Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
source » sources (Expand Search)
resourcessssss » resourcesssssss (Expand Search)
resource » resources (Expand Search)
source » sources (Expand Search)
resourcessssss » resourcesssssss (Expand Search)
resource » resources (Expand Search)
-
941
THE INFLUENCE OF SOIL DENSITY AND THE CHARACTER OF RADIOACTIVE 134Cs And 137Cs POLLUTION’S DISTRIBUTION ON in situ MEASUREMENTS
Published 2018-03-01“…As a result of theoretical estimations, the relationship between the effective radius of contaminated site is determined as a function of soil density.Analysis of the influence of radial zones of the cylindrical gamma source on in situ gamma-spectrometer showed that the main contribution to the total count rate of the pulse-amplitude spectrum is made by the radial zone with radius of up to 40 cm from the center of the probe, regardless of the thickness of the contaminated layer in geometry «Probe is located on the soil surface». …”
Get full text
Article -
942
From Clusters to Communities: Enhancing Wetland Vegetation Mapping Using Unsupervised and Supervised Synergy
Published 2025-07-01“…This study addresses these challenges by developing a scalable vegetation classification framework that integrates cluster-guided sample selection, Random Forest modelling, and multi-source remote-sensing data. …”
Get full text
Article -
943
Reprogrammed Cell‐based Therapy for Liver Disease: From Lab to Clinic
Published 2017-02-01“…The generation of human functional hepatocytes in high quantities for liver cell therapy is an important goal for ongoing therapies in regenerative medicine. …”
Get full text
Article -
944
Biological properties of cord blood hematopoietic stem cells
Published 2014-07-01“…Phased developments of the technology of stem cells detection and selection, their proliferation, differentiation and function assessment using cultivation in vitro and in vivo in animal model was described. …”
Get full text
Article -
945
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
946
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
947
Screen Culture and Literary Mythology of Mass Consciousness (two “Onegins” – 1999 and 2024)
Published 2024-12-01“…The article also touches upon the history of cinematic versions of the literary source. The traditions of literary criticism and critical analysis of the original text by A. …”
Get full text
Article -
948
Diagnostic potential of the B9D2 gene in colorectal cancer based on whole blood gene expression data and machine learning
Published 2025-08-01“…Additionally, three machine learning methods—Random Forest (RF), LASSO regression, and Support Vector Machine Recursive Feature Elimination (SVM-RFE)—were employed for feature selection and to evaluate the robustness and predictive power of the selected features, with diagnostic efficacy evaluated through Receiver Operating Characteristic (ROC) curves. …”
Get full text
Article -
949
Where there’s smoke there is fire: Türkiye and the international illegal wildlife trade
Published 2025-06-01“…By guiding policymakers, conservationists, and authorities, the study fosters international cooperation, optimal resource use, and endangered species protection. International wildlife trafficking can occur when detection and law enforcement measures fail in both the countries of origin and destination, and, where relevant, in transit countries, showing the necessity for governments worldwide to make the international illegal wildlife trade a priority.…”
Get full text
Article -
950
Renal Biopsy Pathological Tissue Segmentation: A Comprehensive Review and Experimental Analysis
Published 2025-01-01“…This study provides a novel technical framework for precise renal pathological tissue segmentation and lays the foundation for future lesion detection and intelligent diagnostic applications.…”
Get full text
Article -
951
Signalling and the evolution of cooperative foraging in dynamic environments.
Published 2011-09-01“…Observed behaviours that benefit others but incur some cost appear incompatible with classical notions of natural selection; however, these behaviours may be explained by concepts such as inclusive fitness, reciprocity, intra-specific mutualism or manipulation. …”
Get full text
Article -
952
Urban resilience: Assessment of performance and science mapping from a climate change perspective
Published 2024-12-01“…The outcome also shows that the Sustainability, Cities, and Urban Climate journal is the top source for urban resilience to climate change literature. …”
Get full text
Article -
953
Research on a traffic flow statistical algorithm based on YBOVDT and SAM2
Published 2025-05-01“…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
Get full text
Article -
954
Fine-grained access control method for private data in android system
Published 2019-03-01“…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
Get full text
Article -
955
Interpretation of Phraseological Units Using Chinese Language in Russian-Chinese Phraseological Dictionaries
Published 2023-04-01“…The results of the research showed that the explanation of Russian phraseology in these lexicographic sources is carried out in two ways: through interpretation and selection of a similar expression. …”
Get full text
Article -
956
Managing Static Archives for Historical Research: A Study at the Archives Depot of the East Java Provincial Library and Archives Service, Indonesia
Published 2024-11-01“…The study applied static archive management theories, encompassing record selection, accessioning, arrangement, description, conservation, preservation, storage, and reference functions. …”
Get full text
Article -
957
MGSurvE: A framework to optimize trap placement for genetic surveillance of mosquito populations.
Published 2024-05-01“…For these projects, monitoring will be required to detect unintended spread of gene drive mosquitoes beyond field sites, and the emergence of alternative alleles, such as drive-resistant alleles or non-functional effector genes, within intervention sites. …”
Get full text
Article -
958
Lier les cooccurrences des Epithetes (1571) de Maurice de La Porte et celles des textes de la Pléiade
Published 2017-02-01“…It is based on the example of a current editorial project that involves processing and publishing, in digital format, a sixteenth century lexicographical work, Les Epithetes by Maurice de La Porte (1571), whose main source is the poetry of the Pléiade. The textual database currently being established should make it possible to identify the attestations upon which La Porte based his selections. …”
Get full text
Article -
959
Branding process of cultural heritage in the context of rural revitalization in China: a case study of Qingtian County
Published 2025-03-01“…The branding process reflects the combination of the functions of service-oriented government and the vitality and agency of the society. …”
Get full text
Article -
960
The role of internal auditors in preventing financial fraud in the Republic of Serbia
Published 2023-01-01“…By exploring the practices and challenges faced by internal auditors, this paper aims to provide valuable insights and recommendations to strengthen the effectiveness of internal audit functions in detecting and preventing financial fraud. …”
Get full text
Article