Showing 101 - 120 results of 2,992 for search '((\ sources selection functions\ ) OR (( source OR resources) detection function\ ))', query time: 0.34s Refine Results
  1. 101
  2. 102
  3. 103

    Fermented, Freeze-Dried Snacks from <i>Lactarius deliciosus</i> as a Source of Functional Compounds and Lactic Acid Bacteria by Kavya Venugopal, Paweł Satora, Katarzyna Kała, Katarzyna Sułkowska-Ziaja, Agnieszka Szewczyk, Beata Ostachowicz, Bożena Muszyńska, Emilia Bernaś

    Published 2025-03-01
    “…After 6 months of storage, mushroom products were a good source of functional compounds, especially LAB, minerals, indoles, lovastatin, antioxidants (phenolic compounds), and dietary fibre. …”
    Get full text
    Article
  4. 104

    Multilingual Investigation of Cross-Project Code Clones in Open-Source Software for Internet of Things Systems by Wenqing Zhu, Norihiro Yoshida, Yutaka Matsubara, Hiroaki Takada

    Published 2024-01-01
    “…We collected 122 IoT system repositories in nine languages from GitHub and grouped them according to their primary functionality in IoT systems. We used MSCCD, a multilingual code clone detector to detect Type-3 code clones for each group. …”
    Get full text
    Article
  5. 105

    Acoustic modelling of surface sources. Part II. Piston model, asymmetrical function of vibration velocity, discretizing error, axisymmetrical problem by A. BRAŃSKI

    Published 2014-01-01
    “…Then the model of the source consists of an array of driving pistons. In order to select the optimal position of the boundary between the pistons, the measure of the divergence/convergence between directivity function of the model and exact was analysed. …”
    Get full text
    Article
  6. 106
  7. 107

    Multi-View Cluster Structure Guided One-Class BLS-Autoencoder for Intrusion Detection by Qifan Yang, Yu-Ang Chen, Yifan Shi

    Published 2025-07-01
    “…Multi-view OCC approaches usually require collecting multi-view traffic data from all sources and have difficulty detecting intrusion independently in each view. …”
    Get full text
    Article
  8. 108

    A near-optimal resource allocation strategy for minimizing the worse-case impact of malicious attacks on cloud networks by Yu-Fang Chen, Frank Yeong-Sung Lin, Kuang-Yen Tai, Chiu-Han Hsiao, Wei-Hsin Wang, Ming-Chi Tsai, Tzu-Lung Sun

    Published 2025-08-01
    “…The proposed model integrates Virtual Machine (VM) initiation decisions and employs the Contest Success Function (CSF) within a two-player max–min game framework to dynamically allocate resources. …”
    Get full text
    Article
  9. 109

    A Novel Method for Estimating Parameters of Magnetic Dipole Sources Under Low Signal-to-Noise Ratio Conditions Based on LM-OBF Algorithm by Zhaotao Yan, Zhaofa Zeng, Jianwei Zhao

    Published 2025-06-01
    “…It then constructs an objective function within a least squares framework and optimizes it using the Levenberg–Marquardt (LM) algorithm to achieve a stable estimation of magnetic source parameters. …”
    Get full text
    Article
  10. 110
  11. 111

    Research Progress on Dual Function Radar and Communication Signal Design and its Application in Typical Detection Scenarios by Yaping HE, Longfei SHI, Dong WANG, Jianglan TANG, Junxian CHEN, Jiazhi MA, Jialei LIU

    Published 2025-08-01
    “…Dual Function Radar and Communication (DFRC)-integrated electronic equipment platform, which combines detection and communication functions, effectively addresses issues such as platform limitations, resource constraints, and electromagnetic compatibility by sharing hardware platforms and transmitting waveforms. …”
    Get full text
    Article
  12. 112

    LFN-YOLO: precision underwater small object detection via a lightweight reparameterized approach by Mingxin Liu, Mingxin Liu, Yujie Wu, Ruixin Li, Cong Lin, Cong Lin

    Published 2025-01-01
    “…Underwater object detection plays a significant role in fisheries resource assessment and ecological environment protection. …”
    Get full text
    Article
  13. 113
  14. 114
  15. 115
  16. 116

    Simulation Study on Detection and Localization of a Moving Target Under Reverberation in Deep Water by Jincong Dun, Shihong Zhou, Yubo Qi, Changpeng Liu

    Published 2024-12-01
    “…Deep-water reverberation caused by multiple reflections from the seafloor and sea surface can affect the performance of active sonars. To detect a moving target under reverberation conditions, a reverberation suppression method using multipath Doppler shift in deep water and wideband ambiguity function (WAF) is proposed. …”
    Get full text
    Article
  17. 117
  18. 118
  19. 119

    Vehicle detection method based on multi-layer selective feature for UAV aerial images by Yinbao Ma, Yuyu Meng, Jiuyuan Huo

    Published 2025-07-01
    “…For the detection head, a Generalized Wasserstein Distance Loss (GWDLoss) function is proposed to quantify positional and scale discrepancies, improving the adaptability of bounding box regression to geometric variations. …”
    Get full text
    Article
  20. 120

    DRBD-YOLOv8: A Lightweight and Efficient Anti-UAV Detection Model by Panpan Jiang, Xiaohua Yang, Yaping Wan, Tiejun Zeng, Mingxing Nie, Zhenghai Liu

    Published 2024-11-01
    “…Achieving real-time detection with high accuracy, while accommodating the limited resources of edge-computing devices poses a significant challenge for anti-UAV detection. …”
    Get full text
    Article