Suggested Topics within your search.
Suggested Topics within your search.
-
121
Human-Machine Function Allocation Method for Submersible Fault Detection Tasks
Published 2024-11-01Get full text
Article -
122
PFW-YOLO Lightweight Helmet Detection Algorithm
Published 2025-01-01“…However, due to the limited arithmetic and storage resources of edge-end devices, and the traditional detection algorithms have problems such as the number of parameters and large computational volume, the detection algorithms are difficult to be deployed practically. …”
Get full text
Article -
123
Effect of cochlear implant surgery on vestibular function: meta-analysis study
Published 2017-06-01“…Study selection Published studies of adult patients who received unilateral or bilateral CIs and whose vestibular function or postural stability was assessed before and after surgery. …”
Get full text
Article -
124
Design and analysis of intelligent service chain system for network security resource pool
Published 2022-08-01“…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
Get full text
Article -
125
-
126
Multiepoch Observations of the Nearby Spiral Galaxy NGC 3938 with the Chandra X-Ray Observatory
Published 2025-01-01“…A total of 47 discrete merged sources from both epochs were detected at the ≈3 σ level or greater with the D25 radius. …”
Get full text
Article -
127
Failure Law of Sandstone and Identification of Premonitory Deterioration Information Based on Digital Image Correlation–Acoustic Emission Multi-Source Information Fusion
Published 2025-02-01“…Additionally, by introducing the derivative functions of the multi-source information function for quantitative analysis, a comprehensive evaluation method was proposed based on the multi-source information fusion monitoring to forewarn red sandstone failure by levels during loading. …”
Get full text
Article -
128
A spatial matrix factorization method to characterize ecological assemblages as a mixture of unobserved sources: An application to fish eDNA surveys
Published 2024-12-01“…We present a spatial matrix factorization method that identifies optimal eDNA sample assemblages—called pools—assuming that taxonomic unit composition is based on a fixed number of unknown sources. These sources, in turn, represent taxonomic units sharing similar habitat properties or characteristics. …”
Get full text
Article -
129
Characteristics of soil microbial phospholipid fatty acids in artificial, black-soil mountain degraded, and natural grasslands in the source region of the Three Rivers
Published 2025-08-01“…Background The source region of the Three Rivers is a concentrated distribution area of alpine grassland. …”
Get full text
Article -
130
Recent Technological Advancements for Identifying and Exploiting Novel Sources of Pest and Disease Resistance for Peanut Improvement
Published 2024-12-01“…Recent technological advancements have revolutionized the identification of novel resistance sources and the development of resistant peanut cultivars. …”
Get full text
Article -
131
Remote Sensing Extraction of Damaged Buildings in the Shigatse Earthquake, 2025: A Hybrid YOLO-E and SAM2 Approach
Published 2025-07-01“…The dataset used for training contained labeled examples of damaged buildings, and the model optimization was carried out using stochastic gradient descent (SGD), with cross-entropy and mean squared error as the selected loss functions. Upon evaluation, the model reached a precision of 0.840, a recall of 0.855, an F1-score of 0.847, and an IoU of 0.735. …”
Get full text
Article -
132
Analysis of physicochemical, functional, and antioxidant properties of four different Indian seaweed species
Published 2024-12-01“…Thus, the selected four marine seaweeds act as a good source of functional components and can be utilized for the development of functional food products such as bread, biscuits, cookies, tea, snacks, soups and beverages.…”
Get full text
Article -
133
A Survey on the Functionalities of Data Catalog Tools
Published 2025-01-01“…Currently, there is no generally accepted definition or interpretation regarding the required functionality of data catalog tools. This has not only led to a wide range of so-called data catalog tools but has also made it difficult for practitioners to gain an overview in order to make a targeted selection of a tool. …”
Get full text
Article -
134
-
135
-
136
-
137
Weak-Lensing Shear-Selected Galaxy Clusters from the Hyper Suprime-Cam Subaru Strategic Program: I. Cluster Catalog, Selection Function and Mass--Observable Relation
Published 2025-01-01“…We use semi-analytical injection simulations to derive the selection function and the mass--observable relation of our sample. …”
Get full text
Article -
138
-
139
DIAMOND2GO: rapid Gene Ontology assignment and enrichment detection for functional genomics
Published 2025-08-01Get full text
Article -
140
Optimized decomposition and identification method for multiple power quality disturbances
Published 2024-11-01Get full text
Article