Search alternatives:
source » sources (Expand Search)
resources » resourcess (Expand Search)
Showing 1,501 - 1,520 results of 2,295 for search '((\ source selection functions\ ) OR (( resources OR resources) detection function\ ))', query time: 0.27s Refine Results
  1. 1501

    The biomarker potential of circPOLD1 and its binding protein YBX1 in cervical carcinogenesis by Lu Zhao, Xin Chen, Yanan Zhang, Yixuan Cen, Tingjia Zhu, Lingfang Wang, Lili Xia, Yang Li, Xiaodong Cheng, Xing Xie, Weiguo Lu, Junfen Xu

    Published 2025-05-01
    “…Mechanistically, circPOLD1 functioned as an oncogene by binding to and phosphorylating YBX1, activating the AKT/mTOR/HIF-1α pathway to enhance glycolysis-driven tumorigenesis. …”
    Get full text
    Article
  2. 1502

    The synthesis of the Gospel and life as a goal of evangelization by Stanisław Dyk

    Published 2024-06-01
    “…In implementing the priestly function, the focus was on celebrating the Eucharist, revealing it as a source of human strength and energy, a school of sacramental perception of life and appreciation of matter, as well as a space for forming a new man. …”
    Get full text
    Article
  3. 1503

    Risk Analysis of Groundwater Contaminant in Rural Areas Using Spatial Distribution by Herawati Herawati, Maria Kanan, Anwar Mallongi, Ramli Bidullah, Sandy N. Sakati, Dwi Wahyu Balebu

    Published 2024-11-01
    “…Background: Water is a very important material for the life of creatures in nature and its function for life cannot be replaced by other compounds. …”
    Get full text
    Article
  4. 1504

    Understanding Silent Eruptions of Depression among Youngsters and Adolescents by Yuan Rai, Ananya Bhattacharjee, Manodeep Chakraborty, Akanchya Rai, Ashika Bhattarai, Chetiz Sharma, Md Hasnat Jahan Ali, Rudra Acharya, Nihar Ranjan Bhuyan

    Published 2024-11-01
    “…Research on the general population is the only source of information on many significant issues regarding depression in young people. …”
    Get full text
    Article
  5. 1505

    Preparation Process Optimization and Physicochemical Properties Characterization of Jinhua Ham Enzymolysis Peptide by Weiqiang WANG, Yu ZHENG, Weimin XU, Yanbo WANG, Jie CHEN

    Published 2025-07-01
    “…To investigate the potential of enzymatic hydrolysis for enhancing the nutritional and functional properties of Jinhua ham, a concentrated extract produced by dialysis desalination was employed as a substrate. …”
    Get full text
    Article
  6. 1506

    Background for modeling the dynamic characteristics of advanced spacecraft drives considering the operation of oscillators by A. N. Sova, M. I. Stepanov, V. A. Sova, A. I. Bykov

    Published 2019-12-01
    “…Recommendations to reduce the effect of active oscillators are established. Initial data are selected to determine the dynamics of advanced space vehicles from the point of view of fulfilling their target functions. …”
    Get full text
    Article
  7. 1507

    Methodological quality of multivariate prognostic models for intracranial haemorrhages in intensive care units: a systematic review by Denis Frasca, Fanny Feuillet, Maxime Leger, Raphaël Cinotti, Yohann Foucher, Jeanne Simon-Pimmel, Laetitia Bodet-Contentin, Etienne Dantan

    Published 2021-09-01
    “…We aimed to methodologically assess prognostic tools for functional outcomes in severe spontaneous intracranial haemorrhages.Data sources Following Preferred Reporting Items for Systematic Reviews and Meta-Analyses recommendations, we conducted a systematic review querying Medline, Embase, Web of Science, and the Cochrane in January 2020.Study selection We included development or validation of multivariate prognostic models for severe intracerebral or subarachnoid haemorrhage.Data extraction We evaluated the articles following the CHecklist for critical Appraisal and data extraction for systematic Reviews of prediction Modelling Studies and Transparent Reporting of multivariable prediction model for Individual Prognosis Or Diagnosis statements to assess the tools’ methodological reporting.Results Of the 6149 references retrieved, we identified 85 articles eligible. …”
    Get full text
    Article
  8. 1508

    Pediatric Adenotonsillectomy Trial for Snoring (PATS): protocol for a randomised controlled trial to evaluate the effect of adenotonsillectomy in treating mild obstructive sleep-di... by Rui Wang, Jessie P. Bakker, Ronald D. Chervin, Susan L. Garetz, Fauziya Hassan, Stacey L. Ishman, Ron B. Mitchell, Michael G. Morrical, Syed K. Naqvi, Jerilynn Radcliffe, Emily I. Riggan, Carol L. Rosen, Kristie Ross, Michael Rueschman, Ignacio E. Tapia, H. Gerry Taylor, David A. Zopf

    Published 2020-03-01
    “…The study’s coprimary endpoints are (1) change from baseline in executive behaviour relating to self-regulation and organisation skills as measured by the Behavioural Rating Inventory of Executive Function (BRIEF) Global Composite Score (GEC); and (2) change from baseline in vigilance as measured on the Go-No-Go (GNG) signal detection parameter (d-prime). …”
    Get full text
    Article
  9. 1509

    Contaminants in the Urban Environment: Dioxins by Yun-Ya Yang, Gurpal S. Toor

    Published 2015-08-01
    “…Long-term exposure to dioxins can harm immune system, nervous system, endocrine system, and reproductive functions. This 7-page fact sheet discusses the sources, emission trends, and impacts of dioxins as well as the ways to minimize exposure to dioxins. …”
    Get full text
    Article
  10. 1510

    Contaminants in the Urban Environment: Dioxins by Yun-Ya Yang, Gurpal S. Toor

    Published 2015-08-01
    “…Long-term exposure to dioxins can harm immune system, nervous system, endocrine system, and reproductive functions. This 7-page fact sheet discusses the sources, emission trends, and impacts of dioxins as well as the ways to minimize exposure to dioxins. …”
    Get full text
    Article
  11. 1511

    Effect of Knowledge Sharing on Success of IT Outsourcing by فرج‌اله رهنورد, جلیل خاوندکار

    Published 2009-02-01
    “…By outsourcing, organizations can focus on core functions, decrease their operational costs and technology risk, and to use external sources to achieve the organizational objectives. …”
    Get full text
    Article
  12. 1512

    Predicting the Likelihood of Operational Risk Occurrence in the Banking Industry Using Machine Learning Algorithms by Hamed Naderi, Mohammad Ali Rastegar Sorkhe, Bakhtiar Ostadi, Mehrdad Kargari

    Published 2025-12-01
    “…Machine learning models can process complex datasets, identify hidden patterns, and facilitate early risk detection, enabling banks to implement preventive measures before risks materialize. …”
    Get full text
    Article
  13. 1513

    Representation of a Scientific Supervisor in Internet-Memes by N. V. Stepanova, M. S. Sigaeva

    Published 2024-04-01
    “…The sources of the memes were the podcasts “The Struggling Scientists”,  “The Meming Phd”, “High impact PhD memes”. …”
    Get full text
    Article
  14. 1514

    Real-World Efficacy of Explainable Artificial Intelligence using the SAGE Framework and Scenario-Based Design by Eleanor Mill, Wolfgang Garn, Chris Turner

    Published 2024-12-01
    “…The paper then employs a functionally-grounded evaluation method to assess its effectiveness. …”
    Get full text
    Article
  15. 1515

    Bovine PMN responses to extracellular vesicles released by Besnoitia besnoiti tachyzoites and B. besnoiti-infected host cells by Gabriel Espinosa, Constanza Salinas-Varas, Lisbeth Rojas-Barón, Christian Preußer, Elke Pogge von Strandmann, Ulrich Gärtner, Iván Conejeros, Carlos Hermosilla, Anja Taubert

    Published 2024-12-01
    “…Therefore, we tested whether exposure of bovine PMN to EVs from different cellular sources affects classical PMN effector functions and cytokine/chemokine secretion. …”
    Get full text
    Article
  16. 1516

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  17. 1517

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  18. 1518
  19. 1519

    A global systematic review of the remote sensing vegetation indices by Kai Yan, Si Gao, Guangjian Yan, Xuanlong Ma, Xiuzhi Chen, Peng Zhu, Jinhua Li, Sicong Gao, Jean-Philippe Gastellu-Etchegorry, Ranga B. Myneni, Qiao Wang

    Published 2025-05-01
    “…This study conducted a bibliometric review of VI-related literature in the web of science (WOS) database since 1986, examining current trends and issues in data sources, geographic areas, eco-functional areas, applications, and technical methods. …”
    Get full text
    Article
  20. 1520

    Microbiome Migration from Soil to Leaves in Maize and Rice by Jiejia Ma, Qianze Peng, Silu Chen, Zhuoxin Liu, Weixing Zhang, Chi Zhang, Xiaohua Du, Shue Sun, Weiye Peng, Ziling Lei, Limei Zhang, Pin Su, Deyong Zhang, Yong Liu

    Published 2025-04-01
    “…This indicated that plants can selectively assemble microbiomes from a shared microbiota source. …”
    Get full text
    Article