Search alternatives:
resource » source (Expand Search)
resources » sources (Expand Search)
Showing 581 - 600 results of 2,583 for search '((\ sources detection functions\ ) OR (( resource OR resources) selection function\ ))', query time: 0.46s Refine Results
  1. 581

    Ibai mag blinds blindana tiuhan? (Luke 6,39). Pragmatic functions and syntactic strategies in the Gothic left sentence periphery by Marina Buzzoni

    Published 2025-01-01
    “…The interference role of the Greek and Latin source texts will also be taken into consideration, mainly in order to ascertain whether the grammaticalization processes which those elements underwent were either induced or implemented by the models. …”
    Get full text
    Article
  2. 582

    5G network slicing function migration mechanism based on particle swarm optimization algorithm by Qiang CHEN, Caixia LIU, Lingshu LI

    Published 2018-08-01
    “…In multi-application scenarios of 5G,data traffic often increases dramatically.Virtual machine resources in network slicing may not meet the normal needs of users.In view of this,a network slicing function migration mechanism aiming at load balancing was proposed.The mechanism simulates the virtual machine into particles based on particle swarm optimization algorithm.In the process of migration,all particles were divided into several subgroups,and particle swarm optimization algorithm was applied within and among groups.According to the historical optimal solution and the current global optimal solution,the particle location was updated,and the best target particles were determined by selecting the smaller particle size of the particle in real time.The mechanism not only improves the convergence speed,but also improves the accuracy of the algorithm.Compared with other migration methods,the results show that the proposed migration mechanism has the advantages of high accuracy and fast convergence.And it can also improve the efficiency of resource utilization,reduce the energy consumption of data center,and has better adaptability.…”
    Get full text
    Article
  3. 583

    SOFTWARE COMPONENT DEVELOPMENT FOR PARALLEL GATEWAYS DETECTION AND QUALITY ASSESSMENT IN BPMN MODELS USING FUZZY LOGIC by Andrii Kopp, Ľuboš Cibák, Dmytro Orlovskyi, Dmytro Kudii

    Published 2025-07-01
    “…This features are evaluated using “soft” modeling rules based on fuzzy membership functions. Additionally, an activation function with the 0.5 threshold is used to generate binary quality indicators and calculate an integral quality assessment measure. …”
    Get full text
    Article
  4. 584

    Fuzzy-Based Novel Cross-Layer RPL Objective Function for Energy-Aware Routing in IoT by M. R. Poornima, H. S. Vimala, J. Shreyas

    Published 2025-07-01
    “…Abstract Energy consumption remains a critical challenge for low-power, resource-constrained Internet of Things (IoT) devices operating over Low-Power and Lossy Networks (LLNs). …”
    Get full text
    Article
  5. 585

    A fuzzy track-to-track association algorithm with dynamic time warping for trajectory-level vehicle detection by Siqi Wan, Huaqiao Mu, Ke Han, Taesu Cheong, Chi Xie

    Published 2025-03-01
    “…Multi-source track-to-track association (TTTA), which identifies trajectories from multiple sensors or data sources of the same dynamic vehicle, is an important data fusion technique widely applied to vehicle detection in the fields of road, marine, and aviation transportation. …”
    Get full text
    Article
  6. 586

    Arlclustering: an R package for community detection in social networks based on user interaction and association rule learning by Mohamed El-Moussaoui, Mohamed Hanine, Ali Kartit, Tarik Agouti

    Published 2025-07-01
    “…Abstract ARLClustering is an open-source R package for community detection in social networks. …”
    Get full text
    Article
  7. 587
  8. 588
  9. 589
  10. 590

    Density‐dependent responses of moose to hunting and landscape change by Mateen Hessami, Robert Serrouya, Clayton T. Lamb, Melanie Dickie, Adam T. Ford

    Published 2025-01-01
    “…The latter data series spanned 1961–2020 and informed the resource selection function and calculations for our first research objective as well as the predictive modelling for our second research objective. …”
    Get full text
    Article
  11. 591
  12. 592
  13. 593

    Hybrid Deep Neural Network Optimization with Particle Swarm and Grey Wolf Algorithms for Sunburst Attack Detection by Mohammad Almseidin, Amjad Gawanmeh, Maen Alzubi, Jamil Al-Sawwa, Ashraf S. Mashaleh, Mouhammd Alkasassbeh

    Published 2025-03-01
    “…The strength of DNNs is derived from their ability to model complex functions and to improve detection engines through deeper architecture. …”
    Get full text
    Article
  14. 594
  15. 595
  16. 596

    Enhanced Separation of Palladium from Nuclear Wastewater by the Sulfur-Rich Functionalized Covalent Organic Framework by Junli Wang, Chen Luo, Wentao Wang, Hui Wang, Yao Liu, Jianwei Li, Taihong Yan

    Published 2025-05-01
    “…The outcomes of this research underscore the immense potential of COFs endowed with resilient linkers and precisely engineered functional groups. Such COFs can adeptly capture metal ions with high selectivity, even in the face of severe environmental conditions, thereby paving the way for the more effective and environmentally responsible management of radioactive waste.…”
    Get full text
    Article
  17. 597
  18. 598

    Implementation of a Smart Home Intruder Detection System using a Vibrometer and ESP 32 CAM by Samuel Owoeye, Folasade Durodola, Adekunle Oyelami, Racheal Oladejo, Samuel Obasuyi, Ademola Qasim, Joshua Ogundairo

    Published 2025-01-01
    “…The topic of security is quite important; hence this paper presents the development and implementation of a Smart Intruder Detection System utilizing the ESP32-CAM board, the Vibrometer and the ATMega328P microcontroller to enhance lighting, security, and surveillance functionalities. …”
    Get full text
    Article
  19. 599
  20. 600

    Enhancing Cybersecurity Through Fusion of Optimization With Deep Wavelet Neural Networks on Denial of Wallet Attack Detection in Serverless Computing by P. Renukadevi, Sibi Amaran, A. Vikram, T. Prabhakara Rao, Mohamad Khairi Ishak

    Published 2025-01-01
    “…A Denial of Wallet (DoW) attack is a cyberattack designed to drain financial resources by causing excessive charges or costs on a serverless computing or cloud platform. …”
    Get full text
    Article