Showing 1,461 - 1,480 results of 2,295 for search '((\ source selection functions\ ) OR (( resourcess OR resources) detection function\ ))', query time: 0.26s Refine Results
  1. 1461
  2. 1462
  3. 1463

    The RBF-FD and RBF-FDTD Methods for Solving Time-Domain Electrical Transient Problems in Power Systems by Duc-Quang Vu, Nhat-Nam Nguyen, Phan-Tu Vu

    Published 2023-01-01
    “…RBFs such as Gaussian (GA), Multiquadric (MQ), Inverse Quadric (IQ), and Inverse Multiquadric (IMQ) are used in these numerical methods to formulate the central finite difference approximations of the first- and second-order derivatives of a function. The algorithm of selecting “optimal” shape parameters for our basis functions is also applied, specifically to increase the accuracy of the suggested methods with regard to high accuracy needs. …”
    Get full text
    Article
  4. 1464

    Cultural Models of the Body Parts Hand and Hair in Hungarian Archaic Prayers by Judit Baranyiné Kóczy

    Published 2023-11-01
    “…The corpus of the study is Erdélyi’s collection of 321 archaic prayers (2013 [1976]), from which all representations of ‘hand’ and ‘hair’ are selected and conceptually analysed. The results show that 1) the figurative functions of the two body parts partly correspond to metaphors which are also found in secular Hungarian (e.g. hand for help, hand for care, hand for action); however, in the archaic prayers, they often take form in specific meanings (hand for help to get into heaven, hand for providence, hand for control); 2) their figurative uses strongly rely on cultural schemas which are attached to people and events. …”
    Get full text
    Article
  5. 1465

    The <i>Wang</i>–<i>Buwang</i> Sequence and Positive Forgetting in Early Confucian Texts by Gad C. Isay

    Published 2025-06-01
    “…Rather than signifying total erasure, for the purposes of the mnemic process, <i>wang</i> functions as a selective and creative mode, aiding cognitive refinement by withdrawing content considered secondary or extraneous. …”
    Get full text
    Article
  6. 1466

    Theoretical Model of Possibility of 15-minute City in Urban Planning Using the Meta-Synthesis Method by Hafez Mahdnejad

    Published 2023-07-01
    “…About 81% of the sources are related to the years 2022 and 2021. 16% of the selected sources are related to the years 2020 and 2019. …”
    Get full text
    Article
  7. 1467

    Production of Bacterial β-Galactosidase Using Wastes of Dairy Industry by Safaa Salah El-Din Taha, Osama Abd El-Hamid Ibrahim, Einas Hamed El-Shatoury, Amany Mohamed El-Deeb, Hayam Abd El-Naby Sayed

    Published 2025-06-01
    “…A peak β-galactosidase activity of 5.523 U/ ml was recorded at a pH 7, a lactose concentration of 4.6 %, UF-cheese permeate serving as a carbon source, 2 % potassium nitrate (KNO₃) as a nitrogen source, an inoculum size of 5%, and incubated at 37 ºC for 24 h. …”
    Get full text
    Article
  8. 1468

    Phenolic Content, Antioxidant Activity and Quality Characteristics of Hulled Wheats Originating from Türkiye by Fatma Ruveyda Alkan, Buket Çetiner, Hüseyin Akşit, Samed Şimşek

    Published 2025-07-01
    “…This study investigated selected quality and functional characteristics of 17 hulled wheat accessions (Triticum monococcum and Triticum dicoccum) preserved in the Türkiye Seed Gene Bank, along using four modern wheat cultivars (Triticum aestivum L. and Triticum durum Desf.). …”
    Get full text
    Article
  9. 1469
  10. 1470
  11. 1471

    A Swing-Assist Controller for Enhancing Knee Flexion in a Semi-Powered Transfemoral Prosthesis by David M. Marsh, Marco Puliti, Michael Goldfarb

    Published 2024-01-01
    “…The controller and parameter selection algorithm are described in the paper, and subsequently validated in walking experiments with three participants with unilateral transfemoral amputation. …”
    Get full text
    Article
  12. 1472

    Wireless, Battery‐free, Implantable Inductor‐Capacitor Based Sensors by Baochun Xu, Cunjiang Yu

    Published 2025-07-01
    “…Inductor‐capacitor (LC) sensors offer a compelling alternative that uses simple resonant circuits to achieve battery‐free and wireless operation. These sensors function through magnetic coupling with external readers, eliminating the need for internal power sources or physical connections, while enabling compact and biocompatible designs. …”
    Get full text
    Article
  13. 1473

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  14. 1474

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  15. 1475

    Stimulation of the immune system by liposomes with potassium orotate (review) by V. V. Mosyagin

    Published 2023-08-01
    “…The review article analyzes the existing world experience in obtaining liposomes for targeted delivery of a medicinal substance potassium orotate to tissue macrophages to stimulate the immune system. The selection of literary sources was carried out on the basis of the relevance of the information and the depth of the research. …”
    Get full text
    Article
  16. 1476

    Raman Spectroscopy Principles for in vivo Diagnostic by Ellipsoidal Reflectors by Bezuglyi Mikhail, Bezuglaya Natalia

    Published 2019-09-01
    “…The testing was performed for different sugar concentrations with the laser radiation wavelength 980 nm. In addition, the selecting principles of laser radiation source parameters (including beam diameter and power) were investigated. …”
    Get full text
    Article
  17. 1477

    Harmonic State Estimation Method Based on Bayesian Optimized Elastic Network Regression by Siqi MA, Zhong WANG

    Published 2022-08-01
    “…Firstly, when the least square method is used to estimate the harmonic state, the weighted 1-norm and 2-norm are added to the penalty function at the same time; In addition, in order to estimate the harmonic state more efficiently and accurately, the Gaussian process and Bayesian optimization are applied to select the weight of 1-norm and 2-norm; Finally, the effectiveness of the proposed method is verified in IEEE14 node. …”
    Get full text
    Article
  18. 1478

    Eye-tracking Analysis of Interactive 3D Geovisualization by Lukas Herman, Stanislav Popelka, Vendula Hejlova

    Published 2017-05-01
    “…Five selected methods are presented in the results section of the paper. …”
    Get full text
    Article
  19. 1479

    Effects of intercropping potato with maize on soil and crop by WEI Changhui, LIU Yajun, YE Xiuxiang, LI Yue, MA Kun

    Published 2017-01-01
    “…The crop yields in the intercropping system obviously have the correlationship between the crop species and species characteristics.It is concluded that rational intercropping contribute to increase soil bacteria population, enrich soil microbial community structure and enhance the ability of microbial community function diversity and the ability of carbon source utilization. …”
    Get full text
    Article
  20. 1480

    Severe pregnancy-associated atypical hemolytic uremia syndrome in the context of the COVID-19 pandemic: a novel survival case report by Yan Yang, Xiao-jin Li, Hua-Yan Yuan, Jing-Jing Xiong, Peng-Fei Li, Zhen Wang

    Published 2025-01-01
    “…Post-treatment evaluation showed normalized complement C3 and C4 levels, stabilized platelet and hemoglobin levels, and gradual normalization of liver function. Renal function improved gradually, and a bone marrow biopsy revealed no fragmented red blood cells. …”
    Get full text
    Article