Showing 81 - 100 results of 2,583 for search '(( sources detection functions\ ) OR (( resources OR resources) selection function\ ))', query time: 0.26s Refine Results
  1. 81

    The Hybrid Model: Prediction-Based Scheduling and Efficient Resource Management in a Serverless Environment by Louai Shiekhani, Hui Wang, Wen Shi, Jiahao Liu, Yuan Qiu, Chunhua Gu, Weichao Ding

    Published 2025-07-01
    “…However, the cold start problem remains a major challenge, not only because of the substantial latency it introduces to function execution time, but also because frequent cold starts lead to poor resource utilization, especially during workload fluctuations. …”
    Get full text
    Article
  2. 82
  3. 83

    A Novel NSGA-III-GKM++ Framework for Multi-Objective Cloud Resource Brokerage Optimization by Ahmed Yosreddin Samti, Ines Ben Jaafar, Issam Nouaouri, Patrick Hirsch

    Published 2025-06-01
    “…Cloud resource brokerage is a fundamental challenge in cloud computing, requiring the efficient selection and allocation of services from multiple providers to optimize performance, sustainability, and cost-effectiveness. …”
    Get full text
    Article
  4. 84
  5. 85

    An enhancement filter utilizing the modified arctangent function for the structural and tectonic interpretation of causative sources: Application to WGM2012 gravity data from the R... by Fengjun WU, Xin-Ai XU

    Published 2025-06-01
    “…In this study, we propose the Modified Arctangent Function (MAT), which enhances gravity source edge detection by integrating the total horizontal gradient with a modified arctangent function. …”
    Get full text
    Article
  6. 86

    Multi-Objective Optimal Allocation of Regional Water Resources Based on the Improved NSGA-III Algorithm by Yuhao Wang, Yi Wang, Bin He

    Published 2025-05-01
    “…Rapid socio-economic development has intensified the conflict between supply and demand for regional water resources, necessitating optimized water resource allocation to enhance water security. …”
    Get full text
    Article
  7. 87

    Quantitative design and production methods for sustainably increasing maize grain yield and resource use efficiency by Huaxiang JI, Guangzhou LIU, Wanmao LIU, Yunshan YANG, Xiaoxia GUO, Guoqiang ZHANG, Zhiqiang TAO, Shaokun LI, Peng HOU

    Published 2025-09-01
    “…This study summarized the key limiting factors, such as solar radiation, temperature, water, soil resources and extreme weather events that currently limit the yield and resource use efficiency of maize production, as well as the main problems existing in the process of maize production, such as unsuitable cultivar selection, low planting density and inappropriate fertilizer application. …”
    Get full text
    Article
  8. 88

    Human Resource Management in Public Administration: The Ongoing Tension Between Reform Requirements and Resistance to Change by Branka Zolak Poljašević, Ana Marija Gričnik, Simona Šarotar Žižek

    Published 2025-03-01
    “…Human resource management (HRM) plays a critical role in shaping public administration by ensuring the efficiency, effectiveness, and adaptability of public institutions. …”
    Get full text
    Article
  9. 89

    Source Detection and Functional Connectivity of the Sensorimotor Cortex during Actual and Imaginary Limb Movement: A Preliminary Study on the Implementation of eConnectome in Motor Imagery Protocols by Alkinoos Athanasiou, Chrysa Lithari, Konstantina Kalogianni, Manousos A. Klados, Panagiotis D. Bamidis

    Published 2012-01-01
    “…Event-Related Desynchronization/Synchronization (ERD/ERS) of the mu-rhythm was used to evaluate MI performance. Source detection and FCNs were studied with eConnectome. …”
    Get full text
    Article
  10. 90

    Feature dependence graph based source code loophole detection method by Hongyu YANG, Haiyun YANG, Liang ZHANG, Xiang CHENG

    Published 2023-01-01
    “…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
    Get full text
    Article
  11. 91

    Feature dependence graph based source code loophole detection method by Hongyu YANG, Haiyun YANG, Liang ZHANG, Xiang CHENG

    Published 2023-01-01
    “…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
    Get full text
    Article
  12. 92
  13. 93
  14. 94

    Deep Reinforcement Learning With Dueling DQN for Partial Computation Offloading and Resource Allocation in Mobile Edge Computing by Ehzaz Mustafa, Junaid Shuja, Faisal Rehman, Abdallah Namoun, Mazhar Ali, Abdullah Alourani

    Published 2025-01-01
    “…Computation offloading transfers resource-intensive tasks from local Internet of Things (IoT) devices to powerful edge servers, which minimizes latency and reduces the computational load on IoT devices. …”
    Get full text
    Article
  15. 95

    Web 2.0 as Catalyst: Virtually Reaching Out to Users and Connecting Them to Library Resources and Services. by Norah Xiao

    Published 2008-11-01
    “…These Web 2.0 technologies function as catalysts which help lower human barriers between my users and me, enable me to reach my users virtually, and attract users to resources from the library as well as various services I provided [ABSTRACT FROM AUTHOR] …”
    Get full text
    Article
  16. 96

    Dietary Niche Variation in an Invasive Omnivore: The Effects of Habitat on Feral Pig Resource Use in Hawai‘i by Michael S. Peyton, Kealohanuiopuna M. Kinney, Sarah Knox, Grace Tredennick, Sara Hotchkiss

    Published 2024-10-01
    “…ABSTRACT Invasive omnivores may have profound impacts on ecological communities through diet selection, particularly when their functional roles differ from those in their native range. …”
    Get full text
    Article
  17. 97

    Optimization of D2D emergency communication resources for UAV relay based on DA-STD3 by Xiaofang Deng, Zijian Deng, Lin Zheng, Chao Yang, Chuanxu Chen

    Published 2024-11-01
    “…By designing the reward function and training mechanism, we can achieve good power control and reduce communication interference. …”
    Get full text
    Article
  18. 98
  19. 99

    Selenium Accumulating Leafy Vegetables Are a Potential Source of Functional Foods by Petro E. Mabeyo, Mkabwa L. K. Manoko, Amra Gruhonjic, Paul A. Fitzpatrick, Göran Landberg, Máté Erdélyi, Stephen S. Nyandoro

    Published 2015-01-01
    “…., Cucurbita maxima, Ipomoea batatas, Solanum villosum, Solanum scabrum, and Vigna unguiculata were explored for their capabilities to accumulate selenium when grown on selenium enriched soil and for use as a potential source of selenium enriched functional foods. Their selenium contents were determined by spectrophotometry using the complex of 3,3′-diaminobenzidine hydrochloride (DABH) as a chromogen. …”
    Get full text
    Article
  20. 100

    Antioxidant Peptides Derived from Woody Oil Resources: Mechanisms of Redox Protection and Emerging Therapeutic Opportunities by Jia Tu, Jie Peng, Li Wen, Changzhu Li, Zhihong Xiao, Ying Wu, Zhou Xu, Yuxi Hu, Yan Zhong, Yongjun Miao, Jingjing Xiao, Sisi Liu

    Published 2025-06-01
    “…Antioxidant peptides derived from woody oil resource by-products exhibit strong free radical scavenging abilities and offer potential applications in functional foods, nutraceuticals, and cosmetics. …”
    Get full text
    Article