Showing 281 - 300 results of 2,583 for search '(( resources selection functions ) OR (( source OR sources) detection function ))', query time: 0.34s Refine Results
  1. 281

    Productivity, activity of digestive and antioxidant enzymes of carp (Cyprinus carpio Linnaeus, 1758) as a result of the use of inulin in low-nutrient feeds by O. Deren, O. Dobrianska, M. Koryliak

    Published 2025-06-01
    “…At the end of the experimental feeding, the selected fish were analyzed for productive parameters, antioxidant and digestive enzyme activity using methods generally accepted in aquaculture. …”
    Get full text
    Article
  2. 282
  3. 283

    Human Resource Management in Public Administration: The Ongoing Tension Between Reform Requirements and Resistance to Change by Branka Zolak Poljašević, Ana Marija Gričnik, Simona Šarotar Žižek

    Published 2025-03-01
    “…Human resource management (HRM) plays a critical role in shaping public administration by ensuring the efficiency, effectiveness, and adaptability of public institutions. …”
    Get full text
    Article
  4. 284

    The quality of functioning in process-oriented organizations by Natalia Dominika Gumowska, Piotr Zaskórski

    Published 2024-09-01
    “…Research objectives and hypothesis/research questions The aim of this article is to identify quality criteria in the context of applying selected quality management techniques and technologies, as well as the role of resources, information systems, and IT tools. …”
    Get full text
    Article
  5. 285

    An Overview of Selected Tools and Strategies for Agricultural Land Protection in Slovakia and the European Union by Machničová Zina

    Published 2022-07-01
    “…Agricultural land, as a component of the environment, is one of the irreplaceable natural resources and, at the same time, through its functions, is an integral part of the quality of human lives. …”
    Get full text
    Article
  6. 286

    Scale‐dependence in elk habitat selection for a reintroduced population in Wisconsin, USA by Jennifer L. Merems, Anna L. Brose, Jennifer Price Tack, Shawn Crimmins, Timothy R. Van Deelen

    Published 2024-10-01
    “…We tested scale‐dependent habitat selection on 79 adult elk from 2017 to 2020 using resource selection functions across temporal (i.e., seasonal) and spatial scales (i.e., landscape and home range). …”
    Get full text
    Article
  7. 287
  8. 288

    On the impact of nuclear fusion power plants deployment on selected critical materials consumption by D.N. Dongiovanni, Y. Melese, F. Gracceva, C. Bustreo, A. von Müller

    Published 2025-07-01
    “…All these materials have been selected in literature as “critical raw materials” for fusion.An analysis of the possible impact of nuclear fusion power plants penetration in the energy market in terms of material resources consumption is proposed in this paper. …”
    Get full text
    Article
  9. 289

    Software Component Selection Based on Quality Criteria Using the Analytic Network Process by Shah Nazir, Sajid Anwar, Sher Afzal Khan, Sara Shahzad, Muhammad Ali, Rohul Amin, Muhammad Nawaz, Pavlos Lazaridis, John Cosmas

    Published 2014-01-01
    “…Software component reusability is an indispensable part of component based software development life cycle (CBSDLC), which consumes a significant amount of organization’s resources, that is, time and effort. It is convenient in component based software system (CBSS) to select the most suitable and appropriate software components that provide all the required functionalities. …”
    Get full text
    Article
  10. 290

    Adaptive Federated Learning With Reinforcement Learning-Based Client Selection for Heterogeneous Environments by Shamim Ahmed, M. Shamim Kaiser, Sudipto Chaki, A. B. M. Shawkat Ali

    Published 2025-01-01
    “…A multi-objective reward function, combining model accuracy and execution time, guides the RL agent toward performance- and efficiency-aware client selection. …”
    Get full text
    Article
  11. 291
  12. 292

    Contextual Vulnerability Should Guide Fair Subject Selection in Xenotransplantation Clinical Trials by Gianna Strand

    Published 2023-03-01
    “…[xiii] UW Medicine Harborview Medical Center – UW Medical Center University of Washington Physicians, Selection Criteria: Kidney Transplant Recipient (Seattle, WA, 2019), 1-3, https://www.uwmedicine.org/sites/stevie/files/2020-11/UW-Medicine-Kidney-Selection-Criteria-UH2701.pdf; Penn Medicine, Kidney Transplant Selection Criteria (Philadelphia, PA: Hospital of the University of Pennsylvania), 1-2. https://www.pennmedicine.org/media/documents/instructions/transplant/kidney_transplant_selection_criteria.ashx. …”
    Get full text
    Article
  13. 293

    Technical Concept of Depot Location Selection and Over Station Development Property Matchability by JIANG Zhihua, ZHU Ying

    Published 2025-06-01
    “…[Result & Conclusion] It is suggested that the functional principle of depot location selection in terms of transportation needs should be supplemented and clarified in the relevant design regulations, in other words, the relevant urban rail transit design regulations should add the technical concepts that ′depots should be preferentially connected to stations with a higher frequency of train departures and arrivals or to turn-back stations′; the depot location should be ′scientifically selected′, and OSD should be cautiously decided; it is necessary to investigate the activation path and renovate the built but idle OSD, realizing both open resource efficiency increase and urban landscape beautification.…”
    Get full text
    Article
  14. 294
  15. 295

    Sustainable Materials Enabled Terahertz Functional Devices by Baoning Wang, Haolan Wang, Ying Bao, Waqas Ahmad, Wenhui Geng, Yibin Ying, Wendao Xu

    Published 2025-04-01
    “…Highlights Sources and types of sustainable materials and their advantages in fabricating high performance terahertz (THz) functional devices are systematically reviewed. …”
    Get full text
    Article
  16. 296

    Dietary Niche Variation in an Invasive Omnivore: The Effects of Habitat on Feral Pig Resource Use in Hawai‘i by Michael S. Peyton, Kealohanuiopuna M. Kinney, Sarah Knox, Grace Tredennick, Sara Hotchkiss

    Published 2024-10-01
    “…ABSTRACT Invasive omnivores may have profound impacts on ecological communities through diet selection, particularly when their functional roles differ from those in their native range. …”
    Get full text
    Article
  17. 297
  18. 298

    Hardcoded vulnerability detection approach for IoT device firmware by Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU

    Published 2022-10-01
    “…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
    Get full text
    Article
  19. 299

    Simulation Analysis of Water Resource Scheduling in Nansu River Based on Coupled Water Quality-Quantity Model by HOU Xiang-dong, ZHAO Xiang-ling

    Published 2025-06-01
    “…[Objectives] With the socioeconomic development, conflicts among the population, water resources, and the environment have become increasingly prominent. …”
    Get full text
    Article
  20. 300

    Deep Reinforcement Learning With Dueling DQN for Partial Computation Offloading and Resource Allocation in Mobile Edge Computing by Ehzaz Mustafa, Junaid Shuja, Faisal Rehman, Abdallah Namoun, Mazhar Ali, Abdullah Alourani

    Published 2025-01-01
    “…Computation offloading transfers resource-intensive tasks from local Internet of Things (IoT) devices to powerful edge servers, which minimizes latency and reduces the computational load on IoT devices. …”
    Get full text
    Article