Showing 141 - 160 results of 2,992 for search '((\ sources selection function\ ) OR (( (resource OR source) OR sources) detection functions\ ))', query time: 0.37s Refine Results
  1. 141
  2. 142

    Testing source elevation versus genotype as predictors of sugar pine performance in a post‐fire restoration planting by Emily V. Moran, Rainbow DeSilva, Courtney Canning, Jessica W. Wright

    Published 2024-10-01
    “…Abstract Climate change is motivating a reassessment of how seeds are selected for reforestation, as rapid environmental change can lead to local maladaptation in trees. …”
    Get full text
    Article
  3. 143

    Aptamer-Functionalized Gold Nanoparticle Assay for Rapid Visual Detection of Norovirus in Stool Samples by Maytawan Thanunchai, Sirikwan Sangboonruang, Natthawat Semakul, Kattareeya Kumthip, Niwat Maneekarn, Khajornsak Tragoolpua

    Published 2025-06-01
    “…Detection relies on MgCl<sub>2</sub>-induced changes in the color and absorbance of these aptamer-functionalized AuNPs. …”
    Get full text
    Article
  4. 144

    Detection of Sensitive Malicious Android Functionalities Using Inter-Component Control-Flow Analysis by Rati Bhan, Parvez Faruki, Rajendra Pamula

    Published 2025-01-01
    “…The paper proposes a robust inter-component communication (ICC) based detection approach to identify such hidden functionality exploited by adversaries. …”
    Get full text
    Article
  5. 145

    A statistical approach to assess interspecific consumptive competition and functional redundancy in ephemeral resource uses using camera traps by Yoshihiro Nakashima, Akane Hashizume, Akane Kanda

    Published 2024-07-01
    “…We extended time‐to‐detection occupancy modeling to quantify interspecific consumptive competition and redundancy of ecosystem functions through consumption between two species, while accounting for observation censoring. …”
    Get full text
    Article
  6. 146
  7. 147

    Investigating the impact of the regularization parameter on EEG resting-state source reconstruction and functional connectivity using real and simulated data by F. Leone, A. Caporali, A. Pascarella, C. Perciballi, O. Maddaluno, A. Basti, P. Belardinelli, L. Marzetti, G. Di Lorenzo, V. Betti

    Published 2024-12-01
    “…Accurate EEG source localization is crucial for mapping resting-state network dynamics and it plays a key role in estimating source-level functional connectivity. …”
    Get full text
    Article
  8. 148

    Source Process Estimation for the 2024 Mw 7.1 Hyuganada, Japan, Earthquake and Forward Modeling Using N‐net Ocean Bottom Seismometer Data by R. Shibata, H. Kubo, W. Suzuki, S. Aoi, H. Sekiguchi

    Published 2025-05-01
    “…The N‐net seafloor seismograms of the mainshock with a frequency of ∼0.05 Hz recorded east of the source area were reproduced for several stations using the empirical Green's function approach based on the estimated source process data.…”
    Get full text
    Article
  9. 149
  10. 150
  11. 151
  12. 152
  13. 153
  14. 154
  15. 155

    PFW-YOLO Lightweight Helmet Detection Algorithm by Yue Hong, Hao Wang, Shuo Guo

    Published 2025-01-01
    “…However, due to the limited arithmetic and storage resources of edge-end devices, and the traditional detection algorithms have problems such as the number of parameters and large computational volume, the detection algorithms are difficult to be deployed practically. …”
    Get full text
    Article
  16. 156

    Design and analysis of intelligent service chain system for network security resource pool by Zenan WANG, Jiahao LI, Chaohong TAN, Dechang PI

    Published 2022-08-01
    “…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
    Get full text
    Article
  17. 157

    Intelligent Firefighting Technology for Drone Swarms with Multi-Sensor Integrated Path Planning: YOLOv8 Algorithm-Driven Fire Source Identification and Precision Deployment Strateg... by Bingxin Yu, Shengze Yu, Yuandi Zhao, Jin Wang, Ran Lai, Jisong Lv, Botao Zhou

    Published 2025-05-01
    “…This study aims to improve the accuracy of fire source detection, the efficiency of path planning, and the precision of firefighting operations in drone swarms during fire emergencies. …”
    Get full text
    Article
  18. 158

    Three-Dimensional Real-Scene-Enhanced GNSS/Intelligent Vision Surface Deformation Monitoring System by Yuanrong He, Weijie Yang, Qun Su, Qiuhua He, Hongxin Li, Shuhang Lin, Shaochang Zhu

    Published 2025-04-01
    “…The system integrates GNSS monitoring terminals and multi-source meteorological sensors to accurately capture minute displacements at monitoring points and multi-source Internet of Things (IoT) data, which are then automatically stored in MySQL databases. …”
    Get full text
    Article
  19. 159
  20. 160

    Highly Efficient Biphoton Generation from Thin Dense Atomic Ensemble by Heewoo Kim, Hansol Jeong, Han Seb Moon

    Published 2025-04-01
    “…Strongly correlated bright biphotons are generated via spontaneous four‐wave mixing from a dense atomic ensemble based on the 6S1/2–6P3/2–6D5/2 transition of 133Cs. Biphoton source achieves a detected biphoton count rate of 100 kilo‐counts per second, a heralding efficiency of 15%, and a maximum normalized crosscorrelation function value of 100 between the signal and idler photons, despite the low detector efficiency of a silicon avalanche photodetector being less than 25% at 917 nm. …”
    Get full text
    Article