Search alternatives:
functions » function (Expand Search)
Showing 1,121 - 1,140 results of 2,992 for search '((( resource OR source) detection functions ) OR ( sources selection functions ))', query time: 0.36s Refine Results
  1. 1121

    A Systematic Search for Candidate Supermassive Black Hole Binaries Using Periodic Mid-infrared Light Curves of Active Galactic Nuclei by Di Luo, Ning Jiang, Xin Liu

    Published 2024-01-01
    “…Notably, we find no overlap between our sample and optical periodic sources, which can be explained by a distinct preference for certain periods due to selection bias. …”
    Get full text
    Article
  2. 1122

    Biological properties of cord blood hematopoietic stem cells by S. A. Rumiantsev, E. Yu. Osipova, S. E. Ipatov, T. V. Shamanskaya, O. A. Mayorova, A. G. Rumyantsev

    Published 2014-07-01
    “…Phased developments of the technology of stem cells detection and selection, their proliferation, differentiation and function assessment using cultivation in vitro and in vivo in animal model was described. …”
    Get full text
    Article
  3. 1123

    Diagnostic potential of the B9D2 gene in colorectal cancer based on whole blood gene expression data and machine learning by Zhaorui Wang, Yongcheng Fu, Haozhe Zhang, Na Liu, Ningjing Lei

    Published 2025-08-01
    “…The B9D2 gene, which is essential for ciliary function, has been rarely explored in CRC. This study is the first to investigate the diagnostic potential of B9D2 in CRC, using bioinformatics and machine learning to uncover its novel role in early detection, with implications for clinical translation. …”
    Get full text
    Article
  4. 1124

    The On-Chip D-LMS Filter Design Method of Wireless Sensor Node Based on FPGA by Jian Li, Maojin Li, Ming Meng, Zepeng Liu

    Published 2020-01-01
    “…In the real-time position technology of underground shallow source, the signal denoising performance of wireless sensor nodes directly determines the location speed and accuracy of underground burst point. …”
    Get full text
    Article
  5. 1125
  6. 1126

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  7. 1127

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  8. 1128

    Bioluminescence and environmental light drive the visual evolution of deep-sea shrimp (Oplophoroidea) by Danielle M. DeLeo, Heather D. Bracken-Grissom

    Published 2025-02-01
    “…In pelagic environments, vertically migrating animals can experience drastic changes to their lighting environment across depth, subjecting them to unique selective pressures, possibly to distinguish between changes in ambient light and bioluminescent sources. …”
    Get full text
    Article
  9. 1129

    Bovine PMN responses to extracellular vesicles released by Besnoitia besnoiti tachyzoites and B. besnoiti-infected host cells by Gabriel Espinosa, Constanza Salinas-Varas, Lisbeth Rojas-Barón, Christian Preußer, Elke Pogge von Strandmann, Ulrich Gärtner, Iván Conejeros, Carlos Hermosilla, Anja Taubert

    Published 2024-12-01
    “…Therefore, we tested whether exposure of bovine PMN to EVs from different cellular sources affects classical PMN effector functions and cytokine/chemokine secretion. …”
    Get full text
    Article
  10. 1130

    Manufacturing Consent for the 2018 Elections in Venezuela and Colombia by Alan MacLeod

    Published 2018-12-01
    “…Furthermore, by conducting a series of 27 interviews with journalists covering the two countries, it finds evidence to support Herman and Chomsky’s theories about the pre-selection of journalists and how ownership and management, sources and flak influence the output of media. …”
    Get full text
    Article
  11. 1131

    A framework for personal protective equipment use in laboratories: regulatory compliance and employee protection by Segaran P. Pillai, Sarah Bradberry, Marisa Newcomer, Tanya Pittas, Kelsey Mathern

    Published 2025-07-01
    “…The Occupational Safety and Health Administration (OSHA) Personal Protective Equipment (PPE) Standard, outlined in 29 CFR 1910 Subpart I states that Protective gear - including personal protective clothing, respiratory equipment, and barriers or shields- must be supplied, properly used, and kept clean and functional whenever there are hazards present. These hazards may arise from processes, environmental conditions, chemicals, radiation, or mechanical sources that could potentially cause injury or harm bodily functions through skin contact, inhalation, or absorption. …”
    Get full text
    Article
  12. 1132

    Development and Optimization of a Novel Deep Learning Model for Diagnosis of Quince Leaf Diseases by A. Naderi Beni, H. Bagherpour, J. Amiri Parian

    Published 2024-12-01
    “…IntroductionDetection of tree leaf diseases plays a crucial role in the horticultural field. …”
    Get full text
    Article
  13. 1133

    Design of the Field Protection and Signal Priority at Intersection System for Autonomous-rail Rapid Transit by SHI Yangyang, LIU Guangyong, WU Jinyong

    Published 2022-06-01
    “…It provides auxiliary driving information for the driver through automation equipment, realizes the functions of route protection, virtual section occupied/unoccupied detection, signal control, entering/leaving station detection, platform door linkage control, berth status detection and management in deport and so on, which improves system security and reduces driver working intensity. …”
    Get full text
    Article
  14. 1134

    Prediction of new candidate proteins and analysis of sub-modules and protein hubs associated with seed development in rice (Oryza sativa) using an ensemble network-based systems bi... by M. R. P. De Silva, J. W. J. K. Weeraman, S. Piyatissa, P. C. Fernando

    Published 2025-05-01
    “…Using a list of known seed development proteins from the Gene Ontology (GO) knowledgebase and literature, novel candidate proteins for seed development were predicted using an ensemble of network-based algorithms, including Majority Voting, Hishigaki Algorithm, Functional Flow, and Random Walk with Restart, which were selected based on their popularity and usability. …”
    Get full text
    Article
  15. 1135

    21 Balmer Jump Street: The Nebular Continuum at High Redshift and Implications for the Bright Galaxy Problem, UV Continuum Slopes, and Early Stellar Populations by Harley Katz, Alex J. Cameron, Aayush Saxena, Laia Barrufet, Nichloas Choustikov, Nikko J. Cleri, Anna de Graff, Richard S. Ellis, Robert A.E. Fosbury, Kasper E. Heintz, Michael Maseda, Jorryt Matthee, Ian McConachie, Pascal A. Oesch

    Published 2025-07-01
    “…Second, we present a dataset of 58 galaxies observed with NIRSpec on JWST at $2.5<z<9.0$ that are selected to have strong nebular continuum emission via the detection of the Balmer jump. …”
    Get full text
    Article
  16. 1136

    Does tinnitus and emotional distress influence central auditory processing? A comparison of acute and chronic tinnitus in normal-hearing individuals. by Qian Zhou, Wenling Jiang, Haibin Sheng, Qinjie Zhang, Dian Jin, Haifeng Li, Meiping Huang, Lu Yang, Yan Ren, Zhiwu Huang

    Published 2025-01-01
    “…<h4>Design</h4>This study compared the auditory afferent and efferent functions of normal-hearing patients with acute tinnitus, chronic tinnitus, and control group using gap detection test, the Mandarin Hearing in Noise Test (MHINT), and contralateral suppression of transient evoked otoacoustic emissions (TEOAEs).…”
    Get full text
    Article
  17. 1137

    Urinary Exosomes by Irena Dimov, Ljubinka Jankovic Velickovic, Vladisav Stefanovic

    Published 2009-01-01
    “…Thus, UE have valuable potential as a source of biomarkers for early detection of various types of diseases, monitoring the disease evolution and/or response to therapy. …”
    Get full text
    Article
  18. 1138

    Real-World Efficacy of Explainable Artificial Intelligence using the SAGE Framework and Scenario-Based Design by Eleanor Mill, Wolfgang Garn, Chris Turner

    Published 2024-12-01
    “…The first of its kind, it leverages three distinct but complementary frameworks to support a user-centric and context-sensitive, post-hoc explanation for fraud detection. Using the principles of scenario-based design, it amalgamates two independent real-world sources to establish a realistic card fraud prediction scenario. …”
    Get full text
    Article
  19. 1139

    Guarantees of family stability in the Holy Quran and the Prophet's Sunnah | ضمانات الاستقرار الأسري في القرآن الكريم والسنة النبوية (دراسة وصفية تحليلية)... by Aisha Shareef

    Published 2020-12-01
    “…I made him an introduction in which I talked about the importance of the topic and the reasons for its selection and previous studies and I divided it into three investigations and under each topic a number of demands. …”
    Get full text
    Article
  20. 1140

    TOPSIS method-based decision-making model for bipolar quadripartitioned neutrosophic environment by G. Muhiuddin, Mohamed E. Elnair, Satham Hussain S, Durga Nagarajan

    Published 2025-06-01
    “…In the domain of renewable energy, selecting the most suitable energy source involves navigating complex decision-making processes influenced by multiple criteria and inherent uncertainties. …”
    Get full text
    Article