Suggested Topics within your search.
Suggested Topics within your search.
-
461
Ibai mag blinds blindana tiuhan? (Luke 6,39). Pragmatic functions and syntactic strategies in the Gothic left sentence periphery
Published 2025-01-01“…The interference role of the Greek and Latin source texts will also be taken into consideration, mainly in order to ascertain whether the grammaticalization processes which those elements underwent were either induced or implemented by the models. …”
Get full text
Article -
462
Ibai mag blinds blindana tiuhan? (Luke 6,39). Pragmatic functions and syntactic strategies in the Gothic left sentence periphery
Published 2025-01-01“…The interference role of the Greek and Latin source texts will also be taken into consideration, mainly in order to ascertain whether the grammaticalization processes which those elements underwent were either induced or implemented by the models. …”
Get full text
Article -
463
Uncovering functional deterioration in the rhizosphere microbiome associated with post-green revolution wheat cultivars
Published 2025-06-01“…Of the 113 functional genes that were differentially abundant between heritage and modern cultivars, 95% were depleted in modern cultivars and 65% of differentially abundant reads best mapped to genes involved in staurosporine biosynthesis (antibiotic product), plant cell wall degradation (microbial mediation of plant root architecture, overwintering energy source for microbes) and sphingolipid metabolism (signal bioactive molecules). …”
Get full text
Article -
464
Beach volleyball athlete training trends of Russian-language scientific resources: a systematic review
Published 2021-10-01Get full text
Article -
465
SOFTWARE COMPONENT DEVELOPMENT FOR PARALLEL GATEWAYS DETECTION AND QUALITY ASSESSMENT IN BPMN MODELS USING FUZZY LOGIC
Published 2025-07-01“…This features are evaluated using “soft” modeling rules based on fuzzy membership functions. Additionally, an activation function with the 0.5 threshold is used to generate binary quality indicators and calculate an integral quality assessment measure. …”
Get full text
Article -
466
-
467
Computational Temporal Ghost Imaging Using Intensity-Only Detection Over a Single Optical Fiber
Published 2018-01-01“…We propose a method of computational temporal ghost imaging over a single optical fiber using simple optical intensity detection instead of coherent detection. The transfer function of a temporal ghost imaging system over a single optical fiber is derived, which is a function of the total fiber dispersion and the power density spectrum of the light source. …”
Get full text
Article -
468
A Wind Power Density Forecasting Model Based on RF-DBO-VMD Feature Selection and BiGRU Optimized by the Attention Mechanism
Published 2025-02-01“…Wind power, as a pivotal renewable energy source, is anticipated to play a critical role in ensuring the reliability, security, and stability of the global energy supply system. …”
Get full text
Article -
469
Spatio-temporal dynamics of ecosystem service value functions in response to landscape fragmentation in Boma-Gambella trans-boundary landscape, Southwest Ethiopia and East South Su...
Published 2025-07-01“…Google Earth Explorer was utilized to randomly select 200 sample training points to assess the accuracy of the Land Use Land Cover classification for both 2009 and 2020. …”
Get full text
Article -
470
-
471
Hybrid Deep Neural Network Optimization with Particle Swarm and Grey Wolf Algorithms for Sunburst Attack Detection
Published 2025-03-01“…The strength of DNNs is derived from their ability to model complex functions and to improve detection engines through deeper architecture. …”
Get full text
Article -
472
A fuzzy track-to-track association algorithm with dynamic time warping for trajectory-level vehicle detection
Published 2025-03-01“…Multi-source track-to-track association (TTTA), which identifies trajectories from multiple sensors or data sources of the same dynamic vehicle, is an important data fusion technique widely applied to vehicle detection in the fields of road, marine, and aviation transportation. …”
Get full text
Article -
473
Vulnerability detection using BERT based LLM model with transparency obligation practice towards trustworthy AI
Published 2024-12-01“…The result shows higher accuracy of 91.8 % for the vulnerability detection and model explainability outcome is highly influenced by “vulnerable”, “function”, ''mysql_tmpdir_list'', “strmov” tokens using both SHAP and LIME framework. …”
Get full text
Article -
474
FRB Line-of-sight Ionization Measurement from Lightcone AAOmega Mapping Survey: The First Data Release
Published 2025-01-01Get full text
Article -
475
Antimicrobial Activity of Chitosan from Different Sources Against Non-<i>Saccharomyces</i> Wine Yeasts as a Tool for Producing Low-Sulphite Wine
Published 2024-10-01“…Finally, the efficiency of different antimicrobial treatments was evaluated during laboratory-scale fermentations inoculated with a selected <i>S. cerevisiae</i> strain. The tested strains exhibited medium/high resistance to the chitosan; in some cases, the behaviour varied in the function of species/strain, and only four strains exhibited different resistance levels, depending on the chitosan source. …”
Get full text
Article -
476
GloFinder: AI-empowered QuPath plugin for WSI-level glomerular detection, visualization, and curation
Published 2025-04-01“…Artificial intelligence (AI) has demonstrated significant success in automating the detection of glomeruli—key functional units of the kidney—from whole slide images (WSIs) in kidney pathology. …”
Get full text
Article -
477
A fuzzy method for improving the functionality of search engines based on user's web interactions
Published 2015-04-01Get full text
Article -
478
Elucidating the role of compositional and processing variables in tailoring the technological functionalities of plant protein ingredients
Published 2025-01-01“…However, other extraction, purification, and drying methods can be properly combined, resulting in specific PP ingredient functionalities. Overall, this review highlights that, besides protein purity and source, knowledge of the processing history is required to select PP ingredients with desired functionalities.…”
Get full text
Article -
479
Securing Wireless Communications with Energy Harvesting and Multi-antenna Diversity
Published 2025-04-01“…A time-switching protocol enables the source node S to alternate between energy harvesting and secure data transmission. …”
Get full text
Article -
480