Search alternatives:
source » sources (Expand Search)
resources » resourcess (Expand Search)
resource » resources (Expand Search)
source » sources (Expand Search)
resources » resourcess (Expand Search)
resource » resources (Expand Search)
-
81
Investigation of Selected Companies' Websites for Online Recruitment and Sustainability Indicators
Published 2021-11-01Get full text
Article -
82
Models of efficiency of functioning in trading enterprises under conditions of economic growth
Published 2021-03-01“…The socio-economic situation in Ukraine suggests that there is insufficient research into the applicability of the model of economic development in forecasting the economic environment in which trade enterprises function. Researchers into issues relating to the efficiency of enterprises’ functioning focus their interest on comprehensively describing efficiency indicators and determining the factors influencing it. …”
Get full text
Article -
83
To Hunt or Patrol? Social Composition and Location Mediate Scent Marking Decisions of a Large Carnivore
Published 2025-06-01“…Specifically, we used resource selection function frameworks to determine how and whether conspecifics influenced habitat selection and behavior at multiple orders of selection. …”
Get full text
Article -
84
-
85
Whole genome resequencing-based analysis of plateau adaptation in Meiren yak (Bos grunniens)
Published 2024-12-01“…The genes in Meiren yak with positive selection in selection signal analysis were subjected to the Gene ontology (GO) and Kyoto Encyclopedia of Genes and Genomes (KEGG) functional enrichment analyses, which indicated that the genes were related to the adaptability to high altitude and hypoxic environment. …”
Get full text
Article -
86
A Novel NSGA-III-GKM++ Framework for Multi-Objective Cloud Resource Brokerage Optimization
Published 2025-06-01“…Cloud resource brokerage is a fundamental challenge in cloud computing, requiring the efficient selection and allocation of services from multiple providers to optimize performance, sustainability, and cost-effectiveness. …”
Get full text
Article -
87
Source Type Recognition Algorithm of Radio Emission using Radial Basis Functions
Published 2017-02-01Get full text
Article -
88
An enhancement filter utilizing the modified arctangent function for the structural and tectonic interpretation of causative sources: Application to WGM2012 gravity data from the R...
Published 2025-06-01“…In this study, we propose the Modified Arctangent Function (MAT), which enhances gravity source edge detection by integrating the total horizontal gradient with a modified arctangent function. …”
Get full text
Article -
89
Multi-Objective Optimal Allocation of Regional Water Resources Based on the Improved NSGA-III Algorithm
Published 2025-05-01“…Rapid socio-economic development has intensified the conflict between supply and demand for regional water resources, necessitating optimized water resource allocation to enhance water security. …”
Get full text
Article -
90
Quantitative design and production methods for sustainably increasing maize grain yield and resource use efficiency
Published 2025-09-01“…By this approach, crop planting density was matched with solar radiation levels, the population structure was matched with appropriate cultivars, and the plow layer-root system-canopy functions were matched with grain yield to ensure increases in grain yield and resource use efficiency in maize production. …”
Get full text
Article -
91
Human Resource Management in Public Administration: The Ongoing Tension Between Reform Requirements and Resistance to Change
Published 2025-03-01“…Human resource management (HRM) plays a critical role in shaping public administration by ensuring the efficiency, effectiveness, and adaptability of public institutions. …”
Get full text
Article -
92
Source Detection and Functional Connectivity of the Sensorimotor Cortex during Actual and Imaginary Limb Movement: A Preliminary Study on the Implementation of eConnectome in Motor Imagery Protocols
Published 2012-01-01“…Event-Related Desynchronization/Synchronization (ERD/ERS) of the mu-rhythm was used to evaluate MI performance. Source detection and FCNs were studied with eConnectome. …”
Get full text
Article -
93
Feature dependence graph based source code loophole detection method
Published 2023-01-01“…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
Get full text
Article -
94
Feature dependence graph based source code loophole detection method
Published 2023-01-01“…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
Get full text
Article -
95
The impact of functional selectivity by fisheries on the fish fauna of Abrolhos Bank
Published 2024-11-01Get full text
Article -
96
Deep Reinforcement Learning With Dueling DQN for Partial Computation Offloading and Resource Allocation in Mobile Edge Computing
Published 2025-01-01“…Computation offloading transfers resource-intensive tasks from local Internet of Things (IoT) devices to powerful edge servers, which minimizes latency and reduces the computational load on IoT devices. …”
Get full text
Article -
97
Web 2.0 as Catalyst: Virtually Reaching Out to Users and Connecting Them to Library Resources and Services.
Published 2008-11-01“…These Web 2.0 technologies function as catalysts which help lower human barriers between my users and me, enable me to reach my users virtually, and attract users to resources from the library as well as various services I provided [ABSTRACT FROM AUTHOR] …”
Get full text
Article -
98
Dietary Niche Variation in an Invasive Omnivore: The Effects of Habitat on Feral Pig Resource Use in Hawai‘i
Published 2024-10-01“…ABSTRACT Invasive omnivores may have profound impacts on ecological communities through diet selection, particularly when their functional roles differ from those in their native range. …”
Get full text
Article -
99
Optimization of D2D emergency communication resources for UAV relay based on DA-STD3
Published 2024-11-01“…Abstract The allocation of communication resources is extremely important for the device-to-device (D2D) communication network with unmanned aerial vehicle (UAV) relays, but this field currently mainly focuses on the communication between UAVs and ground devices. …”
Get full text
Article -
100