Showing 1,141 - 1,160 results of 2,089 for search '((( source OR source) selection functions ) OR ( sources detection function ))', query time: 0.28s Refine Results
  1. 1141

    Comparative genomics reveals key adaptive mechanisms in pathogen host-niche specialization by Menglu Zhang, Longxi Han, Caizhi Liao, Weiheng Su, Weiheng Su, Chunlai Jiang, Chunlai Jiang

    Published 2025-06-01
    “…Bacteria from clinical settings had higher detection rates of antibiotic resistance genes, particularly those related to fluoroquinolone resistance. …”
    Get full text
    Article
  2. 1142

    Blind super-resolution network based on local fuzzy discriminative loss for fabric data augmentation by Ning Dai, Xiaohan Hu, Kaixin Xu, Xudong Hu, Yanhong Yuan, Bo Cao, Luhong Shi

    Published 2025-01-01
    “…In the field of fabric defect detection, the development of algorithms has been hindered by issues such as poor quality and limited quantity of open-source datasets. …”
    Get full text
    Article
  3. 1143

    Solid-State Nanopore Readout of Programmable DNA and Peptide Nanostructures for Scalable Digital Data Storage by Lihuan Zhao, Jiajun Wang, Lin-Sheng Wu, Xin Zhao

    Published 2025-05-01
    “…Peptide nanostructures are introduced as a data medium via click-chemistry, expanding encoding sources. By integrating a photosensitive PC-linker, this approach endows the data chain with functionalities for encryption and data formatting, enhancing the security and organization of biological information storage. …”
    Get full text
    Article
  4. 1144

    Experiments on the application of the infrasound method of remote monitoring of snow avalanches in the Khibiny Mountains by A. V. Fedorov, I. S. Fedorov, V. E. Asming, A. Yu. Motorin

    Published 2025-05-01
    “…Visual slope observations are still the main method of avalanche detection. As a result, avalanche statistics, especially in remote mountain areas, remain incomplete. …”
    Get full text
    Article
  5. 1145

    Hybridization in Metal Wire Additive Manufacturing: A Case Study of an Impeller by Shahu R. Karade, Siddhartha Siddhartha, Neel Kamal Gupta, Ganesan G, K. P. Karunakaran, Henning Zeidler

    Published 2025-01-01
    “…Additive manufacturing (AM) has evolved to enable the direct production of functional components through the hybridization of additive and subtractive processes. …”
    Get full text
    Article
  6. 1146

    Urban Hierarchy Migration Model and Impact Mechanism of Graduates Admitted to the Guangdong Provincial Civil Service Examination by Wu Jinghao, Liu Ye, Tang Honglin

    Published 2025-02-01
    “…The decision-making and selection process in the selection mechanism for the migration mode of newly recruited graduates in the civil service examination is complex and dynamic, involving the interaction of multiple factors, such as government policy guidance, job characteristics, personal factors, and urban conditions, with objective limitations, personal abilities and resources, and subjective willingness. …”
    Get full text
    Article
  7. 1147

    3D-MRI brain glioma intelligent segmentation based on improved 3D U-net network. by Tingting Wang, Tong Wu, Defu Yang, Ying Xu, Dongyang Lv, Tong Jiang, Hengjiao Wang, Qi Chen, Shengnan Xu, Ying Yan, Baoguang Lin

    Published 2025-01-01
    “…This method offers significant guidance for medical diagnosis, grading, and treatment strategy selection.<h4>Methods</h4>Glioma case data were sourced from the BraTS2023 public dataset. …”
    Get full text
    Article
  8. 1148

    Algorithmic Support of Adaptive Automatic Control Systems with Data Compression by V. V. Alekseev, E. M. Antonyuk, I. E. Varshavskiy

    Published 2020-12-01
    “…The exponential growth of measurement information caused by ongoing complication of technical and production facilities necessitates the development of improved or brand new information and measurement systems, including those performing adaptive automatic control functions. Automatic criteria-based selection and reduction of measurement information continuously supplied by multi-parameter sources characterizing the objects under study require algorithms ensuring reconfiguration of automatic control systems during operation. …”
    Get full text
    Article
  9. 1149

    A Comparison of Feminist Term Translation Practices in Academic Journals of Gender and Women’s Studies in Turkiye by Göksenin Abdal, Tuba Ayık Akça

    Published 2022-12-01
    “…Feminist term translation brings both linguistic and pragmatic sides of translation together and turns the act of translation into a function-driven process rather than a solely form-based transfer. …”
    Get full text
    Article
  10. 1150

    The methodology of translating the metonymic images of the Resurrection in the Holy Qur’an according to Larson’s theory, the translation of Makarim Al-Shirazi and Hussain Ansaryan... by Hossein Bayat, Ali Zeighami, Sayyed Reza Mirahmadi, Ebrahim Rezapour

    Published 2022-03-01
    “…His semantic translation is a faithful translation into the source language and a reliable way to translate texts, especially religious texts. …”
    Get full text
    Article
  11. 1151

    Dynamic and efficient vehicular cloud management scheme with privacy protection by Min XIAO, Tao YAO, Yuanni LIU, Yonghong HUANG

    Published 2022-12-01
    “…The vehicular cloud (VC) formed by vehicles is used for localization processing and consumption of traffic sensing data to achieve timely intelligent traffic management.The vehicle cloud is highly dynamic, self-organizing and timely, in which the identity and location privacy of vehicle users need to be protected as this poses challenges to the vehicular cloud management.A dynamic and self-organizing vehicle cloud management scheme based on the asymmetric group key agreement protocol was designed, where the vehicle cloud is automatically formed through the self-organized group key agreement of vehicles.The group key was used to control the provision and access of vehicle cloud services, and the dynamic management of the vehicle cloud was implemented through group key update.The scheme used traceable one-time pseudonym technology to achieve anonymous authentication and conditional privacy protection of vehicle users, and the group key agreement stage only included one bilinear pair operation to achieve high efficiency.In addition, the key negotiation and update process used lightweight signatures, supporting batch verification, to achieve efficient message source authentication and integrity authentication.Then the security and efficiency of vehicle cloud communications in the self-organizing environment can be ensured.The dynamic key update mechanism of the key agreement protocol realized the dynamic joining or exiting of vehicles in the vehicle cloud, adapting to the dynamic characteristics of the vehicle cloud.Under the random oracle model and the difficult assumption of the inverse computational Diffie Hellman (ICDH) problem, it was proved that the asymmetric group key agreement scheme satisfied the selective-plaintext security.The security analysis shows that the scheme can protect the identity and location privacy of vehicle users, realize the legal tracking of malicious vehicles, and ensure the confidentiality, integrity and anti-counterfeiting of communications, as well as the forward security of vehicle cloud dynamic management.The performance comparison analysis shows that this scheme has certain advantages in communication and computing efficiency under the condition of the same function and security level.…”
    Get full text
    Article
  12. 1152

    Exploring Nonlinear Threshold Effects and Interactions Between Built Environment and Urban Vitality at the Block Level Using Machine Learning by Cong Li, Yajuan Zhou, Manfei Wu, Jiayue Xu, Xin Fu

    Published 2025-06-01
    “…This study proposed to develop a comprehensive framework for urban vitality by incorporating multi-source data, and the central urban area of Xi’an, China, was selected as the study area. …”
    Get full text
    Article
  13. 1153

    Isolation and Screening of Lactic Acid Bacteria From Sumbawa Buffalo Milk (Bubalus bubalis) as Potential Starter Cultures by Deni Harmoko, Tri Ardyati, Yoga Dwi Jatmiko

    Published 2022-10-01
    “…Besides containing nutrients that are very beneficial for human health, buffalo milk is also a potential source of lactic acid bacteria (LAB) with technological and functional properties. …”
    Get full text
    Article
  14. 1154

    CHARTER OF THE STAVROPOL KRAI: PROBLEM ISSUES AND SEARCH FOR SOLUTION by V. Cherepanov

    Published 2021-09-01
    “…The interpretation of the source of the government of the Stavropol Krai, which is the people of the Stavropol Kraias part of the multinational people of the Russian Federation, has been proposed. …”
    Get full text
    Article
  15. 1155

    Prevalence and determinants of restrictive lung disorder among quarry workers at the Umuoghara quarry site, Ebonyi State, Nigeria: a cross-sectional study by Ngozika Substance Ike-Samuel, Osaeloka C. Ekwueme, Susan Chioma Udeh

    Published 2025-01-01
    “…Data was collected using a pre-tested semi-structured questionnaire among 300 quarry workers selected by simple random sampling method. Lung function test was performed using a spirometer- spirovit SPI schiller and data was analyzed with the use of IBM SPSS version 23.0. …”
    Get full text
    Article
  16. 1156

    Systemic model of segregation and transformation of urban solid waste by Alex Rengifo Rojas, Nelino Florida Rofner, Luis Morales y Chocano, José Raúl Rodríguez Lichtenheldt, Julio Pedro Atoche Cornejo

    Published 2025-07-01
    “…Simple and cluster random sampling methods were used to select 119 households and 229 non-domestic establishments, in addition to non-random sampling for 26 special establishments. …”
    Get full text
    Article
  17. 1157

    A Novel Method for Traceability of Crude Oil Leakage on Offshore Platforms Based on Improved YOLOv5 Model Multi-Target Identification and Correlation Analysis by Zhenghua Wang, Shihai Zhang, Chongnian Qu, Zongyi Zhang, Feng Sun

    Published 2025-01-01
    “…Based on the positional relationship between the spilled crude oil target and the source target detection anchor frame, the possible source targets are classified into three association levels and assigned different association weights. …”
    Get full text
    Article
  18. 1158

    Genome Mining of Terpene Synthases from Fourteen <i>Streptomyces</i> Strains by Yuanyuan Li, Xi Xiang, Zhiyuan Ren, Rui Wang, Minghui Xie, Gen Li, Xiaohui Yan, Zhilong Zhao, Zixin Deng, Min Xu, Anwei Hou

    Published 2025-06-01
    “…A total of forty-eight TPSs were identified and categorized through phylogenetic analysis, and five representative TPSs distantly related to known TPSs were selected for functional investigation. Biochemical assays revealed that TAC28_6116 is a sesquiterpene synthase producing thujopsan-2β-ol (<b>1</b>) and thujopsene (<b>2</b>), marking the first report of thujopsan-2β-ol production from a bacterial source. …”
    Get full text
    Article
  19. 1159
  20. 1160

    Association of Omega-3 Index and Blood Cell Count-Derived Systemic Inflammatory Indexes among Testicular Germ Cell Tumor Survivors by Milica Zeković, Marko Živković, Marija Takić, Sanja Stanković, Nebojša Bojanić, Aleksandar Janičić, Uroš Bumbaširević

    Published 2024-02-01
    “…Background and objectives: Although testicular cancer is considered the paradigm of highly curable malignancy, treatment-induced adverse effects and potential impairment of gonadal function may cause non-negligible long-term health repercussions, including metabolic disturbances and cardiovascular sequelae. …”
    Get full text
    Article