Showing 421 - 440 results of 2,685 for search '((\ sources detection functions\ ) OR (( (resource OR source) OR success) detection function\ ))', query time: 0.36s Refine Results
  1. 421

    A review on WSN based resource constrained smart IoT systems by Shreeram Hudda, K. Haribabu

    Published 2025-05-01
    “…DL), D2D communication, Computer Vision, and Network Function Virtualization (i.e. NFV). Additionally, it emphasizes assessing and offloading specific IoT application functions onto the network’s edge to enhance performance. …”
    Get full text
    Article
  2. 422
  3. 423

    Multi-Robot Cooperative Simultaneous Localization and Mapping Algorithm Based on Sub-Graph Partitioning by Wan Xu, Yanliang Chen, Shijie Liu, Ao Nie, Rupeng Chen

    Published 2025-05-01
    “…First, a global matching and candidate loop selection strategy is incorporated into the front-end loop detection module, leveraging both LiDAR point clouds and visual features to achieve cross-robot loop detection, effectively mitigating computational redundancy and reducing false matches in collaborative multi-robot systems. …”
    Get full text
    Article
  4. 424

    SUCCESSFUL CHEMOTHERAPY ADMINISTRATION DESPITE HYPERSPLENISM AND PANCYTOPENIA: A CASE OF METASTATIC RECTAL ADENOCARCINOMA by Adil Uğur Kaan Güngör, Abdurrahman Aykut, Berksoy Sahin, Hatice Asoğlu Rüzgar

    Published 2024-12-01
    “…In this case report, we aim to present a patient diagnosed with metastatic rectal adenocarcinoma, who developed hypersplenism due to liver metastasis and was successfully treated with chemotherapy despite the cytopenias. …”
    Get full text
    Article
  5. 425

    Research on Interference Resource Optimization Based on Improved Whale Optimization Algorithm by Xuyi Chen, Mingxi Ma, Chengkui Liu, Haifeng Xie, Shaoqi Wang

    Published 2025-01-01
    “…In this problem, this paper establishes an interference resource optimization model with radar detection probability, interference effectiveness, and interference bandwidth utilization as the objective functions. …”
    Get full text
    Article
  6. 426

    SynergyBug: A deep learning approach to autonomous debugging and code remediation by Hong Chen

    Published 2025-07-01
    “…The system demonstrated exceptional detection strength for functional and performance, and security bugs, where the detection rates reached 94% and 90% and 92%, respectively. …”
    Get full text
    Article
  7. 427
  8. 428

    Castor oil-based molecularly imprinted nanoparticles for the detection of cardiac troponin I: Towards green molecularly imprinted nanoreceptors by Pinar Cakir Hatir, Alice Marinangeli, Alessandra Maria Bossi, Gokhan Cayli

    Published 2025-08-01
    “…Furthermore, GreenNanoMIPs were successfully used for the detection of the cTnI biomarker directly in serum. …”
    Get full text
    Article
  9. 429

    Clinical Algorithms and the Legacy of Race-Based Correction: Historical Errors, Contemporary Revisions and Equity-Oriented Methodologies for Epidemiologists by Horsfall LJ, Bondaronek P, Ive J, Poduval S

    Published 2025-07-01
    “…Future efforts should focus on incorporating diverse data sources, capturing true social and biological health determinants, implementing bias detection and fairness strategies, ensuring transparent reporting, and engaging with diverse communities. …”
    Get full text
    Article
  10. 430
  11. 431

    A lightweight framework to secure IoT devices with limited resources in cloud environments by Vivek Kumar Pandey, Dinesh Sahu, Shiv Prakash, Rajkumar Singh Rathore, Pratibha Dixit, Iryna Hunko

    Published 2025-07-01
    “…This paper proposes a lightweight decision tree-based intrusion detection framework suitable for real-time anomaly detection in a resource-constrained IoT environment. …”
    Get full text
    Article
  12. 432

    Rprot-Vec: a deep learning approach for fast protein structure similarity calculation by Yichuan Zhang, Wen Zhang

    Published 2025-07-01
    “…It can be applied in protein homology detection, structure-function inference, drug repurposing, and other downstream biological tasks. …”
    Get full text
    Article
  13. 433

    Simulating Self-lensing and Eclipsing Signals due to Detached Compact Objects in the TESS Light Curves by Sedighe Sajadian, Niayesh Afshordi

    Published 2024-01-01
    “…The shape of a self-lensing signal is a degenerate function of stellar radius and the compact object’s mass because the self-lensing peak strongly depends on the projected source radius normalized to the Einstein radius. …”
    Get full text
    Article
  14. 434

    Multi-tool copy number detection highlights common body size-associated variants in miniature pig breeds from different geographical regions by Jan Berghöfer, Nadia Khaveh, Stefan Mundlos, Julia Metzger

    Published 2025-03-01
    “…In total, 34 homozygous CNVs overlapped with exonic regions in all samples, suggesting a role in expressing specific phenotypes such as uniform growth patterns, fertility, or metabolic function. In addition, 386 copy number variation regions (CNVRs) shared by all breeds were detected, covering 33.6 Mb (1.48% of the autosomal genome). …”
    Get full text
    Article
  15. 435
  16. 436

    Successful living donor kidney transplantation following ex vivo repair of renal artery aneurysm by Daniel Alejandro Arreola-Ramírez, Sahara Hurtado-Gómez, Alec Anceno, Fernando Fernández Varela-Gómez, Nancy Berenice Guzmán-Martínez, Hirepan Armenta-Álvarez, Alan Gabriel Contreras-Saldívar

    Published 2025-07-01
    “…Renal-artery aneurysms (RAA), rare vascular lesions (≈0.1 % prevalence), may be detected during living-donor evaluations. We report a successful right kidney transplant from a 33-year-old woman with an 11 × 13 mm saccular RAA at the first bifurcation, detected by CT angiography. …”
    Get full text
    Article
  17. 437

    Proteomic analysis of Toraya buffalo seminal plasma and sperm: uncovering insights to optimize reproductive success by Tulus Maulana, Tulus Maulana, Syahruddin Said, Raden Iis Arifiantini, Jakaria Jakaria, Asep Gunawan

    Published 2025-04-01
    “…Bioinformatics tools, including UniProt, PANTHER, DAVID, and STRING, were utilized to identify and annotate the detected proteins. This study successfully identified four key reproductive proteins: ADAM32 in seminal plasma and ZPBP, SPACA3, and CCDC136 in sperm. …”
    Get full text
    Article
  18. 438

    Modeling and Recognizing Policy Conflicts with Resource Access Requests on Protected Health Information by Raik Kuhlisch

    Published 2017-07-01
    “…A conformance verification function detects erroneous, clashing or mutually susceptible rules early during the policy planning phase. …”
    Get full text
    Article
  19. 439

    Deep eutectic solvent-based magnetic molecular nanomaterials coupled with fluorescent carbon dots as a new strategy to highly enrich and sensitively detect doxycycline in food matr... by Yanqiong Luo, Han Zhang, Jun Liu, Aleeza Jamil, Yujiao Hou, Qian Li, Min Zhao, Chunjie Zhao, Wenjing Li, Bo Hong

    Published 2025-01-01
    “…With responsive, excellent selectivity and an eco–friendly nature, the established method is successful in detecting DOX in food matrices, with an average spiked recovery of 87.5 %–97.8 %. …”
    Get full text
    Article
  20. 440