Search alternatives:
resource » resources (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
resource » resources (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
-
941
-
942
Estimating fish stock biomass using a Bayesian state-space model: accounting for catchability change due to technological progress
Published 2024-12-01“…The assessment of trends in fish stocks using long-term time-series data is important for effective fisheries resource management. Despite technological advancements in recent decades, the resulting increase in fisheries catch potential with applied effort is often not adequately considered in stock assessments. …”
Get full text
Article -
943
-
944
Individual ZnO–Ag Hybrid Nanorods for Synergistic Fluorescence Enhancement Towards Highly Sensitive and Miniaturized Biodetection
Published 2025-04-01“…Hybrid nanostructures can be engineered to exhibit superior functionality beyond the level attainable from each of the constituent nanomaterials by synergistically integrating their unique properties. …”
Get full text
Article -
945
Audio recognition method of belt conveyor roller fault based on convolutional neural network and linear regression
Published 2025-06-01“…The results show that the detection rate of roller fault reaches 95.79 %, and the detection accuracy reaches 95.60 %.…”
Get full text
Article -
946
Comparing soil microbial diversity in smallholder plantain backyard gardens and main farms in Western and Central Africa
Published 2025-08-01“…Beneficial genera such as Bacillus, Streptomyces, Bradyrhizobium, and Paenibacillus were also detected. Functional predictions based on COG and KEGG databases indicated notable differences in microbial functional potential between the two settings. …”
Get full text
Article -
947
Comprehensive analysis of the NAC transcription factor gene family in Sophora tonkinensis Gagnep
Published 2025-04-01Get full text
Article -
948
ParticleHolography.jl: Holographic particle measurement in Julia
Published 2025-02-01“…This comprehensive software provides an end-to-end processing pipeline encompassing a wide range of functionalities: preprocessing, including background removal and camera calibration; three-dimensional reconstruction through diffraction calculations; particle analysis, including detection and tracking; and result visualization. …”
Get full text
Article -
949
The global, regional, and national brain and CNS cancers burden and trends from 1990 to 2021
Published 2025-06-01Get full text
Article -
950
Multiwavelength Constraints on the Local Black Hole Occupation Fraction
Published 2024-01-01“…We also constrain the extremely low-luminosity end ( L _bol ≲ 10 ^40 erg s ^−1 ) of the active galactic nucleus (AGN) luminosity functions at z = 0. Our AGN luminosity functions are broadly consistent with an extrapolation of the shallow slope of the AGN luminosity functions from previous work.…”
Get full text
Article -
951
Complexity of immunobiology of tumor necrosis factor and novel anti-TNF therapy
Published 2023-06-01“…Systemic anti-cytokine therapy is known to be accompanied by undesirable side effects, which can hypothetically be explained by the neutralization of these protective functions. Thus, we developed prototypes of TNF blockers which limit the bioavailability of this cytokine only from its main “pathogenic” source – myeloid cells. …”
Get full text
Article -
952
-
953
pytom-match-pick: A tophat-transform constraint for automated classification in template matching
Published 2025-06-01“…However, TM faces challenges of weak signal of the macromolecules and interfering features with a high signal-to-noise ratio, which are often addressed by time-consuming, subjective manual curation of results. To improve the detection performance we introduce pytom-match-pick, a GPU-accelerated, open-source command line interface for enhanced TM in cryo-ET. …”
Get full text
Article -
954
An Improved Fitting Method for Predicting the Zernike Coefficient–Wavelength Curves
Published 2021-01-01“…Broadband transmitted wavefront measurement is a detection method that uses transmitted wavefronts at a few specific wavelengths though a function of Zernike coefficients and wavelength to predict other transmitted wavefronts at any wavelength within a certain range. …”
Get full text
Article -
955
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
956
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
957
-
958
-
959
The role of internal auditors in preventing financial fraud in the Republic of Serbia
Published 2023-01-01“…The findings and recommendations presented in the paper can serve as a valuable resource for policymakers, regulatory bodies and organizations seeking to strengthen their financial fraud defense mechanisms and their internal audit function.…”
Get full text
Article -
960
Fine-grained access control method for private data in android system
Published 2019-03-01“…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
Get full text
Article