Showing 41 - 60 results of 2,992 for search '(( sources selection functions ) OR (( resource OR source) detection function ))', query time: 0.42s Refine Results
  1. 41

    Nitrogen-functionalized modulation of iron nanoparticles promotes selective hydrogenation of carbon dioxide by Xianbiao Wang, Jun Qian, Zixuan Lu, Jie Huang, Liru Zheng, Yong Jiang, Mengdie Cai, Yuxue Wei, Lisheng Guo, Song Sun

    Published 2025-03-01
    “…Nitrogen-functionalized iron nanoparticles were prepared using a one-pot hydrothermal process. …”
    Get full text
    Article
  2. 42

    Enhanced Reward Function Design for Source Term Estimation Based on Deep Reinforcement Learning by Junhee Lee, Hongro Jang, Minkyu Park, Hyondong Oh

    Published 2025-01-01
    “…This study investigates the design of reward functions for deep reinforcement learning-based source term estimation (STE). …”
    Get full text
    Article
  3. 43

    Framework development of continuous non-linear Diophantine fuzzy sets and its application to renewable energy source selection by Asaf Khan, Saifullah Khan, Ariana Abdul Rahimzai, Saleem Abdullah

    Published 2025-05-01
    “…We develop continuous non-linear Diophantine fuzzy algebraic aggregation operators and apply them to a multi-attribute decision-making problem in renewable energy source selection. A case study demonstrates the effectiveness of the proposed CN-LDFS framework using a weighted geometric operator. …”
    Get full text
    Article
  4. 44

    MIF-YOLO: An Enhanced YOLO with Multi-Source Image Fusion for Autonomous Dead Chicken Detection by Jiapan Li, Yan Zhang, Yong Zhang, Hongwei Shi, Xianfang Song, Chao Peng

    Published 2025-12-01
    “…Addressing the paucity of automated systems for the detection of dead poultry within large-scale agricultural settings, characterized by the onerous and time-consuming manual inspection processes, this study introduces an enhanced YOLO algorithm with multi-source image fusion (MIF-YOLO) for the autonomous identification of dead chicken. …”
    Get full text
    Article
  5. 45

    Crashing Fault Residence Prediction Using a Hybrid Feature Selection Framework from Multi-Source Data by Xiao Liu, Xianmei Fang, Song Sun, Yangchun Gao, Dan Yang, Meng Yan

    Published 2025-02-01
    “…This study introduces SCM, a two-stage composite feature selection framework designed to address this challenge. …”
    Get full text
    Article
  6. 46

    SELECTION OF CRITERIA FOR ASSESSING THE EFFECTIVENESS OF RENEWABLE ENERGY SUPPORT POLICIES by N.А. Riazanova

    Published 2018-09-01
    “…The purpose of the article is to research and develop scientific and economic decisions on the assessment of the efficiency of the use of renewable energy sources, and to justify the selection of criteria for assessing renewable energy support policies. …”
    Get full text
    Article
  7. 47
  8. 48

    Forms of financing the cultural sector in Poland against the background of solutions from selected European countries by Joanna Posłuszna, Stella Kaczmarek

    Published 2016-02-01
    “…Although the cultural sector is very important, state budgets contribute only a little to the financing of culture and its functioning depends on various sources of financing. …”
    Get full text
    Article
  9. 49

    QPPLab: A generally applicable software package for detecting, analyzing, and visualizing large-scale quasiperiodic spatiotemporal patterns (QPPs) of brain activity by Nan Xu, Behnaz Yousefi, Nmachi Anumba, Theodore J. LaGrow, Xiaodi Zhang, Shella Keilholz

    Published 2025-02-01
    “…To address these challenges, we present QPPLab, an open-source MATLAB-based toolbox for detecting, analyzing, and visualizing QPPs from fMRI time series. …”
    Get full text
    Article
  10. 50
  11. 51

    Advances in choroid-glaucoma structural-functional correlations using swept-source optical coherence tomography by Ying Tang, Yun Zhao, Qiyao Wang, Jia Li

    Published 2025-08-01
    “…Our analyses suggest that functional and structural changes in the choroid are evident in glaucoma patients as the disease progresses and that the action mechanism varies across different types of glaucoma. …”
    Get full text
    Article
  12. 52

    Application of Open-Source, Low-Code Machine-Learning Library in Python to Diagnose Parkinson's Disease Using Voice Signal Features by Daniel Hilário da Silva, Caio Tonus Ribeiro, Leandro Rodrigues da Silva Souza, Adriano Alves Pereira

    Published 2025-03-01
    “…Seventeen ML algorithms were applied to a dataset of voice recordings from Healthy Control and PD individuals, sourced from a publicly available repository. We leveraged the PyCaret Python library's ML algorithms and functions, which were introduced in this article, to demonstrate their simplicity and effectiveness in dealing with real-world data. …”
    Get full text
    Article
  13. 53

    A functional selection model explains evolutionary robustness despite plasticity in regulatory networks by Naomi Habib, Ilan Wapinski, Hanah Margalit, Aviv Regev, Nir Friedman

    Published 2012-10-01
    “…We explain these trends using a model with a strong selection to conserve the overall function of a transcription factor, and a much weaker selection over the specific genes it targets. …”
    Get full text
    Article
  14. 54
  15. 55

    Characterization of analog rice produced from various carbohydrate sources and their functional components: a review by Dwi Ghina Nadhifa, Meta Mahendradatta, Ariny Poespitasari, Februadi Bastian, Andi Yuyun Adhnitasari

    Published 2025-06-01
    “…The information summarized in this review can be a reference for selecting the carbohydrate sources and ingredients for further development of analog rice based on its resulting characteristics and health benefits.…”
    Get full text
    Article
  16. 56
  17. 57

    PFW-YOLO Lightweight Helmet Detection Algorithm by Yue Hong, Hao Wang, Shuo Guo

    Published 2025-01-01
    “…However, due to the limited arithmetic and storage resources of edge-end devices, and the traditional detection algorithms have problems such as the number of parameters and large computational volume, the detection algorithms are difficult to be deployed practically. …”
    Get full text
    Article
  18. 58
  19. 59

    Effect of cochlear implant surgery on vestibular function: meta-analysis study by Iman Ibrahim, Sabrina Daniela da Silva, Bernard Segal, Anthony Zeitouni

    Published 2017-06-01
    “…Study selection Published studies of adult patients who received unilateral or bilateral CIs and whose vestibular function or postural stability was assessed before and after surgery. …”
    Get full text
    Article
  20. 60

    Design and analysis of intelligent service chain system for network security resource pool by Zenan WANG, Jiahao LI, Chaohong TAN, Dechang PI

    Published 2022-08-01
    “…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
    Get full text
    Article