Search alternatives:
resource » source (Expand Search)
Showing 1 - 20 results of 3,214 for search '((\ sources selection function\ ) OR (( resource OR success) detection functions\ ))', query time: 0.36s Refine Results
  1. 1

    Identification and Mining of Functional Components of Polyphenols in Fruits of <i>Malus</i> Germplasm Resources Based on Multivariate Analysis by Dajiang Wang, Guangyi Wang, Xiang Lu, Zhao Liu, Simiao Sun, Hanxin Guo, Wen Tian, Zichen Li, Lin Wang, Lianwen Li, Yuan Gao, Kun Wang

    Published 2024-10-01
    “…These results provide us with information regarding the polyphenol composition and content of the wild apple resources and local cultivars. The high polyphenol content resources obtained by screening can be used as raw materials for the extraction of polyphenol components and functional fruit juice processing and can also be used as parents for functional fruit creation and variety breeding.…”
    Get full text
    Article
  2. 2

    A near-optimal resource allocation strategy for minimizing the worse-case impact of malicious attacks on cloud networks by Yu-Fang Chen, Frank Yeong-Sung Lin, Kuang-Yen Tai, Chiu-Han Hsiao, Wei-Hsin Wang, Ming-Chi Tsai, Tzu-Lung Sun

    Published 2025-08-01
    “…The proposed model integrates Virtual Machine (VM) initiation decisions and employs the Contest Success Function (CSF) within a two-player max–min game framework to dynamically allocate resources. …”
    Get full text
    Article
  3. 3

    On Data Selection and Regularization for Underdetermined Vibro-Acoustic Source Identification by Laixu Jiang, Jingqiao Liu, Xin Jiang, Yuezhao Pang

    Published 2025-06-01
    “…The number of hologram points in near-field acoustical holography (NAH) for a vibro-acoustic system plays a vital role in conditioning the transfer function between the source and measuring points. The requirement for many overdetermined hologram points for extended sources to obtain high accuracy poses a problem for the practical applications of NAH. …”
    Get full text
    Article
  4. 4
  5. 5

    A Decision Support System for Optimal Building Cold Source Selection by Qing Li, Yan Dong, Rong-Guang Cao, Le Li, Zhi-Bin Chen

    Published 2022-01-01
    “…Based on existing approaches to construction project evaluation and the selection of cold source systems, we establish an evaluation index for building cold source system functional models and network structures. …”
    Get full text
    Article
  6. 6
  7. 7

    Unlocking the prebiotic carbohydrates: Insights into the types, preparation, health benefits and future utilizations of selected Indonesian exotic fruit seeds as a potential source... by Andri Cahyo Kumoro, Dyah Hesti Wardhani, Tutuk Djoko Kusworo, Yusuf Ma'rifat Fajar Azis, Misbahudin Alhanif, Tan Chin Ping

    Published 2025-04-01
    “…This paper aims to explore the feasibility of utilizing Indonesian exotic fruit seeds as a potential source of prebiotic carbohydrates for functional foods and dietary additives. …”
    Get full text
    Article
  8. 8

    Resource scheduling based on routing tree and detection matrix for Internet of things by Hongying Bai, Xiaotong Zhang, Yuxin Liu, Yingdong Xie

    Published 2021-03-01
    “…This article proposes a new efficient resource scheduling based on routing tree and detection matrix for Internet of things. …”
    Get full text
    Article
  9. 9

    Derivation of pressure distribution models for horizontal well using source function by J.O. Oloro, E.S. Adewole

    Published 2019-05-01
    “…In this work, ten (10) models for pressure distribution for horizontal well under different boundary variation were derived following these steps for each of the models:(i) choosing a boundary condition for each axis (ii) selecting the appropriate source function for each axis and (iii)applying Newman product rule to arrive at the pressure expression. …”
    Get full text
    Article
  10. 10

    A Joint Optimization Method for Cooperative Detection Resources Based on Channel Capacity by Wenda Yang, Minggong Wu, Xiangxi Wen, Kexin Bi

    Published 2022-01-01
    “…Aiming at the resource optimization problem in the cooperative detection task, the objective function is constructed based on the channel capacity, and the artificial bee colony (ABC) algorithm is improved to realize the joint optimization of the UAV swarm trajectory and radiation power. …”
    Get full text
    Article
  11. 11

    A Feature-Selective Independent Component Analysis Method for Functional MRI by Yi-Ou Li, Tülay Adali, Vince D. Calhoun

    Published 2007-01-01
    “…In this work, we propose a simple and effective scheme to incorporate prior knowledge about the sources of interest (SOIs) in independent component analysis (ICA) and apply the method to estimate brain activations from functional magnetic resonance imaging (fMRI) data. …”
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Prediction of Wafer Performance: Use of Functional Outlier Detection and Regression by Kyusoon Kim, Seunghee Oh, Kiwook Bae, Hee-Seok Oh

    Published 2025-01-01
    “…To exploit the consecutive nature of OES data, we propose a prediction method based on a functional approach using multivariate functional partial least squares regression, coupled with dimension reduction and a novel outlier detection technique via functional independent component analysis. …”
    Get full text
    Article
  15. 15

    Nitrogen-functionalized modulation of iron nanoparticles promotes selective hydrogenation of carbon dioxide by Xianbiao Wang, Jun Qian, Zixuan Lu, Jie Huang, Liru Zheng, Yong Jiang, Mengdie Cai, Yuxue Wei, Lisheng Guo, Song Sun

    Published 2025-03-01
    “…Nitrogen-functionalized iron nanoparticles were prepared using a one-pot hydrothermal process. …”
    Get full text
    Article
  16. 16

    Enhanced Reward Function Design for Source Term Estimation Based on Deep Reinforcement Learning by Junhee Lee, Hongro Jang, Minkyu Park, Hyondong Oh

    Published 2025-01-01
    “…This study investigates the design of reward functions for deep reinforcement learning-based source term estimation (STE). …”
    Get full text
    Article
  17. 17

    Successful thoracoscopic-assisted resection of a functional paraganglioma in the mediastinum with extracorporeal circulation: a case report by Zhihui Yang, Xiaojie Huang, Danting Zhou, Tao Tang, Hengxing Liang, Wenliang Liu, Fenglei Yu, Chen Chen

    Published 2025-01-01
    “…Stringent perioperative management is crucial to mitigate the risk of cardiovascular complications associated with functional tumors. Lifelong surveillance is recommended to detect potential recurrence or metastasis. …”
    Get full text
    Article
  18. 18

    Framework development of continuous non-linear Diophantine fuzzy sets and its application to renewable energy source selection by Asaf Khan, Saifullah Khan, Ariana Abdul Rahimzai, Saleem Abdullah

    Published 2025-05-01
    “…We develop continuous non-linear Diophantine fuzzy algebraic aggregation operators and apply them to a multi-attribute decision-making problem in renewable energy source selection. A case study demonstrates the effectiveness of the proposed CN-LDFS framework using a weighted geometric operator. …”
    Get full text
    Article
  19. 19

    Crashing Fault Residence Prediction Using a Hybrid Feature Selection Framework from Multi-Source Data by Xiao Liu, Xianmei Fang, Song Sun, Yangchun Gao, Dan Yang, Meng Yan

    Published 2025-02-01
    “…This study introduces SCM, a two-stage composite feature selection framework designed to address this challenge. …”
    Get full text
    Article
  20. 20

    Hard-coded backdoor detection method based on semantic conflict by Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU

    Published 2023-02-01
    “…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
    Get full text
    Article