Search alternatives:
functions » function (Expand Search)
Showing 21 - 40 results of 3,583 for search '((( resource OR source) selection functions ) OR ( sources detection functions ))', query time: 0.29s Refine Results
  1. 21
  2. 22

    On Data Selection and Regularization for Underdetermined Vibro-Acoustic Source Identification by Laixu Jiang, Jingqiao Liu, Xin Jiang, Yuezhao Pang

    Published 2025-06-01
    “…The number of hologram points in near-field acoustical holography (NAH) for a vibro-acoustic system plays a vital role in conditioning the transfer function between the source and measuring points. The requirement for many overdetermined hologram points for extended sources to obtain high accuracy poses a problem for the practical applications of NAH. …”
    Get full text
    Article
  3. 23

    Potential Source Density Function: A New Tool for Identifying Air Pollution Sources by In Sun Kim, Yong Pyo Kim, Daehyun Wee

    Published 2022-01-01
    “…Abstract Potential source density function (PSDF) is developed to identify, that is, locate and quantify, source areas of ambient trace species based on Gaussian process regression (GPR), a machine-learning technique. …”
    Get full text
    Article
  4. 24

    Identification and functional modelling of plausibly causative cis-regulatory variants in a highly-selected cohort with X-linked intellectual disability. by Hemant Bengani, Detelina Grozeva, Lambert Moyon, Shipra Bhatia, Susana R Louros, Jilly Hope, Adam Jackson, James G Prendergast, Liusaidh J Owen, Magali Naville, Jacqueline Rainger, Graeme Grimes, Mihail Halachev, Laura C Murphy, Olivera Spasic-Boskovic, Veronica van Heyningen, Peter Kind, Catherine M Abbott, Emily Osterweil, F Lucy Raymond, Hugues Roest Crollius, David R FitzPatrick

    Published 2021-01-01
    “…We have used in vivo functional analyses to categorize rigorously filtered CRE variants in a clinical cohort that is plausibly enriched for causative CRE mutations: 48 unrelated males with a family history consistent with X-linked intellectual disability (XLID) in whom no detectable cause could be identified in the coding regions of the X chromosome (chrX). …”
    Get full text
    Article
  5. 25

    A Decision Support System for Optimal Building Cold Source Selection by Qing Li, Yan Dong, Rong-Guang Cao, Le Li, Zhi-Bin Chen

    Published 2022-01-01
    “…Based on existing approaches to construction project evaluation and the selection of cold source systems, we establish an evaluation index for building cold source system functional models and network structures. …”
    Get full text
    Article
  6. 26

    Influence of natural selection on the reproductive function in bulls by V. S. Kozyr, V. I. Petrenko, V. I. Barabash

    Published 2025-04-01
    “…The article presents long-term research results on the impact of natural and sexual selection on the reproductive function in bulls under tethered and loose housing conditions. …”
    Get full text
    Article
  7. 27

    Innovation as a Source of Ensuring the Sustainable Development of the Enterprise by Brahina Olha S.

    Published 2024-09-01
    “…The author determines the factors of importance of innovative development in the context of sustainable development and the main functions it performs. The stages of innovative development in the context of sustainable development of enterprise are formed, among which it is worth highlighting the following: analysis and assessment of the current state of enterprise; generation and selection of ideas; development of an innovation strategy; implementation of innovative solutions, monitoring and evaluation of efficiency, adjustment and improvement of strategy, communication of results and involvement of stakeholders. …”
    Get full text
    Article
  8. 28

    Molecular signature of selective microRNAs in Cyprinus carpio (Linnaeus 1758):a computational approach by Soumendu Ghosh, Manojit Bhattacharya, Avijit Kar, Basanta Kumar Das, Bidhan Chandra Patra

    Published 2019-03-01
    “…Using web based tools total 10 selected miRNAs belongs to 10 different families were illustrated and functionally categorized in Cyprinus carpio. …”
    Get full text
    Article
  9. 29

    Unlocking the prebiotic carbohydrates: Insights into the types, preparation, health benefits and future utilizations of selected Indonesian exotic fruit seeds as a potential source... by Andri Cahyo Kumoro, Dyah Hesti Wardhani, Tutuk Djoko Kusworo, Yusuf Ma'rifat Fajar Azis, Misbahudin Alhanif, Tan Chin Ping

    Published 2025-04-01
    “…This paper aims to explore the feasibility of utilizing Indonesian exotic fruit seeds as a potential source of prebiotic carbohydrates for functional foods and dietary additives. …”
    Get full text
    Article
  10. 30

    An Attomolar-Level Optical Device for Monitoring Receptor–Analyte Interactions Without Functionalization Steps: A Case Study of Cytokine Detection by Nunzio Cennamo, Francesco Arcadio, Chiara Marzano, Rosalba Pitruzzella, Mimimorena Seggio, Maria Pesavento, Stefano Toldo, Antonio Abbate, Luigi Zeni

    Published 2025-02-01
    “…The POF-based device was proven to be effective for detecting several interleukins at the attomolar level in a few minutes and without functionalization processes.…”
    Get full text
    Article
  11. 31
  12. 32

    An enhancement filter utilizing the modified arctangent function for the structural and tectonic interpretation of causative sources: Application to WGM2012 gravity data from the R... by Fengjun WU, Xin-Ai XU

    Published 2025-06-01
    “…In this study, we propose the Modified Arctangent Function (MAT), which enhances gravity source edge detection by integrating the total horizontal gradient with a modified arctangent function. …”
    Get full text
    Article
  13. 33

    Systematic investigation of photon strength functions with monochromatic γ-ray beams by Gheorghe Ioana, Aumann Thomas, Baumann Martin, van Beek Patrick, Kuchenbrod Philipp, Lalić Nikolina, Scheit Heiko, Symochko Dmytro, Wang Hongwei, Fan Gongtao, Nishio Katsuhisa, Ohtsuki Tsutomu, Suzaki Fumi, Hirose Kentaro, Inagaki Makoto, Ari-izumi Takashi, Garrote Frank L. Bello, Bjørøen Marianne, Eriksen Tomas, Ingeberg Vetle Wegner, Paulsen Wanja, Pedersen Line G., Reaz Fardous, Belyshev Sergey, Stopani Konstantin, Lui Yiu-Wing, Filipescu Dan, Tudora Anabella, Goriely Stephane, Miyamoto Shuji, Utsunomiya Hiroaki

    Published 2025-01-01
    “…Following the main objective of the IAEA Coordinated Research Project on Photonuclear Data and Photon Strength Functions (Code F41032; Duration 2016-2019), new measurements of photoneutron and photofission cross sections in the Giant Dipole Resonance energy region have been performed at the laser Compton-scattering γ-ray source of the NewSUBARU synchrotron radiation facility. …”
    Get full text
    Article
  14. 34

    Source Detection and Functional Connectivity of the Sensorimotor Cortex during Actual and Imaginary Limb Movement: A Preliminary Study on the Implementation of eConnectome in Motor Imagery Protocols by Alkinoos Athanasiou, Chrysa Lithari, Konstantina Kalogianni, Manousos A. Klados, Panagiotis D. Bamidis

    Published 2012-01-01
    “…Event-Related Desynchronization/Synchronization (ERD/ERS) of the mu-rhythm was used to evaluate MI performance. Source detection and FCNs were studied with eConnectome. …”
    Get full text
    Article
  15. 35

    Feature dependence graph based source code loophole detection method by Hongyu YANG, Haiyun YANG, Liang ZHANG, Xiang CHENG

    Published 2023-01-01
    “…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
    Get full text
    Article
  16. 36

    Feature dependence graph based source code loophole detection method by Hongyu YANG, Haiyun YANG, Liang ZHANG, Xiang CHENG

    Published 2023-01-01
    “…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
    Get full text
    Article
  17. 37
  18. 38
  19. 39
  20. 40