Search alternatives:
source » sources (Expand Search)
resources » resourcess (Expand Search)
Showing 961 - 980 results of 2,295 for search '((\ source selection function\ ) OR (( resources OR resources) detection functions\ ))', query time: 0.34s Refine Results
  1. 961

    Rock Fracture Monitoring Based on High-Precision Microseismic Event Location Using 3D Multiscale Waveform Inversion by Yi Wang, Xueyi Shang, Kang Peng, Rui Gao

    Published 2020-01-01
    “…Results show that the source-time function based on the fractional-order Gaussian function wavelet can better fit complex recording waveforms compared with the conventional Ricker wavelet-based source-time function, and the waveform misfit during the L-BFGS iteration decreased rapidly. …”
    Get full text
    Article
  2. 962
  3. 963

    Soil pollution and remediation: emerging challenges and innovations by Hao Chen, Bin Gao, Yuncong Li

    Published 2025-04-01
    “…These pollutants pose severe risks to environmental health and agricultural productivity by altering soil functionality and contaminant mobility. This perspective summarizes innovative monitoring and remediation technologies, including advanced sensors and bioremediation strategies, that enable real-time detection and effective management of soil pollutants. …”
    Get full text
    Article
  4. 964

    Research on lightweight weed recognition algorithm based on improved YOLOv8 by Zhang Chao, Liu Bin, Li Kun

    Published 2025-01-01
    “…Different scale features are used to improve the performance of target detection. Finally, the MPDIoU loss function is replaced to enhance the convergence and stability of the model. …”
    Get full text
    Article
  5. 965
  6. 966

    Survey on Backdoor Attacks on Deep Learning: Current Trends, Categorization, Applications, Research Challenges, and Future Prospects by Muhammad Abdullah Hanif, Nandish Chattopadhyay, Bassem Ouni, Muhammad Shafique

    Published 2025-01-01
    “…Such attacks are usually referred to as Trojan or backdoor attacks and are very stealthy and hard to detect. In this paper, we highlight the complete attack surface that can be exploited to inject hidden malicious functionality (backdoors) in machine learning models. …”
    Get full text
    Article
  7. 967
  8. 968
  9. 969

    LIFE CYCLE ASSESSMENT IN HEALTHCARE SYSTEM OPTIMIZATION. INTRODUCTION by V. Sarancha, K. Vitale, S. Oreskovic, V. Sulyma

    Published 2015-03-01
    “…Various factors and parameters that may influence effectiveness of different sectors in healthcare system are detected. Performance optimization of detected parameters could lead to better system functioning, higher patient safety, economic sustainability and reduce resources consumption.…”
    Get full text
    Article
  10. 970
  11. 971

    Optimizing Trade-Offs in Reliability, Security, and Freshness for Integrated Communication, Sensing, and Over-the-Air Computing by Tianyu Ren, Miao Zhang, Fangyu Wang, Kaiyuan Zheng

    Published 2025-01-01
    “…Specifically, considering statistical CSI, the target detection and AirComp aggregation errors are derived, and the upper bound of the security information age violation probability is obtained using stochastic network calculus and moment generating function theory. …”
    Get full text
    Article
  12. 972
  13. 973

    Plant- vs. Animal-Based Protein Comparison in the Aging Process and its Role in Perioperative Medicine and Critical Care: A Narrative Review by Cokorda Istri Mas Dalem Sukawati, Agustinus I Wayan Harimawan

    Published 2025-04-01
    “…Beyond aging, protein source selection is a critical factor in specialized medical settings, such as intensive care unit (ICU) nutrition therapy. …”
    Get full text
    Article
  14. 974

    Ensemble machine learning-based pre-trained annotation approach for scRNA-seq data using gradient boosting with genetic optimizer by Osama Elnahas, Waleed M. Ead, Yushan Qiu, Jian Lu

    Published 2025-07-01
    “…The problem of single-cell RNA annotation involves assigning meaningful labels or annotations to each cell in the scRNA-seq dataset, indicating its corresponding cell type, state, or biological function. Current annotation methods are often challenged by limited source data quality, sensitivity to batch effects, and poor adaptability to uncharacterized cell types. …”
    Get full text
    Article
  15. 975

    Research on Virtual Color Restoration of Complex Building System Based on Discrete Wavelet Transform by Chunqiao Song, Xutong Wu

    Published 2022-01-01
    “…In response to these problems, this paper proposes automatic selection of sample color migration. Considering that the respective gray-scale histograms of the visual source image and the target image are approximately normal distributions, this paper takes the peak point as the mean value of the normal distribution to construct the objective function. …”
    Get full text
    Article
  16. 976

    Research on Personnel Image Segmentation Based on MobileNetV2 H-Swish CBAM PSPNet in Search and Rescue Scenarios by Di Zhao, Weiwei Zhang, Yuxing Wang

    Published 2024-11-01
    “…In post-disaster search and rescue scenarios, the accurate image segmentation of individuals is essential for efficient resource allocation and effective rescue operations. …”
    Get full text
    Article
  17. 977
  18. 978

    Microalgal Metabolomes and Recent Biotechnological Advances for Their Industrial Application by Dinesh Kumar Saini, Geetanjali Manchanda, Ratiram Gomaji Chaudhary, Raghvendra Pratap Singh

    Published 2024-10-01
    “…In recent decades, microalgae have emerged as new sustainable resources for the production of various bioactive and biochemical compounds. …”
    Get full text
    Article
  19. 979

    Predictors of mortality and ICD shock therapy in primary prophylactic ICD patients-A systematic review and meta-analysis. by Leonard Bergau, Tobias Tichelbäcker, Barbora Kessel, Lars Lüthje, Thomas H Fischer, Tim Friede, Markus Zabel

    Published 2017-01-01
    “…<h4>Study selection</h4>Studies were eligible if at least one of the endpoints of interest were reported.…”
    Get full text
    Article
  20. 980