Showing 681 - 700 results of 2,992 for search '((\ sources selection function\ ) OR (( (resource OR source) OR sources) detection functions\ ))', query time: 0.38s Refine Results
  1. 681
  2. 682

    Cost-Sensitive Radial Basis Function Neural Network Classifier for Software Defect Prediction by P. Kumudha, R. Venkatesan

    Published 2016-01-01
    “…Effective prediction of software modules, those that are prone to defects, will enable software developers to achieve efficient allocation of resources and to concentrate on quality assurance activities. …”
    Get full text
    Article
  3. 683

    A METHOD FOR INVESTIGATING MACHINE LEARNING ATTACKS ON ARBITER-TYPE PHYSICALLY UNCLONABLE FUNCTIONS by Yuri A. Korotaev

    Published 2025-02-01
    “…This approach allows for a preliminary evaluation of the effectiveness of different algorithms for attacking APUFs without access to challenge-response datasets from real instances of physically unclonable functions. Attacks were conducted on models of basic and modified variants of APUFs from the open-source library "pypuf", using classical logistic regression and artificial neural networks (ANNs). …”
    Get full text
    Article
  4. 684

    Elucidating the role of compositional and processing variables in tailoring the technological functionalities of plant protein ingredients by Lorenzo Barozzi, Stella Plazzotta, Ada Nucci, Lara Manzocco

    Published 2025-01-01
    “…However, other extraction, purification, and drying methods can be properly combined, resulting in specific PP ingredient functionalities. Overall, this review highlights that, besides protein purity and source, knowledge of the processing history is required to select PP ingredients with desired functionalities.…”
    Get full text
    Article
  5. 685
  6. 686

    SOFTWARE COMPONENT DEVELOPMENT FOR PARALLEL GATEWAYS DETECTION AND QUALITY ASSESSMENT IN BPMN MODELS USING FUZZY LOGIC by Andrii Kopp, Ľuboš Cibák, Dmytro Orlovskyi, Dmytro Kudii

    Published 2025-07-01
    “…A set of 3729 BPMN models from the Camunda open source repository was used for experimental calculations. …”
    Get full text
    Article
  7. 687

    A High‐Quality Reference Genome and Comparative Genomics of the Widely Farmed Banded Cricket (Gryllodes sigillatus) Identifies Selective Breeding Targets by Shangzhe Zhang, Kristin R. Duffield, Bert Foquet, Jose L. Ramirez, Ben M. Sadd, Scott K. Sakaluk, John Hunt, Nathan W. Bailey

    Published 2025-03-01
    “…The high‐quality G. sigillatus genome assembly plus accompanying comparative genomic analyses serve as foundational resources for both applied and basic research on insect farming and behavioural biology, enabling researchers to pinpoint trait‐associated genetic variants, unravel functional pathways governing those phenotypes, and accelerate selective breeding efforts to increase the efficacy of large‐scale insect farming operations.…”
    Get full text
    Article
  8. 688

    A Wind Power Density Forecasting Model Based on RF-DBO-VMD Feature Selection and BiGRU Optimized by the Attention Mechanism by Bixiong Luo, Peng Zuo, Lijun Zhu, Wei Hua

    Published 2025-02-01
    “…Wind power, as a pivotal renewable energy source, is anticipated to play a critical role in ensuring the reliability, security, and stability of the global energy supply system. …”
    Get full text
    Article
  9. 689
  10. 690
  11. 691

    Multi-objective optimization models for power load balancing in distributed energy systems by Zhuo Wang, Yuchen Luo, Wei Wu, Lei Cao, Zhun Li

    Published 2025-08-01
    “…Uncertainty and several competing criteria on the demand and generation sides make multi-objective optimization difficult. Selecting a model capable of resolving scheduling issues related to loads and dispersed energy sources is, therefore, essential. …”
    Get full text
    Article
  12. 692

    Regional-Scale Energy Modelling for Developing Strategies to Achieve Climate Neutrality by Janusz Zyśk, Artur Wyrwa, Maciej Raczyński, Marcin Pluta, Wojciech Suwała

    Published 2025-04-01
    “…In the framework of analysis, the 3E (Energy–Economy–Environment) class optimisation model was developed. The objective function includes the costs of energy in the medium and long term. …”
    Get full text
    Article
  13. 693

    Hybrid Deep Neural Network Optimization with Particle Swarm and Grey Wolf Algorithms for Sunburst Attack Detection by Mohammad Almseidin, Amjad Gawanmeh, Maen Alzubi, Jamil Al-Sawwa, Ashraf S. Mashaleh, Mouhammd Alkasassbeh

    Published 2025-03-01
    “…The strength of DNNs is derived from their ability to model complex functions and to improve detection engines through deeper architecture. …”
    Get full text
    Article
  14. 694
  15. 695

    Computational Temporal Ghost Imaging Using Intensity-Only Detection Over a Single Optical Fiber by Jiang Tang, Yongwen Tang, Kun He, Luluzi Lu, Di Zhang, Mengfan Cheng, Lei Deng, Deming Liu, Minming Zhang

    Published 2018-01-01
    “…We propose a method of computational temporal ghost imaging over a single optical fiber using simple optical intensity detection instead of coherent detection. The transfer function of a temporal ghost imaging system over a single optical fiber is derived, which is a function of the total fiber dispersion and the power density spectrum of the light source. …”
    Get full text
    Article
  16. 696

    FCMI-YOLO: An efficient deep learning-based algorithm for real-time fire detection on edge devices. by Junjie Lu, Yuchen Zheng, Liwei Guan, Bing Lin, Wenzao Shi, Junyan Zhang, Yunping Wu

    Published 2025-01-01
    “…The rapid development of Internet of Things (IoT) technology and deep learning has propelled the deployment of vision-based fire detection algorithms on edge devices, significantly exacerbating the trade-off between accuracy and inference speed under hardware resource constraints. …”
    Get full text
    Article
  17. 697
  18. 698
  19. 699

    Vulnerability detection using BERT based LLM model with transparency obligation practice towards trustworthy AI by Jean Haurogné, Nihala Basheer, Shareeful Islam

    Published 2024-12-01
    “…The result shows higher accuracy of 91.8 % for the vulnerability detection and model explainability outcome is highly influenced by “vulnerable”, “function”, ''mysql_tmpdir_list'', “strmov” tokens using both SHAP and LIME framework. …”
    Get full text
    Article
  20. 700

    GloFinder: AI-empowered QuPath plugin for WSI-level glomerular detection, visualization, and curation by Jialin Yue, Tianyuan Yao, Ruining Deng, Siqi Lu, Junlin Guo, Quan Liu, Juming Xiong, Mengmeng Yin, Haichun Yang, Yuankai Huo

    Published 2025-04-01
    “…Artificial intelligence (AI) has demonstrated significant success in automating the detection of glomeruli—key functional units of the kidney—from whole slide images (WSIs) in kidney pathology. …”
    Get full text
    Article