Showing 981 - 1,000 results of 3,741 for search '(( (source OR resources) utilization function ) OR ( sources utilization function ))', query time: 0.21s Refine Results
  1. 981

    Efficiency evaluation of product oil pipeline under transportation market by Hao ZHANG, Renfu TU, Xu ZHANG, Xinyi YANG, Yiwei SU, Yuheng XIA, Jun YAN, Rui QIU

    Published 2024-10-01
    “…Subsequently, the functions of pipelines within the entire product oil logistics system were evaluated in typical and extreme weather scenarios utilizing two key metrics: total transportation cost and the share of pipeline transportation. …”
    Get full text
    Article
  2. 982
  3. 983
  4. 984
  5. 985
  6. 986
  7. 987

    Status Identification and Restoration Zoning of Ecological Space in Maowusu Sandy Land Based on Temporal and Spatial Characteristics of Land Use by Tiejun Zhang, Peng Xiao, Zhenqi Yang, Jianying Guo

    Published 2025-06-01
    “…Low-importance and low-sensitivity zones account for the smallest proportion, in which ecosystem protection, near-natural restoration, and moderate development and utilization should be carried out. This study aims to provide a scientific basis for reasonably protecting natural ecological resources and promoting the healthy and ordered development of natural ecosystems.…”
    Get full text
    Article
  8. 988

    Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing by Seema G. Aarella, Venkata P. Yanambaka, Saraju P. Mohanty, Elias Kougianos

    Published 2025-06-01
    “…This research introduces Fortified-Edge 2.0, a novel authentication framework that addresses critical security and privacy challenges in Physically Unclonable Function (PUF)-based systems for collaborative edge computing (CEC). …”
    Get full text
    Article
  9. 989

    Adaptive Cell Scheduling and Negotiation Techniques for 6TiSCH Networks Under Bursty Traffic by Je-Hyeong Lee, Sang-Hwa Chung

    Published 2025-02-01
    “…The first technique, dynamic cell cycle adjustment, dynamically adjusts the cell addition and deletion cycles based on the link quality and packet queue utilization to prevent packet queue overflow and efficiently use limited cell resources. …”
    Get full text
    Article
  10. 990

    Extensive Numerical Analysis of PDF Parameters for Wind Energy in Brazil: A Study Across 27 Cities for 60 Years Wind Speed by Ahmed Badawi, Amaury Souza, I. M. Elzein, Hassan Ali, Alhareth Zyoud

    Published 2025-01-01
    “…This research conducts a comprehensive numerical assessment of wind energy potential across Brazil, utilizing six decades of wind speed data collected from 27 cities to analyze Probability Density Function (PDF) parameters and enhance wind resource mapping. …”
    Get full text
    Article
  11. 991
  12. 992

    Absorption spectra of Nitrazine Yellow indicator. Experimental data and quantum chemical evaluations by Inna Khristenko, Volodymyr Ivanov

    Published 2024-06-01
    “…Quantum chemical modeling of electronically excited states is performed within the framework of time-dependent density functional theory (TD-DFT). A variety of approaches and basis sets are explored, particularly focusing on the B3LYP and CAM-B3LYP functionals. …”
    Get full text
    Article
  13. 993

    Responses of plant stoichiometric niche to locust disturbance with different densities in Inner Mongolia grasslands by Yuan Liang, Guangming Zhang, Chen Chen, Narui Li, Quansheng Chen, Caifeng Yan, Hao Wang, Hongqing Wang

    Published 2024-12-01
    “…Our results suggest that a heavy degree of locust plague might benefit the expansion of chemical niche space (species' niche in chemical resource utilization) in some plants in Inner Mongolian grasslands, but does not necessarily increase their physical niche (species' niche under abiotic environmental conditions like temperature and humidity). …”
    Get full text
    Article
  14. 994

    Parallelization of Rainbow Tables Generation Using Message Passing Interface: A Study on NTLMv2, MD5, SHA-256 and SHA-512 Cryptographic Hash Functions by Mark Vainer, Arnas Kačeniauskas, Nikolaj Goranin

    Published 2025-07-01
    “…Rainbow table attacks utilize a time-memory trade-off to efficiently crack passwords by employing precomputed tables containing chains of passwords and hash values. …”
    Get full text
    Article
  15. 995

    To Hunt or Patrol? Social Composition and Location Mediate Scent Marking Decisions of a Large Carnivore by K. Whitney Hansen, Neil R. Jordan, Megan J. Claase, J. W. McNutt, Alan Wilson, Christopher C. Wilmers

    Published 2025-06-01
    “…Specifically, we used resource selection function frameworks to determine how and whether conspecifics influenced habitat selection and behavior at multiple orders of selection. …”
    Get full text
    Article
  16. 996

    An Adaptive Harmony Search Part-of-Speech tagger for Square Hmong Corpus by Di-Wen Kang, Shao-Qiang Ye, Sharifah Zarith Rahmah Syed Ahmad, Li-Ping Mo, Feng Qin, Pan Zhou

    Published 2024-02-01
    “… Data-driven models perform poorly on part-of-speech tagging problems with the square Hmong language, a low-resource corpus. This paper designs a weight evaluation function to reduce the influence of unknown words. …”
    Get full text
    Article
  17. 997
  18. 998
  19. 999

    Mapping service capabilities using ISM and fuzzy DEMATEL by Tingting Li, Dan Lv, Davod Khosroanjom

    Published 2025-07-01
    “…Abstract In the present competitive landscape, small enterprises (SEs) must consistently strive to enhance and sustain their position by utilizing suitable capabilities. Recognizing such advancements is mostly linked to service capabilities and resources. …”
    Get full text
    Article
  20. 1000