Showing 1,001 - 1,020 results of 1,810 for search '((\ (source OR sources) detection functions\ ) OR (( resource OR resources) detection function\ ))', query time: 0.44s Refine Results
  1. 1001

    Estimating fish stock biomass using a Bayesian state-space model: accounting for catchability change due to technological progress by Makoto Nishimoto, Yoshinori Aoki, Naoto Matsubara, Paul Hamer, Yuichi Tsuda

    Published 2024-12-01
    “…The assessment of trends in fish stocks using long-term time-series data is important for effective fisheries resource management. Despite technological advancements in recent decades, the resulting increase in fisheries catch potential with applied effort is often not adequately considered in stock assessments. …”
    Get full text
    Article
  2. 1002

    Medical Data over Sound—CardiaWhisper Concept by Radovan Stojanović, Jovan Đurković, Mihailo Vukmirović, Blagoje Babić, Vesna Miranović, Andrej Škraba

    Published 2025-07-01
    “…It then enables a range of control and visualization functions for both local and remote users. Emphasis is placed on describing the system architecture and its key components, as well as the software methodologies used for signal decoding on the receiver side, where several algorithms are implemented using open-source, platform-independent technologies, such as JavaScript, HTML, and CSS. …”
    Get full text
    Article
  3. 1003

    Mobile phone encryption as an obstacle in criminal investigation: Review of comparative solutions by Pisarić Milana

    Published 2021-01-01
    “…In detecting criminal offences, the police increasingly rely on electronic evidence. …”
    Get full text
    Article
  4. 1004
  5. 1005

    Harnessing evanescent photoacoustic waves for multi-domain imaging by Rong Zhou, Liying Zhang, Beibei Li, Jingtao Xiao, Yiheng Xing, Chang Chen, Yuecheng Shen, Hao Shen, Deng Pan, Hongxing Xu

    Published 2025-06-01
    “…Leveraging these features, we develop a proof-of-concept for supercritical angle photoacoustic microscopy (SA-PAM), which utilizes evanescent PA waves to enable new PAM functionalities, such as surface topography reconstruction and edge detection. …”
    Get full text
    Article
  6. 1006
  7. 1007

    Obstacle shape determination by mobile robot sensor system using GP2Y0A (Sharp) type IR distance sensors by V. P. Andreev

    Published 2024-04-01
    “…It is necessary to determine the source of such interference, propose a method for estimating its parameters and a way to minimize its influence.   …”
    Get full text
    Article
  8. 1008

    Transcriptome analysis of corpora lutea in domestic cats (Felis catus) reveals strong differences in gene expression of various hormones, hormone receptors and regulators across di... by Beate C. Braun, Michał M. Hryciuk, Dorina Meneghini

    Published 2025-03-01
    “…Abstract In the domestic cat (Felis catus), the corpus luteum (CL) is the main source of progestogen during pregnancy. Here, we studied gene expression changes in different life cycle stages of the CL of pseudopregnant cats to identify potential regulatory factors. …”
    Get full text
    Article
  9. 1009

    Life-threatening bleeding with intussusception due to gastrointestinal stromal tumor: a case report by Min Sung Kim, In Teak Woo, Young Min Jo, Jin Hyung Lee, Byung Sam Park

    Published 2019-10-01
    “…Abstract Background Massive intraluminal bleeding requires urgent intervention and management. However, the source of bleeding on the small intestine is difficult to determine. …”
    Get full text
    Article
  10. 1010

    Motivation and stimulation of employment specialists in the sphere of information technologies by S. Bazhenov

    Published 2016-04-01
    “…In conducting this study the main sources of raw data served as the information contained in scientific, reference, periodical literature on the subject in question, including the sources of information and telecommunications network "Internet". …”
    Get full text
    Article
  11. 1011

    Structural Repetition Detector for multi-scale quantitative mapping of molecular complexes through microscopy by Afonso Mendes, Bruno M. Saraiva, Guillaume Jacquemet, João I. Mamede, Christophe Leterrier, Ricardo Henriques

    Published 2025-07-01
    “…Understanding these structures provides insights into their functional roles. While super-resolution microscopy can visualise such patterns, manual detection in large datasets is challenging and biased. …”
    Get full text
    Article
  12. 1012

    Antioxidant Profiling of Botryocladia leptopoda Based on In Silico and In Vitro Studies by Fenny Crista Anastasia Panjaitan, Huey-Jine Chai

    Published 2025-05-01
    “…Thus, B. leptopoda can be considered a promising source of antioxidative products in the functional food and pharmaceutical industries.…”
    Get full text
    Article
  13. 1013
  14. 1014

    The Roles of Transcrustal Magma- and Fluid-Conducting Faults in the Formation of Mineral Deposits by Farida Issatayeva, Auez Abetov, Gulzada Umirova, Aigerim Abdullina, Zhanibek Mustafin, Oleksii Karpenko

    Published 2025-05-01
    “…At hydrocarbon fields, they play extremely important roles in conductive and convective heat, as well as in mass transfer to the area of hydrocarbon generation, determining the relationship between the processes of lithogenesis and tectogenesis, and activating the generation of hydrocarbons from oil and gas source rock. Detection of TCMFCFs was carried out using MMSS (the method of microseismic sounding) and MTSM (the magnetotelluric sounding method), in combination with other geological and geophysical data. …”
    Get full text
    Article
  15. 1015

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  16. 1016

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  17. 1017
  18. 1018

    Maximum Entropy Principle Based on Bank Customer Account Validation Using the Spark Method by Xiaorong Qiu, Ye Xu, Yingzhong Shi, S. Kannadhasan Deepa, S. Balakumar

    Published 2023-01-01
    “…This research works in the field of money laundering detection from real bank data. Banking data analysis is a complex process that involves information gathered from various sources, mainly in terms of personality, such as bills or bank account transactions which have qualitative characteristics such as the testimony of eyewitnesses. …”
    Get full text
    Article
  19. 1019
  20. 1020

    Investigation on the Radar Scattering and Doppler Spectrum From Trimaran Based on the Motion of Six Degrees of Freedom by Yuxin Deng, Jinxing Li, Wangqiang Jiang, Min Zhang

    Published 2023-01-01
    “…Second, an accelerated geometrical optics and physical optics algorithm using the light source function (GO-PO/LSF) is proposed, which uses the light source function to realize the visibility judgment of surfaces and greatly reduces the computation time. …”
    Get full text
    Article