Showing 781 - 800 results of 2,992 for search '((\ sources selection functions\ ) OR (( resource OR source) detection function\ ))', query time: 0.44s Refine Results
  1. 781

    A Method for Service Function Chain Migration Based on Server Failure Prediction in Mobile Edge Computing Environment by Joelle Kabdjou, Norihiko Shinomiya

    Published 2025-01-01
    “…However, traditional hardware-based middleboxes limit flexibility and scalability, leading to the adoption of Network Function Virtualization (NFV). NFV enables the deployment of network functions as software, optimizing resource allocation and reducing costs. …”
    Get full text
    Article
  2. 782

    Short-Circuit Protection Circuit With Current Slope-to-Digital Conversion Short-Circuit Detection and Adaptive Soft Turn-Off by Seungjik Lee, Jinman Myung, Geonwoo Park, Yoseph Kim, Ockgoo Lee, Ilku Nam

    Published 2025-01-01
    “…It ensures that the drain–source voltage overshoot remains below 14.5% of the drain–source voltage while achieving a consistent response delay of approximately 750 ns for short-circuit detection and a turn-off time of approximately 500 ns for soft turn-off operation.…”
    Get full text
    Article
  3. 783

    Karbon dots (C-dots) dari Bahan Hayati untuk Deteksi Logam Berat by Cut Navita Rahmi, Sri Sugiarti, Alvian Dea Yuliani

    Published 2023-05-01
    “…This study aims to review carbon nanoparticles derived from natural sources for detecting heavy metals. C-dots derived from biological sources have been widely studied as selective heavy metal detection. …”
    Get full text
    Article
  4. 784

    Software with artificial intelligence-derived algorithms for detecting and analysing lung nodules in CT scans: systematic review and economic evaluation by Julia Geppert, Peter Auguste, Asra Asgharzadeh, Hesam Ghiasvand, Mubarak Patel, Anna Brown, Surangi Jayakody, Emma Helm, Dan Todkill, Jason Madan, Chris Stinton, Daniel Gallacher, Sian Taylor-Phillips, Yen-Fu Chen

    Published 2025-05-01
    “…Information required to populate the models included the prevalence of lung nodules, risk of lung cancer with different nodule sizes, sensitivity and specificity for nodule detection, nodule type and size distributions in different population, resource use, costs and utilities. …”
    Get full text
    Article
  5. 785

    A Fault-Tolerant Localization Method for 5G/INS Based on Variational Bayesian Strong Tracking Fusion Filtering with Multilevel Fault Detection by Zhongliang Deng, Ziyao Ma, Haiming Luo, Jilong Guo, Zidu Tian

    Published 2025-06-01
    “…Sudden and gradual faults were quickly detected through a dual-channel pre-check, and then, the fault source was identified through AIME. …”
    Get full text
    Article
  6. 786
  7. 787

    RE-YOLO: An apple picking detection algorithm fusing receptive-field attention convolution and efficient multi-scale attention. by Jinxue Sui, Li Liu, Zuoxun Wang, Li Yang

    Published 2025-01-01
    “…The accuracy of current apple picking detection algorithms is still limited when the distribution is dense and occlusion exists, and there is a significant challenge in deploying current high accuracy detection models on edge devices with limited computational resources. …”
    Get full text
    Article
  8. 788

    Context-dependent PSIICOS: A novel framework for functional connectivity estimation accounting for task-related power leakage by Daria Kleeva, Alexei Ossadtchi

    Published 2025-08-01
    “…The results demonstrate that CD-PSIICOS outperforms the original PSIICOS in suppressing artifacts at the lower projection ranks, maintaining robust detection of functional networks across theta and gamma frequency bands. …”
    Get full text
    Article
  9. 789
  10. 790

    VIRify: An integrated detection, annotation and taxonomic classification pipeline using virus-specific protein profile hidden Markov models. by Guillermo Rangel-Pineros, Alexandre Almeida, Martin Beracochea, Ekaterina Sakharova, Manja Marz, Alejandro Reyes Muñoz, Martin Hölzer, Robert D Finn

    Published 2023-08-01
    “…Overall, we demonstrate that VIRify is a novel and powerful resource that offers an enhanced capability to detect a broad range of viral contigs and taxonomically classify them.…”
    Get full text
    Article
  11. 791

    Improved smart city security using a deep maxout network-based intrusion detection system with walrus optimization by Wahid Rajeh, Majed Aborokbah, Manimurugan S., Umar Albalawi, Ahamed Aljuhani, Osama Shibl Abdalghany Younes, Karthikeyan Periyasami

    Published 2025-03-01
    “…Methods This research addresses the need for robust intrusion detection systems (IDS) tailored to the unique challenges of securing public transportation within smart cities. …”
    Get full text
    Article
  12. 792
  13. 793
  14. 794

    Detection of power theft in sensitive stations based on generalized robust distance metric and multi-classification support vector machine by Wei Zhang, Qiong Cao, Shuai Yang, Hao Guo

    Published 2025-04-01
    “…Through training and optimization, the support vector machine outputs the detection results of electricity stealing behavior according to the decision function, and realizes the accurate detection of electricity stealing behavior. …”
    Get full text
    Article
  15. 795

    A deep learning based intrusion detection system for CAN vehicle based on combination of triple attention mechanism and GGO algorithm by Hongwei Yang, Mehdi Effatparvar

    Published 2025-06-01
    “…The current work utilizes a novel Greylag Goose Optimization algorithm for optimal selection of the network hyperparameters. For checking the effectiveness of the suggested method, an open-source dataset was applied, which recorded the traffic of CAN using a real vehicle throughout injection attacks of message. …”
    Get full text
    Article
  16. 796

    Enhancing Cybersecurity Through Fusion of Optimization With Deep Wavelet Neural Networks on Denial of Wallet Attack Detection in Serverless Computing by P. Renukadevi, Sibi Amaran, A. Vikram, T. Prabhakara Rao, Mohamad Khairi Ishak

    Published 2025-01-01
    “…Deep learning (DL) models show strong potential in detecting DoW attacks, where attackers disrupt services by exploiting system resources. …”
    Get full text
    Article
  17. 797

    DETECTION AND SYSTEMATIZATION OF SIGNS AND MARKERS OF MODIFICATIONS IN MEDIA CONTENT FOR THE DEVELOPMENT OF A METHODOLOGY TO ENHANCING CRITICAL THINKING IN THE ERA OF DEEPFAKES by Ганна Чемерис

    Published 2024-02-01
    “…The paper focuses on creating a comprehensive framework for detecting manipulated content and identifying indicators such as pixelization, unnatural expressions, etc. …”
    Get full text
    Article
  18. 798
  19. 799

    Location and function of TDP-43 in platelets, alterations in neurodegenerative diseases and arising considerations for current plasma biobank protocols by Ruth Luthi-Carter, Sara Cappelli, Morgan Le Roux-Bourdieu, Noemie Tentillier, James P. Quinn, Tiziana Petrozziello, Lathika Gopalakrishnan, Purva Sethi, Himanshi Choudhary, Giorgia Bartolini, Elias Gebara, Cristiana Stuani, Laure Font, Jiyan An, Vanessa Ortega, Jessica Sage, Edina Kosa, Bianca A. Trombetta, Roberto Simeone, Tamara Seredenina, Tariq Afroz, James D. Berry, Steven E. Arnold, Becky C. Carlyle, Oskar Adolfsson, Ghazaleh Sadri-Vakili, Emanuele Buratti, Robert Bowser, Abdulbaki Agbas

    Published 2024-09-01
    “…Here, we explore its tractability as a plasma biomarker of disease and describe its localization and possible functions in the cytosol of platelets. Novel TDP-43 immunoassays were developed on three different technical platforms and qualified for specificity, signal-to-noise ratio, detection range, variation, spike recovery and dilution linearity in human plasma samples. …”
    Get full text
    Article
  20. 800

    Characterising the metabolic functionality of the preterm neonatal gut microbiome prior to the onset of necrotising enterocolitis: a pilot study by Jonathan A. Chapman, Emily Wroot, Toby Brown, Lauren C. Beck, Nicholas D. Embleton, Janet E. Berrington, Christopher J. Stewart

    Published 2024-12-01
    “…The microbiota of NEC and control infants showed similar wide-ranging metabolic functionalities. All 94 carbon sources were utilised to varying extents but NEC and control samples clustered separately by supervised ordination based on carbon source utilisation profiles. …”
    Get full text
    Article