Showing 861 - 880 results of 1,079 for search 'implementing component 3 efficiency', query time: 0.15s Refine Results
  1. 861
  2. 862

    DEPANet: A Differentiable Edge-Guided Pyramid Aggregation Network for Strip Steel Surface Defect Segmentation by Yange Sun, Siyu Geng, Chengyi Zheng, Chenglong Xu, Huaping Guo, Yan Feng

    Published 2025-05-01
    “…DEPANet adopts an end-to-end encoder-decoder framework, where the encoder consisting of three key components: a backbone network, a Differentiable Edge Feature Pyramid network (DEFP), and Edge-aware Feature Aggregation Modules (EFAMs). …”
    Get full text
    Article
  3. 863

    SCH-Hunter: A Taint-Based Hybrid Fuzzing Framework for Smart Contract Honeypots by Haoyu Zhang, Baotong Wang, Wenhao Fu, Leyi Shi

    Published 2025-05-01
    “…(ii) For detection capabilities, SCH-Hunter is not only roughly on par with HoneyBadger in terms of precision and recall rate but also capable of detecting a wider variety of smart contract honeypot techniques. (iii) For the evaluation of components, we conducted three ablation studies to demonstrate that the proposed modules in SCH-Hunter significantly improve the framework’s detection capability, code coverage, and detection efficiency, respectively.…”
    Get full text
    Article
  4. 864
  5. 865

    THE MAIN TASK IS THE IMPROVEMENT OF THE ORGANIZATIONAL AND ECONOMIC MECHANISM FOR THE DEVELOPMENT OF RUSSIAN ENTERPRISES by G. B. Kleiner, N. L. Pirogov

    Published 2018-06-01
    “…According to the authors, this will improve the efficiency of the use of human capital in terms of all its components: ordinary workers, managers, specialists, owners.Conclusions and Relevance: currently, there is a situation in which the owners of enterprises (mainly large ones) have practically unlimited rights and very limited liability for the results of the work of their enterprises. …”
    Get full text
    Article
  6. 866

    Investigating the Effects of Sleep Health Education Based on Mobile Application on Sleep Quality of the Elderly: A Quasi-Experimental Study by Shahla Asiri, Hananeh Rahimi, Ehsan Kazemnezhad Leyli, Negar Pourvakhshoori

    Published 2025-03-01
    “…The intervention group received training on using the mobile-based sleep health educational application during two face-to-face sessions and was instructed to implement its programs daily for four weeks. Results The results of the study indicated that the average age of the elderly participants was 68.98±6.52 years, with the majority being female (60.1%), married (83.3%), living in urban areas (91.5%), and having a university education (52%). …”
    Get full text
    Article
  7. 867

    ASSESSMENT OF ENTRY LEVEL OF MARKETOLOGIST LEADERSHIP COMPETENCE FORMATION by Olena I. Kazakevych

    Published 2021-06-01
    “…It was found that approximately the same number of students have sufficient (EG – 51,7%, KG –52,9%) and low (EG – 36,9%, KG –35,3%) levels of leadership competence development indicators for all components, only a small number of students showed high level (EG – 10,02%, KG –11,8%). …”
    Get full text
    Article
  8. 868

    Highlight of Grid-connected PV systems in administrative buildings in Egypt by Dina Said, Marwa Mostafa, Kamelia Youssef, Hatem Waheed

    Published 2017-03-01
    “…Cost- effective EE measures should be implemented prior to or at the same time as implemented PV program. …”
    Get full text
    Article
  9. 869
  10. 870

    MDO of Robotic Landing Gear Systems: A Hybrid Belt-Driven Compliant Mechanism for VTOL Drones Application by Masoud Kabganian, Seyed M. Hashemi

    Published 2025-06-01
    “…The proposed system design utilizes compliant mechanisms featuring a series of three-flexure hinges (3SFH), to reduce the number of articulated drivetrain components and actuators. …”
    Get full text
    Article
  11. 871

    Situational assessment of age of suspicion, diagnosis, and intervention of hearing loss in pediatric population in India and factors that influence them by Indira C. Pazhayapisharath, Sandeep Maruthy

    Published 2024-11-01
    “…Conclusions: Relying on parental help-seeking behaviour cannot result in early identification and intervention required for optimum pediatric hearing healthcare. India should implement comprehensive early hearing detection and intervention program that includes universal newborn hearing screening and addresses awareness, accessibility, and affordability of hearing healthcare services as critical components.…”
    Get full text
    Article
  12. 872
  13. 873

    Symmetric physically unclonable functions of the arbiter type by V. N. Yarmolik, A. A. Ivaniuk

    Published 2024-03-01
    “…The proposed approach to the construction of symmetrical physically unclonable functions, based on the implementation of the Generate, Select and Switch functions by various components of the base element, has shown its efficiency and promise. …”
    Get full text
    Article
  14. 874

    A novel global MPPT method based on sooty tern optimization for photovoltaic systems under complex partial shading by Mohammed Taha Kaaitan, Rashid Ali Fayadh, Zuhair S. AL-sagar, Salam J. Yaqoob, Mohit Bajaj, Mebratu Sintie Geremew

    Published 2025-07-01
    “…A comprehensive simulation framework was implemented in MATLAB/Simulink, employing a 3 × 3 PV array (3 kW capacity) and a boost converter to test the proposed method across four shading scenarios, including highly irregular and dynamic patterns. …”
    Get full text
    Article
  15. 875
  16. 876
  17. 877

    Highly Robust South Fork Zumbro River Flow Forecasting Based on Deep Temporal Modeling by Yingjun Sun, Peixia Wang, Chong Wang, Xiaodong Wang, Hailin Feng, Wei Wang, Kai Fang

    Published 2025-10-01
    “…Accurate flow forecasting enables decision makers to allocate resources efficiently, implement early flood prevention measures, and protect ecosystems. …”
    Get full text
    Article
  18. 878

    Security decision method for the edge of multi-layer satellite network based on reinforcement learning by Peiliang ZUO, Shaolong HOU, Chao GUO, Hua JIANG, Wenbo WANG

    Published 2022-06-01
    “…This paper uses deep reinforcement learning algorithms to implement edge security decisions for satellite networks. …”
    Get full text
    Article
  19. 879

    Phish Fighter: Self Updating Machine Learning Shield Against Phishing Kits Based on HTML Code Analysis by Gabriela Brezeanu, Alexandru Archip, Codrut-Georgian Artene

    Published 2025-01-01
    “…These features are then fed to clustering and classification components to detect common structural patterns without relying on textual or visual content. …”
    Get full text
    Article
  20. 880

    Structural Analysis of a Modular High-Concentration PV System Operating at ~1200 Suns by Taher Maatallah, Mussad Alzahrani, William Cameron, Katie Shanks, Souheil El Alimi, Tapas K. Mallick, Sajid Ali

    Published 2025-05-01
    “…The integration necessitated implementation of a counterbalance mechanism along with comprehensive static load analysis to ensure alignment stability and mechanical resilience. …”
    Get full text
    Article