Search alternatives:
resource » source (Expand Search)
sourcess » source (Expand Search), success (Expand Search)
Showing 261 - 280 results of 2,296 for search '(( sources selection function\ ) OR (( resource OR sourcess) detection functions\ ))', query time: 0.26s Refine Results
  1. 261

    A lightweight object detection approach based on edge computing for mining industry by Muhammad Wahab Hanif, Zhanli Li, Zhenhua Yu, Rehmat Bashir

    Published 2024-11-01
    “…These enhancements enable more accurate and efficient detection in resource‐constrained edge environments, contributing to safer and more reliable monitoring in coal mining operations.…”
    Get full text
    Article
  2. 262

    Feature selection using a multi-strategy improved parrot optimization algorithm in software defect prediction by Qi Fei, Guisheng Yin, Zhian Sun

    Published 2025-04-01
    “…Finally, to further enhance the classification performance of defect prediction, a heterogeneous data stacking ensemble learning algorithm (HEDSE) based on feature selection is proposed. Experimental evaluations on 16 open-source software defect datasets indicate that the proposed HEDSE outperforms existing methods, providing a novel and effective solution for software defect prediction. …”
    Get full text
    Article
  3. 263
  4. 264
  5. 265

    Rapid urban health security assessment tool: a new resource for evaluating local-level public health preparedness by Rebecca Katz, Matthew R Boyce

    Published 2020-06-01
    “…Plans and policies for responding to public health emergencies are generally framed at higher levels of governance, but developing, improving and sustaining the capacities necessary for implementing these policies is a direct function of local-level authorities. Evaluating local-level public health capacities is an important process for identifying strengths and weaknesses that can impact the preparedness for, detection of and response to health security threats. …”
    Get full text
    Article
  6. 266

    MeStanG—Resource for High-Throughput Sequencing Standard Data Sets Generation for Bioinformatic Methods Evaluation and Validation by Daniel Ramos Lopez, Francisco J. Flores, Andres S. Espindola

    Published 2025-01-01
    “…Metagenomics analysis has enabled the measurement of the microbiome diversity in environmental samples without prior targeted enrichment. Functional and phylogenetic studies based on microbial diversity retrieved using HTS platforms have advanced from detecting known organisms and discovering unknown species to applications in disease diagnostics. …”
    Get full text
    Article
  7. 267

    Enhancing the power quality in radial electrical systems using optimal sizing and selective allocation of distributed generations. by Bachirou Bogno, Deli Goron, Nisso Nicodem, S Shanmugan, Dieudonné Kidmo Kaoga, Kitmo, Akhlaque Ahmad Khan, Yasser Fouad, Michel Aillerie

    Published 2024-01-01
    “…Accordingly, a proposed configuration system is shown in this work to inject multiple renewable energy sources (MRES) from selected regulated nodes. The feasibility of the proposed system is evaluated using particle swarm optimization (PSO), which was used to locate stable nodes and locations, sensitive to voltage fluctuations. …”
    Get full text
    Article
  8. 268

    TEDVIL: Leveraging Transformer-Based Embeddings for Vulnerability Detection in Lifted Code by Gary A. McCully, John D. Hastings, Shengjie Xu

    Published 2025-01-01
    “…Notably, these results are achieved when the embedding model is trained with a dataset of just 48,000 functions, demonstrating effectiveness in resource-constrained settings. …”
    Get full text
    Article
  9. 269

    Comparative Analysis of Deep Learning Models for Intrusion Detection in IoT Networks by Abdullah Waqas, Sultan Daud Khan, Zaib Ullah, Mohib Ullah, Habib Ullah

    Published 2025-07-01
    “…However, the constrained processing capacities and resource limitations of IoT networks make them especially susceptible to cyber threats. …”
    Get full text
    Article
  10. 270
  11. 271
  12. 272
  13. 273

    Cities in transition: Krakow‘s social, economic and spatial transformation within the last thirty years (selected aspects) by Anna Karwińska, Dorota Jopek, Michał Kudłacz, Michał Wiśniewski

    Published 2024-03-01
    “…Therefore, depending on the availability of statistical data, several time periods were selected and compared with each other in the most important areas of Krakow’s functioning. …”
    Get full text
    Article
  14. 274

    Biphoton Waveforms of Photon Pair from Velocity‐Selective Atoms in a Doppler‐Broadened Atomic Ensemble by Hansol Jeong, Heewoo Kim, Danbi Kim, Han Seb Moon

    Published 2025-06-01
    “…Here, the beat phenomenon in the autocorrelation function of the telecom‐wavelength photon due to the velocity‐selective classes of the atoms in a Doppler‐broadened atomic ensemble of the cascade‐type 5S1/2–5P3/2–4D5/2 transition of 87Rb is reported. …”
    Get full text
    Article
  15. 275

    A Three-Dimensional Complex Measurement Model-Based Avionic Radio-Frequency Power Source Health Assessment Method by Lin Huo, Shiqi Li, Simiao Fei, Chuan Lyu

    Published 2020-01-01
    “…According to the function and structure characteristics of radio-frequency power source, the health characterization parameters are then obtained and the health assessment parameter system is established. …”
    Get full text
    Article
  16. 276

    Location- and feature-based selection histories make independent, qualitatively distinct contributions to urgent visuomotor performance by Emily E Oor, Emilio Salinas, Terrence R Stanford

    Published 2025-06-01
    “…Although less well studied, selection history, which reflects multiple facets of experience with recent events, is increasingly recognized as a distinct source of attentional bias. …”
    Get full text
    Article
  17. 277

    Improving dependability with low power fault detection model for skinny-hash. by Sonal Arvind Barge, Gerardine Immaculate Mary

    Published 2024-01-01
    “…Two fault detection approaches are proposed to detect faults in cryptographic algorithms running on IoT devices. …”
    Get full text
    Article
  18. 278

    Optimization of the defense forces personnel under mobilization conditions: The role of occupational selection as a personnel allocator by V. V. Kalnysh, A. V. Shvets

    Published 2024-12-01
    “…The proposed conceptual model of optimization of the occupational selection system in the defense forces reflects 4 main elements and functions of it. …”
    Get full text
    Article
  19. 279
  20. 280

    Determination of selection criteria for yield traits to improve okra (Abelmoschus esculentus L. Moench) breeding in Indonesia by H. A. Reswari, M. Syukur, A. W. Ritonga, W. Nurcholis

    Published 2025-03-01
    “…Moench, commonly known as okra, is increasingly cultivated in Indonesia due to its recognition as a functional food source. Current efforts in breeding new okra varieties are focused on high productivity, yet minimal information is available regarding selection criteria. …”
    Get full text
    Article