Showing 581 - 600 results of 2,583 for search '(( resources selection functions ) OR (( source OR sources) detection function ))', query time: 0.32s Refine Results
  1. 581
  2. 582

    Looking at the Distant Universe with the MeerKAT Array: The H i Mass Function in the Local Universe by Amir Kazemi-Moridani, Andrew J. Baker, Marc Verheijen, Eric Gawiser, Sarah-Louise Blyth, Danail Obreschkow, Laurent Chemin, Jordan D. Collier, Kyle W. Cook, Jacinta Delhaize, Ed Elson, Bradley S. Frank, Marcin Glowacki, Kelley M. Hess, Benne W. Holwerda, Zackary L. Hutchens, Matt J. Jarvis, Melanie Kaasinen, Sphesihle Makhathini, Abhisek Mohapatra, Hengxing Pan, Anja C. Schröder, Leyya Stockenstroom, Mattia Vaccari, Tobias Westmeier, John F. Wu, Martin Zwaan

    Published 2025-01-01
    “…This new method tracks the recovery of sources in mass bins different from those in which they were injected and incorporates a Poisson likelihood in the forward modeling process, allowing it to correctly handle uncertainties in bins with few or no detections. …”
    Get full text
    Article
  3. 583
  4. 584
  5. 585

    An investigation of the distribution of gaze estimation errors in head mounted gaze trackers using polynomial functions by Diako Mardanbegi, Andrew T. N. Kurauchi, Carlos H. Morimoto

    Published 2018-06-01
    “…In this paper we investigate the behavior of the gaze estimation error distribution throughout the image of the scene camera when using polynomial functions. Using simulated scenarios, we describe effects of four different sources of error: interpolation, extrapolation, parallax, and radial distortion. …”
    Get full text
    Article
  6. 586
  7. 587

    Fuzzy-Based Novel Cross-Layer RPL Objective Function for Energy-Aware Routing in IoT by M. R. Poornima, H. S. Vimala, J. Shreyas

    Published 2025-07-01
    “…Abstract Energy consumption remains a critical challenge for low-power, resource-constrained Internet of Things (IoT) devices operating over Low-Power and Lossy Networks (LLNs). …”
    Get full text
    Article
  8. 588
  9. 589

    5G network slicing function migration mechanism based on particle swarm optimization algorithm by Qiang CHEN, Caixia LIU, Lingshu LI

    Published 2018-08-01
    “…In multi-application scenarios of 5G,data traffic often increases dramatically.Virtual machine resources in network slicing may not meet the normal needs of users.In view of this,a network slicing function migration mechanism aiming at load balancing was proposed.The mechanism simulates the virtual machine into particles based on particle swarm optimization algorithm.In the process of migration,all particles were divided into several subgroups,and particle swarm optimization algorithm was applied within and among groups.According to the historical optimal solution and the current global optimal solution,the particle location was updated,and the best target particles were determined by selecting the smaller particle size of the particle in real time.The mechanism not only improves the convergence speed,but also improves the accuracy of the algorithm.Compared with other migration methods,the results show that the proposed migration mechanism has the advantages of high accuracy and fast convergence.And it can also improve the efficiency of resource utilization,reduce the energy consumption of data center,and has better adaptability.…”
    Get full text
    Article
  10. 590
  11. 591

    Shelf-Life Evaluation of a Novel Functional Product from a Blend of Powdered Vegetables by Aisha Idris Ali, Virginia Paul, Munir Abba Dandago, Fatima Idris Ali, Daniel Amiteye

    Published 2023-06-01
    “… Perishable fresh vegetables that do not meet cosmetic standards and other crop waste rich resources are presently wasted. Mangifera indica leaves, Psidium guajava leaves, Petroselinum crispum leaves and Daucus carota were selected as model vegetables to show that they can be converted into a shelf-stable novel functional powdered product. …”
    Get full text
    Article
  12. 592

    Proteolysis and volatile compounds in Mediterranean buffalo milk blue cheese: Quality determinants and functional peptides by Federica Della Cerra, Giuseppina Garro, Rosaria Cozzolino, Sabrina De Pascale, Mariapia Esposito, Gianluca Picariello, Simonetta Caira, Andrea Scaloni, Francesca Marino, Francesco Addeo

    Published 2025-06-01
    “…This study explores the proteolytic changes and volatile organic compound (VOC) profiles occurring during the ripening of Mediterranean buffalo milk blue cheese.The main objective was to characterize bioactive peptides, casein phosphopeptides, and volatile compounds and to assess their potential implications for functional food development.Peptide profiling was conducted using nanoLC-ESI-MS/MS and MALDI-TOF-MS, while VOCs were analyzed via headspace solid-phase microextraction coupled with gas chromatography-mass spectrometry (HS-SPME)-GC-MS.β-casein emerged as the predominant source of bioactive peptides, including sequences with predicted ACE-inhibitory, antimicrobial, and antioxidant activities. …”
    Get full text
    Article
  13. 593
  14. 594
  15. 595

    The structural and functional brain alternations in tobacco use disorder: a systematic review and meta-analysis by Longyao Ma, Longyao Ma, Qiuying Tao, Qiuying Tao, Jinghan Dang, Jinghan Dang, Jieping Sun, Jieping Sun, Xiaoyu Niu, Xiaoyu Niu, Mengzhe Zhang, Mengzhe Zhang, Yimeng Kang, Yimeng Kang, Weijian Wang, Weijian Wang, Jingliang Cheng, Jingliang Cheng, Yong Zhang, Yong Zhang

    Published 2025-04-01
    “…BackgroundWhile numerous previous studies have indicated that nicotine intake results in gray matter and functional brain abnormalities in tobacco use disorder (TUD), the majority of results could not be replicated or even reversed. …”
    Get full text
    Article
  16. 596
  17. 597

    The availability and functionality of medical equipment and the barriers to their use at comprehensive specialized hospitals in the Amhara region, Ethiopia by Alem Endeshaw Woldeyohanins, Nigatu Mihretu Molla, Abibo Wondie Mekonen, Abrham Wondimu

    Published 2025-01-01
    “…Eight (n = 8) comprehensive specialized hospitals in the Amhara region were selected purposefully and included in this study. The data used to assess the availability and functionality of medical equipment items (n = 78) listed by the Ethiopian Ministry of Health that are supposed to be available in all of the comprehensive specialized hospitals were collected from 29 May to 18 June 2023. …”
    Get full text
    Article
  18. 598

    System Eliminating Emergency Discharges in Industrial Facilities Waste Waters Using Relative Signal Description by V. A. Alekseev, S. I. Yuran, V. P. Usoltsev, D. N. Shulmin

    Published 2022-07-01
    “…Due to installation of laser radiation sources along the perimeter of the pipe along which the liquid moves, simultaneous laser action on the emergency clot of harmful substances passing through the pipe is ensured. …”
    Get full text
    Article
  19. 599

    Enhancing Cybersecurity Through Fusion of Optimization With Deep Wavelet Neural Networks on Denial of Wallet Attack Detection in Serverless Computing by P. Renukadevi, Sibi Amaran, A. Vikram, T. Prabhakara Rao, Mohamad Khairi Ishak

    Published 2025-01-01
    “…A Denial of Wallet (DoW) attack is a cyberattack designed to drain financial resources by causing excessive charges or costs on a serverless computing or cloud platform. …”
    Get full text
    Article
  20. 600

    Using multiple scales of movement to highlight risk–reward strategies of coyotes (Canis latrans) in mixed‐use landscapes by Amy Van Scoyoc, Kendall L. Calhoun, Justin S. Brashares

    Published 2024-08-01
    “…We used resource selection functions and hidden Markov models to test whether coyote selection for anthropogenic and natural features varied by time of day or by behavioral state (resting, foraging, and traveling). …”
    Get full text
    Article