Search alternatives:
functions » function (Expand Search)
Showing 721 - 740 results of 1,810 for search '((( resource OR source) detection functions ) OR ( sources detection functions ))', query time: 0.20s Refine Results
  1. 721
  2. 722
  3. 723
  4. 724

    Validating and utilizing dried blood spots for family screening: Screening Programme Providing Outreach for Testing Hereditary Angioedema (SPPOT-HAE) by Jane C.Y. Wong, MBBS, Dorothy L.Y. Lam, MSc, Jackie S.H. Yim, MSc, Elaine Lee, MSc, Weihong Shi, MMed, Valerie Chiang, MBBS, Philip H. Li, MD

    Published 2025-02-01
    “…Methods: In part 1, 16 Chinese C1-INH-HAE patients from 7 families participated in the validation of DBS for detecting C4, C1-INH, and functional C1-INH (fC1-INH). …”
    Get full text
    Article
  5. 725
  6. 726

    Quality-Aware PPG-Based Blood Pressure Classification for Energy-Efficient Trustworthy BP Monitoring Devices With Reduced False Alarms by Yalagala Sivanjaneyulu, M. Sabarimalai Manikandan, Srinivas Boppu, Linga Reddy Cenkeramaddi

    Published 2025-01-01
    “…Early detection of hypertension (HT) is crucial for significantly reducing the risk of serious health complications, which demands continuous or long-term blood pressure (BP) monitoring to ensure the timely management of hypertension. …”
    Get full text
    Article
  7. 727

    Habitat conditions of reef-forming corals directly affect the spatial distribution and stability in fish and macroinvertebrate communities: A case study of Mischief Reef by Peng Xu, Jianfeng Gan, Lintao Huang, Danping Xie, Feilong Li, Hui Huang

    Published 2025-12-01
    “…Overall, we highlight that eDNA is a reliable tool for detecting differences in community structure across small-scale habitats and provides valuable insights into ecosystem functioning and resilience under varying coral reef conditions.…”
    Get full text
    Article
  8. 728
  9. 729
  10. 730
  11. 731
  12. 732
  13. 733

    Urban Microcirculation Traffic Network Planning Method Based on Fast Search Random Tree Algorithm by Ning YU

    Published 2024-12-01
    “…The interpolation collision detection method is used to determine the shortest path while considering constraint conditions. …”
    Get full text
    Article
  14. 734

    Public health workforce management during a major organizational reform in the World Health Organization African Region Country Offices by Egide Rwamatwara, Abdulmumini Usman, Ndoungou Salla Ba, Patrick Kabore, Hyelni Kulausa, Olushayo Oluseun Olu, Alex Gasasira, Joseph Cabore, Matshidiso Moeti

    Published 2025-07-01
    “…This paper examines the management of human resources throughout the functional review process, with a focus on workforce challenges, including anxiety, stress, and uncertainty and the strategies adopted by organization to mitigate their impact. …”
    Get full text
    Article
  15. 735

    Comprehensive evaluation of the response relationship between meteorological drought and hydrological drought in the Yalong River Basin, China by Yunliang Wen, Ling Kang, Liwei Zhou, Wufeng Liao, Xuye Guo

    Published 2024-12-01
    “…The results showed that: (1) The smaller the scale of SPEI and SRI, the more sensitive the identification of drought and the faster the detection of drought trend changes. (2) Combined with small-scale drought index analyses, the trend and severity of meteorological and hydrological droughts propagating from the upper and middle reaches to the lower reaches is increasing from year to year. (3) The Gumbel-Hougaard Copula function reveals the relationship between meteorological and hydrological drought, with the longest joint return period of 13–15 months. (4) In cloud model risk evaluation, the degree, uncertainty and stochasticity of drought risk in the basin are increasing, and the risk degree of interannual meteorological and seasonal hydrological droughts in the basin was high. …”
    Get full text
    Article
  16. 736
  17. 737
  18. 738
  19. 739

    SOE: A Multi-Objective Traffic Scheduling Engine for DDoS Mitigation with Isolation-Aware Optimization by Mingwei Zhou, Xian Mu, Yanyan Liang

    Published 2025-06-01
    “…Distributed Denial-of-Service (DDoS) attacks generate deceptive, high-volume traffic that bypasses conventional detection mechanisms. When interception fails, effectively allocating mixed benign and malicious traffic under resource constraints becomes a critical challenge. …”
    Get full text
    Article
  20. 740