Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
resource » source (Expand Search)
sourcess » source (Expand Search), success (Expand Search)
functions » function (Expand Search)
resource » source (Expand Search)
sourcess » source (Expand Search), success (Expand Search)
functions » function (Expand Search)
-
801
-
802
A Machine-Learning-Based Ocean-Current Velocity Inversion Model Using OCN From Sentinel-1 Observations
Published 2025-01-01Get full text
Article -
803
Wind Field Retrieval From Co-Polarized SAR Imagery Without External Wind Direction Assistance
Published 2025-01-01Get full text
Article -
804
-
805
-
806
Estimation of Above-Ground Biomass for <italic>Dendrocalamus Giganteus</italic> Utilizing Spaceborne LiDAR GEDI Data
Published 2025-01-01“…The outcomes reveal that 1) the results showed that the power function emerged as the most efficacious model, with coefficient of determination (<italic>R</italic><sup>2</sup>) = 0.87 and root mean square error (RMSE) = 0.00051 Mg, in estimating the AGB of <italic>Dendrocalamus giganteus</italic>. 2) Based on the feature importance ranking of Random Forest, five variables were selected from the 40 extracted from GEDI, achieving RMSE = 8.21 Mg/ha and mean absolute error (MAE) = 6.12 Mg/ha. …”
Get full text
Article -
807
A Scale-Aware and Discriminative Feature Learning Network for Fine-Grained Rigid Object Recognition
Published 2025-01-01Get full text
Article -
808
Infrared Satellite Detection Limits for Monitoring Atmospheric Ammonia
Published 2025-01-01Get full text
Article -
809
Exploring the Role of Teaching Aids in Enhancing Physical Education for Schoolchildren: A Literature Review
Published 2022-12-01“…The search criteria used specific keywords related to the topic, and a total of 38 sources were selected for analysis. Results. The study reveals the various approaches to defining teaching aids and their functions in physical education, as well as their sources of selection. …”
Get full text
Article -
810
Distinct requirements for cranial ectoderm and mesenchyme-derived wnts in specification and differentiation of osteoblast and dermal progenitors.
Published 2014-02-01“…Thus two sources of Wnt ligands perform distinct functions during osteoblast and dermal fibroblast formation.…”
Get full text
Article -
811
Diagnostic Possibilities of Optical Coherent Tomography of the Retina during Compression in the Chiasm-Sellar Region
Published 2020-04-01“…Recovery and preservation of visual functions during compression in the chiasm-sellar region is possible in the case of early diagnosis of pathology and timely surgical decompression. …”
Get full text
Article -
812
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
813
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
814
Bioluminescence and environmental light drive the visual evolution of deep-sea shrimp (Oplophoroidea)
Published 2025-02-01“…In pelagic environments, vertically migrating animals can experience drastic changes to their lighting environment across depth, subjecting them to unique selective pressures, possibly to distinguish between changes in ambient light and bioluminescent sources. …”
Get full text
Article -
815
Manufacturing Consent for the 2018 Elections in Venezuela and Colombia
Published 2018-12-01“…Furthermore, by conducting a series of 27 interviews with journalists covering the two countries, it finds evidence to support Herman and Chomsky’s theories about the pre-selection of journalists and how ownership and management, sources and flak influence the output of media. …”
Get full text
Article -
816
A framework for personal protective equipment use in laboratories: regulatory compliance and employee protection
Published 2025-07-01“…The Occupational Safety and Health Administration (OSHA) Personal Protective Equipment (PPE) Standard, outlined in 29 CFR 1910 Subpart I states that Protective gear - including personal protective clothing, respiratory equipment, and barriers or shields- must be supplied, properly used, and kept clean and functional whenever there are hazards present. These hazards may arise from processes, environmental conditions, chemicals, radiation, or mechanical sources that could potentially cause injury or harm bodily functions through skin contact, inhalation, or absorption. …”
Get full text
Article -
817
Design of the Field Protection and Signal Priority at Intersection System for Autonomous-rail Rapid Transit
Published 2022-06-01“…It provides auxiliary driving information for the driver through automation equipment, realizes the functions of route protection, virtual section occupied/unoccupied detection, signal control, entering/leaving station detection, platform door linkage control, berth status detection and management in deport and so on, which improves system security and reduces driver working intensity. …”
Get full text
Article -
818
Guarantees of family stability in the Holy Quran and the Prophet's Sunnah | ضمانات الاستقرار الأسري في القرآن الكريم والسنة النبوية (دراسة وصفية تحليلية)...
Published 2020-12-01“…I made him an introduction in which I talked about the importance of the topic and the reasons for its selection and previous studies and I divided it into three investigations and under each topic a number of demands. …”
Get full text
Article -
819
TOPSIS method-based decision-making model for bipolar quadripartitioned neutrosophic environment
Published 2025-06-01“…In the domain of renewable energy, selecting the most suitable energy source involves navigating complex decision-making processes influenced by multiple criteria and inherent uncertainties. …”
Get full text
Article -
820
Research on a traffic flow statistical algorithm based on YBOVDT and SAM2
Published 2025-05-01“…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
Get full text
Article