Showing 701 - 720 results of 1,810 for search '((\ (source OR sources) detection functions\ ) OR (( resource OR resources) detection function\ ))', query time: 0.32s Refine Results
  1. 701

    Characterization of Biocalcium Microparticles from Saltwater Crocodile (<i>Crocodylus porosus</i>) Bone and Their Potential for Enhancing Fish Bologna Quality by Theeraphol Senphan, Natthapong Mungmueang, Supatra Karnjanapratum, Sutee Wangtueai, Akkasit Jongjareonrak, Suthasinee Yarnpakdee

    Published 2025-05-01
    “…Saltwater crocodile (SC; <i>Crocodylus porosus</i>) bone, an underutilized by-product, can be converted into high-value bio-calcium (Biocal), serving as a potential source of calcium and minerals. This study aimed to produce SC bone Biocal as functional gel enhancer for fish bologna development and to increase calcium intake. …”
    Get full text
    Article
  2. 702

    A statistical framework for analysis of trial-level temporal dynamics in fiber photometry experiments by Gabriel Loewinger, Erjia Cui, David Lovinger, Francisco Pereira

    Published 2025-03-01
    “…Finally, we provide an open-source package and analysis guide for applying our framework.…”
    Get full text
    Article
  3. 703
  4. 704

    Analysis of microsatellite and single nucleotide polymorphism within transcriptomic database in Cymbidium ensi folium by Li Xiaobai, Xiang Lin, Luo Jie, Qin Dehui, Sun Chongbo

    Published 2014-07-01
    “…Owing to the lack of its genomic resource, the development and application of molecular marker is still limited. …”
    Get full text
    Article
  5. 705
  6. 706

    Battery Management System: Threat Modeling, Vulnerability Analysis, and Cybersecurity Strategy by Shravan Murlidharan, Varsha Ravulakole, Jyothi Karnati, Hafiz Malik

    Published 2025-01-01
    “…Unauthorized access or tampering with the BMS can disrupt its fault response mechanisms, jeopardizing system performance and associated resources. Key cybersecurity strategies include intrusion detection systems (IDS), crypto-based authentication, secure firmware updates, and hardware-based security mechanisms such as trusted platform modules (TPMs). …”
    Get full text
    Article
  7. 707

    Electroencephalography derived connectivity informing epilepsy surgical planning: Towards clinical applications and future perspectives by Giulia Salvatici, Giovanni Pellegrino, Marco Perulli, Alberto Danieli, Paolo Bonanni, Gian Marco Duma

    Published 2024-01-01
    “…The EEG has benefited significantly from technological advancement across the last decades. Firstly, electrical source imaging (ESI) allows the reconstruction of electrical activity detected by EEG at the cortex level; secondly, functional connectivity (FC) allows the assessment of functional dependencies across brain areas. …”
    Get full text
    Article
  8. 708

    Comparison of Nutritional and Bioactive Component in Graded Highland Barley Flour by Chongyu LI, Bin DANG, Falin ZHANG, Xijuan YANG

    Published 2025-08-01
    “…To elucidate the chemical composition differences and processing applications of three types flour fractions produced in highland barley milling, a comparative analysis of their nutritional and functional components was conducted in this study. The results showed that there were significant differences (P<0.05) in the content of nutritional and functional components among the three graded flours of highland barley. …”
    Get full text
    Article
  9. 709

    Autoencoder-Driven Fiducial Landmark Identification in 3D Brain MRI for Neuroimaging Alignment by G. Deepali, H. Anitha, B. P. Swathi, M. V. Suhas

    Published 2025-01-01
    “…Accurate identification of fiducial markers, such as the left pre-auricle (LPA), right pre-auricle (RPA), and nasion, is critical for head localization, source reconstruction, anatomical alignment, and ensuring reproducibility in functional and structural neuroimaging studies. …”
    Get full text
    Article
  10. 710
  11. 711

    Does the island area also need to insist on salt iodization to prevent iodine deficiency disorders? a cross-sectional survey in Hainan Province, China by Hongying Wu, Shizhu Meng, Dingwei Sun, Yuting Hu, Tingou Wu, Xiaohuan Wang, Xingren Wang, Ying Liu, Chuyan Peng, Chuyan Peng, Bin He, Fangang Meng, Fangang Meng

    Published 2025-02-01
    “…The median urinary iodine in pregnant women was 144.6μg/L, which was slightly lower than the adequate level. The main source of iodine intake was salt iodine, which contributed 59.8% to total dietary iodine. …”
    Get full text
    Article
  12. 712
  13. 713
  14. 714
  15. 715
  16. 716

    Deep learning approach for automated hMPV classification by Sivarama Prasad Tera, Ravikumar Chinthaginjala, Irum Shahzadi, Priya Natha, Safia Obaidur Rab

    Published 2025-08-01
    “…Despite its clinical relevance, hMPV poses diagnostic challenges due to its symptom similarity with other respiratory illnesses, such as influenza and respiratory syncytial virus (RSV), and the lack of specialized detection systems. Traditional diagnostic methods are often inadequate for providing rapid and accurate results, particularly in low-resource settings. …”
    Get full text
    Article
  17. 717
  18. 718

    Extending Sensing Range by Physics Constraints in Multiband-Multiline Absorption Spectroscopy for Flame Measurement by Tengfei Jiao, Sheng Kou, Liuhao Ma, Kin-Pang Cheong, Wei Ren

    Published 2025-04-01
    “…The present study provides a strong technique for future complex combustion detection with advanced laser sources of broad spectrum.…”
    Get full text
    Article
  19. 719

    Cross-Layer Security for 5G/6G Network Slices: An SDN, NFV, and AI-Based Hybrid Framework by Zeina Allaw, Ola Zein, Abdel-Mehsen Ahmad

    Published 2025-05-01
    “…This study proposes a Hybrid Security Framework Using Cross-Layer Integration, combining Software-Defined Networking (SDN), Network Function Virtualization (NFV), and AI-driven anomaly detection to strengthen network defenses. …”
    Get full text
    Article
  20. 720