Showing 341 - 360 results of 3,741 for search '(( (resources OR resources) utilization function ) OR ( sources utilization function ))', query time: 0.24s Refine Results
  1. 341
  2. 342
  3. 343

    Enhancing cyber defense strategies with discrete multi-dimensional Z-numbers: a multi-attribute decision-making approach by Aiting Yao, Chen Huang, Weiqi Zhang, Chengzu Dong, Meiqu Lu, Junjun Mao, Xiao Liu, Xuejun Li

    Published 2025-03-01
    “…Furthermore, we define utility functions based on MZs and develop a multi-attribute group decision-making framework tailored for network defense. …”
    Get full text
    Article
  4. 344

    Evaluating Urban Park Utility in Seoul: A Distance-to-Area Discounting Model by Gyoungju Lee, Youngeun Kang

    Published 2025-07-01
    “…This study proposes a novel method to assess urban park accessibility by incorporating perceived utility based on both park area and distance. Departing from conventional models that treat accessibility as a function of geometric proximity alone, we define park utility as a distance-discounted benefit of park area, thereby allowing for a more behaviorally grounded measure. …”
    Get full text
    Article
  5. 345

    Rice bran as a sustainable source for value added materials: an overview by A. S. Nidhishree, Rachel Alveera Menezes, H. Venkatachalam, K. Subrahmanya Bhat

    Published 2024-12-01
    “…Abstract Rice bran, a byproduct of rice milling, holds immense potential for sustainable resource management and product innovation across various industries. …”
    Get full text
    Article
  6. 346
  7. 347
  8. 348
  9. 349

    Distributed congestion control strategy using network utility maximization theory in VANET by Guozhen TAN, Guodong HAN, Fuxin ZHANG, Nan DING, Mingjian LIU

    Published 2019-02-01
    “…Cooperative vehicle safety system (CVSS) rely on periodical beacons to track neighboring vehicles.High traffic density often causes channel congestion,seriously damaging the performance of CVSS.Existing congestion control strategies aim to ensure the performance in network layer,without considering the service requirements of vehicles in different driving contexts.To solve the problem,a distributed congestion control strategy using network utility maximization (NUM) theory was proposed.First of all,the NUM model for channel resource allocation was introduced.A utility function reflecting vehicle’s safety requirements was proposed in the model.Then under the condition of fixed transmit powers,a optimization problem of channel resource allocation was proposed.Lastly,to solve the optimization problem,a distributed congestion control algorithm named utility-based rate congestion control (UBRCC) algorithm was designed,the algorithm worked out the optimal beaconing rate by updating vehicle’s congestion price,realizing the resource allocation according to vehicle’s safety requirements.Simulation results validate that UBRCC algorithm can efficiently control channel congestion,reduce transmission delay,ensure reliable data transmission and satisfies the requirements of safety applications.…”
    Get full text
    Article
  10. 350
  11. 351

    Utilizing the Ethereum blockchain for retrieving and archiving augmented reality surgical navigation data by Sai Batchu, Michael J. Diaz, Lauren Ladehoff, Kevin Root, Brandon Lucke-Wold

    Published 2023-02-01
    “…Ethereum smart contracts present one such novel approach. Ethereum is an open-source platform that allows for the use of smart contracts. …”
    Get full text
    Article
  12. 352
  13. 353

    Assessing the agronomic efficiency of rock dust as a nutrient source in agriculture by Caroline de Figueiredo Oliveira, Gutierres Nelson Silva, Nericlenes Chaves Marcante, Vinicius Vasconcelos, Mathaus Antonio Elias Mandro, Elcio Ferreira Santos

    Published 2025-04-01
    “…ABSTRACT Silicate rocks derived from mining waste, particularly siltstone powder, have the potential to function as a nutrient source in agriculture. It is worth noting that their effectiveness can be enhanced when combined with limestone. …”
    Get full text
    Article
  14. 354

    Source reconstruction via deposition measurements of an undeclared radiological atmospheric release by S. Van Leuven, S. Van Leuven, S. Van Leuven, P. De Meutter, P. De Meutter, J. Camps, P. Termonia, P. Termonia, A. Delcloo, A. Delcloo

    Published 2025-08-01
    “…The inversion consists of Bayesian and cost-function-based algorithms to reconstruct the initial source properties. …”
    Get full text
    Article
  15. 355
  16. 356
  17. 357
  18. 358

    SCUP-HPC: System for Constructing and Utilizing Provenance on High-Performance Computing Systems by Yuta Namiki, Takeo Hosomi, Hideyuki Tanushi, Akihiro Yamashita, Susumu Date

    Published 2025-01-01
    “…In addition, we developed a suite of techniques to transform the captured data into provenance by extracting the relationships among programs, files, jobs, and source code from the user’s perspective. We evaluated SCUP-HPC with well-known HPC applications, assessing both the functionality of the constructed provenance and the performance impacts on the applications. …”
    Get full text
    Article
  19. 359

    Electrophysiological characterization of sourced human iPSC-derived motor neurons by Bohumila Jurkovicova-Tarabova, Robin N. Stringer, Zuzana Sevcikova Tomaskova, Norbert Weiss

    Published 2025-12-01
    “…Voltage-clamp analyses confirmed the functional expression of key ion channels, including high- and low-voltage-activated calcium channels, TTX-sensitive and TTX-insensitive sodium channels, and voltage-gated potassium channels. …”
    Get full text
    Article
  20. 360