Search alternatives:
resource » resources (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
Showing 961 - 980 results of 1,810 for search '((( resource OR resources) detection function ) OR ( source detection function ))', query time: 0.33s Refine Results
  1. 961
  2. 962

    Lipoprotein N-terminal modification in Bacillus: a new paradigm for extracellular acetylation and species-dependent Toll-like receptor 2 immunomodulation by Gloria Komazin, Rachel M. Wigmore, Aditi M. Ranade, Amena A. Rizk, John H. Gardiner, Timothy C. Meredith

    Published 2025-08-01
    “…While Ac-LP biosynthetic pathway genes appear to be universally conserved in all Bacillus spp., those associated with pathogenic lineages have often lost function. In B. anthracis strains, LhaT has been inactivated by insertion of poly-tyrosine runs of variable length that favors chemotype conversion to lyso-LP and evasion of TLR2 detection. …”
    Get full text
    Article
  3. 963

    Estimating fish stock biomass using a Bayesian state-space model: accounting for catchability change due to technological progress by Makoto Nishimoto, Yoshinori Aoki, Naoto Matsubara, Paul Hamer, Yuichi Tsuda

    Published 2024-12-01
    “…The assessment of trends in fish stocks using long-term time-series data is important for effective fisheries resource management. Despite technological advancements in recent decades, the resulting increase in fisheries catch potential with applied effort is often not adequately considered in stock assessments. …”
    Get full text
    Article
  4. 964
  5. 965

    Individual ZnO–Ag Hybrid Nanorods for Synergistic Fluorescence Enhancement Towards Highly Sensitive and Miniaturized Biodetection by Marion Ryan C. Sytu, Jong-in Hahm

    Published 2025-04-01
    “…Hybrid nanostructures can be engineered to exhibit superior functionality beyond the level attainable from each of the constituent nanomaterials by synergistically integrating their unique properties. …”
    Get full text
    Article
  6. 966

    Comparing soil microbial diversity in smallholder plantain backyard gardens and main farms in Western and Central Africa by Manoj Kaushal, Yao Adjiguita Kolombia, Amos Emitati Alakonya, Cargele Masso

    Published 2025-08-01
    “…Beneficial genera such as Bacillus, Streptomyces, Bradyrhizobium, and Paenibacillus were also detected. Functional predictions based on COG and KEGG databases indicated notable differences in microbial functional potential between the two settings. …”
    Get full text
    Article
  7. 967
  8. 968

    ParticleHolography.jl: Holographic particle measurement in Julia by Dai Nakai, Yohsuke Tanaka

    Published 2025-02-01
    “…This comprehensive software provides an end-to-end processing pipeline encompassing a wide range of functionalities: preprocessing, including background removal and camera calibration; three-dimensional reconstruction through diffraction calculations; particle analysis, including detection and tracking; and result visualization. …”
    Get full text
    Article
  9. 969
  10. 970

    Sigma Delta Modulation Controller and Associated Cybersecurity Issues with Battery Energy Storage Integrated with PV-Based Microgrid by Syeda Afra Saiara, Mohd. Hasan Ali

    Published 2024-12-01
    “…Battery energy storage systems (BESSs) play a crucial role in integrating renewable energy sources into microgrids. However, robust BESS controllers are needed to carry out this function properly. …”
    Get full text
    Article
  11. 971

    iMeta Conference 2024: Building an innovative scientific research ecosystem for microbiome and One Health by Yao Wang, Huiyu Hou, Hao Luo, Jiani Xun, Chuang Ma, Haifei Yang, Defeng Bai, Salsabeel Yousuf, Hujie Lyu, Tianyuan Zhang, Xiulin Wan, Xiaofang Yao, Tengfei Ma, Yuanping Zhou, Zhihao Zhu, Meiyin Zeng, Sanqi An, Qing Bai, Yao Bai, Guodong Cao, Tingting Cao, Yongkai Cao, Chihmin Chang, Lijia Chang, Bo Chen, Dai Chen, Dijun Chen, Hanqing Chen, Jiali Chen, Jinfeng Chen, Wei‐Hua Chen, Xinhai Chen, Yue Chen, Zhangran Chen, Cheng Cheng, Quan Cheng, Xi‐Jian Dai, Chaowen Deng, Feilong Deng, Jingwen Deng, Chang‐Sheng Dong, Lei Dong, Lianhui Duan, Yi Duan, Qingjie Fan, Chao Fang, Tingyu Fang, Wensheng Fang, Zhencheng Fang, Min Fu, Minjie Fu, Cong Gao, Hao Gao, Weiwei Gao, Xinrui Gao, Yi‐Zhou Gao, Yan Geng, Wenping Gong, Shaohua Gu, Xia Gu, Zhengquan Gu, Jian‐Wei Guo, Junjie Guo, Qiuyan Guo, Xiang Guo, Xiaoqian Guo, Dongfei Han, Ziyi Han, Yanan Hao, Jiale He, Jianquan He, Jianyu He, Ruolin He, Guosen Hou, Bin Hu, Haibo Hu, Yi Hu, Yongfei Hu, Yucan Hu, Guanyin Huang, Haiyun Huang, Jiaomei Huang, Shenghui Huang, Baolei Jia, Xingxing Jian, Chao Jiang, Kun Jiang, Lanyan Jiang, Shuaiming Jiang, Jian‐Yu Jiao, Hao Jin, Jiajia Jin, Siyuan Kong, Xinxing Lai, Yuxin Leng, Bang Li, Bing Li, Fang Li, Hao Li, Huanjie Li, Jing Li, Kai Li, Lanqi Li, Leyuan Li, Minghan Li, Pengsong Li, Wei Li, Wei Li, Xianyu Li, Li Xuemeng, Yafei Li, Yuantao Li, Zhi Li, Liqin Liang, Rong Liang, Zhuobin Liang, Qingya Liu, Dejian Liu, Huiheng Liu, Jinchao Liu, Li Liu, Lihui Liu, Moyang Liu, Ran Liu, Shuai Liu, Tianyang Liu, Wei Liu, Wenjuan Liu, Xiaomin Liu, Yang Liu, Yichen Liu, Yina Liu, Yuan Liu, Zhe Liu, Zhipeng Liu, Zhiquan Liu, Chunhao Long, Yun Long, Changying Lu, Chao Lu, Cheng Lu, Qi Lu, Yaning Luan, Peng Luo, Sheng Luo, Ning Ma, Xiao‐Ya Ma, Yan Ma, Wenjun Mao, Yuanfa Meng, Yan Ni, Yawen Ni, Kang Ning, Dongze Niu, Kai Peng, Zhengwu Peng, Xubo Qian, Zhiguang Qiu, Hui Qu, Zepeng Qu, Yan Ren, Zhigang Ren, Youming Shen, Lin Shi, Linlin Shi, Wenxuan Shi, Yongpeng Shi, Tianyuan Song, Xiaohui Song, Xiaoming Song, Xiaowei Song, Qi Su, Yufan Su, Lifang Sun, Qiang Sun, Tiefeng Sun, Yunke Sun, Hua Tang, Wenjing Tang, Tao Yu, Simon Tian, Shuo Wang, Bowen Wang, Cheng Wang, Wang Jin, Leli Wang, Liangliang Wang, Lixiao Wang, Mingbang Wang, Ming‐Ke Wang, Pingyi Wang, Shaolin Wang, Shaopu Wang, Xinxia Wang, Xueqiang Wang, Mi Wei, Yan Wei, Yanxia Wei, Yongjun Wei, Chaoliang Wen, Xin Wen, Linkun Wu, Shengru Wu, Yuting Wu, Shuting Xia, Xiaodong Xia, Yu Xia, Xionggen Xiang, Chuanxing Xiao, Weihua Xiao, Yingping Xiao, Ruohan Xie, Rui Xing, Hui Xu, Wei Xu, Zhimin Xu, Hongliang Xue, Chao Yan, Qiu‐Long Yan, Shaofei Yan, Xiuchuan Yan, Mengli Yang, Yufan Yang, Zhipeng Yang, Ziyuan Yang, Guixiang Yao, Yanlai Yao, Xianfu Yi, Chong Yin, Mingliang Yin, Shicheng Yu, Ying Yu, Yongyao Yu, Fusong Yuan, Shao‐Lun Zhai, Bo Zhang, Chen Zhang, Fang Zhang, Feng‐Li Zhang, Hengguo Zhang, Jinping Zhang, Junya Zhang, Kun Zhang, Li Zhang, Lin Zhang, Lingxuan Zhang, Meng Zhang, Qian Zhang, Runan Zhang, Tongtong Zhang, Tongxue Zhang, Weipeng Zhang, Yong Zhang, Yuchao Zhang, Yujun Zhang, Zeng Zhang, Zhengxiao Zhang, Zhi‐Feng Zhang, Boxi Zhao, Yanyan Zhao, Yibing Zhao, Ziwei Zhao, Diwei Zheng, Ying Zheng, Wenqiang Zhi, Jixin Zhong, Xiangjian Zhong, Wei Zhou, Xin Zhou, Zhemin Zhou, Zhichao Zhou, Congmin Zhu, Feiying Zhu, Xiaodie Zhu, Yutian Zou, Hongling Zhou, Lei Lei, Yanliang Bi, Hubing Shi, Hui‐Zeng Sun, Shuangxia Jin, Wenkai Ren, Lei Dai, Xin Wang, Canhui Lan, Hongwei Liu, Shuang‐Jiang Liu, Yulong Yin, Chun‐Lin Shi, Ren‐You Gan, Fangqing Zhao, Jun Yu, Tong Chen, Xin Hong, Hua Yang, Bangzhou Zhang, Shifu Chen, Xiaodong Li, Yunyun Gao, Yong‐Xin Liu

    Published 2024-12-01
    Get full text
    Article
  12. 972
  13. 973

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  14. 974

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  15. 975
  16. 976

    JASBO: Jaya Average Subtraction Based Optimization with Deep Learning Model for Multi-Classification of Infectious Disease from Unstructured Data by Vian Sabeeh, Ahmed Bahaaulddin A. Alwahhab, Ali Abdulmunim Ibrahim Al-kharaz

    Published 2024-10-01
    “…Medical documents are considered an essential source for modern, invented, and robust analysis methods for accurate infection diagnoses. …”
    Get full text
    Article
  17. 977
  18. 978

    The role of internal auditors in preventing financial fraud in the Republic of Serbia by Jeremić Nebojša, Jakovljević Nemanja

    Published 2023-01-01
    “…The findings and recommendations presented in the paper can serve as a valuable resource for policymakers, regulatory bodies and organizations seeking to strengthen their financial fraud defense mechanisms and their internal audit function.…”
    Get full text
    Article
  19. 979

    Fine-grained access control method for private data in android system by Gang Liu, Guofang Zhang, Quan Wang, Shaomin Ji, Lizhi Zhang

    Published 2019-03-01
    “…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
    Get full text
    Article
  20. 980