Search alternatives:
source » sources (Expand Search)
resourcess » resourcesss (Expand Search)
resource » resources (Expand Search)
Showing 941 - 960 results of 2,295 for search '((\ source selection functions\ ) OR (( resourcess OR resource) detection function\ ))', query time: 0.31s Refine Results
  1. 941

    THE INFLUENCE OF SOIL DENSITY AND THE CHARACTER OF RADIOACTIVE 134Cs And 137Cs POLLUTION’S DISTRIBUTION ON in situ MEASUREMENTS by A. I. Zhukouski, O. M. Anshakou, A. O. Nichyparchuk, P. M. Marozik, S. A. Kuten

    Published 2018-03-01
    “…As a result of theoretical estimations, the relationship between the effective radius of contaminated site is determined as a function of soil density.Analysis of the influence of radial zones of the cylindrical gamma source on in situ gamma-spectrometer showed that the main contribution to the total count rate of the pulse-amplitude spectrum is made by the radial zone with radius of up to 40 cm from the center of the probe, regardless of the thickness of the contaminated layer in geometry «Probe is located on the soil surface». …”
    Get full text
    Article
  2. 942

    From Clusters to Communities: Enhancing Wetland Vegetation Mapping Using Unsupervised and Supervised Synergy by Li Wen, Shawn Ryan, Megan Powell, Joanne E. Ling

    Published 2025-07-01
    “…This study addresses these challenges by developing a scalable vegetation classification framework that integrates cluster-guided sample selection, Random Forest modelling, and multi-source remote-sensing data. …”
    Get full text
    Article
  3. 943

    Reprogrammed Cell‐based Therapy for Liver Disease: From Lab to Clinic by Amir Mehdizadeh, Masoud Darabi

    Published 2017-02-01
    “…The generation of human functional hepatocytes in high quantities for liver cell therapy is an important goal for ongoing therapies in regenerative medicine. …”
    Get full text
    Article
  4. 944

    Biological properties of cord blood hematopoietic stem cells by S. A. Rumiantsev, E. Yu. Osipova, S. E. Ipatov, T. V. Shamanskaya, O. A. Mayorova, A. G. Rumyantsev

    Published 2014-07-01
    “…Phased developments of the technology of stem cells detection and selection, their proliferation, differentiation and function assessment using cultivation in vitro and in vivo in animal model was described. …”
    Get full text
    Article
  5. 945

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  6. 946

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  7. 947

    Screen Culture and Literary Mythology of Mass Consciousness (two “Onegins” – 1999 and 2024) by Sergey N. Ilchenko

    Published 2024-12-01
    “…The article also touches upon the history of cinematic versions of the literary source. The traditions of literary criticism and critical analysis of the original text by A. …”
    Get full text
    Article
  8. 948

    Diagnostic potential of the B9D2 gene in colorectal cancer based on whole blood gene expression data and machine learning by Zhaorui Wang, Yongcheng Fu, Haozhe Zhang, Na Liu, Ningjing Lei

    Published 2025-08-01
    “…Additionally, three machine learning methods—Random Forest (RF), LASSO regression, and Support Vector Machine Recursive Feature Elimination (SVM-RFE)—were employed for feature selection and to evaluate the robustness and predictive power of the selected features, with diagnostic efficacy evaluated through Receiver Operating Characteristic (ROC) curves. …”
    Get full text
    Article
  9. 949

    Where there’s smoke there is fire: Türkiye and the international illegal wildlife trade by Özgün Emre Can

    Published 2025-06-01
    “…By guiding policymakers, conservationists, and authorities, the study fosters international cooperation, optimal resource use, and endangered species protection. International wildlife trafficking can occur when detection and law enforcement measures fail in both the countries of origin and destination, and, where relevant, in transit countries, showing the necessity for governments worldwide to make the international illegal wildlife trade a priority.…”
    Get full text
    Article
  10. 950

    Renal Biopsy Pathological Tissue Segmentation: A Comprehensive Review and Experimental Analysis by Yan Liu, Taiping Wang, Xinxin He, Wei Wang, Qiang He, Juan Jin

    Published 2025-01-01
    “…This study provides a novel technical framework for precise renal pathological tissue segmentation and lays the foundation for future lesion detection and intelligent diagnostic applications.…”
    Get full text
    Article
  11. 951

    Signalling and the evolution of cooperative foraging in dynamic environments. by Colin J Torney, Andrew Berdahl, Iain D Couzin

    Published 2011-09-01
    “…Observed behaviours that benefit others but incur some cost appear incompatible with classical notions of natural selection; however, these behaviours may be explained by concepts such as inclusive fitness, reciprocity, intra-specific mutualism or manipulation. …”
    Get full text
    Article
  12. 952

    Urban resilience: Assessment of performance and science mapping from a climate change perspective by Apu Deb, Humayra Sultana

    Published 2024-12-01
    “…The outcome also shows that the Sustainability, Cities, and Urban Climate journal is the top source for urban resilience to climate change literature. …”
    Get full text
    Article
  13. 953

    Research on a traffic flow statistical algorithm based on YBOVDT and SAM2 by Yuanyuan Wang, Zheng Ding, Jiange Liu, Kexiao Wu, Md Sharid Kayes Dipu, Tingmei Ma, Yonghao Ma, Haiyan Zhang

    Published 2025-05-01
    “…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
    Get full text
    Article
  14. 954

    Fine-grained access control method for private data in android system by Gang Liu, Guofang Zhang, Quan Wang, Shaomin Ji, Lizhi Zhang

    Published 2019-03-01
    “…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
    Get full text
    Article
  15. 955

    Interpretation of Phraseological Units Using Chinese Language in Russian-Chinese Phraseological Dictionaries by Di Liu, Fanhong Meng

    Published 2023-04-01
    “…The results of the research showed that the explanation of Russian phraseology in these lexicographic sources is carried out in two ways: through interpretation and selection of a similar expression. …”
    Get full text
    Article
  16. 956

    Managing Static Archives for Historical Research: A Study at the Archives Depot of the East Java Provincial Library and Archives Service, Indonesia by Farah Mumtahanah Mustakim, Adi Prasetyawan

    Published 2024-11-01
    “…The study applied static archive management theories, encompassing record selection, accessioning, arrangement, description, conservation, preservation, storage, and reference functions. …”
    Get full text
    Article
  17. 957

    MGSurvE: A framework to optimize trap placement for genetic surveillance of mosquito populations. by Héctor M Sánchez C, David L Smith, John M Marshall

    Published 2024-05-01
    “…For these projects, monitoring will be required to detect unintended spread of gene drive mosquitoes beyond field sites, and the emergence of alternative alleles, such as drive-resistant alleles or non-functional effector genes, within intervention sites. …”
    Get full text
    Article
  18. 958

    Lier les cooccurrences des Epithetes (1571) de Maurice de La Porte et celles des textes de la Pléiade by Nathalie Gasiglia, Anne-Pascale Pouey-Mounou

    Published 2017-02-01
    “…It is based on the example of a current editorial project that involves processing and publishing, in digital format, a sixteenth century lexicographical work, Les Epithetes by Maurice de La Porte (1571), whose main source is the poetry of the Pléiade. The textual database currently being established should make it possible to identify the attestations upon which La Porte based his selections. …”
    Get full text
    Article
  19. 959

    Branding process of cultural heritage in the context of rural revitalization in China: a case study of Qingtian County by Mei Zhang

    Published 2025-03-01
    “…The branding process reflects the combination of the functions of service-oriented government and the vitality and agency of the society. …”
    Get full text
    Article
  20. 960

    The role of internal auditors in preventing financial fraud in the Republic of Serbia by Jeremić Nebojša, Jakovljević Nemanja

    Published 2023-01-01
    “…By exploring the practices and challenges faced by internal auditors, this paper aims to provide valuable insights and recommendations to strengthen the effectiveness of internal audit functions in detecting and preventing financial fraud. …”
    Get full text
    Article