-
541
-
542
A fuzzy track-to-track association algorithm with dynamic time warping for trajectory-level vehicle detection
Published 2025-03-01“…Multi-source track-to-track association (TTTA), which identifies trajectories from multiple sensors or data sources of the same dynamic vehicle, is an important data fusion technique widely applied to vehicle detection in the fields of road, marine, and aviation transportation. …”
Get full text
Article -
543
Ibai mag blinds blindana tiuhan? (Luke 6,39). Pragmatic functions and syntactic strategies in the Gothic left sentence periphery
Published 2025-01-01“…The interference role of the Greek and Latin source texts will also be taken into consideration, mainly in order to ascertain whether the grammaticalization processes which those elements underwent were either induced or implemented by the models. …”
Get full text
Article -
544
Ibai mag blinds blindana tiuhan? (Luke 6,39). Pragmatic functions and syntactic strategies in the Gothic left sentence periphery
Published 2025-01-01“…The interference role of the Greek and Latin source texts will also be taken into consideration, mainly in order to ascertain whether the grammaticalization processes which those elements underwent were either induced or implemented by the models. …”
Get full text
Article -
545
Arlclustering: an R package for community detection in social networks based on user interaction and association rule learning
Published 2025-07-01“…Abstract ARLClustering is an open-source R package for community detection in social networks. …”
Get full text
Article -
546
Advancements in Nanostructured Functional Constituent Materials for Gas Sensing Applications: A Comprehensive Review
Published 2025-02-01“…By providing a comprehensive and up-to-date analysis, this review serves as a valuable resource for researchers and engineers, offering insights that can drive the next generation of high-performance, reliable, and selective gas sensors.…”
Get full text
Article -
547
Dynamic scheduling method of service function chain executors based on the mimic defense architecture
Published 2022-04-01“…Faced with the problem that static and lagging traditional defense technologies cannot effectively deal with new network attacks, according to the theory of mimetic security defense, a defense architecture of mimic service function chain (MSFC) based on the data forwarding level was proposed, and an execution dynamic scheduling method based on the decision feedback was further proposed.The method took the abnormal executor information fed back by the decision maker, the heterogeneity of executors and the actual load of the system as the scheduling influencing factors, so that the scheduling method can be adjusted adaptively according to the actual changes of the network.In addition, the scheduling method used decision feedback to adjust the scheduling time, so as to achieve the best balance between system cost and security, and reduce the resource overhead of the system.Simulation results showed that the scheduling method can select a set of highly heterogeneous actuators that better meet the current network requirements on the basis of balancing the system cost and security, so as to improve the security and reliability of the system.…”
Get full text
Article -
548
Identification of Genomic Variants and Candidate Genes for Reproductive Traits and Growth Traits in Pishan Red Sheep Using Whole-Genome Resequencing
Published 2025-05-01“…In this study, we performed whole-genome resequencing of Pishan red sheep, generating 9084.81 Gb of raw data and identifying 53,968,686 high-quality single-nucleotide polymorphisms (SNPs). Through selective sweep analysis, 92 genomic regions under selection were detected, containing 90 positional candidate genes significantly associated with growth, reproduction, and immune functions. …”
Get full text
Article -
549
SOFTWARE COMPONENT DEVELOPMENT FOR PARALLEL GATEWAYS DETECTION AND QUALITY ASSESSMENT IN BPMN MODELS USING FUZZY LOGIC
Published 2025-07-01“…A set of 3729 BPMN models from the Camunda open source repository was used for experimental calculations. …”
Get full text
Article -
550
pH-tuneable simultaneous and selective dye wastewater remediation with digestate-derived biochar: adsorption behaviour, mechanistic insights and potential application
Published 2025-09-01“…In this study, biochar prepared from digestate was subjected to nitric acid functionalization to enhance its adsorption capacity for organic dye mixtures of methylene blue and methyl red in synthetic wastewater. …”
Get full text
Article -
551
A Wind Power Density Forecasting Model Based on RF-DBO-VMD Feature Selection and BiGRU Optimized by the Attention Mechanism
Published 2025-02-01“…This paper proposes a novel WPD forecasting model based on RF-DBO-VMD feature selection and BiGRU optimized by an attention mechanism. …”
Get full text
Article -
552
-
553
-
554
Hybrid Deep Neural Network Optimization with Particle Swarm and Grey Wolf Algorithms for Sunburst Attack Detection
Published 2025-03-01“…The strength of DNNs is derived from their ability to model complex functions and to improve detection engines through deeper architecture. …”
Get full text
Article -
555
-
556
-
557
Studying grain color diversity in the barley collection of VIR
Published 2022-10-01Get full text
Article -
558
Computational Temporal Ghost Imaging Using Intensity-Only Detection Over a Single Optical Fiber
Published 2018-01-01“…We propose a method of computational temporal ghost imaging over a single optical fiber using simple optical intensity detection instead of coherent detection. The transfer function of a temporal ghost imaging system over a single optical fiber is derived, which is a function of the total fiber dispersion and the power density spectrum of the light source. …”
Get full text
Article -
559
-
560
Function over form: The benefits of aspen as surrogate brood‐rearing habitat for greater sage‐grouse
Published 2024-12-01Get full text
Article