Showing 741 - 760 results of 3,583 for search '(( sources detection functions\ ) OR (( resource OR source) selection function\ ))', query time: 0.23s Refine Results
  1. 741
  2. 742
  3. 743

    Intelligent Firefighting Technology for Drone Swarms with Multi-Sensor Integrated Path Planning: YOLOv8 Algorithm-Driven Fire Source Identification and Precision Deployment Strateg... by Bingxin Yu, Shengze Yu, Yuandi Zhao, Jin Wang, Ran Lai, Jisong Lv, Botao Zhou

    Published 2025-05-01
    “…This study aims to improve the accuracy of fire source detection, the efficiency of path planning, and the precision of firefighting operations in drone swarms during fire emergencies. …”
    Get full text
    Article
  4. 744
  5. 745

    The Relationship Between Soil and Gut Microbiota Influences the Adaptive Strategies of Goitered Gazelles in the Qaidam Basin by Yiran Wang, Bin Li, Bo Xu, Wen Qin

    Published 2024-12-01
    “…Interactions with soil microbiota can shape the composition and function of the gut microbiota, thereby influencing the hosts’ adaptive strategies. …”
    Get full text
    Article
  6. 746
  7. 747

    Objective Function Formulation to Optimize Control Structure Parameters Using Nature-Inspired Optimization Algorithms by Rafal Szczepanski, Krystian Erwinski, Tomasz Tarczewski

    Published 2025-06-01
    “…Moreover, the possibilities of formulating objective functions for nature-inspired optimization algorithms that can be successfully used to solve multi-objective constrained optimization problems are presented. …”
    Get full text
    Article
  8. 748

    Ibai mag blinds blindana tiuhan? (Luke 6,39). Pragmatic functions and syntactic strategies in the Gothic left sentence periphery by Marina Buzzoni

    Published 2025-01-01
    “…The interference role of the Greek and Latin source texts will also be taken into consideration, mainly in order to ascertain whether the grammaticalization processes which those elements underwent were either induced or implemented by the models. …”
    Get full text
    Article
  9. 749

    Ibai mag blinds blindana tiuhan? (Luke 6,39). Pragmatic functions and syntactic strategies in the Gothic left sentence periphery by Marina Buzzoni

    Published 2025-01-01
    “…The interference role of the Greek and Latin source texts will also be taken into consideration, mainly in order to ascertain whether the grammaticalization processes which those elements underwent were either induced or implemented by the models. …”
    Get full text
    Article
  10. 750

    SOFTWARE COMPONENT DEVELOPMENT FOR PARALLEL GATEWAYS DETECTION AND QUALITY ASSESSMENT IN BPMN MODELS USING FUZZY LOGIC by Andrii Kopp, Ľuboš Cibák, Dmytro Orlovskyi, Dmytro Kudii

    Published 2025-07-01
    “…This features are evaluated using “soft” modeling rules based on fuzzy membership functions. Additionally, an activation function with the 0.5 threshold is used to generate binary quality indicators and calculate an integral quality assessment measure. …”
    Get full text
    Article
  11. 751
  12. 752

    A fuzzy track-to-track association algorithm with dynamic time warping for trajectory-level vehicle detection by Siqi Wan, Huaqiao Mu, Ke Han, Taesu Cheong, Chi Xie

    Published 2025-03-01
    “…Multi-source track-to-track association (TTTA), which identifies trajectories from multiple sensors or data sources of the same dynamic vehicle, is an important data fusion technique widely applied to vehicle detection in the fields of road, marine, and aviation transportation. …”
    Get full text
    Article
  13. 753

    How mindfulness-based training improves stress-related health: a selective review of randomized clinical trials comparing psychological mechanisms of action by Lara M. C. Puhlmann, Lara M. C. Puhlmann, Lara M. C. Puhlmann, Veronika Engert, Veronika Engert, Veronika Engert

    Published 2025-08-01
    “…We examine two comparative frameworks, the prominent Monitor and Acceptance Theory (MAT) and the ReSource training program, an intervention protocol designed to disentangle mindfulness components in a large-scale mental training project. …”
    Get full text
    Article
  14. 754

    Fuzzy-Based Novel Cross-Layer RPL Objective Function for Energy-Aware Routing in IoT by M. R. Poornima, H. S. Vimala, J. Shreyas

    Published 2025-07-01
    “…Abstract Energy consumption remains a critical challenge for low-power, resource-constrained Internet of Things (IoT) devices operating over Low-Power and Lossy Networks (LLNs). …”
    Get full text
    Article
  15. 755

    Feature engineering for fault detection and diagnosis in Power Transmission Lines using a tree-based approach by Hassan N. Noura, Zaid Allal, Ola Salman, Khaled Chahine

    Published 2025-06-01
    “…The training time did not exceed 0.5 s for fault detection and 0.3 s for fault diagnosis. This swift convergence, coupled with the minimal training times, underscores the efficiency of the proposed feature engineering process and the selected classifiers.…”
    Get full text
    Article
  16. 756

    Arlclustering: an R package for community detection in social networks based on user interaction and association rule learning by Mohamed El-Moussaoui, Mohamed Hanine, Ali Kartit, Tarik Agouti

    Published 2025-07-01
    “…Abstract ARLClustering is an open-source R package for community detection in social networks. …”
    Get full text
    Article
  17. 757
  18. 758

    Fracture maturity controls the complexity of earthquake rupture: evidence from source processes of six moderate earthquakes during swarm activities off the east coast of Izu Penins... by Yukako Tanaka, Takuji Yamada

    Published 2025-08-01
    “…We first selected waveforms of smaller earthquakes (Mw3.4–3.9) as empirical Green’s functions and carried out the waveform inversion with 200 time windows for two horizontal components of 10-s-long K-net waveforms. …”
    Get full text
    Article
  19. 759

    Hybrid Deep Neural Network Optimization with Particle Swarm and Grey Wolf Algorithms for Sunburst Attack Detection by Mohammad Almseidin, Amjad Gawanmeh, Maen Alzubi, Jamil Al-Sawwa, Ashraf S. Mashaleh, Mouhammd Alkasassbeh

    Published 2025-03-01
    “…The strength of DNNs is derived from their ability to model complex functions and to improve detection engines through deeper architecture. …”
    Get full text
    Article
  20. 760