Showing 1,461 - 1,480 results of 1,810 for search '((\ (source OR sources) detection functions\ ) OR (( resources OR resources) detection function\ ))', query time: 0.27s Refine Results
  1. 1461

    Who Leads Trends on Q&A Platforms? Identifying and Analyzing Trend Discoverers by Yongning Li, Lun Zhang, Ye Wu, Tianlan Wei

    Published 2024-01-01
    “…Q&A platforms are vital sources of information but often face challenges related to their high ratios of passive to active contributors, which can impede knowledge construction and information exchange on the platforms. …”
    Get full text
    Article
  2. 1462
  3. 1463

    Validation of a 60K SNP chip for caribou (Rangifer tarandus) for use in wildlife forensics, conservation, and management by Trottier-Lavoie Mallorie, Prunier Julien, Poisson William, Carrier Alexandra, Gilbert Isabelle, Mastromonaco Gabriela, Albert Vicky, Cecilia Hernandez, Bourret Vincent, Taillon Joëlle, Droit Arnaud, Côté Steeve D., Robert Claude

    Published 2024-12-01
    “…The SNP chip was shown to be robust, highly sensitive, reliable, and accurate at more than 10-fold below the recommended DNA input. Biological source of DNA had minor impact, even with fecal pellets given sufficient amount of host DNA. …”
    Get full text
    Article
  4. 1464

    Microfluidic Nanobioplatform-Based Immunosensor for Monitoring of 25-Hydroxy Vitamin-D3 by Deepika Chauhan, Zimad Hashmi, Rishi Raj, Pratima R. Solanki

    Published 2024-01-01
    “…The use of proposed immunosensor to serum samples would allow early detection of 25-VitD _3 deficiency, particularly in rural and resource-constrained settings.…”
    Get full text
    Article
  5. 1465

    Accelerated low-intensity rTMS does not rescue anxiety behaviour or abnormal connectivity in young adult rats following chronic restraint stress by Lauren A. Hennessy, Bhedita J. Seewoo, Liz A. Jaeschke, Leah A. Mackie, Abbey Figliomeni, Yasmin Arena-Foster, Sarah J. Etherington, Sarah A. Dunlop, Paul E. Croarkin, Jennifer Rodger

    Published 2022-09-01
    “…Behaviour was assessed using the Elevated Plus Maze and Forced Swim Test, and functional, chemical, and structural brain changes measured using magnetic resonance imaging techniques. …”
    Get full text
    Article
  6. 1466
  7. 1467

    The biomarker potential of circPOLD1 and its binding protein YBX1 in cervical carcinogenesis by Lu Zhao, Xin Chen, Yanan Zhang, Yixuan Cen, Tingjia Zhu, Lingfang Wang, Lili Xia, Yang Li, Xiaodong Cheng, Xing Xie, Weiguo Lu, Junfen Xu

    Published 2025-05-01
    “…Mechanistically, circPOLD1 functioned as an oncogene by binding to and phosphorylating YBX1, activating the AKT/mTOR/HIF-1α pathway to enhance glycolysis-driven tumorigenesis. …”
    Get full text
    Article
  8. 1468

    Unveiling the complex double-edged sword role of exosomes in nasopharyngeal carcinoma by Xueyan Huang, Yuedi Tang

    Published 2025-01-01
    “…Exosomes are small membrane vesicles at the nanoscale that transport physiologically active compounds from their source cell and have a crucial function in signal transmission and intercellular message exchange. …”
    Get full text
    Article
  9. 1469

    Face Recognition Door Security System and Contactless Bell by Rini Irnayanti, Elfizon Elfizon

    Published 2024-02-01
    “…Face recognition uses OpenCV based on an open source library to recognize faces in realtime using the Python programming language.  …”
    Get full text
    Article
  10. 1470

    State immunological reactivity and autonomic regulation in patients with chronic apical periodontitis

    Published 2020-04-01
    “…In this paper we studied 107 people with a diagnosis of «chronic apical periodontitis». The functional state of the autonomic nervous system were detected by electrophoresis dosed adrenaline and carbachol and test dermographism. …”
    Get full text
    Article
  11. 1471

    Landscape of extracellular small RNA and identification of biomarkers in multiple human cancers by Shoubin Zhan, Ye Xu, Botao Li, Peng Ge, Chunwu Zhang, Shengkai Zhou, Tingting Yang, Gaoli Liang, Ling Ji, Xiangbin Kong, Ping Yang, Xi Chen, Chen-Yu Zhang, Han Shen, Xu Luo, Zhen Zhou, Yanbo Wang

    Published 2025-08-01
    “…Summary: Extracellular RNAs (exRNAs) in biofluids, sourced from diverse tissues, exhibit various biological functions and diagnostic potential. …”
    Get full text
    Article
  12. 1472

    Pediatric Adenotonsillectomy Trial for Snoring (PATS): protocol for a randomised controlled trial to evaluate the effect of adenotonsillectomy in treating mild obstructive sleep-di... by Rui Wang, Jessie P. Bakker, Ronald D. Chervin, Susan L. Garetz, Fauziya Hassan, Stacey L. Ishman, Ron B. Mitchell, Michael G. Morrical, Syed K. Naqvi, Jerilynn Radcliffe, Emily I. Riggan, Carol L. Rosen, Kristie Ross, Michael Rueschman, Ignacio E. Tapia, H. Gerry Taylor, David A. Zopf

    Published 2020-03-01
    “…The study’s coprimary endpoints are (1) change from baseline in executive behaviour relating to self-regulation and organisation skills as measured by the Behavioural Rating Inventory of Executive Function (BRIEF) Global Composite Score (GEC); and (2) change from baseline in vigilance as measured on the Go-No-Go (GNG) signal detection parameter (d-prime). …”
    Get full text
    Article
  13. 1473

    Comparative metabolomic profiling of Lupinus albus and L. angustifolius harvest residues: exploring chemical diversity and valorization potential by Salma Halime, Salma Halime, Jenny Renaut, Stéphanie Zimmer, Hanna Heidt, Cédric Jacquard, Kjell Sergeant

    Published 2025-07-01
    “…Lupin species are a rich source of bioactive compounds with diverse industrial applications, yet their harvest residues remain underutilized. …”
    Get full text
    Article
  14. 1474

    Reconstruction of defects in elastic bodies by combination of genetic algorithm and finite element method by Arkady N Solovyev, Mikhail Y. Shevtsov

    Published 2016-06-01
    “…The inverse problem solution is based on the minimization of the residual functional between the measured input source information and the data calculated during the numerical solution of direct problems with the given parameters of defects. …”
    Get full text
    Article
  15. 1475

    Synthesis and Production of Sweet-Tasting Protein in E. coli and Purification by Amylose Resin by F. Mansouri

    Published 2011-06-01
    “…However, the extraction of brazzein from its natural source is expensive and not applicable. In this study we used recombinant DNA technology to provide an alternative option for cheaper mass production of brazzein. …”
    Get full text
    Article
  16. 1476

    Predicting the Likelihood of Operational Risk Occurrence in the Banking Industry Using Machine Learning Algorithms by Hamed Naderi, Mohammad Ali Rastegar Sorkhe, Bakhtiar Ostadi, Mehrdad Kargari

    Published 2025-12-01
    “…Machine learning models can process complex datasets, identify hidden patterns, and facilitate early risk detection, enabling banks to implement preventive measures before risks materialize. …”
    Get full text
    Article
  17. 1477

    Intranasal administration of stem cell derivatives for the treatment of AD animal models: a systematic review and meta-analysis by Zilin Hua, Nan Zhou, Zijing Zhou, Zewei Fu, Ruiyun Guo, Herman Yao Akogo, Jiayin Yang, Meixuan Yu, Yujie Jiang, Siyi Lan, Haixia Chang, Jun Ma, Huixian Cui

    Published 2025-07-01
    “…Subgroup analyses indicated that stem cell source, stem cell derivative types and Aβ detection method were not primary drivers of heterogeneity. …”
    Get full text
    Article
  18. 1478

    Inference of a plume conduit beneath the Réunion Island from 3D migration of Ps conversions from the mantle transition zone by B. Padma Rao, M. Ravi Kumar

    Published 2025-03-01
    “…These maiden results shed-light on the high-temperature anomalies in the mid-mantle, probably sourced from the Réunion plume and provide evidence for the Majorite-garnet phase transformation at 660 km discontinuity. …”
    Get full text
    Article
  19. 1479

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  20. 1480

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article