Search alternatives:
functions » function (Expand Search)
resourcessss » resourcesssss (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
Showing 801 - 820 results of 1,810 for search '((( resourcessss OR resources) detection functions ) OR ( source detection functions ))', query time: 0.25s Refine Results
  1. 801
  2. 802

    Provenance-Finding of Dust Storms Using AVHRR Sensor Images of NOAA Satellite (Case Study: Southwest of Iran) by Mohammad Hossein Rezaei Moghaddam, Mojtaba Mahdian Boruojeni

    Published 2016-03-01
    “…Dust pollution of this area drawn to the south of Khuzestan. 4- Conclusion In general, using 24 AVHRR images and the use of detection techniques, a total 62 points were identified as the source of dust production. …”
    Get full text
    Article
  3. 803
  4. 804

    Intra action review of the cholera outbreak response in Kadoma city, Zimbabwe, 2024 by Clayton Munemo, Chido Zibanayi, Hamilton Gomba, Precious Banda, Sarah Tengawarima, Sikhanyisiwe Moyo, Daniel Chirundu

    Published 2025-08-01
    “…The working groups covered eight response pillars aligned to the five core functions of the Incident Management System (IMS). …”
    Get full text
    Article
  5. 805

    MGSurvE: A framework to optimize trap placement for genetic surveillance of mosquito populations. by Héctor M Sánchez C, David L Smith, John M Marshall

    Published 2024-05-01
    “…For these projects, monitoring will be required to detect unintended spread of gene drive mosquitoes beyond field sites, and the emergence of alternative alleles, such as drive-resistant alleles or non-functional effector genes, within intervention sites. …”
    Get full text
    Article
  6. 806

    Prokaryotic microbial compositions and physicochemical characteristics of Huangshui, a by-product of Baijiu fermentation by TANG Yanping, GAO Xiubing, NI Jie, ZHANG Fengqin

    Published 2024-03-01
    “…Huangshui is a by-product of solid-state fermentation Baijiu that has abundant microbial resources. In this study, the similarities and differences in physicochemical properties and prokaryotic microbial structures among different sources of Huangshui were comprehensively analyzed by physicochemical detection methods and high-throughput sequencing technology. …”
    Get full text
    Article
  7. 807
  8. 808

    An Emergency Response Framework Design and Performance Analysis for Ship Fire Incidents in Waterway Tunnels by Jian Deng, Shaoyong Liu, Xiaohan Zeng

    Published 2025-07-01
    “…The framework is mapped into a Petri net model encompassing three key stages: detection and early warning, emergency response actions, and recovery. …”
    Get full text
    Article
  9. 809

    Optimization of multi-element geochemical anomaly recognition in the Takht-e Soleyman area of northwestern Iran using swarm-intelligence support vector machine by Hamid Sabbaghi, Seyed Hassan Tabatabaei, Nader Fathianpour

    Published 2025-03-01
    “…Mineral exploration is becoming increasingly challenging because the depths at which undiscovered mineral deposits can be found are progressively increasing under barren cover. Therefore, detecting metal resources under barren cover is a significant step for industrial progress. …”
    Get full text
    Article
  10. 810

    Analysis of variant interactions in families with autism points to genes involved in the development of the central nervous system. by Jacek Kaczyński, Marta Pasenkiewicz-Gierula

    Published 2025-01-01
    “…Analysis of the statistical interactions also points to genes whose biological functions are not yet known.…”
    Get full text
    Article
  11. 811
  12. 812

    Making Blind Robots See: The Synergy Between Fluorescent Dyes and Imaging Devices in Automated Proteomics by Wayne F. Patton

    Published 2000-05-01
    “…Since rare proteins cannot be amplified by any type of PCR method, sensitive detection is critical to proteome projects. Fluorescence methods deliver streamlined detection protocols, superior detection sensitivity, broad linear dynamic range and excellent compatibility with modern microchemical identification methods such as mass spectrometry. …”
    Get full text
    Article
  13. 813

    Cryopreservation and culture strategies for testicular tissue and cells in small and large animals by Valeria Vurchio, Martina Colombo, Rolando Pasquariello, Gaia Cecilia Luvoni

    Published 2025-07-01
    “…Spermatogenic cells from cryopreserved testicular tissue can be cultured in vitro and resume their functions after thawing, contributing to the preservation of fertility and genetic resources in both small and large animals. …”
    Get full text
    Article
  14. 814
  15. 815

    Gallium oxide (Ga2O3) as a radiation detector distinguishing neutrons and gammas by D. J. Valdes, L. Rendon, J. Winkelbauer, P. Koehler, S. C. Vogel, K.-X. Sun

    Published 2025-04-01
    “…Gallium oxide (Ga2O3) is a promising ultrawide bandgap semiconductor for radiation detection with the potential of integrating electronic and scintillation functions within a single crystal device. …”
    Get full text
    Article
  16. 816
  17. 817

    Bearing Small Sample Fault Diagnosis based on Data Generation and Transfer Learning by Dinghui Wu, Qin Fang, Chuyi Wu

    Published 2020-11-01
    “…First, the source dataset is trained on the training network to obtain the source model, and then a small amount of drive-end data is used as the target dataset to fine-tuning to obtain the target model. …”
    Get full text
    Article
  18. 818

    Modelling and Forecasting Energy Efficiency Impact on the Human Health by Yuliia Matvieieva, Hedy Ben Hamida

    Published 2022-06-01
    “…In the study framework, the VOSviewer 1.6.18 tools allowed the detection of six clusters of research streams: renewable resources, sustainable development, public, energy policy, energy efficiency, and solar energy. …”
    Get full text
    Article
  19. 819

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  20. 820

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article