Search alternatives:
functions » function (Expand Search)
resource » resources (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
Showing 21 - 40 results of 1,810 for search '((( resource OR resources) detection functions ) OR ( source detection functions ))', query time: 0.37s Refine Results
  1. 21

    Modeling and Recognizing Policy Conflicts with Resource Access Requests on Protected Health Information by Raik Kuhlisch

    Published 2017-07-01
    “…A conformance verification function detects erroneous, clashing or mutually susceptible rules early during the policy planning phase. …”
    Get full text
    Article
  2. 22
  3. 23

    A Comprehensive Resource for Exploring Antiphage Defense: DefenseFinder Webservice,Wiki and Databases by Tesson, Florian, Planel, Rémi, Egorov, Artyom A, Georjon, Héloïse, Vaysset, Hugo, Brancotte, Bryan, Néron, Bertrand, Mordret, Ernest, Atkinson, Gemma Catherine, Bernheim, Aude, Cury, Jean

    Published 2024-09-01
    “…To overcome these challenges, we present a hub of resources on defense systems, including: 1) an updated version of DefenseFinder with a web-service search function, 2) a community-curated repository of knowledge on the systems, and 3) precomputed databases, which include annotations done on RefSeq genomes and structure predictions generated by AlphaFold. …”
    Get full text
    Article
  4. 24
  5. 25

    LFN-YOLO: precision underwater small object detection via a lightweight reparameterized approach by Mingxin Liu, Mingxin Liu, Yujie Wu, Ruixin Li, Cong Lin, Cong Lin

    Published 2025-01-01
    “…Underwater object detection plays a significant role in fisheries resource assessment and ecological environment protection. …”
    Get full text
    Article
  6. 26

    Background of standardization and regulation of training and use of pharmaceutical regular resource potential in XI–XVI centuries by M. S. Ponomarenko, O. S. Soloviov, T. M. Krasnianska, Yu. M. Grygoruk

    Published 2016-08-01
    “…The main stages of development of the property (material) and human resources to provide medical treatment and patients have been detected. …”
    Article
  7. 27
  8. 28
  9. 29

    An enhancement filter utilizing the modified arctangent function for the structural and tectonic interpretation of causative sources: Application to WGM2012 gravity data from the R... by Fengjun WU, Xin-Ai XU

    Published 2025-06-01
    “…In this study, we propose the Modified Arctangent Function (MAT), which enhances gravity source edge detection by integrating the total horizontal gradient with a modified arctangent function. …”
    Get full text
    Article
  10. 30

    Adult limbal neurosphere cells: a potential autologous cell resource for retinal cell generation. by Xiaoli Chen, Heather Thomson, Jessica Cooke, Jennifer Scott, Parwez Hossain, Andrew Lotery

    Published 2014-01-01
    “…Complete differentiation is likely to require more comprehensive regulation; however, the accessibility and plasticity of LNS makes them an attractive cell resource for future study and ultimately therapeutic application.…”
    Get full text
    Article
  11. 31

    Source Detection and Functional Connectivity of the Sensorimotor Cortex during Actual and Imaginary Limb Movement: A Preliminary Study on the Implementation of eConnectome in Motor Imagery Protocols by Alkinoos Athanasiou, Chrysa Lithari, Konstantina Kalogianni, Manousos A. Klados, Panagiotis D. Bamidis

    Published 2012-01-01
    “…Event-Related Desynchronization/Synchronization (ERD/ERS) of the mu-rhythm was used to evaluate MI performance. Source detection and FCNs were studied with eConnectome. …”
    Get full text
    Article
  12. 32

    Feature dependence graph based source code loophole detection method by Hongyu YANG, Haiyun YANG, Liang ZHANG, Xiang CHENG

    Published 2023-01-01
    “…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
    Get full text
    Article
  13. 33

    Feature dependence graph based source code loophole detection method by Hongyu YANG, Haiyun YANG, Liang ZHANG, Xiang CHENG

    Published 2023-01-01
    “…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
    Get full text
    Article
  14. 34

    Design and Validation of a Lightweight Entropy-Based Intrusion Detection Algorithm for Automotive CANs by Jiacheng Chen, Zhifu Wang

    Published 2025-06-01
    “…Experimental results demonstrate robust performance under low computational resources, achieving high detection accuracy with high recall (>80%) even at 10% bus load fluctuation thresholds. …”
    Get full text
    Article
  15. 35

    Surgical Indications for Proximal Limb Amputations in a Resource-limited Setting: A Single Institution’s Experience by Ja’Neil Grace-Marie Humphrey, Joseph Nthumba, Puja Jagasia, Peter M. Nthumba

    Published 2025-01-01
    “…In particular, proximal limb amputations (PLAs) impose enormous functional and social challenges on patients and their families, as they leave minimal options for functional prostheses, especially in the low-resource settings. …”
    Get full text
    Article
  16. 36

    Selenium Accumulating Leafy Vegetables Are a Potential Source of Functional Foods by Petro E. Mabeyo, Mkabwa L. K. Manoko, Amra Gruhonjic, Paul A. Fitzpatrick, Göran Landberg, Máté Erdélyi, Stephen S. Nyandoro

    Published 2015-01-01
    “…., Cucurbita maxima, Ipomoea batatas, Solanum villosum, Solanum scabrum, and Vigna unguiculata were explored for their capabilities to accumulate selenium when grown on selenium enriched soil and for use as a potential source of selenium enriched functional foods. Their selenium contents were determined by spectrophotometry using the complex of 3,3′-diaminobenzidine hydrochloride (DABH) as a chromogen. …”
    Get full text
    Article
  17. 37

    Go Source Code Vulnerability Detection Method Based on Graph Neural Network by Lisha Yuan, Yong Fang, Qiang Zhang, Zhonglin Liu, Yijia Xu

    Published 2025-06-01
    “…With the widespread application of the Go language, the demand for vulnerability detection in Go programs is increasing. Existing detection models and methods have deficiencies in extracting source code features of Go programs and mainly focus on detecting concurrency vulnerabilities. …”
    Get full text
    Article
  18. 38
  19. 39

    Is Clonal Integration a Buffer for the Stress of Resource Acquisition Depletion in <i>Eichhornia crassipes</i> (Pontederiaceae) Ramets? by Guilherme Ramos Demetrio, Dalton Serafim, Flávia de Freitas Coelho

    Published 2024-11-01
    “…Natural selection favors the allocation of finite resources to different functions maximizing fitness. …”
    Get full text
    Article
  20. 40

    Impact of Artificial Intelligence on Human Resource Management Practices: A Qualitative Study in Hyderabad, Pakistan’s Banking Sector by Sahar Akhtar Mughal, Mohammed Bilal Memon, Faraz Ali Memon

    Published 2025-06-01
    “… Artificial Intelligence (AI) is reshaping the way Human Resource Management (HRM) functions within organizations. …”
    Get full text
    Article