Search alternatives:
resourcess » resource (Expand Search)
Showing 1,161 - 1,180 results of 1,810 for search '((( resourcess OR resources) detection functions ) OR ( sources detection function ))', query time: 0.27s Refine Results
  1. 1161
  2. 1162
  3. 1163
  4. 1164
  5. 1165

    Assessment of the nutritional constituents of Elaeis Guineensis Jacq exudates from different States of Nigeria by FI Obahiagbon, GE Ilori, JO Erhabor

    Published 2013-07-01
    “…The concentration of potassium was high in all the samples irrespective of their sources. The exudates could be classified as a rich source of nutrients that are needed in man, as some of the nutrients act as sources of energy, body builders, components of body organs and tissues, coenzymes and play notable roles in biochemical functions and deficiency diseases. …”
    Get full text
    Article
  6. 1166

    Effect of Perfluorane on Electric Pulse-Modified Red Blood Cell Membranes by V. V. Moroz, Ye. K. Kozlova, M. S. Bogushevich, P. Yu. Alekseyeva, A. M. Chernysh

    Published 2005-06-01
    “…As a plasma substitute clinical medicine uses perfluorane that is an antishock, antiischemic, and cardioprotective agent having a function of transferring O2 and CO2. The authors have investigated the interaction of perfluorane particles with human erythrocytic membranes. …”
    Get full text
    Article
  7. 1167

    Quantification of glucagon and oxyntomodulin by protein precipitation-immunoaffinity enrichment-LC-MS/MS by Jessica O. Becker, Sara K. Shijo, Huu-Hien Huynh, Katrina L. Forrest, Michael J. MacCoss, Michelle A. Emrick, Elisha Goonatilleke, Andrew N. Hoofnagle

    Published 2025-04-01
    “…A glucagon calibration material was sourced commercially and characterized for purity and concentration by high-performance liquid chromatography-ultraviolet detection and amino acid analysis. …”
    Get full text
    Article
  8. 1168

    LIFE CYCLE ASSESSMENT IN HEALTHCARE SYSTEM OPTIMIZATION. INTRODUCTION by V. Sarancha, K. Vitale, S. Oreskovic, V. Sulyma

    Published 2015-03-01
    “…Various factors and parameters that may influence effectiveness of different sectors in healthcare system are detected. Performance optimization of detected parameters could lead to better system functioning, higher patient safety, economic sustainability and reduce resources consumption.…”
    Get full text
    Article
  9. 1169

    Unveiling smart contract vulnerabilities: Toward profiling smart contract vulnerabilities using enhanced genetic algorithm and generating benchmark dataset by Sepideh HajiHosseinKhani, Arash Habibi Lashkari, Ali Mizani Oskui

    Published 2025-06-01
    “…This dataset consists of 111,897 Solidity source code samples, ensuring the practical validation of the proposed approach. …”
    Get full text
    Article
  10. 1170

    FAM3C Regulates Glioma Cell Proliferation, Invasion, Apoptosis, and Epithelial Mesenchymal Transition via the Notch Pathway by Xiaochao Xia, Zihao Wang, Lvmeng Song, Yinchuan Cheng, Ping Xiong, Shun Li

    Published 2024-12-01
    “…Methods We utilized open‐source bioinformatics tools and platforms to analyze the transcriptional expression levels, prognosis, and correlation with clinical variables of FAM3C in gliomas, and subsequently, to hypothesize its potential molecular functions and possibly associated signaling pathways. …”
    Get full text
    Article
  11. 1171

    Impulse Shaping Method Based on Bayesian Deconvolution by JIA Tonghui, LIU Yi, WANG Ming, MA Yingjie, WANG Bo

    Published 2025-04-01
    “…The initial step of this method entailed expressing the measured pulse signal as the convolution of the current impulse pulse signal and the detection system response function. Then, the measured signal was expressed in the continuous time domain and decomposed into the form of an impulse signal and a double exponential kernel convolution by derivation. …”
    Get full text
    Article
  12. 1172

    Mitigating malicious denial of wallet attack using attribute reduction with deep learning approach for serverless computing on next generation applications by Amal K. Alkhalifa, Mohammed Aljebreen, Rakan Alanazi, Nazir Ahmad, Sultan Alahmari, Othman Alrusaini, Ali Alqazzaz, Hassan Alkhiri

    Published 2025-05-01
    “…Abstract Denial of Wallet (DoW) attacks are one kind of cyberattack whose goal is to develop and expand the financial sources of a group by causing extreme costs in their serverless computing or cloud environments. …”
    Get full text
    Article
  13. 1173

    The influence of genetics on the endocannabinoid system gene expression and relevance for targeting reproductive conditions by Keisuke Tanaka, Akwasi A. Amoako, Sally Mortlock, Peter A. W. Rogers, Sarah J. Holdsworth-Carson, Jacqueline F. Donoghue, Wan Tinn Teh, Grant W. Montgomery, Brett McKinnon

    Published 2025-05-01
    “…Abstract Background Endocannabinoids are small lipid molecules that have critical roles in cellular proliferation and function. They are produced locally with their concentrations controlled via the endocannabinoid system (ECS). …”
    Get full text
    Article
  14. 1174

    Subclinical Aortic Root Pathology in Close Relatives of Patients with Bicuspid Aortic Valve by Ivaniv Y., Lozynska N., Ivaniv I.

    Published 2013-12-01
    “…According to various sources, among the relatives of the first degree (FDR) of affinity the prevalence of BAV is 9.0-21.0%. …”
    Get full text
    Article
  15. 1175
  16. 1176

    Estimating fish stock biomass using a Bayesian state-space model: accounting for catchability change due to technological progress by Makoto Nishimoto, Yoshinori Aoki, Naoto Matsubara, Paul Hamer, Yuichi Tsuda

    Published 2024-12-01
    “…This model allows for the flexible integration of the timing and functional form of the uptake of technological innovations that are assumed to influence catchability. …”
    Get full text
    Article
  17. 1177

    Survey on Backdoor Attacks on Deep Learning: Current Trends, Categorization, Applications, Research Challenges, and Future Prospects by Muhammad Abdullah Hanif, Nandish Chattopadhyay, Bassem Ouni, Muhammad Shafique

    Published 2025-01-01
    “…Such attacks are usually referred to as Trojan or backdoor attacks and are very stealthy and hard to detect. In this paper, we highlight the complete attack surface that can be exploited to inject hidden malicious functionality (backdoors) in machine learning models. …”
    Get full text
    Article
  18. 1178

    Pearls on a String: Dark and Bright Galaxies on a Strikingly Straight and Narrow Filament by M. Arabsalmani, S. Roychowdhury, B. Schneider, V. Springel, E. Le Floc’h, F. Bournaud, A. Burkert, J.-C. Cuillandre, P.-A. Duc, E. Emsellem, D. Galárraga-Espinosa, E. Pian, F. Renaud, M. A. Zwaan

    Published 2025-01-01
    “…We study the cold H i gas in a 1.3 Mpc section of the filament through H i 21 cm emission line observations and detect 11 H i sources, many more than expected from the H i mass function in a similar volume. …”
    Get full text
    Article
  19. 1179

    Harnessing evanescent photoacoustic waves for multi-domain imaging by Rong Zhou, Liying Zhang, Beibei Li, Jingtao Xiao, Yiheng Xing, Chang Chen, Yuecheng Shen, Hao Shen, Deng Pan, Hongxing Xu

    Published 2025-06-01
    “…Leveraging these features, we develop a proof-of-concept for supercritical angle photoacoustic microscopy (SA-PAM), which utilizes evanescent PA waves to enable new PAM functionalities, such as surface topography reconstruction and edge detection. …”
    Get full text
    Article
  20. 1180