Showing 1,901 - 1,920 results of 3,741 for search '(( (resources OR (resource OR source)) utilization function ) OR ( sources utilization function ))', query time: 0.31s Refine Results
  1. 1901
  2. 1902
  3. 1903
  4. 1904

    Battery Powered Edge Computing Acceleration for Smart Agriculture Applications: A Use Case for Resonant Ultrasound Spectroscopy by Zilvinas Nakutis, Paulius Tervydis, Linas Svilainis, Alberto Rodriguez-Martinez

    Published 2024-01-01
    “…A methodology for estimating the utilization and performance of both edge and cloud data processing devices is proposed here. …”
    Get full text
    Article
  5. 1905

    Enhancing direct carbonation performance of basic oxygen furnace slag through potassium chloride activation by Rong SUN, Weicheng XU, Hongming LONG, Rufei WEI

    Published 2025-06-01
    “…The use of steel slag to capture and sequester CO2 is an effective method for coupling solid waste resource utilization with carbon emission reduction. …”
    Get full text
    Article
  6. 1906
  7. 1907

    Network security traffic detection and legal supervision based on adaptive metric learning algorithm by Liu Zhen

    Published 2025-09-01
    “…Network security mainly utilizes relevant equipment and programs of network systems to protect private information, in order to prevent damage, tampering, or leakage by illegal elements, and ensure the smooth operation of network system security. …”
    Get full text
    Article
  8. 1908

    Determination of the reduced electric field in surface dielectric barrier discharge plasmas by А.А. Муталип, Е.А. Усенов, А.К. Акильдинова, М.Қ. Досболаев, М.Т. Габдуллин, Т.С. Рамазанов

    Published 2021-09-01
    “…The main transport properties of electrons, such as mobility, mean average energy, and diffusion coefficients were calculated using the BOLSIG+ open source software. The dependence of the ratio of intensities of the nitrogen spectral lines on the reduced electric field, the dependence of the E/n on plasma power, and the dependence of the electron energy distribution function (EEDF) on E/n were obtained. …”
    Get full text
    Article
  9. 1909

    Somatic 'soluble' adenylyl cyclase isoforms are unaffected in Sacy tm1Lex/Sacy tm1Lex 'knockout' mice. by Jeanne Farrell, Lavoisier Ramos, Martin Tresguerres, Margarita Kamenetsky, Lonny R Levin, Jochen Buck

    Published 2008-09-01
    “…<h4>Background</h4>Mammalian Soluble adenylyl cyclase (sAC, Adcy10, or Sacy) represents a source of the second messenger cAMP distinct from the widely studied, G protein-regulated transmembrane adenylyl cyclases. …”
    Get full text
    Article
  10. 1910

    Visual Metaphor: Likeness of Unlike Things in Cartoons by Mohsen Zarifian

    Published 2025-12-01
    “…Guided by Conceptual Metaphor Theory, developed by Lakoff and Johnson as the theoretical framework, this study aims to examine how metaphors in political cartoons function as essential components in conveying complex socio-political messages. …”
    Get full text
    Article
  11. 1911

    Leveraging large language models for comprehensive locomotion control in humanoid robots design by Shilong Sun, Chiyao Li, Zida Zhao, Haodong Huang, Wenfu Xu

    Published 2024-12-01
    “…Traditional reinforcement learning (RL) approaches for robot locomotion are resource-intensive and rely heavily on manually designed reward functions. …”
    Get full text
    Article
  12. 1912

    A study on commodity criticism from the perspective of marxist semiotics by Yi Li, Xinpeng Wang

    Published 2024-11-01
    “…Secondary data sources, including case studies and theoretical analyses, are utilized to explore real-world contexts that demonstrate the material and symbolic roles of digital commodities. …”
    Get full text
    Article
  13. 1913

    Mankind’s Relationship with the Environment in Jeff VanderMeer’s Annihilation by Hossein Mohseni

    Published 2023-05-01
    “…The present study believes that the various aspects of this shattering gives us a glimpse of the kind of relationship we could have with the environment in the Anthropocene, the human epoch. By utilizing the theoretical concepts in key secondary sources – such as Pieter Vermeulen’s Literature and the Anthropocene (2020) and Benjamin Robertson’s None of This Is Normal: The Fiction of Jeff VanderMeer (2018) – the study identifies that various demarcational means fail to fulfill their binary making function due to the vastness and unmappable nature of environments such as Area X. …”
    Get full text
    Article
  14. 1914
  15. 1915

    Multi-Modalities in Mobile Technology for Assisted Learning Performance in Higher Education in China by Ruichen Yuan, Habibah Ab Jalil, Muhd Khaizer Omar

    Published 2025-03-01
    “…As a result of rapid advances in application technologies, various learning applications can combine different media or multi-modalities, such as video, audio, images, animated graphics, and text, to create multimedia learning resources that engage learners. However, the most favorable modalities in different learning applications that assist performance are worth exploring. …”
    Get full text
    Article
  16. 1916

    ENHANCEMENT OF CODE DIVISION MULTIPLE ACCESS (CDMA) WITHIN THE GSM SYSTEM IN IRAQ by Nabil Abdulwahab Abdulrazaq Baban

    Published 2025-07-01
    “…Additionally, CDMA's ability to dynamically allocate resources based on user demand ensures efficient spectrum utilization and improved capacity. …”
    Get full text
    Article
  17. 1917

    Using the TSA-LSTM two-stage model to predict cancer incidence and mortality. by Rabnawaz Khan, Wang Jie

    Published 2025-01-01
    “…Factor analysis is possible because data sources indicate changing factors. TSA-LSTM Two-stage attention design a popular tool with advanced visualization functions, Tableau, simplifies this paper's study. …”
    Get full text
    Article
  18. 1918

    Hybrid Deep Neural Network Optimization with Particle Swarm and Grey Wolf Algorithms for Sunburst Attack Detection by Mohammad Almseidin, Amjad Gawanmeh, Maen Alzubi, Jamil Al-Sawwa, Ashraf S. Mashaleh, Mouhammd Alkasassbeh

    Published 2025-03-01
    “…The strength of DNNs is derived from their ability to model complex functions and to improve detection engines through deeper architecture. …”
    Get full text
    Article
  19. 1919
  20. 1920

    Migrating from Developing Asynchronous Multi-Threading Programs to Reactive Programs in Java by Andrei Zbarcea, Cătălin Tudose

    Published 2024-12-01
    “…The results are examined in terms of functional equivalence, testing, and comparative analysis of response times, resource utilization, and throughput, as well as the cases where the reactive paradigm proves to be a solution worth considering. …”
    Get full text
    Article