Showing 281 - 300 results of 2,583 for search '(( resources selection function ) OR (( source OR sources) detection function ))', query time: 0.34s Refine Results
  1. 281

    Human Resource Management in Public Administration: The Ongoing Tension Between Reform Requirements and Resistance to Change by Branka Zolak Poljašević, Ana Marija Gričnik, Simona Šarotar Žižek

    Published 2025-03-01
    “…Human resource management (HRM) plays a critical role in shaping public administration by ensuring the efficiency, effectiveness, and adaptability of public institutions. …”
    Get full text
    Article
  2. 282

    An Overview of Selected Tools and Strategies for Agricultural Land Protection in Slovakia and the European Union by Machničová Zina

    Published 2022-07-01
    “…Agricultural land, as a component of the environment, is one of the irreplaceable natural resources and, at the same time, through its functions, is an integral part of the quality of human lives. …”
    Get full text
    Article
  3. 283

    On the impact of nuclear fusion power plants deployment on selected critical materials consumption by D.N. Dongiovanni, Y. Melese, F. Gracceva, C. Bustreo, A. von Müller

    Published 2025-07-01
    “…All these materials have been selected in literature as “critical raw materials” for fusion.An analysis of the possible impact of nuclear fusion power plants penetration in the energy market in terms of material resources consumption is proposed in this paper. …”
    Get full text
    Article
  4. 284

    Software Component Selection Based on Quality Criteria Using the Analytic Network Process by Shah Nazir, Sajid Anwar, Sher Afzal Khan, Sara Shahzad, Muhammad Ali, Rohul Amin, Muhammad Nawaz, Pavlos Lazaridis, John Cosmas

    Published 2014-01-01
    “…Software component reusability is an indispensable part of component based software development life cycle (CBSDLC), which consumes a significant amount of organization’s resources, that is, time and effort. It is convenient in component based software system (CBSS) to select the most suitable and appropriate software components that provide all the required functionalities. …”
    Get full text
    Article
  5. 285
  6. 286

    Scale‐dependence in elk habitat selection for a reintroduced population in Wisconsin, USA by Jennifer L. Merems, Anna L. Brose, Jennifer Price Tack, Shawn Crimmins, Timothy R. Van Deelen

    Published 2024-10-01
    “…We tested scale‐dependent habitat selection on 79 adult elk from 2017 to 2020 using resource selection functions across temporal (i.e., seasonal) and spatial scales (i.e., landscape and home range). …”
    Get full text
    Article
  7. 287

    Contextual Vulnerability Should Guide Fair Subject Selection in Xenotransplantation Clinical Trials by Gianna Strand

    Published 2023-03-01
    “…[xiii] UW Medicine Harborview Medical Center – UW Medical Center University of Washington Physicians, Selection Criteria: Kidney Transplant Recipient (Seattle, WA, 2019), 1-3, https://www.uwmedicine.org/sites/stevie/files/2020-11/UW-Medicine-Kidney-Selection-Criteria-UH2701.pdf; Penn Medicine, Kidney Transplant Selection Criteria (Philadelphia, PA: Hospital of the University of Pennsylvania), 1-2. https://www.pennmedicine.org/media/documents/instructions/transplant/kidney_transplant_selection_criteria.ashx. …”
    Get full text
    Article
  8. 288

    Technical Concept of Depot Location Selection and Over Station Development Property Matchability by JIANG Zhihua, ZHU Ying

    Published 2025-06-01
    “…[Result & Conclusion] It is suggested that the functional principle of depot location selection in terms of transportation needs should be supplemented and clarified in the relevant design regulations, in other words, the relevant urban rail transit design regulations should add the technical concepts that ′depots should be preferentially connected to stations with a higher frequency of train departures and arrivals or to turn-back stations′; the depot location should be ′scientifically selected′, and OSD should be cautiously decided; it is necessary to investigate the activation path and renovate the built but idle OSD, realizing both open resource efficiency increase and urban landscape beautification.…”
    Get full text
    Article
  9. 289

    Deep Reinforcement Learning With Dueling DQN for Partial Computation Offloading and Resource Allocation in Mobile Edge Computing by Ehzaz Mustafa, Junaid Shuja, Faisal Rehman, Abdallah Namoun, Mazhar Ali, Abdullah Alourani

    Published 2025-01-01
    “…Computation offloading transfers resource-intensive tasks from local Internet of Things (IoT) devices to powerful edge servers, which minimizes latency and reduces the computational load on IoT devices. …”
    Get full text
    Article
  10. 290

    Sustainable Materials Enabled Terahertz Functional Devices by Baoning Wang, Haolan Wang, Ying Bao, Waqas Ahmad, Wenhui Geng, Yibin Ying, Wendao Xu

    Published 2025-04-01
    “…Highlights Sources and types of sustainable materials and their advantages in fabricating high performance terahertz (THz) functional devices are systematically reviewed. …”
    Get full text
    Article
  11. 291

    Web 2.0 as Catalyst: Virtually Reaching Out to Users and Connecting Them to Library Resources and Services. by Norah Xiao

    Published 2008-11-01
    “…These Web 2.0 technologies function as catalysts which help lower human barriers between my users and me, enable me to reach my users virtually, and attract users to resources from the library as well as various services I provided [ABSTRACT FROM AUTHOR] …”
    Get full text
    Article
  12. 292

    Dietary Niche Variation in an Invasive Omnivore: The Effects of Habitat on Feral Pig Resource Use in Hawai‘i by Michael S. Peyton, Kealohanuiopuna M. Kinney, Sarah Knox, Grace Tredennick, Sara Hotchkiss

    Published 2024-10-01
    “…ABSTRACT Invasive omnivores may have profound impacts on ecological communities through diet selection, particularly when their functional roles differ from those in their native range. …”
    Get full text
    Article
  13. 293

    Hardcoded vulnerability detection approach for IoT device firmware by Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU

    Published 2022-10-01
    “…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
    Get full text
    Article
  14. 294

    Optimization of D2D emergency communication resources for UAV relay based on DA-STD3 by Xiaofang Deng, Zijian Deng, Lin Zheng, Chao Yang, Chuanxu Chen

    Published 2024-11-01
    “…By designing the reward function and training mechanism, we can achieve good power control and reduce communication interference. …”
    Get full text
    Article
  15. 295
  16. 296
  17. 297
  18. 298

    Infrared Satellite Detection Limits for Monitoring Atmospheric Ammonia by Mark W. Shephard, Shailesh K. Kharol, Enrico Dammers, Christopher E. Sioris, Andrew Bell, Rik Jansen, Jerome Caron, Ralph Snel, Emanuela Palombo, Karen E. Cady-Pereira, Chris A. McLinden, Erik Lutsch, Robert O. Knuteson

    Published 2025-01-01
    “…Information on the frequency of a given detection limit, and the cumulative probability of detection, are provided as a function of instrument spectral resolution and noise. …”
    Get full text
    Article
  19. 299
  20. 300

    Educational content selection in human rights education at the early childhood education and care level by Anette Ringen Rosenberg

    Published 2025-07-01
    “…It aims to discuss the function of four content selection dimensions for discussing HRE content at the ECEC level. …”
    Get full text
    Article