Search alternatives:
source » sources (Expand Search)
Showing 1,841 - 1,860 results of 2,392 for search 'source utilization efficiency', query time: 0.13s Refine Results
  1. 1841

    Maritime Traffic Knowledge Discovery via Knowledge Graph Theory by Shibo Li, Jiajun Xu, Xinqiang Chen, Yajie Zhang, Yiwen Zheng, Octavian Postolache

    Published 2024-12-01
    “…Intelligent ships are a key focus for the future development of maritime transportation, relying on efficient decision-making and autonomous control within complex environments. …”
    Get full text
    Article
  2. 1842

    Enhanced Rapid Mangrove Habitat Mapping Approach to Setting Protected Areas Using Satellite Indices and Deep Learning: A Case Study of the Solomon Islands by Hyeon Kwon Ahn, Soohyun Kwon, Cholho Song, Chul-Hee Lim

    Published 2025-07-01
    “…The present study introduces an efficient and accurate methodology for mapping mangrove habitats and prioritizing protection areas utilizing open-source satellite imagery and datasets available through the Google Earth Engine platform in conjunction with a U-Net deep learning algorithm. …”
    Get full text
    Article
  3. 1843

    Degradation of dyes by fungi: An overview on recent updates by Nagraj, Pankaj Kumar Chaurasia, Shashi Lata Bharati, Nagendra Sharma, Jaynath Kumar, Azhagu Madhavan Sivalingam

    Published 2025-03-01
    “…Different methods for the detoxification of dyes molecules have been studied like physical, chemical, and biological methods. Biological methods utilize the microbial sources (primarily fungi, bacteria, yeast, and microbial enzymes) and plants for the degradation and remediation of dyes pollutants. …”
    Get full text
    Article
  4. 1844

    Budgetary Factors and the Quality of Education Service Delivery in Public Secondary Schools in Northern Division Kabale District. by Atwongyeire, Redeemer

    Published 2024
    “…Schools should adopt more sophisticated budget planning and management tools to ensure efficient allocation and utilization of resources. …”
    Get full text
    Thesis
  5. 1845

    Knowledge Graph Completion With Pattern-Based Methods by Maryam Sabet, Mohammadreza Pajoohan, Mohammad Reza Moosavi

    Published 2025-01-01
    “…In this paper, we propose a Pattern-based Knowledge Graph Completion (PKGC) method that consists of three phases. The first phase utilizes multi-source information and expands the KG using entity description as external information with efficient Natural Language Processing (NLP) techniques. …”
    Get full text
    Article
  6. 1846

    Optimizing the Production of LNG and NGL from Arab Crudes and Wet Gases by Adel M. Hemeida, Mohammed S. Al-Blehed, Saad El-Din Desouky

    Published 1995-01-01
    “…The developed model should be utilized as a useful tool to help the design of an efficient processing of natural gases. …”
    Get full text
    Article
  7. 1847

    A Novel Method for the Estimation of Sea Surface Wind Speed from SAR Imagery by Zahra Jafari, Pradeep Bobby, Ebrahim Karami, Rocky Taylor

    Published 2024-10-01
    “…Wind is one of the important environmental factors influencing marine target detection as it is the source of sea clutter and also affects target motion and drift. …”
    Get full text
    Article
  8. 1848

    An Integrated Model for Dam Break Flood Including Reservoir Area, Breach Evolution, and Downstream Flood Propagation by Huiwen Liu, Zhongxiang Wang, Dawei Zhang, Liyun Xiang

    Published 2024-11-01
    “…The reasonable and efficient prediction of dam failure events is of great significance to the emergency rescue operations and the reduction in dam failure losses. …”
    Get full text
    Article
  9. 1849

    Assessment of Collaboration-Based and Non-Collaboration-Based Logistics Risks with Plithogenic SWARA Method by Alptekin Ulutaş, Ieva Meidute-Kavaliauskiene, Ayse Topal, Ezgi Demir

    Published 2021-11-01
    “…<i>Conclusions</i>: The proposed technique will help logistics professionals make informed decisions and manage and analyze risks more efficiently. This study will also contribute to the literature as it is the first time that logistical risks have been addressed by utilizing the Plithogenic SWARA technique.…”
    Get full text
    Article
  10. 1850

    Biometric and IoT Integration for Secure and Remote Door Access Control Using Fingerprint Recognition and GSM Technology by S Kanagamalliga, S Rajalingam, A Kannan, M Karthikeyan

    Published 2025-01-01
    “…The reliability and flexibility of Arduino, coupled with the GSM capabilities of SIM900, are utilized to create a robust and efficient solution. …”
    Get full text
    Article
  11. 1851

    Deep Learning-Based Emergency Rescue Positioning Technology Using Matching-Map Images by Juil Jeon, Myungin Ji, Jungho Lee, Kyeong-Soo Han, Youngsu Cho

    Published 2024-10-01
    “…In real-world experiments, our method, utilizing multi-source data, achieved a positioning success rate of 85.27%, which meets the US FCC’s E911 standards for location accuracy and reliability across various conditions and environments. …”
    Get full text
    Article
  12. 1852

    CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs by Ahmad Kabil, Heba Aslan, Marianne A. Azer, Mohamed Rasslan

    Published 2024-09-01
    “…Due to the critical time constraints in VANETs, efficient batch verification techniques are crucial. …”
    Get full text
    Article
  13. 1853

    Method for Extracting Arterial Pulse Waveforms from Interferometric Signals by Marian Janek, Ivan Martincek, Gabriela Tarjanyiova

    Published 2025-07-01
    “…Visual analyses highlight amplitude variations and residual noise sources, primarily attributed to sensor bandwidth limitations and interpolation methods, considerations critical for real-world deployment. …”
    Get full text
    Article
  14. 1854

    Enhancing SR-Tree for Nearest Neighbor Search by Kayumov Abduaziz, Shincheol Lee, Ji Sun Shin

    Published 2025-01-01
    “…While dynamic index structures have been extensively utilized for indexing dynamic data, their performance in nearest neighbor search can further be improved. …”
    Get full text
    Article
  15. 1855

    An Intelligent Technique for Android Malware Identification Using Fuzzy Rank-Based Fusion by Altyeb Taha, Ahmed Hamza Osman, Yakubu Suleiman Baguda

    Published 2025-01-01
    “…Android’s open-source nature, combined with its large market share, has made it a primary target for malware developers. …”
    Get full text
    Article
  16. 1856

    Advanced computational methods for news classification: A study in neural networks and CNN integrated with GPT by Fahim Sufi

    Published 2025-11-01
    “…This research offers substantial practical contributions, providing detailed insights into news source contributions, effective anomaly detection, and predictive trend analysis using neural networks. …”
    Get full text
    Article
  17. 1857

    Model of the malicious traffic classification based on hypergraph neural network by Wenbo ZHAO, Zitong MA, Zhe YANG

    Published 2023-10-01
    “…As the use and reliance on networks continue to grow, the prevalence of malicious network traffic poses a significant challenge in the field of network security.Cyber attackers constantly seek new ways to infiltrate systems, steal data, and disrupt network services.To address this ongoing threat, it is crucial to develop more effective intrusion detection systems that can promptly detect and counteract malicious network traffic, thereby minimizing the resulting losses.However, current methods for classifying malicious traffic have limitations, particularly in terms of excessive reliance on data feature selection.To improve the accuracy of malicious traffic classification, a novel malicious traffic classification model based on Hypergraph Neural Networks (HGNN) was proposed.The traffic data was represented as hypergraph structures and HGNN was utilized to capture the spatial features of the traffic.By considering the interrelations among traffic data, HGNN provided a more accurate representation of the characteristics of malicious traffic.Additionally, to handle the temporal features of traffic data, Recurrent Neural Networks (RNN) was introduced to further enhance the model’s classification performance.The extracted spatiotemporal features were then used for the classification of malicious traffic, aiding in the detection of potential threats within the network.Through a series of ablative experiments, the effectiveness of the HGNN+RNN method was verified.These experiments demonstrate the model’s ability to efficiently extract spatiotemporal features from traffic, resulting in improved classification performance for malicious traffic.The model achieved outstanding classification accuracy across three widely-used open-source datasets: NSL-KDD (94% accuracy), UNSW-NB15 (95.6% accuracy), and CIC-IDS-2017 (99.08% accuracy).These results underscore the potential significance of the malicious traffic classification model based on hypergraph neural networks in enhancing network security and its capacity to better address the evolving landscape of network threats within the domain of network security.…”
    Get full text
    Article
  18. 1858

    Evaluation of Photo-Fenton and Photo-Fenton-Like Methods for Removing Direct Orange 118 Dye from Wastewater by Tamara Kawther Hussein, Nidaa Adil Jasim

    Published 2025-08-01
    “… Wastewater treatment has used efficient technology methods that can remove any pollutant. …”
    Get full text
    Article
  19. 1859

    High-throughput discovery of perturbation-induced topological magnons by Mohammed J. Karaki, Ahmed E. Fahmy, Archibald J. Williams, Sara Haravifard, Joshua E. Goldberger, Yuan-Ming Lu

    Published 2025-07-01
    “…In this work, we significantly advance the symmetry-based approach for identifying topological magnons through developing a fully automated algorithm, utilizing the theory of symmetry indicators, that enables a highly efficient and large-scale search for candidate materials hosting perturbation-driven topological magnons. …”
    Get full text
    Article
  20. 1860

    Phylo-rs: an extensible phylogenetic analysis library in rust by Sriram Vijendran, Tavis Anderson, Alexey Markin, Oliver Eulenstein

    Published 2025-07-01
    “…Phylo-rs focuses on the efficient and convenient deployment of software aimed at large-scale phylogenetic analysis and inference. …”
    Get full text
    Article