Showing 1,941 - 1,960 results of 7,085 for search 'more function (general OR (generated OR generated))', query time: 0.23s Refine Results
  1. 1941

    Tremor and its duration‐amplitude distribution at Popocatépetl volcano, Mexico by R. Arámbula‐Mendoza, C. Valdés‐González, N. Varley, T. A. Reyes‐Pimentel, B. Juárez‐García

    Published 2016-09-01
    “…Abstract The duration‐amplitude distribution was calculated for the tremor observed at Popocatépetl volcano during episodes of activity in 2000 and 2012–2014. An exponential function was used to obtain a good fit for the duration‐amplitude distribution, and the source of volcanic tremor is probably generated by the transportation of magmatic fluids and its coupling with the host rock within the volcanic conduit. …”
    Get full text
    Article
  2. 1942

    Design of smart agriculture based on big data and Internet of things by Chunling Li, Ben Niu

    Published 2020-05-01
    “…The algorithm in this article can realize the functions of real-time data communication and information processing more efficiently, and has a significant role in promoting agricultural informatization and improving the level of agricultural modernization.…”
    Get full text
    Article
  3. 1943

    Multipotent Mesenchymal Stem Cell Treatment for Discogenic Low Back Pain and Disc Degeneration by Jeffrey Zeckser, Michael Wolff, Jason Tucker, Josh Goodwin

    Published 2016-01-01
    “…Low back pain with resultant loss of function, decreased productivity, and high economic costs is burdensome for both the individual and the society. …”
    Get full text
    Article
  4. 1944

    DCW-YOLO: Road Object Detection Algorithms for Autonomous Driving by Hongge Ren, Fangke Jing, Song Li

    Published 2025-01-01
    “…Finally, the deleterious gradients generated by low-quality examples are reduced using the Wise-IoU v3 bounding box loss function in conjunction with a dynamic non-monotonic focusing mechanism utilizing an anchor box gradient gain assignment strategy. …”
    Get full text
    Article
  5. 1945

    Integer programming‐based non‐uniform window decoding schedules for spatially coupled low‐density parity‐check codes by Sirawit Khittiwitchayakul, Watid Phakphisut, Pornchai Supnithi

    Published 2022-10-01
    “…Our design is more flexible than the previous design, because the integer programming‐based design allows reduction of update numbers and performance losses through the constraints function, whereas the previous design requires observation of variable node update behaviour. …”
    Get full text
    Article
  6. 1946

    Design of the optimal groundwater quality monitoring network using a genetic algorithm based optimization approach by Somaye Janatrostami, Ali Salahi

    Published 2020-06-01
    “…In this paper, two conflicting objective functions are simultaneously solved. The first objective function is the maximization of the match between the interpolated EC distributions obtained from data of the all available monitoring wells and the wells from the newly generated network. …”
    Get full text
    Article
  7. 1947

    The relationship between protein-energy wasting and cognitive impairment in patients receiving maintenance hemodialysis by Jun Liu, Jingfang Wan, Kehong Chen, Yani He, Weiwei Zhang, Jiyuan Luo, Dan Li

    Published 2025-07-01
    “…Those combined with PEW were more likely to develop CI, and to suffer from more severe CI. …”
    Get full text
    Article
  8. 1948

    Rapid mutation of endogenous zebrafish genes using zinc finger nucleases made by Oligomerized Pool ENgineering (OPEN). by Jonathan E Foley, Jing-Ruey J Yeh, Morgan L Maeder, Deepak Reyon, Jeffry D Sander, Randall T Peterson, J Keith Joung

    Published 2009-01-01
    “…<h4>Methodology/principal findings</h4>Here we show that OPEN can also be used to generate ZFNs that function efficiently in zebrafish. …”
    Get full text
    Article
  9. 1949

    Hardcoded vulnerability detection approach for IoT device firmware by Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU

    Published 2022-10-01
    “…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
    Get full text
    Article
  10. 1950

    PERHITUNGAN NUMERIK RAPAT KEADAAN GRAPHENE BILAYER DENGAN MODEL TIGHT-BINDING MENGGUNAKAN METODE RAMBATAN WAKTU TROTTER-SUZUKI by Wahyu Setiawan

    Published 2023-08-01
    “…The number of atoms (sites) reviewed affects the regularity of the DOS calculation results. The more atoms that are reviewed, the more orderly the DOS calculations will be generated. …”
    Get full text
    Article
  11. 1951

    Halogencarbene-free Ciamician-Dennstedt single-atom skeletal editing by Shaopeng Liu, Yong Yang, Qingmin Song, Zhaohong Liu, Paramasivam Sivaguru, Yifan Zhang, Graham de Ruiter, Edward A. Anderson, Xihe Bi

    Published 2024-11-01
    “…Herein, we report a general methodology for the Ciamician-Dennstedt reaction using α-halogen-free carbenes generated in situ from N-triftosylhydrazones. …”
    Get full text
    Article
  12. 1952
  13. 1953

    Exploring public sector workforce attitudes toward AI competence and its impact on AI competence self-assessment by Gatis Lāma, Agnese Lastovska

    Published 2025-01-01
    “…Additionally, more than half of the respondents expressed limited trust in AI-generated information, with only seven participants fully trusting AI. …”
    Get full text
    Article
  14. 1954

    Do TFEU provisions on free movement of goods apply to private parties: Expanded vertical or horizontal direct effect? by Savković Vladimir

    Published 2018-01-01
    “…Finally, based on the case law analysis, the conclusion is offered that in terms of the recent developments in the field of free movement of goods the CJEU has opted for further expansion of the concept of vertical direct effect in order to both avoid establishing the horizontal direct effect of the freedom of movement of goods and safeguard the functioning of internal market against certain impediments generated by private parties.…”
    Get full text
    Article
  15. 1955

    Advances in the study of the role of high-frequency mutant subunits of the SWI/SNF complex in tumors by Jiumei Zhao, Jing Zhu, Yu Tang, Kepu Zheng, Ziwei Li

    Published 2024-12-01
    “…As a catalytic subunit of the SWI/SNF complex, SMARCA4 has ATPase activity that catalyzes the hydrolysis of ATP to produce energy and power the chromatin remodeling complex, which is critical to the function of the SWI/SNF complex. The study data indicate that approximately 25% of cancers have one or more SWI/SNF subunit genetic abnormalities, and at least nine different SWI/SNF subunits have been identified as having repeated mutations multiple times in various cancers, suggesting that mutations affecting SWI/SNF subunits may introduce vulnerabilities to these cancers. …”
    Get full text
    Article
  16. 1956

    Public security patrol path planning recommendation method based on wolf-pack optimization algorithm using DAF and BRS by Dongxing Wang, Gaomin Zhang, Fangbo Wu, Zhiyang Huang, Yiping Chen

    Published 2025-06-01
    “…Firstly, an optimization objective function regarding the public security patrol path planning (S3P-Function) was abstracted from the actual situation; Moreover, this paper proposed an improved wolf-pack optimization algorithm named DAF-BRS-CWOA using Dynamic-Adjustment-Factor(DAF) and Balanced-Raid-Strategy (BRS), and DAF devoted to adjust the overall wolf-pack running strategy by dynamically adjusting the number of airdropped wolves during the stage of Summon-Raid while BRS with symmetric property was to improve both the algorithm’s global exploration as well as the local development capabilities by increasing the number of checking locations, that means not only checking the reverse position of the current wolf, but also the positions generated according to certain rules between the reverse position of the current wolf and the current optimal wolf during the stage of Summon-Raid; Finally, DAF-BRS-CWOA was adopted to optimize S3P-Function, forming a public security patrol path planning recommendation method based on DAF-BRS-CWOA (S3PRM-DAF-BRS-CWOA). 30 independent numerical experiments were conducted on 20 public classical datasets by DAF-BRS-CWOA compared with GA, PSO, WDX-WPOA. …”
    Get full text
    Article
  17. 1957

    Large Language Model-Guided SARSA Algorithm for Dynamic Task Scheduling in Cloud Computing by Bhargavi Krishnamurthy, Sajjan G. Shiva

    Published 2025-03-01
    “…Nowadays, more enterprises are rapidly transitioning to cloud computing as it has become an ideal platform to perform the development and deployment of software systems. …”
    Get full text
    Article
  18. 1958

    Constructing a web recommender system using web usage mining and user’s profiles by T. Mombeini, A. Harounabadi, J. Rezaeian Sheshdeh

    Published 2014-12-01
    “…Date is of importance since it is more possible for users to request new pages more than old ones and old pages are less probable to be viewed, as users mostly look for new information. …”
    Get full text
    Article
  19. 1959

    The “What” of Athletes’ Goal Pursuit and Its Relationships to Goal-Related Processes and Well- and Ill-Being by Natalia Martínez-González, Francisco L. Atienza, Joan L. Duda, Isabel Balaguer

    Published 2025-05-01
    “…The results showed that intrinsic goals, assessed in an open-ended format, were more heterogeneous in terms of content, and more common among athletes than extrinsic goals. …”
    Get full text
    Article
  20. 1960

    Deformation anisotropy and lamellar α re-orientation of TC17 alloy under the different slip modes of HCP structure by Cong Li, Jiao Luo

    Published 2024-11-01
    “…Therein, the variation of the rotation factor with tilt angle conforms to the quadratic function, reaching a maximum value around 45°. When the rotation factor is small, the ratio of (01–11) [1–210] slip system with small Burgers vector at the phase boundary is large, the rotation tendency is poor, and the intragranular dislocation slip replaces the grain rotation as the strain accommodation mechanism, the lamella is more prone to globularization. …”
    Get full text
    Article