Search alternatives:
source » sources (Expand Search)
resources » resourcess (Expand Search)
resource » resources (Expand Search)
Showing 941 - 960 results of 1,810 for search '((\ source detection functions\ ) OR (( resources OR resource) detection function\ ))', query time: 0.31s Refine Results
  1. 941
  2. 942

    Estimating fish stock biomass using a Bayesian state-space model: accounting for catchability change due to technological progress by Makoto Nishimoto, Yoshinori Aoki, Naoto Matsubara, Paul Hamer, Yuichi Tsuda

    Published 2024-12-01
    “…The assessment of trends in fish stocks using long-term time-series data is important for effective fisheries resource management. Despite technological advancements in recent decades, the resulting increase in fisheries catch potential with applied effort is often not adequately considered in stock assessments. …”
    Get full text
    Article
  3. 943
  4. 944

    Individual ZnO–Ag Hybrid Nanorods for Synergistic Fluorescence Enhancement Towards Highly Sensitive and Miniaturized Biodetection by Marion Ryan C. Sytu, Jong-in Hahm

    Published 2025-04-01
    “…Hybrid nanostructures can be engineered to exhibit superior functionality beyond the level attainable from each of the constituent nanomaterials by synergistically integrating their unique properties. …”
    Get full text
    Article
  5. 945

    Audio recognition method of belt conveyor roller fault based on convolutional neural network and linear regression by Xiangyuan CHEN, Wei QIN, Yanchi LIU, Minghua LUO

    Published 2025-06-01
    “…The results show that the detection rate of roller fault reaches 95.79 %, and the detection accuracy reaches 95.60 %.…”
    Get full text
    Article
  6. 946

    Comparing soil microbial diversity in smallholder plantain backyard gardens and main farms in Western and Central Africa by Manoj Kaushal, Yao Adjiguita Kolombia, Amos Emitati Alakonya, Cargele Masso

    Published 2025-08-01
    “…Beneficial genera such as Bacillus, Streptomyces, Bradyrhizobium, and Paenibacillus were also detected. Functional predictions based on COG and KEGG databases indicated notable differences in microbial functional potential between the two settings. …”
    Get full text
    Article
  7. 947
  8. 948

    ParticleHolography.jl: Holographic particle measurement in Julia by Dai Nakai, Yohsuke Tanaka

    Published 2025-02-01
    “…This comprehensive software provides an end-to-end processing pipeline encompassing a wide range of functionalities: preprocessing, including background removal and camera calibration; three-dimensional reconstruction through diffraction calculations; particle analysis, including detection and tracking; and result visualization. …”
    Get full text
    Article
  9. 949
  10. 950

    Multiwavelength Constraints on the Local Black Hole Occupation Fraction by Colin J. Burke, Priyamvada Natarajan, Vivienne F. Baldassare, Marla Geha

    Published 2024-01-01
    “…We also constrain the extremely low-luminosity end ( L _bol ≲ 10 ^40 erg s ^−1 ) of the active galactic nucleus (AGN) luminosity functions at z = 0. Our AGN luminosity functions are broadly consistent with an extrapolation of the shallow slope of the AGN luminosity functions from previous work.…”
    Get full text
    Article
  11. 951

    Complexity of immunobiology of tumor necrosis factor and novel anti-TNF therapy by S. А. Nedospasov

    Published 2023-06-01
    “…Systemic anti-cytokine therapy is known to be accompanied by undesirable side effects, which can hypothetically be explained by the neutralization of these protective functions. Thus, we developed prototypes of TNF blockers which limit the bioavailability of this cytokine only from its main “pathogenic” source – myeloid cells. …”
    Get full text
    Article
  12. 952
  13. 953

    pytom-match-pick: A tophat-transform constraint for automated classification in template matching by Marten L. Chaillet, Sander Roet, Remco C. Veltkamp, Friedrich Förster

    Published 2025-06-01
    “…However, TM faces challenges of weak signal of the macromolecules and interfering features with a high signal-to-noise ratio, which are often addressed by time-consuming, subjective manual curation of results. To improve the detection performance we introduce pytom-match-pick, a GPU-accelerated, open-source command line interface for enhanced TM in cryo-ET. …”
    Get full text
    Article
  14. 954

    An Improved Fitting Method for Predicting the Zernike Coefficient–Wavelength Curves by Fang Wang, Qiyuan Zhang, Haoyu Wang, Dayong Zhu, Huaikang Zhu, Wenxin Jia, Sen Han

    Published 2021-01-01
    “…Broadband transmitted wavefront measurement is a detection method that uses transmitted wavefronts at a few specific wavelengths though a function of Zernike coefficients and wavelength to predict other transmitted wavefronts at any wavelength within a certain range. …”
    Get full text
    Article
  15. 955

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  16. 956

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  17. 957
  18. 958
  19. 959

    The role of internal auditors in preventing financial fraud in the Republic of Serbia by Jeremić Nebojša, Jakovljević Nemanja

    Published 2023-01-01
    “…The findings and recommendations presented in the paper can serve as a valuable resource for policymakers, regulatory bodies and organizations seeking to strengthen their financial fraud defense mechanisms and their internal audit function.…”
    Get full text
    Article
  20. 960

    Fine-grained access control method for private data in android system by Gang Liu, Guofang Zhang, Quan Wang, Shaomin Ji, Lizhi Zhang

    Published 2019-03-01
    “…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
    Get full text
    Article