Showing 141 - 160 results of 2,295 for search '((\ (source OR sources) selection function\ ) OR (( resources OR resources) detection functions\ ))', query time: 0.36s Refine Results
  1. 141
  2. 142
  3. 143

    Western spotted skunk spatial ecology in the temperate rainforests of the Pacific Northwest by Marie I. Tosa, Damon B. Lesmeister, Taal Levi

    Published 2024-08-01
    “…Using these home ranges, we fitted a resource selection function using environmental covariates that we assigned to various hypotheses such as resources, predator avoidance, thermal tolerance, and disturbance. …”
    Get full text
    Article
  4. 144

    Development and validation of microwave-assisted extraction for phenolic compound profiling in diverse oyster mushrooms (Pleurotus spp.) sourced from various geographical regions by M Umar Harun, Miguel Palma, Widiastuti Setyaningsih

    Published 2025-04-01
    “…This study aimed to develop and validate a microwave-assisted extraction (MAE) method for profiling phenolic compounds in a diverse selection of oyster mushrooms (Pleurotus spp.) sourced from multiple geographical regions. …”
    Get full text
    Article
  5. 145
  6. 146

    Continuous-Variable Quantum Key Distribution Protocol Based on Post-Selection by Hao YU, Bao FENG, Zichun PAN, Wenhe ZHUO, Zhenwei LI

    Published 2019-07-01
    “…In the paper, we present a CVQKD protocol based on post-selection method, which need not any extra single photon source. …”
    Get full text
    Article
  7. 147

    Detection of Sensitive Malicious Android Functionalities Using Inter-Component Control-Flow Analysis by Rati Bhan, Parvez Faruki, Rajendra Pamula

    Published 2025-01-01
    “…The paper proposes a robust inter-component communication (ICC) based detection approach to identify such hidden functionality exploited by adversaries. …”
    Get full text
    Article
  8. 148

    C3-methylation of imidazopyridines via C(sp2)-H activation using magnetic Cu-MOF, and DMSO as solvent and Methyl source by Firouz Matloubi Moghaddam, Parisa Yaqubnezhad Pazoki, Atefeh Jarahiyan, Bagher Aghamiri

    Published 2025-08-01
    “…This approach offers an efficient and reliable method for the methylation of imidazopyridines, showcasing excellent compatibility with various functional groups, high site selectivity, and outstanding product yields. …”
    Get full text
    Article
  9. 149

    Pollination-driven modulation of amino acid biosynthesis in plum: A multi-omics approach by Lijun Deng, Binshu Yuan, Xiaojun Jin, Yingying Xu, Yuhuan Feng, Xuan Zhang, Hui Zhang, Bo Xiong, Xun Wang, Guochao Sun, Mingfei Zhang, Siya He, Ling Liao, Zhihui Wang

    Published 2025-08-01
    “…The findings underscore the potential to improve the nutritional value of plums through the strategic selection of pollination cultivars. In addition, this research provides a foundation for a deeper understanding of the regulatory mechanisms underlying amino acid biosynthesis in plum and supports the development of relevant functional foods.…”
    Get full text
    Article
  10. 150
  11. 151

    The ANFIS-RSM based multi-objective optimization and modelling of ultrasound-assisted extraction of polyphenols from jamun fruit (Syzygium cumini) by Mohammad Ganje, Somayyeh Gharibi, Fatemeh Nejatpour, Maryam Deilamipour, Kimia Goshadehrou, Sahra Saberyan, Gholamreza Abdi

    Published 2025-02-01
    “…For each of the six process-solver conditions, optimal ANFIS models were determined by analyzing the number and type of input membership functions, the output membership function, and the selected optimization and defuzzification methods, based on the highest correlation between actual and predicted data, along with the lowest error rates. …”
    Get full text
    Article
  12. 152
  13. 153

    Aptamer-Functionalized Gold Nanoparticle Assay for Rapid Visual Detection of Norovirus in Stool Samples by Maytawan Thanunchai, Sirikwan Sangboonruang, Natthawat Semakul, Kattareeya Kumthip, Niwat Maneekarn, Khajornsak Tragoolpua

    Published 2025-06-01
    “…Detection relies on MgCl<sub>2</sub>-induced changes in the color and absorbance of these aptamer-functionalized AuNPs. …”
    Get full text
    Article
  14. 154

    Antimicrobial Activity of Chitosan from Different Sources Against Non-<i>Saccharomyces</i> Wine Yeasts as a Tool for Producing Low-Sulphite Wine by Francesco Tedesco, Rocchina Pietrafesa, Gabriella Siesto, Carmen Scieuzo, Rosanna Salvia, Patrizia Falabella, Angela Capece

    Published 2024-10-01
    “…Finally, the efficiency of different antimicrobial treatments was evaluated during laboratory-scale fermentations inoculated with a selected <i>S. cerevisiae</i> strain. The tested strains exhibited medium/high resistance to the chitosan; in some cases, the behaviour varied in the function of species/strain, and only four strains exhibited different resistance levels, depending on the chitosan source. …”
    Get full text
    Article
  15. 155
  16. 156

    PFW-YOLO Lightweight Helmet Detection Algorithm by Yue Hong, Hao Wang, Shuo Guo

    Published 2025-01-01
    “…However, due to the limited arithmetic and storage resources of edge-end devices, and the traditional detection algorithms have problems such as the number of parameters and large computational volume, the detection algorithms are difficult to be deployed practically. …”
    Get full text
    Article
  17. 157

    Productivity, activity of digestive and antioxidant enzymes of carp (Cyprinus carpio Linnaeus, 1758) as a result of the use of inulin in low-nutrient feeds by O. Deren, O. Dobrianska, M. Koryliak

    Published 2025-06-01
    “…The practical use of the knowledge gained outlines the possibility of optimizing the production of fish when introducing resource-saving technologies in aquaculture.…”
    Get full text
    Article
  18. 158
  19. 159
  20. 160

    Reinforcement Q-Learning-Based Adaptive Encryption Model for Cyberthreat Mitigation in Wireless Sensor Networks by Sreeja Balachandran Nair Premakumari, Gopikrishnan Sundaram, Marco Rivera, Patrick Wheeler, Ricardo E. Pérez Guzmán

    Published 2025-03-01
    “…The proposed model leverages a deep learning-based anomaly detection system to classify network states into low, moderate, or high threat levels, which guides encryption policy selection. …”
    Get full text
    Article