Search alternatives:
resource » resources (Expand Search)
source » sources (Expand Search)
Showing 821 - 840 results of 1,810 for search '((( resource OR resource) detection function ) OR ( source detection function ))', query time: 0.33s Refine Results
  1. 821

    Integrated metabolomic and transcriptomic analyses of flavonoid accumulation in different cultivars of Platostoma palustre by Jiankai You, Zhongdong Wang, Lishan Zeng, Yimeng Xia, Ying Lin, Ruoting Zhan, Guifang Zhang

    Published 2024-12-01
    “…Abstract Background Platostoma palustre is a kind of plant resource with medicinal and food value, which has been differentiated into many different varieties after a long period of breeding. …”
    Get full text
    Article
  2. 822

    Mineral identification in thin sections using a lightweight and attention mechanism by Xin Zhang, Wei Dang, Jun Liu, Zijuan Yin, Guichao Du, Yawen He, Yankai Xue

    Published 2025-04-01
    “…Mineral identification is foundational to geological survey research, mineral resource exploration, and mining engineering. Considering the diversity of mineral types and the challenge of achieving high recognition accuracy for similar features, this study introduces a mineral detection method based on YOLOv8-SBI. …”
    Get full text
    Article
  3. 823

    An Improved Fitting Method for Predicting the Zernike Coefficient–Wavelength Curves by Fang Wang, Qiyuan Zhang, Haoyu Wang, Dayong Zhu, Huaikang Zhu, Wenxin Jia, Sen Han

    Published 2021-01-01
    “…Broadband transmitted wavefront measurement is a detection method that uses transmitted wavefronts at a few specific wavelengths though a function of Zernike coefficients and wavelength to predict other transmitted wavefronts at any wavelength within a certain range. …”
    Get full text
    Article
  4. 824

    Advances in key technologies for the management, restoration, development, and utilization of coal mining subsidence areas by Zhuanghan MENG, Yutao WANG, Yanzhe TIAN

    Published 2025-07-01
    “…BackgroundCoal mining subsidence areas, formed by the exploitation of coal resources, have emerged as severe challenges to the construction of ecological civilization and the sustainable development of the social economy in China. …”
    Get full text
    Article
  5. 825

    An Observational Study on Pre-natal Diagnosis of Congenital Talipes Equinovarus by Gaurav Vatsa, Saurabh Suman, Siddharth Kumar Singh

    Published 2025-07-01
    “…Future research should assess long-term functional outcomes and optimize pre-natal screening protocols, particularly in resource-limited settings, to ensure comprehensive CTEV management.…”
    Get full text
    Article
  6. 826

    A Novel Method for Traceability of Crude Oil Leakage on Offshore Platforms Based on Improved YOLOv5 Model Multi-Target Identification and Correlation Analysis by Zhenghua Wang, Shihai Zhang, Chongnian Qu, Zongyi Zhang, Feng Sun

    Published 2025-01-01
    “…Based on the positional relationship between the spilled crude oil target and the source target detection anchor frame, the possible source targets are classified into three association levels and assigned different association weights. …”
    Get full text
    Article
  7. 827
  8. 828

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  9. 829

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  10. 830

    Investigating the AGN-neutrino connection with public IceCube data by Kuhlmann Julian, Capel Francesca

    Published 2025-01-01
    “…We present the first application of a newly developed hierarchical Bayesian analysis framework for the detection of point-like sources of high-energy neutrinos. …”
    Get full text
    Article
  11. 831
  12. 832

    Bearing Small Sample Fault Diagnosis based on Data Generation and Transfer Learning by Dinghui Wu, Qin Fang, Chuyi Wu

    Published 2020-11-01
    “…First, the source dataset is trained on the training network to obtain the source model, and then a small amount of drive-end data is used as the target dataset to fine-tuning to obtain the target model. …”
    Get full text
    Article
  13. 833

    Fine-grained access control method for private data in android system by Gang Liu, Guofang Zhang, Quan Wang, Shaomin Ji, Lizhi Zhang

    Published 2019-03-01
    “…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
    Get full text
    Article
  14. 834

    An atypical presentation of autoimmune hepatitis with delayed menarche in a Nigerian adolescent: a case report by Promise Udoka Asogwa, Bruno Basil, Winifred Njideka Adiri, Nelson Ugwu, Gideon Ekene Anigbo, Evaristus Offia, Casmir Orjioke

    Published 2025-01-01
    “…It emphasizes the need for increased awareness and better diagnostic resources to improve early detection and management of autoimmune hepatitis in sub-Saharan Africa. …”
    Get full text
    Article
  15. 835

    Proteinuria Ratio and Related Factors İn Type 2 DM Patients: A Hospital-Based Study in Somalia by Gökhan Alıcı, Ahmed Muhammad Bashir

    Published 2025-02-01
    “…Understanding these factors is crucial for early detection and intervention to prevent kidney damage in this population. …”
    Get full text
    Article
  16. 836

    Research on Interval Probability Prediction and Optimization of Vegetation Productivity in Hetao Irrigation District Based on Improved TCLA Model by Jie Ren, Delong Tian, Hexiang Zheng, Guoshuai Wang, Zekun Li

    Published 2025-05-01
    “…This model employs TTHHO to effectively navigate the search space and adaptively optimize network node positions, integrates CNN-LSSVM for feature extraction and regression analysis, and incorporates ABKDE for probability density function estimation and outlier detection, resulting in accurate interval probability prediction and enhanced model resilience to interference. …”
    Get full text
    Article
  17. 837

    A Novel Approach to Cognitive Load Measurement in N-Back Tasks Using Wearable Sensors, Empirical Mode Decomposition With Machine Learning, and Explainable AI for Feature Importance by Aakanksha Dayal, Ziaullah Khan, Kiramat Ullah, Hee-Cheol Kim

    Published 2025-01-01
    “…This study introduces a novel approach for detecting mental workload and stress, utilizing ECG and Fingertip-PPG data from the MAUS dataset. …”
    Get full text
    Article
  18. 838

    Efficient analysis of drug interactions in liver injury: a retrospective study leveraging natural language processing and machine learning by Junlong Ma, Heng Chen, Ji Sun, Juanjuan Huang, Gefei He, Guoping Yang

    Published 2024-12-01
    “…Electronic medical records contain comprehensive clinical information and have gained increasing attention as a potential resource for DDI detection. However, a substantial portion of adverse drug reaction (ADR) information is hidden in unstructured narrative text, which has yet to be efficiently harnessed, thereby introducing bias into the research. …”
    Get full text
    Article
  19. 839

    Lactylation: From Homeostasis to Pathological Implications and Therapeutic Strategies by Xi Chen, Yixiao Yuan, Fan Zhou, Lihua Li, Jun Pu, Yong Zeng, Xiulin Jiang

    Published 2025-06-01
    “…Moreover, we discuss advanced detection technologies and potential therapeutic interventions targeting lactylation pathways. …”
    Get full text
    Article
  20. 840