5.The Source-Free Series RLC Circuit -- 9.6.The Complete Response of the RLC Circuit -- 9.7.The Lossless LC Circuit -- Summary And Review -- Reading Further -- Exercises -- ch. 10 Sinusoidal Steady-State Analysis -- 10.1.Characteristics of Sinusoids -- 10.2.Forced Response to Sinusoidal Functions -- 10.3.The Complex Forcing Function -- 10.4.The Phasor -- 10.5.Impedance and Admittance -- 10.6.Nodal and Mesh Analysis -- 10.7.Superposition, Source Transformations and Thevenin's Theorem -- 10.8.Phasor Diagrams -- Summary And Review -- Reading Further -- Exercises -- ch. 11 Ac Circuit Power Analysis -- 11.1.Instantaneous Power -- 11.2.Average Power -- 11.3.Effective Values of Current and Voltage -- 11.4.Apparent Power and Power Factor -- 11.5.Complex Power -- Summary And Review -- Reading Further -- Exercises -- ch. 12 Polyphase Circuits -- 12.1.Polyphase Systems -- 12.2.Single-Phase Three-Wire Systems -- 12.3.Three-Phase Y-Y Connection -- 12.4.The Delta (A) Connection -- 12.5.Power Measurement in Three-Phase Systems -- Summary And Review -- Reading Further -- Exercises -- ch. 13 Magnetically Coupled Circuits -- 13.1.Mutual Inductance -- 13.2.Energy Considerations -- 13.3.The Linear Transformer -- 13.4.The Ideal Transformer -- Summary And Review -- Reading Further -- Exercises -- ch. 14 Complex Frequency And The Laplace Transform -- 14.1.Complex Frequency -- 14.2.The Damped Sinusoidal Forcing Function -- 14.3.Definition of the Laplace Transform -- 14.4.Laplace Transforms of Simple Time Functions -- 14.5.Inverse Transform Techniques -- 14.6.Basic Theorems for the Laplace Transform -- 14.7.The Initial-Value and Final-Value Theorems -- Summary And Review -- Reading Further -- Exercises -- ch. 15 Circuit Analysis In The s-Domain -- 15.1.Z(s) and Y(s) -- 15.2.Nodal and Mesh Analysis in the s-Domain -- 15.3.Additional Circuit Analysis Techniques -- 15.4.Poles, Zeros, and Transfer Functions -- 15.5.Convolution -- 15.6.The Complex-Frequency Plane -- 15.7.Natural Response and the s Plane -- 15.8.A Technique for Synthesizing the Voltage Ratio H(s) = V out/V in -- Summary And Review -- Reading Further -- Exercises -- ch. 16 Frequency Response -- 16.1.Parallel Resonance -- 16.2.Bandwidth and High-Q Circuits -- 16.3.Series Resonance -- 16.4.Other Resonant Forms -- 16.5.Scaling -- 16.6.Bode Diagrams -- 16.7.Basic Filter Design -- 16.8.Advanced Filter Design -- Summary And Review -- Reading Further -- Exercises -- ch. 17 Two-Port Networks -- 17.1.One-Port Networks -- 17.2.Admittance Parameters -- 17.3.Some Equivalent Networks -- 17.4.Impedance Parameters -- 17.5.Hybrid Parameters -- 17.6.Transmission Parameters -- Summary And Review -- Reading Further -- Exercises -- ch. 18 Fourier Circuit Analysis -- 18.1.Trigonometric Form of the Fourier Series -- 18.2.The Use of Symmetry -- 18.3.Complete Response to Periodic Forcing Functions -- 18.4.Complex Form of the Fourier Series -- 18.5.Definition of the Fourier Transform -- 18.6.Some Properties of the Fourier Transform -- 18.7.Fourier Transform Pairs for Some Simple Time Functions -- 18.8.The Fourier Transform of a General Periodic Time Function -- 18.9.The System Function and Response in the Frequency Domain -- 18.10.The Physical Significance of the System Function -- Summary And Review -- Reading Further -- Exercises.…”
    Publisher description
    Table of contents only
    View in OPAC
    Book
  7. 947
  8. 948

    AI-powered literature search: some observations and concerns by Farooq Azam Rathore, Fareeha Farooq

    Published 2024-12-01
    “…This raises questions about the data sources utilized by these AI tools and the overall reliability of their outputs. …”
    Get full text
    Article
  9. 949

    Data-driven predictive models for sustainable smart buildings by Prabhu Rajaram, Gnana Swathika O․V․

    Published 2025-09-01
    “…The integration of renewable energy sources in smart buildings fosters a synergistic relationship between clean energy generation and smart energy management systems. …”
    Get full text
    Article
  10. 950

    Mitigating malicious denial of wallet attack using attribute reduction with deep learning approach for serverless computing on next generation applications by Amal K. Alkhalifa, Mohammed Aljebreen, Rakan Alanazi, Nazir Ahmad, Sultan Alahmari, Othman Alrusaini, Ali Alqazzaz, Hassan Alkhiri

    Published 2025-05-01
    “…Abstract Denial of Wallet (DoW) attacks are one kind of cyberattack whose goal is to develop and expand the financial sources of a group by causing extreme costs in their serverless computing or cloud environments. …”
    Get full text
    Article
  11. 951

    SCIENTIFIC AND PRACTICAL APPROACHES TO THE FORMATION OF READINESS OF FUTURE SPECIALISTS IN THE SOCIONOMIC SPHERE FOR THE SOCIAL SUPPORT FOR PARENTS OF CHILDREN WITH SPECIAL NEEDS by Sapozhnykov Stanislav, Teplytska Alina

    Published 2022-12-01
    “…It has been emphasized that today in higher education there is an approach that orients future specialists to the transfer of this function to other social institutions. This situation does not contribute to the formation of the appropriate level of motivation and ability to energetically engage in their own professional activities, and the capacity to adequately self-assess professional actions in future specialists in the socionomic sphere. …”
    Get full text
    Article
  12. 952

    Comparative analysis of anthocyanin content in various tomato samples in connection with breeding by E. A. Dzhos, M. I. Mamedov, O. N. Pyshnaya, N. A. Golubkina, O. V. Verba, A. A. Matyukina

    Published 2022-12-01
    “…Vegetable products containing antioxidant substances belong to the functional products and conform to the concept of a healthy diet. …”
    Get full text
    Article
  13. 953

    Re-Infection Outcomes Following One- And Two-Stage Surgical Revision of Infected Knee Prosthesis: A Systematic Review and Meta-Analysis. by Setor K Kunutsor, Michael R Whitehouse, Erik Lenguerrand, Ashley W Blom, Andrew D Beswick, INFORM Team

    Published 2016-01-01
    “…Our second objective was to compare between the two revision strategies, clinical outcomes as measured by postoperative Knee Society Knee score, Knee Society Function score, Hospital for Special Surgery knee score, WOMAC score, and range of motion.…”
    Get full text
    Article
  14. 954

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  15. 955

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  16. 956

    Where there’s smoke there is fire: Türkiye and the international illegal wildlife trade by Özgün Emre Can

    Published 2025-06-01
    “…By guiding policymakers, conservationists, and authorities, the study fosters international cooperation, optimal resource use, and endangered species protection. International wildlife trafficking can occur when detection and law enforcement measures fail in both the countries of origin and destination, and, where relevant, in transit countries, showing the necessity for governments worldwide to make the international illegal wildlife trade a priority.…”
    Get full text
    Article
  17. 957

    Renal Biopsy Pathological Tissue Segmentation: A Comprehensive Review and Experimental Analysis by Yan Liu, Taiping Wang, Xinxin He, Wei Wang, Qiang He, Juan Jin

    Published 2025-01-01
    “…This study provides a novel technical framework for precise renal pathological tissue segmentation and lays the foundation for future lesion detection and intelligent diagnostic applications.…”
    Get full text
    Article
  18. 958

    Research on a traffic flow statistical algorithm based on YBOVDT and SAM2 by Yuanyuan Wang, Zheng Ding, Jiange Liu, Kexiao Wu, Md Sharid Kayes Dipu, Tingmei Ma, Yonghao Ma, Haiyan Zhang

    Published 2025-05-01
    “…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
    Get full text
    Article
  19. 959

    Fine-grained access control method for private data in android system by Gang Liu, Guofang Zhang, Quan Wang, Shaomin Ji, Lizhi Zhang

    Published 2019-03-01
    “…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
    Get full text
    Article
  20. 960

    MGSurvE: A framework to optimize trap placement for genetic surveillance of mosquito populations. by Héctor M Sánchez C, David L Smith, John M Marshall

    Published 2024-05-01
    “…For these projects, monitoring will be required to detect unintended spread of gene drive mosquitoes beyond field sites, and the emergence of alternative alleles, such as drive-resistant alleles or non-functional effector genes, within intervention sites. …”
    Get full text
    Article