Search alternatives:
resourcess » resource (Expand Search), resourcesss (Expand Search)
functions » function (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
resourcess » resource (Expand Search), resourcesss (Expand Search)
functions » function (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
-
801
Human disturbance influences occupancy of red deer in Mongolia
Published 2022-10-01Get full text
Article -
802
Provenance-Finding of Dust Storms Using AVHRR Sensor Images of NOAA Satellite (Case Study: Southwest of Iran)
Published 2016-03-01“…Dust pollution of this area drawn to the south of Khuzestan. 4- Conclusion In general, using 24 AVHRR images and the use of detection techniques, a total 62 points were identified as the source of dust production. …”
Get full text
Article -
803
Research and application of bolter miner airborne drilling rig
Published 2025-03-01Get full text
Article -
804
Intra action review of the cholera outbreak response in Kadoma city, Zimbabwe, 2024
Published 2025-08-01“…The working groups covered eight response pillars aligned to the five core functions of the Incident Management System (IMS). …”
Get full text
Article -
805
MGSurvE: A framework to optimize trap placement for genetic surveillance of mosquito populations.
Published 2024-05-01“…For these projects, monitoring will be required to detect unintended spread of gene drive mosquitoes beyond field sites, and the emergence of alternative alleles, such as drive-resistant alleles or non-functional effector genes, within intervention sites. …”
Get full text
Article -
806
Prokaryotic microbial compositions and physicochemical characteristics of Huangshui, a by-product of Baijiu fermentation
Published 2024-03-01“…Huangshui is a by-product of solid-state fermentation Baijiu that has abundant microbial resources. In this study, the similarities and differences in physicochemical properties and prokaryotic microbial structures among different sources of Huangshui were comprehensively analyzed by physicochemical detection methods and high-throughput sequencing technology. …”
Get full text
Article -
807
Unsustainable anthropogenic mortality threatens the long-term viability of lion populations in Mozambique.
Published 2025-01-01“…Our findings suggest that resilience to anthropogenic threats is largely a function of lion population size as well as resource and management capacity. …”
Get full text
Article -
808
An Emergency Response Framework Design and Performance Analysis for Ship Fire Incidents in Waterway Tunnels
Published 2025-07-01“…The framework is mapped into a Petri net model encompassing three key stages: detection and early warning, emergency response actions, and recovery. …”
Get full text
Article -
809
Optimization of multi-element geochemical anomaly recognition in the Takht-e Soleyman area of northwestern Iran using swarm-intelligence support vector machine
Published 2025-03-01“…Mineral exploration is becoming increasingly challenging because the depths at which undiscovered mineral deposits can be found are progressively increasing under barren cover. Therefore, detecting metal resources under barren cover is a significant step for industrial progress. …”
Get full text
Article -
810
Analysis of variant interactions in families with autism points to genes involved in the development of the central nervous system.
Published 2025-01-01“…Analysis of the statistical interactions also points to genes whose biological functions are not yet known.…”
Get full text
Article -
811
-
812
Making Blind Robots See: The Synergy Between Fluorescent Dyes and Imaging Devices in Automated Proteomics
Published 2000-05-01“…Since rare proteins cannot be amplified by any type of PCR method, sensitive detection is critical to proteome projects. Fluorescence methods deliver streamlined detection protocols, superior detection sensitivity, broad linear dynamic range and excellent compatibility with modern microchemical identification methods such as mass spectrometry. …”
Get full text
Article -
813
Cryopreservation and culture strategies for testicular tissue and cells in small and large animals
Published 2025-07-01“…Spermatogenic cells from cryopreserved testicular tissue can be cultured in vitro and resume their functions after thawing, contributing to the preservation of fertility and genetic resources in both small and large animals. …”
Get full text
Article -
814
-
815
Gallium oxide (Ga2O3) as a radiation detector distinguishing neutrons and gammas
Published 2025-04-01“…Gallium oxide (Ga2O3) is a promising ultrawide bandgap semiconductor for radiation detection with the potential of integrating electronic and scintillation functions within a single crystal device. …”
Get full text
Article -
816
Identification method of roof rock interface based on response characteristics of drilling parameters
Published 2025-02-01Get full text
Article -
817
Bearing Small Sample Fault Diagnosis based on Data Generation and Transfer Learning
Published 2020-11-01“…First, the source dataset is trained on the training network to obtain the source model, and then a small amount of drive-end data is used as the target dataset to fine-tuning to obtain the target model. …”
Get full text
Article -
818
Modelling and Forecasting Energy Efficiency Impact on the Human Health
Published 2022-06-01“…In the study framework, the VOSviewer 1.6.18 tools allowed the detection of six clusters of research streams: renewable resources, sustainable development, public, energy policy, energy efficiency, and solar energy. …”
Get full text
Article -
819
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
820
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article