Showing 1,041 - 1,060 results of 2,295 for search '(( resource detection function ) OR (( source OR sources) selection functions ))', query time: 0.33s Refine Results
  1. 1041

    Bridging Behavioural, Neural, and First-Person Insights into Working Memory Strategies by Anka Slana Ozimič, Nina Purg Suljič, Aleš Oblak, Jurij Bon, Toma Strle, Grega Repovš

    Published 2025-07-01
    “…We argue that a major source of this inconsistency stems from the diverse strategies individuals employ to perform working memory tasks. …”
    Get full text
    Article
  2. 1042

    Coherence in popularized medico-pharmaceutical reports: The case of EPAR summaries for the public by Aage Hill-Madsen

    Published 2025-06-01
    “…The summary for the public reports the gist of the specialized source text in a linguistic register suitable for a lay readership. …”
    Get full text
    Article
  3. 1043

    Energy Trading in Local Energy Markets: A Comprehensive Review of Models, Solution Strategies, and Machine Learning Approaches by Sania Khaskheli, Amjad Anvari-Moghaddam

    Published 2024-12-01
    “…This classification examines various algorithms for energy transactions considering the agent type, learning methods, policy, state space, action space, and action selection for state, action, and reward function outputs. …”
    Get full text
    Article
  4. 1044

    Information Assisted Dictionary Learning for fMRI Data Analysis by Manuel Morante, Yannis Kopsinis, Sergios Theodoridis, Athanassios Protopapas

    Published 2020-01-01
    “…Moreover, it can cope efficiently with uncertainties in the modeling of the hemodynamic response function. In addition, the method bypasses one of the major drawbacks of the DL methods; namely, the selection of the sparsity-related regularization parameters. …”
    Get full text
    Article
  5. 1045

    Nature-based solutions for urban climate resilience: implementation, contribution, and effectiveness by Gemechis B Mosisa, Bobe Bedadi, Gemedo Dalle, Nega Tassie

    Published 2025-12-01
    “…For instance, of the 26 qualitative sample publications selected for this systematic review, almost 54 % employed only secondary data sources, and eight publications lacked clear and specified data analysis techniques. …”
    Get full text
    Article
  6. 1046

    Cascaded Directional Coupler-Based Triplexer Working on Spectroscopically Relevant Wavelengths for Multiple Gas Detection by Ajmal Thottoli, Gabriele Biagi, Artem S. Vorobev, Antonella D’Orazio, Giovanni Magno, Liam O’Faolain

    Published 2025-02-01
    “…The device is designed to combine the wavelengths of 1530 nm, 1653.7 nm, and 2003 nm for use in spectroscopy systems targeting the detection of ammonia, methane, and carbon dioxide gases, respectively. The triplexer’s functions focus on enhancing the coupling efficiency and selectivity, while facilitating the on-chip integration of diode lasers. …”
    Get full text
    Article
  7. 1047

    Subjective and objective vestibular changes that occur following paediatric cochlear implantation: systematic review and meta-analysis by Michael Yong, Emily Young, Jane Lea, Hannah Foggin, Erica Zaia, Frederick K. Kozak, Brian D. Westerberg

    Published 2019-05-01
    “…Grey literature and unpublished sources were also reviewed. Study selection Articles published from 1980 until the present which documented pre-operative and post-operative vestibular testing on children under the age of 18 were used. …”
    Get full text
    Article
  8. 1048

    Evaluation of Adulticidal Clorine with Black Sand, White Sand and Silica Sand for Decline Coliform Bacteria by Rezania Asyfiradayati, Eni Budiyati, Mitoriana Porusia, Muhammad Rivandi Athaya, Afnan Zain Muzakki, Jenita Berlian Nindyasari, Siti Rohana Mohd Yatim

    Published 2025-07-01
    “…This finding suggests that material selection significantly influences the functional performance of chlorine-based water disinfection systems.…”
    Get full text
    Article
  9. 1049

    Genetic diversity in wild species and cultivars of strawberry for the <i>FanAAMT</i> gene controlling fruit flavor volatiles by A. S. Lyzhin, I. V. Luk’yanchuk

    Published 2021-07-01
    “…Identification of genetic determinants for this trait facilitates targeted selection of promising forms based on diagnostic DNA markers. …”
    Get full text
    Article
  10. 1050

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  11. 1051

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  12. 1052

    Reinforcement learning-based vehicle travel path reconstruction from sparse automatic licence plate recognition data by Qiuping Li, Hui Meng, Li Zhuo

    Published 2025-04-01
    “…First, the maximum entropy inverse reinforcement learning (MaxEnt IRL) method is employed to learn vehicle path selection strategy, i.e. the reward function, from the real data. …”
    Get full text
    Article
  13. 1053

    Voluntary (NGO) Sector’s Involvement in Health Promotion for Older Population in Europe by Michał Zabdyr-Jamróz

    Published 2022-03-01
    “…Method: The research is based on narrative literature review as well as interviews and consultations with informers (practitioners and experts) in selected European countries. Results: Voluntary/NGO sector increases its role as a complimentary or alternative source of health promotion for older people in Europe. …”
    Get full text
    Article
  14. 1054

    Where there’s smoke there is fire: Türkiye and the international illegal wildlife trade by Özgün Emre Can

    Published 2025-06-01
    “…By guiding policymakers, conservationists, and authorities, the study fosters international cooperation, optimal resource use, and endangered species protection. International wildlife trafficking can occur when detection and law enforcement measures fail in both the countries of origin and destination, and, where relevant, in transit countries, showing the necessity for governments worldwide to make the international illegal wildlife trade a priority.…”
    Get full text
    Article
  15. 1055

    Renal Biopsy Pathological Tissue Segmentation: A Comprehensive Review and Experimental Analysis by Yan Liu, Taiping Wang, Xinxin He, Wei Wang, Qiang He, Juan Jin

    Published 2025-01-01
    “…This study provides a novel technical framework for precise renal pathological tissue segmentation and lays the foundation for future lesion detection and intelligent diagnostic applications.…”
    Get full text
    Article
  16. 1056

    The RBF-FD and RBF-FDTD Methods for Solving Time-Domain Electrical Transient Problems in Power Systems by Duc-Quang Vu, Nhat-Nam Nguyen, Phan-Tu Vu

    Published 2023-01-01
    “…RBFs such as Gaussian (GA), Multiquadric (MQ), Inverse Quadric (IQ), and Inverse Multiquadric (IMQ) are used in these numerical methods to formulate the central finite difference approximations of the first- and second-order derivatives of a function. The algorithm of selecting “optimal” shape parameters for our basis functions is also applied, specifically to increase the accuracy of the suggested methods with regard to high accuracy needs. …”
    Get full text
    Article
  17. 1057

    Cultural Models of the Body Parts Hand and Hair in Hungarian Archaic Prayers by Judit Baranyiné Kóczy

    Published 2023-11-01
    “…The corpus of the study is Erdélyi’s collection of 321 archaic prayers (2013 [1976]), from which all representations of ‘hand’ and ‘hair’ are selected and conceptually analysed. The results show that 1) the figurative functions of the two body parts partly correspond to metaphors which are also found in secular Hungarian (e.g. hand for help, hand for care, hand for action); however, in the archaic prayers, they often take form in specific meanings (hand for help to get into heaven, hand for providence, hand for control); 2) their figurative uses strongly rely on cultural schemas which are attached to people and events. …”
    Get full text
    Article
  18. 1058

    The <i>Wang</i>–<i>Buwang</i> Sequence and Positive Forgetting in Early Confucian Texts by Gad C. Isay

    Published 2025-06-01
    “…Rather than signifying total erasure, for the purposes of the mnemic process, <i>wang</i> functions as a selective and creative mode, aiding cognitive refinement by withdrawing content considered secondary or extraneous. …”
    Get full text
    Article
  19. 1059

    Research on a traffic flow statistical algorithm based on YBOVDT and SAM2 by Yuanyuan Wang, Zheng Ding, Jiange Liu, Kexiao Wu, Md Sharid Kayes Dipu, Tingmei Ma, Yonghao Ma, Haiyan Zhang

    Published 2025-05-01
    “…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
    Get full text
    Article
  20. 1060

    FORMALIZATION OF INNOVATIVE PROCESSES OF FOOD TECHNOLOGY EQUIPMENT by Panfilov V.A.

    Published 2016-06-01
    “…The technology formalization includes the following steps: function formulation, prototype selection; creation of a tree of structural prototype evolution; elaboration and detailing of elements of the 1st and 2nd stages; transformation into the technical solution; feasibility and admissibility control; optimization of parameters, experimental testing, sale of the experimental batch of products; assessment of the effect expected, control of the application field of the product.…”
    Get full text
    Article