Showing 561 - 580 results of 2,583 for search '(( resources selection function ) OR (( source OR sources) detection function ))', query time: 0.41s Refine Results
  1. 561

    Implementation of a Smart Home Intruder Detection System using a Vibrometer and ESP 32 CAM by Samuel Owoeye, Folasade Durodola, Adekunle Oyelami, Racheal Oladejo, Samuel Obasuyi, Ademola Qasim, Joshua Ogundairo

    Published 2025-01-01
    “…The topic of security is quite important; hence this paper presents the development and implementation of a Smart Intruder Detection System utilizing the ESP32-CAM board, the Vibrometer and the ATMega328P microcontroller to enhance lighting, security, and surveillance functionalities. …”
    Get full text
    Article
  2. 562
  3. 563
  4. 564
  5. 565
  6. 566
  7. 567
  8. 568
  9. 569

    Enhancing Cybersecurity Through Fusion of Optimization With Deep Wavelet Neural Networks on Denial of Wallet Attack Detection in Serverless Computing by P. Renukadevi, Sibi Amaran, A. Vikram, T. Prabhakara Rao, Mohamad Khairi Ishak

    Published 2025-01-01
    “…A Denial of Wallet (DoW) attack is a cyberattack designed to drain financial resources by causing excessive charges or costs on a serverless computing or cloud platform. …”
    Get full text
    Article
  10. 570

    Looking at the Distant Universe with the MeerKAT Array: The H i Mass Function in the Local Universe by Amir Kazemi-Moridani, Andrew J. Baker, Marc Verheijen, Eric Gawiser, Sarah-Louise Blyth, Danail Obreschkow, Laurent Chemin, Jordan D. Collier, Kyle W. Cook, Jacinta Delhaize, Ed Elson, Bradley S. Frank, Marcin Glowacki, Kelley M. Hess, Benne W. Holwerda, Zackary L. Hutchens, Matt J. Jarvis, Melanie Kaasinen, Sphesihle Makhathini, Abhisek Mohapatra, Hengxing Pan, Anja C. Schröder, Leyya Stockenstroom, Mattia Vaccari, Tobias Westmeier, John F. Wu, Martin Zwaan

    Published 2025-01-01
    “…This new method tracks the recovery of sources in mass bins different from those in which they were injected and incorporates a Poisson likelihood in the forward modeling process, allowing it to correctly handle uncertainties in bins with few or no detections. …”
    Get full text
    Article
  11. 571

    Functions and Obstacles of Nurse Leadership in Disaster Management in West Sulawesi, Indonesia: A Qualitative Study by Edi Purnomo, Achir Yani S. Hamid, Dewi Gayatri, Agus Setiawan

    Published 2025-04-01
    “…Results: The analysis identified 4 primary categories and 9 subcategories: 1) Personnel direction function (providing instructions and directions, motivating and empowering members), 2) Staffing function (availability of human resources, addition and development of human resources), 3) Conflict of functions in family and profession (role and responsibilities in family, demands of the profession), 4) Advocacy, coordination, and communication functions (cross-sectoral advocacy, inter-institutional synchronization, and communication channels and media).  …”
    Get full text
    Article
  12. 572
  13. 573
  14. 574

    An investigation of the distribution of gaze estimation errors in head mounted gaze trackers using polynomial functions by Diako Mardanbegi, Andrew T. N. Kurauchi, Carlos H. Morimoto

    Published 2018-06-01
    “…In this paper we investigate the behavior of the gaze estimation error distribution throughout the image of the scene camera when using polynomial functions. Using simulated scenarios, we describe effects of four different sources of error: interpolation, extrapolation, parallax, and radial distortion. …”
    Get full text
    Article
  15. 575
  16. 576

    Fuzzy-Based Novel Cross-Layer RPL Objective Function for Energy-Aware Routing in IoT by M. R. Poornima, H. S. Vimala, J. Shreyas

    Published 2025-07-01
    “…Abstract Energy consumption remains a critical challenge for low-power, resource-constrained Internet of Things (IoT) devices operating over Low-Power and Lossy Networks (LLNs). …”
    Get full text
    Article
  17. 577
  18. 578

    TIME-UNIT SHIFTING IN 3-PERSON GAMES IN FINITE AND UNCOUNTABLY INFINITE STAIRCASE-FUNCTION SPACES SOLVED IN PURE STRATEGIES by Вадим Романюк

    Published 2025-04-01
    “…Games played with staircase-function pure strategies can model discrete-time dynamics of rationalizing the distribution of some limited resources among players. …”
    Get full text
    Article
  19. 579

    5G network slicing function migration mechanism based on particle swarm optimization algorithm by Qiang CHEN, Caixia LIU, Lingshu LI

    Published 2018-08-01
    “…In multi-application scenarios of 5G,data traffic often increases dramatically.Virtual machine resources in network slicing may not meet the normal needs of users.In view of this,a network slicing function migration mechanism aiming at load balancing was proposed.The mechanism simulates the virtual machine into particles based on particle swarm optimization algorithm.In the process of migration,all particles were divided into several subgroups,and particle swarm optimization algorithm was applied within and among groups.According to the historical optimal solution and the current global optimal solution,the particle location was updated,and the best target particles were determined by selecting the smaller particle size of the particle in real time.The mechanism not only improves the convergence speed,but also improves the accuracy of the algorithm.Compared with other migration methods,the results show that the proposed migration mechanism has the advantages of high accuracy and fast convergence.And it can also improve the efficiency of resource utilization,reduce the energy consumption of data center,and has better adaptability.…”
    Get full text
    Article
  20. 580