Search alternatives:
resourcess » resource (Expand Search)
Showing 541 - 560 results of 2,583 for search '((\ sources detection functions\ ) OR (( resources OR resourcess) selection function\ ))', query time: 0.33s Refine Results
  1. 541

    SOFTWARE COMPONENT DEVELOPMENT FOR PARALLEL GATEWAYS DETECTION AND QUALITY ASSESSMENT IN BPMN MODELS USING FUZZY LOGIC by Andrii Kopp, Ľuboš Cibák, Dmytro Orlovskyi, Dmytro Kudii

    Published 2025-07-01
    “…This features are evaluated using “soft” modeling rules based on fuzzy membership functions. Additionally, an activation function with the 0.5 threshold is used to generate binary quality indicators and calculate an integral quality assessment measure. …”
    Get full text
    Article
  2. 542

    A fuzzy track-to-track association algorithm with dynamic time warping for trajectory-level vehicle detection by Siqi Wan, Huaqiao Mu, Ke Han, Taesu Cheong, Chi Xie

    Published 2025-03-01
    “…Multi-source track-to-track association (TTTA), which identifies trajectories from multiple sensors or data sources of the same dynamic vehicle, is an important data fusion technique widely applied to vehicle detection in the fields of road, marine, and aviation transportation. …”
    Get full text
    Article
  3. 543

    Arlclustering: an R package for community detection in social networks based on user interaction and association rule learning by Mohamed El-Moussaoui, Mohamed Hanine, Ali Kartit, Tarik Agouti

    Published 2025-07-01
    “…Abstract ARLClustering is an open-source R package for community detection in social networks. …”
    Get full text
    Article
  4. 544
  5. 545

    Hybrid Deep Neural Network Optimization with Particle Swarm and Grey Wolf Algorithms for Sunburst Attack Detection by Mohammad Almseidin, Amjad Gawanmeh, Maen Alzubi, Jamil Al-Sawwa, Ashraf S. Mashaleh, Mouhammd Alkasassbeh

    Published 2025-03-01
    “…The strength of DNNs is derived from their ability to model complex functions and to improve detection engines through deeper architecture. …”
    Get full text
    Article
  6. 546
  7. 547
  8. 548
  9. 549

    Implementation of a Smart Home Intruder Detection System using a Vibrometer and ESP 32 CAM by Samuel Owoeye, Folasade Durodola, Adekunle Oyelami, Racheal Oladejo, Samuel Obasuyi, Ademola Qasim, Joshua Ogundairo

    Published 2025-01-01
    “…The topic of security is quite important; hence this paper presents the development and implementation of a Smart Intruder Detection System utilizing the ESP32-CAM board, the Vibrometer and the ATMega328P microcontroller to enhance lighting, security, and surveillance functionalities. …”
    Get full text
    Article
  10. 550
  11. 551
  12. 552
  13. 553

    Enhancing Cybersecurity Through Fusion of Optimization With Deep Wavelet Neural Networks on Denial of Wallet Attack Detection in Serverless Computing by P. Renukadevi, Sibi Amaran, A. Vikram, T. Prabhakara Rao, Mohamad Khairi Ishak

    Published 2025-01-01
    “…A Denial of Wallet (DoW) attack is a cyberattack designed to drain financial resources by causing excessive charges or costs on a serverless computing or cloud platform. …”
    Get full text
    Article
  14. 554
  15. 555

    Functions and Obstacles of Nurse Leadership in Disaster Management in West Sulawesi, Indonesia: A Qualitative Study by Edi Purnomo, Achir Yani S. Hamid, Dewi Gayatri, Agus Setiawan

    Published 2025-04-01
    “…Results: The analysis identified 4 primary categories and 9 subcategories: 1) Personnel direction function (providing instructions and directions, motivating and empowering members), 2) Staffing function (availability of human resources, addition and development of human resources), 3) Conflict of functions in family and profession (role and responsibilities in family, demands of the profession), 4) Advocacy, coordination, and communication functions (cross-sectoral advocacy, inter-institutional synchronization, and communication channels and media).  …”
    Get full text
    Article
  16. 556
  17. 557
  18. 558
  19. 559

    Fuzzy-Based Novel Cross-Layer RPL Objective Function for Energy-Aware Routing in IoT by M. R. Poornima, H. S. Vimala, J. Shreyas

    Published 2025-07-01
    “…Abstract Energy consumption remains a critical challenge for low-power, resource-constrained Internet of Things (IoT) devices operating over Low-Power and Lossy Networks (LLNs). …”
    Get full text
    Article
  20. 560