Search alternatives:
functions » function (Expand Search)
Showing 521 - 540 results of 3,330 for search '((( success OR source) selection functions ) OR ( sources detection functions ))', query time: 0.37s Refine Results
  1. 521

    Optimized conductor selection and phase balancing in unbalanced distribution networks: Economic optimization via the vortex search algorithm by Brandon Cortés-Caicedo, Jhony Andrés Guzmán-Henao, Oscar Danilo Montoya, Luis Fernando Grisales-Noreña, Rubén Iván Bolaños

    Published 2025-09-01
    “…Given the complexity of the model, a leader–follower methodology based on the vortex search algorithm (VSA) is employed to determine the conductor caliber and load phase configuration, in conjunction with the three-phase successive approximations power flow method to compute the objective function. …”
    Get full text
    Article
  2. 522

    A genome-wide metabolic QTL analysis in Europeans implicates two loci shaped by recent positive selection. by George Nicholson, Mattias Rantalainen, Jia V Li, Anthony D Maher, Daniel Malmodin, Kourosh R Ahmadi, Johan H Faber, Amy Barrett, Josine L Min, N William Rayner, Henrik Toft, Maria Krestyaninova, Juris Viksna, Sudeshna Guha Neogi, Marc-Emmanuel Dumas, Ugis Sarkans, MolPAGE Consortium, Peter Donnelly, Thomas Illig, Jerzy Adamski, Karsten Suhre, Maxine Allen, Krina T Zondervan, Tim D Spector, Jeremy K Nicholson, John C Lindon, Dorrit Baunsgaard, Elaine Holmes, Mark I McCarthy, Chris C Holmes

    Published 2011-09-01
    “…Two of the three hit regions lie within haplotype blocks (at 2p13.1 and 10q24.2) that carry the genetic signature of strong, recent, positive selection in European populations. Genes NAT8 and PYROXD2, both with relatively uncharacterized functional roles, are good candidates for mediating the corresponding mQTL associations. …”
    Get full text
    Article
  3. 523

    Source-load coordinated optimal scheduling strategy considering solar thermal biomass utilization under integrated demand response incentives by ZHANG Yewei, WEN Zhong, WANG Can, NI Zhi, YAN Wenwen, HU Chuanbao

    Published 2024-11-01
    “…Secondly, on the load side, both price-based and substitution-based demand responses are introduced to improve the low-carbon performance of the IES through source-load coordinated optimization. Then, a liquid storage carbon capture system and a tiered carbon tax mechanism are introduced in the IES to enhance the system's low-carbon economic benefits, establishing an objective function to maximize the system's total revenue. …”
    Get full text
    Article
  4. 524
  5. 525

    Inversion of Leaf Chlorophyll Content in Different Growth Periods of Maize Based on Multi-Source Data from “Sky–Space–Ground” by Wu Nile, Su Rina, Na Mula, Cha Ersi, Yulong Bao, Jiquan Zhang, Zhijun Tong, Xingpeng Liu, Chunli Zhao

    Published 2025-02-01
    “…This study proposes an improved method based on multi-source data, combining the Sentinel-2A spectral response function (SRF) and computer algorithms, to overcome the limitations of traditional methods. …”
    Get full text
    Article
  6. 526

    Effect and mode of action of different doses and sources of zinc in weaning pigs using a meta-analytical and systematic review approach by Diana Luise, Clara Negrini, Federico Correa, Paolo Trevisi

    Published 2024-12-01
    “…A total of 309 articles were identified from a literature research from 2001 to 2021; 85 were selected. Articles were divided in 3 datasets to evaluate: 1) the effects of ZnO doses (ZnO database); 2) the efficacy of ZnO on infection models (challenge database); 3) the effect of different Zn sources (special Zn database). …”
    Get full text
    Article
  7. 527

    Enterococcus faecalis strains derived from wild bird provide protection against Clostridium perfringens challenge in locally-sourced broilers by Gerui Zhang, Ainul Zahra, Tianrui Yang, Qiyu Guo, Yan Sun, Yuhang Zhang, Yupeng Gao, Yuxi Zhang, Mingyue Wang, Jingshuo Gong, Haibin Huang, Zhannan Wang, Chunfeng Wang, Yanlong Jiang

    Published 2025-05-01
    “…IntroductionNecrotic enteritis (NE), caused by Clostridium perfringens, has seen a surge in chicken populations recently due to the ban on antibiotic growth promoters in feed.MethodsIn this research, screening and identification of probiotics with strong antagonistic ability against C. perfringens from 34 wild bird fecal isolates, followed by analysis of probiotic characteristics and carbon source metabolic activity. Strains exhibiting favorable antagonistic activity against C. perfringens were subsequently employed in vivo study to evaluate their protective efficacy against C. perfringens challenge in locally-sourced broilers.ResultsThe results showed that Enterococcus faecalis strains YL-EF25 and YL-EF32 were selected based on their ability to inhibit the growth and biofilm formation of C. perfringens. …”
    Get full text
    Article
  8. 528

    Pisum sativum L. as an alternative protein and starch source in Italian Mediterranean buffaloes’ feeding plan: in vitro evaluation of different varieties by Alessandro Vastolo, Roberta Matera, Giulia Passarelli, Serena Calabrò, Matteo Santinello, Gianluca Neglia, Monica Isabella Cutrignelli

    Published 2025-12-01
    “…After multivariate cluster analysis, Ganster, Poisedon and Peps were selected for the second trial in function of highest organic and protein degradability. …”
    Get full text
    Article
  9. 529

    An optimization method of multiscale storage tank target detection introducing an attention mechanism by Wenjia Sun, Chunchun Hu, Nianxue Luo, Qiansheng Zhao

    Published 2024-01-01
    “…As containers for chemical storage, storage tanks are potential sources of hazards. Conducting target detection for hazard risk analysis is essential. …”
    Get full text
    Article
  10. 530

    YOLOX-LS: Strong Gravitational Lenses Detection in the DECaLS with Deep Learning by Yangyang Liu, Liangping Tu, Jianxi Li, Jiawei Miao, Gengqi Lin, Chenying Zhao

    Published 2025-01-01
    “…We apply the YOLOX algorithm as the basic framework and improve it by selecting the optimal optimizer, activation function, attention mechanism, and loss function. …”
    Get full text
    Article
  11. 531

    Multi-Person Fall Detection Using Data Assimilation Method With Kalman Filter by Jinmo Yang, Ye Jin Jin, R. Young Chul Kim

    Published 2025-01-01
    “…Fall detection is an essential technology for ensuring the safety of elderly individuals, as falling accidents are critical and can cause significant functional damage in old age. …”
    Get full text
    Article
  12. 532

    cogsworth: A Gala of COSMIC Proportions Combining Binary Stellar Evolution and Galactic Dynamics by Tom Wagg, Katelyn Breivik, Mathieu Renzo, Adrian M. Price-Whelan

    Published 2025-01-01
    “…Alternatively, several analytic models are available for galactic potentials and star formation histories. cogsworth can also transform the intrinsic simulated population into an observed population using dust maps, bolometric correction functions, and survey selection functions. We provide a detailed explanation of the functionality of cogsworth and demonstrate its capabilities through a series of use cases: (1) we predict the spatial distribution of compact objects and runaways in both dwarf and Milky Way–like galaxies; (2) using a star cluster from a hydrodynamical simulation, we show how supernovae can change the orbits of stars in several ways; and (3) we predict the separation of disrupted binary stellar companions on the sky and create a synthetic Gaia color–magnitude diagram. …”
    Get full text
    Article
  13. 533

    Review of Fault Detection and Diagnosis Methods in Power Plants: Algorithms, Architectures, and Trends by Camelia Adela Maican, Cristina Floriana Pană, Daniela Maria Pătrașcu-Pană, Virginia Maria Rădulescu

    Published 2025-06-01
    “…Key findings are summarized in a comparative matrix, highlighting trends, gaps, and inconsistencies across publication sources. This review identifies critical research gaps—including the underuse of hybrid models, lack of benchmark datasets, and limited integration between detection and control layers—and offers concrete recommendations for future research. …”
    Get full text
    Article
  14. 534
  15. 535

    Hard-coded backdoor detection method based on semantic conflict by Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU

    Published 2023-02-01
    “…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
    Get full text
    Article
  16. 536

    Securing Electric Vehicle Performance: Machine Learning-Driven Fault Detection and Classification by Mahbub Ul Islam Khan, Md. Ilius Hasan Pathan, Mohammad Mominur Rahman, Md. Maidul Islam, Mohammed Arfat Raihan Chowdhury, Md. Shamim Anower, Md. Masud Rana, Md. Shafiul Alam, Mahmudul Hasan, Md. Shohanur Islam Sobuj, Md. Babul Islam, Veerpratap Meena, Francesco Benedetto

    Published 2024-01-01
    “…In addition, the superiority of the proposed fault detection and classification approaches using ML tools was assessed by comparing the detection and classification efficiency through some statistical performance parameter comparisons among the classifiers.…”
    Get full text
    Article
  17. 537

    Optimization of Protein Extraction from Sunflower Meal Using Taguchi Design and Regression Modeling for Human Nutrition Applications by Anca Becze, Marin Senila, Lacrimioara Senila, Lucian Dordai, Oana Cadar, Vanda Liliana Fuss-Babalau, Marius Roman, Levente Levei, Paul Uiuiu, Mihai Octavian Naghiu

    Published 2025-07-01
    “…Safety analyses confirmed the absence of detectable aflatoxins and very low PAH levels. These results support the use of sunflower protein concentrate as a sustainable, nutritionally valuable, and safe ingredient for functional food applications. …”
    Get full text
    Article
  18. 538

    Research on monthly runoff prediction model considering secondary decomposition of multiple fitness functions and deep learning by Zhongfeng Zhao, Xueni Wang, Hua Jin, Jie Zheng

    Published 2025-12-01
    “…In addition, to improve the precision of sequence decomposition, 12 distinct fitness functions are selected as objective functions for optimizing the parameters of both decomposition algorithms. …”
    Get full text
    Article
  19. 539

    Automated identification of soil functional components based on NanoSIMS data by Yahan Hu, Johann Maximilian Zollner, Carmen Höschen, Martin Werner, Steffen A. Schweizer

    Published 2024-12-01
    “…The tool is provided as an open-source software toolbox (NanoT). In addition, a two-step unsupervised segmentation method was developed to identify soil functional components based on NanoSIMS analyses. …”
    Get full text
    Article
  20. 540

    A study on pollen characteristics of bisexual and functionally male flowers in pomegranate by DUAN Shuyun, CHEN Lina, ZHU Juanli, LIU Ruitao, LI Haoxian, YAN Qiong, LI Songkai, YANG Qinghua, LU Zhenhua

    Published 2025-04-01
    “…Although the functionally male flowers could accept pollen and the pollen on the stigma surface could germinate, only a few pollens could germinate with pollen tube successfully growing into the pistil. …”
    Get full text
    Article