Search alternatives:
resource » source (Expand Search)
Showing 1,341 - 1,360 results of 2,992 for search '((( resource OR sources) detection function ) OR ( sources selection function ))', query time: 0.33s Refine Results
  1. 1341

    Re-Infection Outcomes Following One- And Two-Stage Surgical Revision of Infected Knee Prosthesis: A Systematic Review and Meta-Analysis. by Setor K Kunutsor, Michael R Whitehouse, Erik Lenguerrand, Ashley W Blom, Andrew D Beswick, INFORM Team

    Published 2016-01-01
    “…Our second objective was to compare between the two revision strategies, clinical outcomes as measured by postoperative Knee Society Knee score, Knee Society Function score, Hospital for Special Surgery knee score, WOMAC score, and range of motion.…”
    Get full text
    Article
  2. 1342

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  3. 1343

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  4. 1344

    Renal Biopsy Pathological Tissue Segmentation: A Comprehensive Review and Experimental Analysis by Yan Liu, Taiping Wang, Xinxin He, Wei Wang, Qiang He, Juan Jin

    Published 2025-01-01
    “…This study provides a novel technical framework for precise renal pathological tissue segmentation and lays the foundation for future lesion detection and intelligent diagnostic applications.…”
    Get full text
    Article
  5. 1345

    Research on a traffic flow statistical algorithm based on YBOVDT and SAM2 by Yuanyuan Wang, Zheng Ding, Jiange Liu, Kexiao Wu, Md Sharid Kayes Dipu, Tingmei Ma, Yonghao Ma, Haiyan Zhang

    Published 2025-05-01
    “…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
    Get full text
    Article
  6. 1346

    Baseline levels of microplastics in agricultural soils obscure the effects of additional microplastics from recycled fertilizers by Collin J. Weber, Dominika Kundel, Andreas Fliessbach, Else K. Bünemann, Moritz Bigalke

    Published 2025-07-01
    “…Whilst it was observed from the fluxes that digestate can be a substantial source of microplastics to soils, the comparatively short time of application and the high background at our investigated sites leads to a obscured effect where digestate inputs serve a limited function.…”
    Get full text
    Article
  7. 1347

    Quality and content evaluation of thyroid eye disease treatment information on TikTok and Bilibili by Haisheng Wang, Huahong Zhang, Jiamin Cao, Feng Zhang, Wei Xiong

    Published 2025-07-01
    “…Abstract Thyroid eye disease (TED) is an autoimmune condition that commonly impacts patients’ visual function, appearance, and psychological well-being. …”
    Get full text
    Article
  8. 1348

    Fine-grained access control method for private data in android system by Gang Liu, Guofang Zhang, Quan Wang, Shaomin Ji, Lizhi Zhang

    Published 2019-03-01
    “…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
    Get full text
    Article
  9. 1349

    Direction of Arrival Estimation Based on the Multistage Nested Wiener Filter by Xiaodong He, Bin Tang

    Published 2015-02-01
    “…The computation of the proposed method is simple, and the number of detectable signal sources could exceed the number of antenna elements.…”
    Get full text
    Article
  10. 1350

    Implementation of stochastic signal processing algorithms in radar CAD by M. Yu. Konopel'kin, S. V. Petrov, D. A. Smirnyagina

    Published 2022-10-01
    “…A simulation model of a sector surveillance radar with a digital antenna array was created in the radar CAD visual functional editor. The passive channel included the following algorithms: algorithm for detecting stochastic signals; algorithm for estimating the number of stochastic signals; direction finding algorithm for stochastic signal sources; adaptive spatial filtering algorithm. …”
    Get full text
    Article
  11. 1351
  12. 1352

    The role of internal auditors in preventing financial fraud in the Republic of Serbia by Jeremić Nebojša, Jakovljević Nemanja

    Published 2023-01-01
    “…By exploring the practices and challenges faced by internal auditors, this paper aims to provide valuable insights and recommendations to strengthen the effectiveness of internal audit functions in detecting and preventing financial fraud. …”
    Get full text
    Article
  13. 1353

    The RBF-FD and RBF-FDTD Methods for Solving Time-Domain Electrical Transient Problems in Power Systems by Duc-Quang Vu, Nhat-Nam Nguyen, Phan-Tu Vu

    Published 2023-01-01
    “…RBFs such as Gaussian (GA), Multiquadric (MQ), Inverse Quadric (IQ), and Inverse Multiquadric (IMQ) are used in these numerical methods to formulate the central finite difference approximations of the first- and second-order derivatives of a function. The algorithm of selecting “optimal” shape parameters for our basis functions is also applied, specifically to increase the accuracy of the suggested methods with regard to high accuracy needs. …”
    Get full text
    Article
  14. 1354

    Retracted: Study on Modeling Method of Forest Tree Image Recognition Based on CCD and Theodolite by Yeqiong Shi, Sainan Wang, Shuna Zhou, M. M. Kamruzzaman

    Published 2020-01-01
    “…Forest vegetation is the main body that constitutes forest resources. Accurate identification of the types of forest trees can lay the foundation for the research and utilization of forest resources. …”
    Get full text
    Article
  15. 1355

    Compositional and nutritional value of lupin cultivars: Identifying high-protein seeds for enhanced protein isolate production and phytochemical valorisation by Pau Taberner-Pibernat, Albert Ribas-Agustí, Gisela Quinteros, Gerard Sabeña, Miguel López-Gómez, Rubén Domínguez-Valencia, Ricard Bou

    Published 2025-08-01
    “…These findings highlight the potential of lupin for diverse applications in the food and industrial sectors. Cultivar selection is essential to enhance protein extraction yields and colour, as well as to consider lupin as a source of various phytochemicals for valorisation.…”
    Get full text
    Article
  16. 1356

    SMART Based Multi-Point Matching Assisted Approximation of Renewable Interconnected Power System by Umesh Kumar Yadav, V. P. Singh, Luigi Fortuna, Umesh Kumar Sahu

    Published 2025-01-01
    “…The errors between expansion parameters obtained in terms of coefficients of HO HPP system and its RO model are minimized around selected multi-points, further. For the error minimization, objective function is framed. …”
    Get full text
    Article
  17. 1357

    Potential physiological mechanisms behind variation in rainbow trout (Oncorhynchus mykiss) to biosynthesize EPA and DHA when reared on plant oil replacement feeds by Ken Overturf, Jason Abernathy, Dietmar Kültz, Jacob Bledsoe, Shawn Narum, Thomas Welker

    Published 2025-04-01
    “…The omega-3 fatty acids, docosahexaenoic acid (DHA; 22:6n-3) and eicosapentaenoic acid (EPA; 20:5n-3), are of primary concern as they provide significant health benefits such as reducing inflammation and improving heart and health function. However, the DHA; 22:6n-3 and EPA; 20:5n-3 available for aquaculture feeds is primarily provided by fish oil which is already limited in availability and expensive, and dietary lipids are consistently being replaced with oil sourced from plants. …”
    Get full text
    Article
  18. 1358

    Probing Cosmic Isotropy with the FAST All Sky H i Survey by Yi-Wen Wu, Jun-Qing Xia

    Published 2025-01-01
    “…This refined subsample is divided into 10 distinct sky regions, for which we compute the two-point angular correlation functions (2PACF) over angular scales of 0 $\mathop{.}…”
    Get full text
    Article
  19. 1359

    Morphological divergence driven by predation environment within and between species of Brachyrhaphis fishes. by Spencer J Ingley, Eric J Billman, Mark C Belk, Jerald B Johnson

    Published 2014-01-01
    “…Our findings are important because they provide evidence that the same source of selection can drive similar phenotypic divergence independently at multiple divergence levels.…”
    Get full text
    Article
  20. 1360

    Lexical and semantic characteristics in the novel Kad su cvetale tikve by Dragoslav Mihailović by Stevanović Jelena M., Milošević Jadranka Ž., Lazarević Emilija N.

    Published 2025-01-01
    “…In the linguistic corpus, there is almost no dialogue without the use of sociolect, which, in a unique way, leads to the intertwining of literary-artistic and colloquial functional styles. The paper concludes that in this novel by Dragoslav Mihailović, the specific selection of vocabulary achieved not only a stylistic function but also a formal linguistic function, contributing to the overall efficiency of linguistic expression.…”
    Get full text
    Article