Search alternatives:
resource » source (Expand Search)
resources » sources (Expand Search)
Showing 1 - 20 results of 1,810 for search '(( sources detection functions ) OR (( resource OR resources) detection function ))', query time: 0.39s Refine Results
  1. 1

    Identification and Mining of Functional Components of Polyphenols in Fruits of <i>Malus</i> Germplasm Resources Based on Multivariate Analysis by Dajiang Wang, Guangyi Wang, Xiang Lu, Zhao Liu, Simiao Sun, Hanxin Guo, Wen Tian, Zichen Li, Lin Wang, Lianwen Li, Yuan Gao, Kun Wang

    Published 2024-10-01
    “…These results provide us with information regarding the polyphenol composition and content of the wild apple resources and local cultivars. The high polyphenol content resources obtained by screening can be used as raw materials for the extraction of polyphenol components and functional fruit juice processing and can also be used as parents for functional fruit creation and variety breeding.…”
    Get full text
    Article
  2. 2

    Resource scheduling based on routing tree and detection matrix for Internet of things by Hongying Bai, Xiaotong Zhang, Yuxin Liu, Yingdong Xie

    Published 2021-03-01
    “…This article proposes a new efficient resource scheduling based on routing tree and detection matrix for Internet of things. …”
    Get full text
    Article
  3. 3

    A Joint Optimization Method for Cooperative Detection Resources Based on Channel Capacity by Wenda Yang, Minggong Wu, Xiangxi Wen, Kexin Bi

    Published 2022-01-01
    “…Aiming at the resource optimization problem in the cooperative detection task, the objective function is constructed based on the channel capacity, and the artificial bee colony (ABC) algorithm is improved to realize the joint optimization of the UAV swarm trajectory and radiation power. …”
    Get full text
    Article
  4. 4
  5. 5

    Design and analysis of intelligent service chain system for network security resource pool by Zenan WANG, Jiahao LI, Chaohong TAN, Dechang PI

    Published 2022-08-01
    “…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
    Get full text
    Article
  6. 6

    Metal surface defect detection using SLF-YOLO enhanced YOLOv8 model by Yuan Liu, Yilong Liu, Xiaoyan Guo, Xi Ling, Qingyi Geng

    Published 2025-04-01
    “…Abstract This paper addresses the industrial demand for precision and efficiency in metal surface defect detection by proposing SLF-YOLO, a lightweight object detection model designed for resource-constrained environments. …”
    Get full text
    Article
  7. 7

    ABDviaMSIFAT: Abnormal Crowd Behavior Detection Utilizing a Multi-Source Information Fusion Technique by Ali Ahmad Hamid, S. Amirhassan Monadjemi, Bijan Shoushtarian

    Published 2025-01-01
    “…To solve this issue, we suggest a new method that combines data from various sources with different characteristics to enhance the precision of detecting human behavior in crowds. …”
    Get full text
    Article
  8. 8

    A statistical approach to assess interspecific consumptive competition and functional redundancy in ephemeral resource uses using camera traps by Yoshihiro Nakashima, Akane Hashizume, Akane Kanda

    Published 2024-07-01
    “…We extended time‐to‐detection occupancy modeling to quantify interspecific consumptive competition and redundancy of ecosystem functions through consumption between two species, while accounting for observation censoring. …”
    Get full text
    Article
  9. 9
  10. 10

    A near-optimal resource allocation strategy for minimizing the worse-case impact of malicious attacks on cloud networks by Yu-Fang Chen, Frank Yeong-Sung Lin, Kuang-Yen Tai, Chiu-Han Hsiao, Wei-Hsin Wang, Ming-Chi Tsai, Tzu-Lung Sun

    Published 2025-08-01
    “…The proposed model integrates Virtual Machine (VM) initiation decisions and employs the Contest Success Function (CSF) within a two-player max–min game framework to dynamically allocate resources. …”
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Fine-grained building function recognition with street-view images and GIS map data via geometry-aware semi-supervised learning by Weijia Li, Jinhua Yu, Dairong Chen, Yi Lin, Runmin Dong, Xiang Zhang, Conghui He, Haohuan Fu

    Published 2025-03-01
    “…In this work, we propose a geometry-aware semi-supervised method for fine-grained building function recognition, which effectively uses multi-source geoinformation data to achieve accurate function recognition in both single-city and cross-city scenarios. …”
    Get full text
    Article
  14. 14

    Toward Compliance and Transparency in Raw Material Sourcing With Blockchain and Edge AI by Abderrahim Khiari, Anas Osman, Massimo Vecchio, Mattia Antonini, Miguel Pincheira

    Published 2025-01-01
    “…This low-power device enables real-time detection of shipment anomalies such as tampering or unauthorized access, even in offline and resource-limited environments. …”
    Get full text
    Article
  15. 15

    A review on WSN based resource constrained smart IoT systems by Shreeram Hudda, K. Haribabu

    Published 2025-05-01
    “…Abstract In Wireless Sensor Network (i.e. WSN) based resource constrained Internet of Things (i.e. IoT) environments, efficient data forwarding is achieved through cluster based mechanisms, where cluster heads facilitate communication among themselves and with the sink node. …”
    Get full text
    Article
  16. 16
  17. 17

    Research on Interference Resource Optimization Based on Improved Whale Optimization Algorithm by Xuyi Chen, Mingxi Ma, Chengkui Liu, Haifeng Xie, Shaoqi Wang

    Published 2025-01-01
    “…In this problem, this paper establishes an interference resource optimization model with radar detection probability, interference effectiveness, and interference bandwidth utilization as the objective functions. …”
    Get full text
    Article
  18. 18

    Potential Source Density Function: A New Tool for Identifying Air Pollution Sources by In Sun Kim, Yong Pyo Kim, Daehyun Wee

    Published 2022-01-01
    “…Abstract Potential source density function (PSDF) is developed to identify, that is, locate and quantify, source areas of ambient trace species based on Gaussian process regression (GPR), a machine-learning technique. …”
    Get full text
    Article
  19. 19

    A lightweight framework to secure IoT devices with limited resources in cloud environments by Vivek Kumar Pandey, Dinesh Sahu, Shiv Prakash, Rajkumar Singh Rathore, Pratibha Dixit, Iryna Hunko

    Published 2025-07-01
    “…Abstract Billions of IoT devices increasingly function as gateways to cloud infrastructures, making them an inevitable target of cyber threats because of the limited resources and low processing capabilities of IoT devices. …”
    Get full text
    Article
  20. 20