Search alternatives:
resource » source (Expand Search)
Showing 781 - 800 results of 1,810 for search '((( resource OR resource) detection function ) OR ( sources detection function ))', query time: 0.28s Refine Results
  1. 781

    State of the art in remote sensing monitoring of carbon dynamics in African tropical forests by Thomas Bossy, Thomas Bossy, Thomas Bossy, Philippe Ciais, Philippe Ciais, Solène Renaudineau, Liang Wan, Bertrand Ygorra, Elhadi Adam, Nicolas Barbier, Marijn Bauters, Nicolas Delbart, Nicolas Delbart, Frédéric Frappart, Tawanda Winmore Gara, Eliakim Hamunyela, Suspense Averti Ifo, Gabriel Jaffrain, Philippe Maisongrande, Maurice Mugabowindekwe, Maurice Mugabowindekwe, Theodomir Mugiraneza, Theodomir Mugiraneza, Cassandra Normandin, Conan Vassily Obame, Marc Peaucelle, Camille Pinet, Pierre Ploton, Le Bienfaiteur Sagang, Martin Schwartz, Valentine Sollier, Bonaventure Sonké, Bonaventure Sonké, Paul Tresson, Aurélien De Truchis, An Vo Quang, Jean-Pierre Wigneron

    Published 2025-03-01
    “…Future developments in remote sensing should examine how multi-sensor integration of high-resolution data from instruments such as Planet, Tandem-X, SPOT and improved AI methods can refine forest composition, carbon storage and function maps, enhance large-scale monitoring of tree height and biomass dynamics, and improve forest degradation and deforestation detection down to tree level. …”
    Get full text
    Article
  2. 782
  3. 783

    Attack traffic allocation and load balancing mechanism for SDN by LI Man, ZHOU Huachun, XU Qi, DENG Shuangxing, ZOU Tao, ZHANG Ruyun

    Published 2025-03-01
    “…The traffic allocation problem was modeled as a Markov decision process (MDP), where the reward function included both resource consumption and delay. …”
    Get full text
    Article
  4. 784

    Experimental study on solution possibilities of multiextremal optimization problems through heuristic methods by Rudolf A. Neydorf, Ivan V. Chernogorov, Orkhan Takhir Yarakhmedov, Victor V. Polyakh

    Published 2015-12-01
    “…Each method can provide any desired accuracy of the extremum problem solution, and it utilizes an acceptable time resource.…”
    Get full text
    Article
  5. 785
  6. 786
  7. 787

    Sequence analysis of tyrosine recombinases allows annotation of mobile genetic elements in prokaryotic genomes by Georgy Smyshlyaev, Alex Bateman, Orsolya Barabas

    Published 2021-05-01
    “…Tyrosine recombinase (YR) proteins drive MGE mobilization and could provide markers for MGE detection, but they constitute a diverse family also involved in housekeeping functions. …”
    Get full text
    Article
  8. 788

    A Dataset of Lower Band Whistler Mode Chorus and Exohiss with Instrumental Noise Thresholds by Ondřej Santolík, Ivana Kolmašová, Ulrich Taubenschuss, Miroslav Hanzelka, David P. Hartley

    Published 2025-07-01
    “…We also remove all data points which may be contaminated by instrumental noise using a newly developed method to define detection thresholds as a function of frequency, time, and instrument settings. …”
    Get full text
    Article
  9. 789

    Early Fault-Tolerant Quantum Algorithms in Practice: Application to Ground-State Energy Estimation by Oriel Kiss, Utkarsh Azad, Borja Requena, Alessandro Roggero, David Wakeham, Juan Miguel Arrazola

    Published 2025-04-01
    “…Additionally, we provide quantitative resource estimates, demonstrating a constant factor improvement in the number of samples required to detect a specified change in CDF. …”
    Get full text
    Article
  10. 790
  11. 791
  12. 792

    Feature selection using a multi-strategy improved parrot optimization algorithm in software defect prediction by Qi Fei, Guisheng Yin, Zhian Sun

    Published 2025-04-01
    “…Software defect detection is a critical research topic in the field of software engineering, aiming to identify potential defects during the development process to improve software quality and reduce maintenance costs. …”
    Get full text
    Article
  13. 793

    Utilizing a Transient Electromagnetic Inversion Method with Lateral Constraints in the Goaf of Xiaolong Coal Mine, Xinjiang by Yingying Zhang, Bin Xie, Xinyu Wu

    Published 2025-08-01
    “…The abandoned goaf resulting from coal resource integration in China poses a significant threat to coal mine safety. …”
    Get full text
    Article
  14. 794

    Genome-Wide Scan for Copy Number Variations in Chinese Merino Sheep Based on Ovine High-Density 600K SNP Arrays by Yuezhen Tian, Jing An, Xinning Zhang, Jiang Di, Junmin He, Ayinuer Yasen, Yanpin Ma, Gaohaer Sailikehan, Xixia Huang, Kechuan Tian

    Published 2024-10-01
    “…To generate a comprehensive CNVR map of the ovine genome, we conducted genome-wide CNV detection using genotyping data from 285 fine wool sheep. …”
    Get full text
    Article
  15. 795

    Research on Personnel Image Segmentation Based on MobileNetV2 H-Swish CBAM PSPNet in Search and Rescue Scenarios by Di Zhao, Weiwei Zhang, Yuxing Wang

    Published 2024-11-01
    “…In post-disaster search and rescue scenarios, the accurate image segmentation of individuals is essential for efficient resource allocation and effective rescue operations. …”
    Get full text
    Article
  16. 796

    CRISPR-Cas- and Aptamer-based Systems for Diagnosing Pathogens: A Review by Helin Yu, Wenwen Jing, Xunjia Cheng

    Published 2023-04-01
    “…Finally, we discuss Cas14-based tools as functionally stronger platforms for the detection of non-nucleic acid targets.…”
    Get full text
    Article
  17. 797
  18. 798

    Chronic Kidney Disease: Bridging Conventional Therapeutics and Emerging Molecular Innovations by Shao-feng Wang, Jie Gong, Hai-ying Zhang, Hao-jun Dai, Jin-jin Shi, Jing-wen Ling, Ke-qing Dong, Rosnani Hashim

    Published 2025-08-01
    “…The shortcomings of current approaches highlight the need for strategies to mitigate disease progression and restore renal function, particularly during the early phases of the disease. …”
    Get full text
    Article
  19. 799

    Optimizing Trade-Offs in Reliability, Security, and Freshness for Integrated Communication, Sensing, and Over-the-Air Computing by Tianyu Ren, Miao Zhang, Fangyu Wang, Kaiyuan Zheng

    Published 2025-01-01
    “…Specifically, considering statistical CSI, the target detection and AirComp aggregation errors are derived, and the upper bound of the security information age violation probability is obtained using stochastic network calculus and moment generating function theory. …”
    Get full text
    Article
  20. 800