Search alternatives:
resource » source (Expand Search)
resourcess » sourcess (Expand Search)
Showing 801 - 820 results of 2,295 for search '((\ sources selection function\ ) OR (( resource OR resourcess) detection functions\ ))', query time: 0.33s Refine Results
  1. 801
  2. 802
  3. 803
  4. 804
  5. 805

    Estimation of Above-Ground Biomass for <italic>Dendrocalamus Giganteus</italic> Utilizing Spaceborne LiDAR GEDI Data by Huanfen Yang, Zhen Qin, Qingtai Shu, Li Xu, Jinge Yu, Shaolong Luo, Zaikun Wu, Cuifen Xia, Zhengdao Yang

    Published 2025-01-01
    “…The outcomes reveal that 1) the results showed that the power function emerged as the most efficacious model, with coefficient of determination (<italic>R</italic><sup>2</sup>) &#x003D; 0.87 and root mean square error (RMSE) &#x003D; 0.00051 Mg, in estimating the AGB of <italic>Dendrocalamus giganteus</italic>. 2) Based on the feature importance ranking of Random Forest, five variables were selected from the 40 extracted from GEDI, achieving RMSE &#x003D; 8.21 Mg&#x002F;ha and mean absolute error (MAE) &#x003D; 6.12 Mg&#x002F;ha. …”
    Get full text
    Article
  6. 806
  7. 807
  8. 808
  9. 809

    Efficient Use of Variation in Evolutionary Optimization by John W. Pepper

    Published 2010-01-01
    “…Commonly used selection algorithms contain several sources of inefficiency, some of which are easily avoided and others of which are not. …”
    Get full text
    Article
  10. 810

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  11. 811

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  12. 812

    Design of the Field Protection and Signal Priority at Intersection System for Autonomous-rail Rapid Transit by SHI Yangyang, LIU Guangyong, WU Jinyong

    Published 2022-06-01
    “…It provides auxiliary driving information for the driver through automation equipment, realizes the functions of route protection, virtual section occupied/unoccupied detection, signal control, entering/leaving station detection, platform door linkage control, berth status detection and management in deport and so on, which improves system security and reduces driver working intensity. …”
    Get full text
    Article
  13. 813

    Research on a traffic flow statistical algorithm based on YBOVDT and SAM2 by Yuanyuan Wang, Zheng Ding, Jiange Liu, Kexiao Wu, Md Sharid Kayes Dipu, Tingmei Ma, Yonghao Ma, Haiyan Zhang

    Published 2025-05-01
    “…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
    Get full text
    Article
  14. 814

    Investigation of the Impact of Light Colour on Surface Colour Perception: A Case Study on Red Surfaces by Havva Gül Sümer, Leyla Dokuzer Öztürk

    Published 2025-07-01
    “…These results offer valuable insights for the selection of suitable light sources not only for art exhibition spaces but also for other environments featuring colourful objects. …”
    Get full text
    Article
  15. 815

    Numerical modeling of complex radiative heat transfer by N. I. Moskalenko, L. V. Rodionov, M. S. Khamidullina, I. A. Afanasyev

    Published 2017-12-01
    “…The application of numerical simulation of the fine structure of the absorption and emission in the complex problems of radiative heat transfer is consider when the structural characteristics of the environment and the boundary conditions are different strong inhomogeneities in temperature, chemical composition and distribution of the radiation sources. The very nature of radiative heat transfer and temperature variation trends over time are determined by the acute effects of selection of the spectra and their modeling require knowledge of spectral line parameters: intensity, half-width position of the centers, contours. …”
    Get full text
    Article
  16. 816

    Fine-grained access control method for private data in android system by Gang Liu, Guofang Zhang, Quan Wang, Shaomin Ji, Lizhi Zhang

    Published 2019-03-01
    “…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
    Get full text
    Article
  17. 817

    Practical Implementation of a Smart Home Model Using Arduino and Sensors by Soufiane Hachani, Okba Benelmir

    Published 2025-05-01
    “…Controlling outdoor lighting based on ambient light intensity detected by a light sensor. Activating a security alarm by touch detection using a touch sensor. …”
    Get full text
    Article
  18. 818

    TOPSIS method-based decision-making model for bipolar quadripartitioned neutrosophic environment by G. Muhiuddin, Mohamed E. Elnair, Satham Hussain S, Durga Nagarajan

    Published 2025-06-01
    “…In the domain of renewable energy, selecting the most suitable energy source involves navigating complex decision-making processes influenced by multiple criteria and inherent uncertainties. …”
    Get full text
    Article
  19. 819

    Diverse-Origin Exosomes Therapeutic Strategies for Diabetic Wound Healing by Wang F, Yao J, Zuo H, Jiao Y, Wu J, Meng Z

    Published 2025-06-01
    “…As exosomes from different sources have different composition and function, the characteristics of their source must be considered when using them. …”
    Get full text
    Article
  20. 820

    FORMALIZATION OF INNOVATIVE PROCESSES OF FOOD TECHNOLOGY EQUIPMENT by Panfilov V.A.

    Published 2016-06-01
    “…The technology formalization includes the following steps: function formulation, prototype selection; creation of a tree of structural prototype evolution; elaboration and detailing of elements of the 1st and 2nd stages; transformation into the technical solution; feasibility and admissibility control; optimization of parameters, experimental testing, sale of the experimental batch of products; assessment of the effect expected, control of the application field of the product.…”
    Get full text
    Article