Showing 281 - 300 results of 2,583 for search '(( resource selection function ) OR (( source OR sources) detection functions ))', query time: 0.32s Refine Results
  1. 281

    Systematic investigation of photon strength functions with monochromatic γ-ray beams by Gheorghe Ioana, Aumann Thomas, Baumann Martin, van Beek Patrick, Kuchenbrod Philipp, Lalić Nikolina, Scheit Heiko, Symochko Dmytro, Wang Hongwei, Fan Gongtao, Nishio Katsuhisa, Ohtsuki Tsutomu, Suzaki Fumi, Hirose Kentaro, Inagaki Makoto, Ari-izumi Takashi, Garrote Frank L. Bello, Bjørøen Marianne, Eriksen Tomas, Ingeberg Vetle Wegner, Paulsen Wanja, Pedersen Line G., Reaz Fardous, Belyshev Sergey, Stopani Konstantin, Lui Yiu-Wing, Filipescu Dan, Tudora Anabella, Goriely Stephane, Miyamoto Shuji, Utsunomiya Hiroaki

    Published 2025-01-01
    “…Following the main objective of the IAEA Coordinated Research Project on Photonuclear Data and Photon Strength Functions (Code F41032; Duration 2016-2019), new measurements of photoneutron and photofission cross sections in the Giant Dipole Resonance energy region have been performed at the laser Compton-scattering γ-ray source of the NewSUBARU synchrotron radiation facility. …”
    Get full text
    Article
  2. 282

    Technical Concept of Depot Location Selection and Over Station Development Property Matchability by JIANG Zhihua, ZHU Ying

    Published 2025-06-01
    “…[Result & Conclusion] It is suggested that the functional principle of depot location selection in terms of transportation needs should be supplemented and clarified in the relevant design regulations, in other words, the relevant urban rail transit design regulations should add the technical concepts that ′depots should be preferentially connected to stations with a higher frequency of train departures and arrivals or to turn-back stations′; the depot location should be ′scientifically selected′, and OSD should be cautiously decided; it is necessary to investigate the activation path and renovate the built but idle OSD, realizing both open resource efficiency increase and urban landscape beautification.…”
    Get full text
    Article
  3. 283

    Scale‐dependence in elk habitat selection for a reintroduced population in Wisconsin, USA by Jennifer L. Merems, Anna L. Brose, Jennifer Price Tack, Shawn Crimmins, Timothy R. Van Deelen

    Published 2024-10-01
    “…We tested scale‐dependent habitat selection on 79 adult elk from 2017 to 2020 using resource selection functions across temporal (i.e., seasonal) and spatial scales (i.e., landscape and home range). …”
    Get full text
    Article
  4. 284
  5. 285

    Contextual Vulnerability Should Guide Fair Subject Selection in Xenotransplantation Clinical Trials by Gianna Strand

    Published 2023-03-01
    “…[xiii] UW Medicine Harborview Medical Center – UW Medical Center University of Washington Physicians, Selection Criteria: Kidney Transplant Recipient (Seattle, WA, 2019), 1-3, https://www.uwmedicine.org/sites/stevie/files/2020-11/UW-Medicine-Kidney-Selection-Criteria-UH2701.pdf; Penn Medicine, Kidney Transplant Selection Criteria (Philadelphia, PA: Hospital of the University of Pennsylvania), 1-2. https://www.pennmedicine.org/media/documents/instructions/transplant/kidney_transplant_selection_criteria.ashx. …”
    Get full text
    Article
  6. 286
  7. 287

    An Overview of Selected Tools and Strategies for Agricultural Land Protection in Slovakia and the European Union by Machničová Zina

    Published 2022-07-01
    “…Agricultural land, as a component of the environment, is one of the irreplaceable natural resources and, at the same time, through its functions, is an integral part of the quality of human lives. …”
    Get full text
    Article
  8. 288

    Software Component Selection Based on Quality Criteria Using the Analytic Network Process by Shah Nazir, Sajid Anwar, Sher Afzal Khan, Sara Shahzad, Muhammad Ali, Rohul Amin, Muhammad Nawaz, Pavlos Lazaridis, John Cosmas

    Published 2014-01-01
    “…Software component reusability is an indispensable part of component based software development life cycle (CBSDLC), which consumes a significant amount of organization’s resources, that is, time and effort. It is convenient in component based software system (CBSS) to select the most suitable and appropriate software components that provide all the required functionalities. …”
    Get full text
    Article
  9. 289

    On the impact of nuclear fusion power plants deployment on selected critical materials consumption by D.N. Dongiovanni, Y. Melese, F. Gracceva, C. Bustreo, A. von Müller

    Published 2025-07-01
    “…All these materials have been selected in literature as “critical raw materials” for fusion.An analysis of the possible impact of nuclear fusion power plants penetration in the energy market in terms of material resources consumption is proposed in this paper. …”
    Get full text
    Article
  10. 290
  11. 291

    Deep Reinforcement Learning With Dueling DQN for Partial Computation Offloading and Resource Allocation in Mobile Edge Computing by Ehzaz Mustafa, Junaid Shuja, Faisal Rehman, Abdallah Namoun, Mazhar Ali, Abdullah Alourani

    Published 2025-01-01
    “…Computation offloading transfers resource-intensive tasks from local Internet of Things (IoT) devices to powerful edge servers, which minimizes latency and reduces the computational load on IoT devices. …”
    Get full text
    Article
  12. 292

    Sustainable Materials Enabled Terahertz Functional Devices by Baoning Wang, Haolan Wang, Ying Bao, Waqas Ahmad, Wenhui Geng, Yibin Ying, Wendao Xu

    Published 2025-04-01
    “…Highlights Sources and types of sustainable materials and their advantages in fabricating high performance terahertz (THz) functional devices are systematically reviewed. …”
    Get full text
    Article
  13. 293

    Functional Data Analysis for Prediction of Employee Presence by Nouhaila Goujili, Matthieu Saumard, Nicolas Cochard, Maher Jridi

    Published 2025-01-01
    “…This paper proposes a robust approach combining functional data analysis with the integration of exogenous variables adapted to time series (RobFTS). …”
    Get full text
    Article
  14. 294

    Web 2.0 as Catalyst: Virtually Reaching Out to Users and Connecting Them to Library Resources and Services. by Norah Xiao

    Published 2008-11-01
    “…These Web 2.0 technologies function as catalysts which help lower human barriers between my users and me, enable me to reach my users virtually, and attract users to resources from the library as well as various services I provided [ABSTRACT FROM AUTHOR] …”
    Get full text
    Article
  15. 295

    Dietary Niche Variation in an Invasive Omnivore: The Effects of Habitat on Feral Pig Resource Use in Hawai‘i by Michael S. Peyton, Kealohanuiopuna M. Kinney, Sarah Knox, Grace Tredennick, Sara Hotchkiss

    Published 2024-10-01
    “…ABSTRACT Invasive omnivores may have profound impacts on ecological communities through diet selection, particularly when their functional roles differ from those in their native range. …”
    Get full text
    Article
  16. 296
  17. 297

    Hardcoded vulnerability detection approach for IoT device firmware by Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU

    Published 2022-10-01
    “…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
    Get full text
    Article
  18. 298

    Optimization of D2D emergency communication resources for UAV relay based on DA-STD3 by Xiaofang Deng, Zijian Deng, Lin Zheng, Chao Yang, Chuanxu Chen

    Published 2024-11-01
    “…By designing the reward function and training mechanism, we can achieve good power control and reduce communication interference. …”
    Get full text
    Article
  19. 299
  20. 300

    Forecasting dengue in Bangladesh using meteorological variables with a novel feature selection approach by Mahadee Al Mobin

    Published 2024-12-01
    “…A novel wrapper feature selection algorithm employing a custom objective function is proposed in this study, which significantly improves model accuracy by 12.63% and reduces the mean absolute percentage error by 70.82%. …”
    Get full text
    Article