Search alternatives:
functions » function (Expand Search)
Showing 541 - 560 results of 2,583 for search '(( resources selection functions ) OR (( source OR sources) detection functions ))', query time: 0.27s Refine Results
  1. 541

    CHILDREN’S MAP READING ABILITIES IN RELATION TO DISTANCE PERCEPTION, TRAVEL TIME AND LANDSCAPE by Aikaterini APOSTOLOPOULOU, Aikaterini KLONARI

    Published 2022-01-01
    “… Children’s cognition of distance is influenced by functional distance and estimations of travel time which increases with the presence of natura l or artificial barriers. …”
    Get full text
    Article
  2. 542
  3. 543
  4. 544

    Cross-Domain Communication Method Based on Load Balancing for SDNs by Xiaomao Wang, Yi Zhou, Feng Dan, Xian Yang

    Published 2025-02-01
    “…Therefore, the multi-domain control plane needs to consider more network resource states during the path selection, such as link weights, load saturation, and resource occupancy rates, in order to select the optimal paths to maximize the satisfaction of data plane requirements while maintaining network load balance. …”
    Get full text
    Article
  5. 545

    A Wind Power Density Forecasting Model Based on RF-DBO-VMD Feature Selection and BiGRU Optimized by the Attention Mechanism by Bixiong Luo, Peng Zuo, Lijun Zhu, Wei Hua

    Published 2025-02-01
    “…This paper proposes a novel WPD forecasting model based on RF-DBO-VMD feature selection and BiGRU optimized by an attention mechanism. …”
    Get full text
    Article
  6. 546

    Implementation and Effectiveness of community-based resources to increase cervical cancer screening uptake among women living in sub-Saharan Africa: A protocol for systematic revie... by Danladi B Adamu, Nicole Robertson, David Weller, Christine Campbell

    Published 2019-08-01
    “… # Methods We will systematically search selected databases and websites from 1980 to date for published and grey literature including citation and reference list tracking, on studies with a community focus carried out in sub-Saharan Africa, without language restrictions. …”
    Get full text
    Article
  7. 547
  8. 548

    A High‐Quality Reference Genome and Comparative Genomics of the Widely Farmed Banded Cricket (Gryllodes sigillatus) Identifies Selective Breeding Targets by Shangzhe Zhang, Kristin R. Duffield, Bert Foquet, Jose L. Ramirez, Ben M. Sadd, Scott K. Sakaluk, John Hunt, Nathan W. Bailey

    Published 2025-03-01
    “…The high‐quality G. sigillatus genome assembly plus accompanying comparative genomic analyses serve as foundational resources for both applied and basic research on insect farming and behavioural biology, enabling researchers to pinpoint trait‐associated genetic variants, unravel functional pathways governing those phenotypes, and accelerate selective breeding efforts to increase the efficacy of large‐scale insect farming operations.…”
    Get full text
    Article
  9. 549
  10. 550
  11. 551
  12. 552
  13. 553

    A fuzzy track-to-track association algorithm with dynamic time warping for trajectory-level vehicle detection by Siqi Wan, Huaqiao Mu, Ke Han, Taesu Cheong, Chi Xie

    Published 2025-03-01
    “…Multi-source track-to-track association (TTTA), which identifies trajectories from multiple sensors or data sources of the same dynamic vehicle, is an important data fusion technique widely applied to vehicle detection in the fields of road, marine, and aviation transportation. …”
    Get full text
    Article
  14. 554

    Ibai mag blinds blindana tiuhan? (Luke 6,39). Pragmatic functions and syntactic strategies in the Gothic left sentence periphery by Marina Buzzoni

    Published 2025-01-01
    “…The interference role of the Greek and Latin source texts will also be taken into consideration, mainly in order to ascertain whether the grammaticalization processes which those elements underwent were either induced or implemented by the models. …”
    Get full text
    Article
  15. 555

    Ibai mag blinds blindana tiuhan? (Luke 6,39). Pragmatic functions and syntactic strategies in the Gothic left sentence periphery by Marina Buzzoni

    Published 2025-01-01
    “…The interference role of the Greek and Latin source texts will also be taken into consideration, mainly in order to ascertain whether the grammaticalization processes which those elements underwent were either induced or implemented by the models. …”
    Get full text
    Article
  16. 556

    Arlclustering: an R package for community detection in social networks based on user interaction and association rule learning by Mohamed El-Moussaoui, Mohamed Hanine, Ali Kartit, Tarik Agouti

    Published 2025-07-01
    “…Abstract ARLClustering is an open-source R package for community detection in social networks. …”
    Get full text
    Article
  17. 557

    Advancements in Nanostructured Functional Constituent Materials for Gas Sensing Applications: A Comprehensive Review by Ivana Panžić, Arijeta Bafti, Floren Radovanović-Perić, Davor Gašparić, Zhen Shi, Arie Borenstein, Vilko Mandić

    Published 2025-02-01
    “…By providing a comprehensive and up-to-date analysis, this review serves as a valuable resource for researchers and engineers, offering insights that can drive the next generation of high-performance, reliable, and selective gas sensors.…”
    Get full text
    Article
  18. 558

    Dynamic scheduling method of service function chain executors based on the mimic defense architecture by Chuanhuang LI, Jingjing TANG, Yangting CHEN, Rui LEI, Chao CHEN, Weiming WANG

    Published 2022-04-01
    “…Faced with the problem that static and lagging traditional defense technologies cannot effectively deal with new network attacks, according to the theory of mimetic security defense, a defense architecture of mimic service function chain (MSFC) based on the data forwarding level was proposed, and an execution dynamic scheduling method based on the decision feedback was further proposed.The method took the abnormal executor information fed back by the decision maker, the heterogeneity of executors and the actual load of the system as the scheduling influencing factors, so that the scheduling method can be adjusted adaptively according to the actual changes of the network.In addition, the scheduling method used decision feedback to adjust the scheduling time, so as to achieve the best balance between system cost and security, and reduce the resource overhead of the system.Simulation results showed that the scheduling method can select a set of highly heterogeneous actuators that better meet the current network requirements on the basis of balancing the system cost and security, so as to improve the security and reliability of the system.…”
    Get full text
    Article
  19. 559

    SOFTWARE COMPONENT DEVELOPMENT FOR PARALLEL GATEWAYS DETECTION AND QUALITY ASSESSMENT IN BPMN MODELS USING FUZZY LOGIC by Andrii Kopp, Ľuboš Cibák, Dmytro Orlovskyi, Dmytro Kudii

    Published 2025-07-01
    “…A set of 3729 BPMN models from the Camunda open source repository was used for experimental calculations. …”
    Get full text
    Article
  20. 560