Showing 101 - 120 results of 2,992 for search '(( sources selection functions ) OR (( resource OR source) detection function ))', query time: 0.33s Refine Results
  1. 101
  2. 102
  3. 103

    Fermented, Freeze-Dried Snacks from <i>Lactarius deliciosus</i> as a Source of Functional Compounds and Lactic Acid Bacteria by Kavya Venugopal, Paweł Satora, Katarzyna Kała, Katarzyna Sułkowska-Ziaja, Agnieszka Szewczyk, Beata Ostachowicz, Bożena Muszyńska, Emilia Bernaś

    Published 2025-03-01
    “…After 6 months of storage, mushroom products were a good source of functional compounds, especially LAB, minerals, indoles, lovastatin, antioxidants (phenolic compounds), and dietary fibre. …”
    Get full text
    Article
  4. 104

    Multilingual Investigation of Cross-Project Code Clones in Open-Source Software for Internet of Things Systems by Wenqing Zhu, Norihiro Yoshida, Yutaka Matsubara, Hiroaki Takada

    Published 2024-01-01
    “…We collected 122 IoT system repositories in nine languages from GitHub and grouped them according to their primary functionality in IoT systems. We used MSCCD, a multilingual code clone detector to detect Type-3 code clones for each group. …”
    Get full text
    Article
  5. 105

    Acoustic modelling of surface sources. Part II. Piston model, asymmetrical function of vibration velocity, discretizing error, axisymmetrical problem by A. BRAŃSKI

    Published 2014-01-01
    “…Then the model of the source consists of an array of driving pistons. In order to select the optimal position of the boundary between the pistons, the measure of the divergence/convergence between directivity function of the model and exact was analysed. …”
    Get full text
    Article
  6. 106
  7. 107

    Multi-View Cluster Structure Guided One-Class BLS-Autoencoder for Intrusion Detection by Qifan Yang, Yu-Ang Chen, Yifan Shi

    Published 2025-07-01
    “…Multi-view OCC approaches usually require collecting multi-view traffic data from all sources and have difficulty detecting intrusion independently in each view. …”
    Get full text
    Article
  8. 108

    A near-optimal resource allocation strategy for minimizing the worse-case impact of malicious attacks on cloud networks by Yu-Fang Chen, Frank Yeong-Sung Lin, Kuang-Yen Tai, Chiu-Han Hsiao, Wei-Hsin Wang, Ming-Chi Tsai, Tzu-Lung Sun

    Published 2025-08-01
    “…The proposed model integrates Virtual Machine (VM) initiation decisions and employs the Contest Success Function (CSF) within a two-player max–min game framework to dynamically allocate resources. …”
    Get full text
    Article
  9. 109

    A Novel Method for Estimating Parameters of Magnetic Dipole Sources Under Low Signal-to-Noise Ratio Conditions Based on LM-OBF Algorithm by Zhaotao Yan, Zhaofa Zeng, Jianwei Zhao

    Published 2025-06-01
    “…It then constructs an objective function within a least squares framework and optimizes it using the Levenberg–Marquardt (LM) algorithm to achieve a stable estimation of magnetic source parameters. …”
    Get full text
    Article
  10. 110

    Research Progress on Dual Function Radar and Communication Signal Design and its Application in Typical Detection Scenarios by Yaping HE, Longfei SHI, Dong WANG, Jianglan TANG, Junxian CHEN, Jiazhi MA, Jialei LIU

    Published 2025-08-01
    “…Dual Function Radar and Communication (DFRC)-integrated electronic equipment platform, which combines detection and communication functions, effectively addresses issues such as platform limitations, resource constraints, and electromagnetic compatibility by sharing hardware platforms and transmitting waveforms. …”
    Get full text
    Article
  11. 111
  12. 112
  13. 113
  14. 114
  15. 115
  16. 116

    Design and Validation of a Lightweight Entropy-Based Intrusion Detection Algorithm for Automotive CANs by Jiacheng Chen, Zhifu Wang

    Published 2025-06-01
    “…Experimental results demonstrate robust performance under low computational resources, achieving high detection accuracy with high recall (>80%) even at 10% bus load fluctuation thresholds. …”
    Get full text
    Article
  17. 117

    Simulation Study on Detection and Localization of a Moving Target Under Reverberation in Deep Water by Jincong Dun, Shihong Zhou, Yubo Qi, Changpeng Liu

    Published 2024-12-01
    “…Deep-water reverberation caused by multiple reflections from the seafloor and sea surface can affect the performance of active sonars. To detect a moving target under reverberation conditions, a reverberation suppression method using multipath Doppler shift in deep water and wideband ambiguity function (WAF) is proposed. …”
    Get full text
    Article
  18. 118

    Vehicle detection method based on multi-layer selective feature for UAV aerial images by Yinbao Ma, Yuyu Meng, Jiuyuan Huo

    Published 2025-07-01
    “…For the detection head, a Generalized Wasserstein Distance Loss (GWDLoss) function is proposed to quantify positional and scale discrepancies, improving the adaptability of bounding box regression to geometric variations. …”
    Get full text
    Article
  19. 119
  20. 120