Suggested Topics within your search.
Suggested Topics within your search.
-
1
Identification and Mining of Functional Components of Polyphenols in Fruits of <i>Malus</i> Germplasm Resources Based on Multivariate Analysis
Published 2024-10-01“…These results provide us with information regarding the polyphenol composition and content of the wild apple resources and local cultivars. The high polyphenol content resources obtained by screening can be used as raw materials for the extraction of polyphenol components and functional fruit juice processing and can also be used as parents for functional fruit creation and variety breeding.…”
Get full text
Article -
2
A near-optimal resource allocation strategy for minimizing the worse-case impact of malicious attacks on cloud networks
Published 2025-08-01“…The proposed model integrates Virtual Machine (VM) initiation decisions and employs the Contest Success Function (CSF) within a two-player max–min game framework to dynamically allocate resources. …”
Get full text
Article -
3
On Data Selection and Regularization for Underdetermined Vibro-Acoustic Source Identification
Published 2025-06-01“…The number of hologram points in near-field acoustical holography (NAH) for a vibro-acoustic system plays a vital role in conditioning the transfer function between the source and measuring points. The requirement for many overdetermined hologram points for extended sources to obtain high accuracy poses a problem for the practical applications of NAH. …”
Get full text
Article -
4
SELECTION FEATURES OF THE FIELDS REPRESENTATION FOR THE ADDITIONAL SOURCES OF THE PARTIAL DOMAINS
Published 2010-06-01Get full text
Article -
5
A Decision Support System for Optimal Building Cold Source Selection
Published 2022-01-01“…Based on existing approaches to construction project evaluation and the selection of cold source systems, we establish an evaluation index for building cold source system functional models and network structures. …”
Get full text
Article -
6
Consistent Modeling of Transport Processes and Travel Times—Coupling Soil Hydrologic Processes With StorAge Selection Functions
Published 2024-01-01Subjects: Get full text
Article -
7
Unlocking the prebiotic carbohydrates: Insights into the types, preparation, health benefits and future utilizations of selected Indonesian exotic fruit seeds as a potential source...
Published 2025-04-01“…This paper aims to explore the feasibility of utilizing Indonesian exotic fruit seeds as a potential source of prebiotic carbohydrates for functional foods and dietary additives. …”
Get full text
Article -
8
Resource scheduling based on routing tree and detection matrix for Internet of things
Published 2021-03-01“…This article proposes a new efficient resource scheduling based on routing tree and detection matrix for Internet of things. …”
Get full text
Article -
9
Derivation of pressure distribution models for horizontal well using source function
Published 2019-05-01“…In this work, ten (10) models for pressure distribution for horizontal well under different boundary variation were derived following these steps for each of the models:(i) choosing a boundary condition for each axis (ii) selecting the appropriate source function for each axis and (iii)applying Newman product rule to arrive at the pressure expression. …”
Get full text
Article -
10
A Joint Optimization Method for Cooperative Detection Resources Based on Channel Capacity
Published 2022-01-01“…Aiming at the resource optimization problem in the cooperative detection task, the objective function is constructed based on the channel capacity, and the artificial bee colony (ABC) algorithm is improved to realize the joint optimization of the UAV swarm trajectory and radiation power. …”
Get full text
Article -
11
A Feature-Selective Independent Component Analysis Method for Functional MRI
Published 2007-01-01“…In this work, we propose a simple and effective scheme to incorporate prior knowledge about the sources of interest (SOIs) in independent component analysis (ICA) and apply the method to estimate brain activations from functional magnetic resonance imaging (fMRI) data. …”
Get full text
Article -
12
-
13
-
14
Prediction of Wafer Performance: Use of Functional Outlier Detection and Regression
Published 2025-01-01“…To exploit the consecutive nature of OES data, we propose a prediction method based on a functional approach using multivariate functional partial least squares regression, coupled with dimension reduction and a novel outlier detection technique via functional independent component analysis. …”
Get full text
Article -
15
Nitrogen-functionalized modulation of iron nanoparticles promotes selective hydrogenation of carbon dioxide
Published 2025-03-01“…Nitrogen-functionalized iron nanoparticles were prepared using a one-pot hydrothermal process. …”
Get full text
Article -
16
Enhanced Reward Function Design for Source Term Estimation Based on Deep Reinforcement Learning
Published 2025-01-01“…This study investigates the design of reward functions for deep reinforcement learning-based source term estimation (STE). …”
Get full text
Article -
17
Successful thoracoscopic-assisted resection of a functional paraganglioma in the mediastinum with extracorporeal circulation: a case report
Published 2025-01-01“…Stringent perioperative management is crucial to mitigate the risk of cardiovascular complications associated with functional tumors. Lifelong surveillance is recommended to detect potential recurrence or metastasis. …”
Get full text
Article -
18
Framework development of continuous non-linear Diophantine fuzzy sets and its application to renewable energy source selection
Published 2025-05-01“…We develop continuous non-linear Diophantine fuzzy algebraic aggregation operators and apply them to a multi-attribute decision-making problem in renewable energy source selection. A case study demonstrates the effectiveness of the proposed CN-LDFS framework using a weighted geometric operator. …”
Get full text
Article -
19
Crashing Fault Residence Prediction Using a Hybrid Feature Selection Framework from Multi-Source Data
Published 2025-02-01“…This study introduces SCM, a two-stage composite feature selection framework designed to address this challenge. …”
Get full text
Article -
20
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article