Search alternatives:
source » sources (Expand Search)
resource » resources (Expand Search)
resources » resourcess (Expand Search)
Showing 1,001 - 1,020 results of 2,295 for search '((\ source selection functions\ ) OR (( resource OR resources) detection function\ ))', query time: 0.33s Refine Results
  1. 1001

    Attitude of patients and doctors of government health care system to the basic principles of medical ethics by E. P. Pukhova, O. Yu. Kutumova, D. O. Trufanov

    Published 2021-03-01
    “…Materials and methods. For the selection of respondents was used the representative sample based on gender and age of respondents (for the selection of patients), and by specialty of a medical workers (for doctors). …”
    Get full text
    Article
  2. 1002

    Multi-Robot Cooperative Simultaneous Localization and Mapping Algorithm Based on Sub-Graph Partitioning by Wan Xu, Yanliang Chen, Shijie Liu, Ao Nie, Rupeng Chen

    Published 2025-05-01
    “…In terms of localization accuracy, the proposed method achieves an improvement of approximately 32.8% over other open source algorithms.…”
    Get full text
    Article
  3. 1003

    Morphological divergence driven by predation environment within and between species of Brachyrhaphis fishes. by Spencer J Ingley, Eric J Billman, Mark C Belk, Jerald B Johnson

    Published 2014-01-01
    “…Our findings are important because they provide evidence that the same source of selection can drive similar phenotypic divergence independently at multiple divergence levels.…”
    Get full text
    Article
  4. 1004
  5. 1005

    Genome-Wide Scan for Copy Number Variations in Chinese Merino Sheep Based on Ovine High-Density 600K SNP Arrays by Yuezhen Tian, Jing An, Xinning Zhang, Jiang Di, Junmin He, Ayinuer Yasen, Yanpin Ma, Gaohaer Sailikehan, Xixia Huang, Kechuan Tian

    Published 2024-10-01
    “…Sheep are a vital species in the global agricultural economy, providing essential resources such as meat, milk, and wool. Merino sheep (Junken type) are a key breed of fine wool sheep in China. …”
    Get full text
    Article
  6. 1006

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  7. 1007

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  8. 1008
  9. 1009

    Distorting Electrical Power of the Alternating Current in the Simplest Circuit with a Diode by O. V. Bialobrzheskyi, D. Y. Rod`kin

    Published 2019-10-01
    “…For the analysis of processes of formation the components of electrical power, a diagram of the simplest circuit containing a series-connected source of electromotive force, resistors and a diode is considered; also, the circuit was conditionally separated into a source and a consumer. …”
    Get full text
    Article
  10. 1010

    Optimal Dispatch of Power System with P2G-Wind-Thermal-Nuclear-Carbon Capture Units by Wenhao CHAO, Zhi YUAN, Ji LI

    Published 2024-01-01
    “…Finally, the minimization of system comprehensive operation costs is selected as the overall objective function. At the same time, the carbon trading mechanism is considered to build the simulation model on the Matlab platform to verify the effectiveness of the proposed model. …”
    Get full text
    Article
  11. 1011

    Sociocultural activities of wartime library within the context of the Ukrainian sociohumanitarian science priorities by Vasylenko Olha, Sereda Tetiana

    Published 2024-01-01
    “…The purpose of the article is to examine legal documents of the National Academy of Sciences of Ukraine during full-scale war in Ukraine as a component of scientific and information source base for the libraries sociocultural activities and to highlight the organization of events on the corresponding topics in the leading scientific libraries. …”
    Get full text
    Article
  12. 1012
  13. 1013

    The role of internal auditors in preventing financial fraud in the Republic of Serbia by Jeremić Nebojša, Jakovljević Nemanja

    Published 2023-01-01
    “…The findings and recommendations presented in the paper can serve as a valuable resource for policymakers, regulatory bodies and organizations seeking to strengthen their financial fraud defense mechanisms and their internal audit function.…”
    Get full text
    Article
  14. 1014

    Fine-grained access control method for private data in android system by Gang Liu, Guofang Zhang, Quan Wang, Shaomin Ji, Lizhi Zhang

    Published 2019-03-01
    “…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
    Get full text
    Article
  15. 1015
  16. 1016
  17. 1017

    Early Bearing Fault Diagnosis in PMSMs Based on HO-VMD and Weighted Evidence Fusion of Current–Vibration Signals by Xianwu He, Xuhui Liu, Cheng Lin, Minjie Fu, Jiajin Wang, Jian Zhang

    Published 2025-07-01
    “…The HO algorithm is employed to optimize the parameters of VMD for adaptive modal decomposition of current and vibration signals, resulting in the generation of intrinsic mode functions (IMFs). These IMFs are then selected and reconstructed based on their kurtosis to suppress noise and harmonic interference. …”
    Get full text
    Article
  18. 1018

    Spectral Properties of Suprathermal Protons Associated with Interplanetary Shocks from WIND/STICS Data by Johann Rubens Mejia-Ott, Brent M. Randol

    Published 2024-01-01
    “…“Suprathermal” designates energies above the bulk, “thermal” solar wind, including inner-source pickup ions, cometary ions, solar energetic particles, and suprathermal tail particles. …”
    Get full text
    Article
  19. 1019

    Renal Biopsy Pathological Tissue Segmentation: A Comprehensive Review and Experimental Analysis by Yan Liu, Taiping Wang, Xinxin He, Wei Wang, Qiang He, Juan Jin

    Published 2025-01-01
    “…This study provides a novel technical framework for precise renal pathological tissue segmentation and lays the foundation for future lesion detection and intelligent diagnostic applications.…”
    Get full text
    Article
  20. 1020

    Research on a traffic flow statistical algorithm based on YBOVDT and SAM2 by Yuanyuan Wang, Zheng Ding, Jiange Liu, Kexiao Wu, Md Sharid Kayes Dipu, Tingmei Ma, Yonghao Ma, Haiyan Zhang

    Published 2025-05-01
    “…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
    Get full text
    Article