Suggested Topics within your search.
Suggested Topics within your search.
-
21
Crashing Fault Residence Prediction Using a Hybrid Feature Selection Framework from Multi-Source Data
Published 2025-02-01“…This study introduces SCM, a two-stage composite feature selection framework designed to address this challenge. …”
Get full text
Article -
22
SELECTION OF CRITERIA FOR ASSESSING THE EFFECTIVENESS OF RENEWABLE ENERGY SUPPORT POLICIES
Published 2018-09-01“…The purpose of the article is to research and develop scientific and economic decisions on the assessment of the efficiency of the use of renewable energy sources, and to justify the selection of criteria for assessing renewable energy support policies. …”
Get full text
Article -
23
Forms of financing the cultural sector in Poland against the background of solutions from selected European countries
Published 2016-02-01“…Although the cultural sector is very important, state budgets contribute only a little to the financing of culture and its functioning depends on various sources of financing. …”
Get full text
Article -
24
-
25
Conflict Detection of Functional Requirements Based on Clustering and Rule-Based System
Published 2024-01-01“…Functional requirement identification is the initial stage in software development and a crucial step in the success of software development. …”
Get full text
Article -
26
A functional selection model explains evolutionary robustness despite plasticity in regulatory networks
Published 2012-10-01“…We explain these trends using a model with a strong selection to conserve the overall function of a transcription factor, and a much weaker selection over the specific genes it targets. …”
Get full text
Article -
27
-
28
Characterization of analog rice produced from various carbohydrate sources and their functional components: a review
Published 2025-06-01“…The information summarized in this review can be a reference for selecting the carbohydrate sources and ingredients for further development of analog rice based on its resulting characteristics and health benefits.…”
Get full text
Article -
29
High SERS performance of functionalized carbon dots in the detection of dye contaminants
Published 2025-02-01“…Methods: The enhanced substrate used for the detection of MG has been successfully constructed using PBA modulated Ag-CDs on a structured surface with rich binding sites. …”
Get full text
Article -
30
Human-Machine Function Allocation Method for Submersible Fault Detection Tasks
Published 2024-11-01Get full text
Article -
31
PFW-YOLO Lightweight Helmet Detection Algorithm
Published 2025-01-01“…However, due to the limited arithmetic and storage resources of edge-end devices, and the traditional detection algorithms have problems such as the number of parameters and large computational volume, the detection algorithms are difficult to be deployed practically. …”
Get full text
Article -
32
-
33
Design and analysis of intelligent service chain system for network security resource pool
Published 2022-08-01“…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
Get full text
Article -
34
Fermented Buffalo Milk with Conjugated Linoleic Acid-Producing Bacteria: Strain Selection and Functional Applications
Published 2025-05-01“…Buffalo milk is a rich source of precursor fatty acids for bioactive compounds and provides an optimal environment for bacterial growth. …”
Get full text
Article -
35
Germ Cell Dysfunction is Universal in Adolescent Male Patients with β-thalassemia Following Earlier Successful Hematopoietic Stem Cell Transplantation
Published 2025-06-01“…Objective: To assess gonadal function in adolescent male patients with β-thalassemia who underwent earlier successful hematopoietic stem cell transplantation (HSCT). …”
Get full text
Article -
36
Recent Technological Advancements for Identifying and Exploiting Novel Sources of Pest and Disease Resistance for Peanut Improvement
Published 2024-12-01“…Recent technological advancements have revolutionized the identification of novel resistance sources and the development of resistant peanut cultivars. …”
Get full text
Article -
37
A Survey on the Functionalities of Data Catalog Tools
Published 2025-01-01“…Currently, there is no generally accepted definition or interpretation regarding the required functionality of data catalog tools. This has not only led to a wide range of so-called data catalog tools but has also made it difficult for practitioners to gain an overview in order to make a targeted selection of a tool. …”
Get full text
Article -
38
-
39
-
40