Showing 1,461 - 1,480 results of 2,685 for search '((\ sources detection functions\ ) OR (( (resource OR source) OR success) detection function\ ))', query time: 0.68s Refine Results
  1. 1461

    Submillimeter and Mid-infrared Variability of Young Stellar Objects in the M17 H II Region by Zhiwei Chen, Doug Johnstone, Carlos Contreras Peña, Jeong-Eun Lee, Sheng-Yuan Liu, Gregory Herczeg, Steve Mairs, Geumsook Park, Kee-Tae Kim, Mi-Ryang Kim, Keping Qiu, Yao-Te Wang, Xu Zhang, Megan Reiter, The JCMT Transient Team

    Published 2025-01-01
    “…This mid-IR fractional variability as a function of evolutionary stage result is similar to what has previously been found for YSO variability within the Gould Belt and the intermediate-mass star formation region M17 SWex, though overall less variability is detected in M17 in submillimeter and mid-IR. …”
    Get full text
    Article
  2. 1462

    A survey on the applications of transfer learning to enhance the performance of large language models in healthcare systems by Anmol Rahujo, Daniya Atif, Syed Azeem Inam, Abdullah Ayub Khan, Sajid Ullah

    Published 2025-06-01
    “…This research analyzes different transfer learning methods, including inductive, transductive, and unsupervised techniques, while demonstrating their effectiveness in detecting COVID-19 from chest X-rays and multi-source disease evaluation. …”
    Get full text
    Article
  3. 1463
  4. 1464

    Cutaneous Anthrax: What is the Hallmark? by Dhani Redhono Harioputro, Arie Kusumawardani, Iin Novita, Evi Nurhayatun, Rahajeng N Tunjungputri, Erni Juwita Nelwan

    Published 2024-10-01
    “…Clinical and serological examinations are the spearheads of early detection of anthrax cases. Prompt and appropriate management largely determines the success of therapy.…”
    Get full text
    Article
  5. 1465

    Cutaneous Anthrax: What is the Hallmark? by Dhani Redhono Harioputro, Arie Kusumawardani, Iin Novita, Evi Nurhayatun, Rahajeng N Tunjungputri, Erni Juwita Nelwan

    Published 2025-01-01
    “…Clinical and serological examinations are the spearheads of early detection of anthrax cases. Prompt and appropriate management largely determines the success of therapy. …”
    Get full text
    Article
  6. 1466
  7. 1467

    Unveiling the complex double-edged sword role of exosomes in nasopharyngeal carcinoma by Xueyan Huang, Yuedi Tang

    Published 2025-01-01
    “…Exosomes are small membrane vesicles at the nanoscale that transport physiologically active compounds from their source cell and have a crucial function in signal transmission and intercellular message exchange. …”
    Get full text
    Article
  8. 1468

    Face Recognition Door Security System and Contactless Bell by Rini Irnayanti, Elfizon Elfizon

    Published 2024-02-01
    “…Face recognition uses OpenCV based on an open source library to recognize faces in realtime using the Python programming language.  …”
    Get full text
    Article
  9. 1469

    Trade-offs and synergies for urban Production-Living-Ecological spatial Patterns-Comparison study between Fuzhou, China, and Saskatoon, Canada by Xi Wang, Xiaomei Li, Jinming Sha, Hao Zhang, Eshetu Shifaw, Xulin Guo, Shuhui Lai, Jinliang Wang

    Published 2024-12-01
    “…First, the paper identified the PLE spaces by integrating multi-source data, then analyzed the PLE spatial agglomeration characteristics by using the average nearest neighbor and kernel density analysis, finally detected the trade-offs and synergies between functional spaces by Spearman correlation and bivariate spatial autocorrelation. …”
    Get full text
    Article
  10. 1470

    Molecular mechanisms of leukemogenesis by D. A. Domninskiy

    Published 2022-11-01
    “…Such targets can be enzymes, proteins with other (non-enzymatic) functions, genomic DNA, mRNA, or, for example, certain lipid components of cell membranes. …”
    Get full text
    Article
  11. 1471
  12. 1472
  13. 1473

    Distal radial artery ligation for dialysis access-associated ischemic syndrome by ZHANG Li-hong, ZHAN Shen, YANG Tao, WANG Yu-zhu

    Published 2015-01-01
    “…Objective To summarize the experience of treatment for dialysis access-associated ischemic steal syndrome by ligating distal radial artery of radial cephalic fistulas(RCFs).Methods We enrolled hemodialysis patients who used RCFs with complaint of ipsilateral limb ischemia admitted in our department Anatomical prerequisites(side-to-end anastomosis fistula and retrograde flow in the distal radial artery) were checked by ultrasound,the patency of central artery by angiography,and the function of ulnar artery by Allen test Division and ligation of the juxta-anastomosis distal radial artery were performed under regional anesthesia.Clinical presentation,blood flow during hemodialysis,urea clearance index,urea reduction rate,and fistula patency were observed before and after operation.Results This study included 16 patients(8 males and 8 females,accounting for roughly 1.45%of hospitalizations of patients associated with fistula complications at the corresponding time) who underwent DRAL of RCFs with ischemia,of whom the mean age was(66.2 ± 11.2) years,fistula age was(57.75 ± 88.41) months,and the ischemia was detected(39.62 ± 58.31) months after the construction of fistula.According to clinical presentation,71.40%patients were grade Ⅲ,28.60%were grade Ⅱ,and no patients belonged to grade Ⅳ.The technique success rate was 100%and clinical success rate was 93.7%.Blood flow during hemodialysis before and 7 days,6 months and 12 months after operation was(258.63 + 25.44),(246.61 ± 24.24),(260.42 ± 20.83) and(254.87 ± 22.44) ml/min(P>0.05),and Kt/V was(1.65 ± 0.210),(1.59 +0.24),(1.62±0.28) and(1.58 ±0.39)(P>0.05),respectively.The mean follow-up duration was(19.30 ± 13.15) months and the patency rate was 100%.Conclusions DRAL is a simple,safe,and effective technique for dialysis access-associated ischemic syndrome in RCFs.…”
    Get full text
    Article
  14. 1474

    On path length, beam divergence, and retroreflector array size in open-path FTIR spectroscopy by C. E. N. Power, C. E. N. Power, A. Wiacek, A. Wiacek

    Published 2025-06-01
    “…<p>Open-path Fourier transform infrared (OP-FTIR) spectroscopy is an established technique used to measure boundary layer trace gas concentrations, consisting (in this work) of a spectrometer with an active mid-IR source coupled to a single transmitting and receiving telescope, as well as a cube-corner retroreflector array separated from the spectrometer and telescope by an atmospheric path. …”
    Get full text
    Article
  15. 1475

    Effects of moderate-protein and high-protein diets, including mealworm meal or poultry by-product meal, on immunological variables in healthy adult dogs by Sophie-Kristin Heinze, Jürgen Zentek, Kathrin Büttner, Andreas Moritz, Nadine Paßlack

    Published 2025-08-01
    “…An interaction effect between the dietary protein source and protein level could be detected for the phagocytic activity of blood granulocytes as well as for the plasma concentrations of IgA and IgE. …”
    Get full text
    Article
  16. 1476

    Task-Driven Real-World Super-Resolution of Document Scans by Maciej Zyrek, Tomasz Tarasiewicz, Jakub Sadel, Aleksandra Krzywon, Michal Kawulok

    Published 2025-07-01
    “…We propose to incorporate auxiliary loss functions derived from high-level vision tasks, including text detection using the connectionist text proposal network (CTPN), text recognition via a convolutional recurrent neural network (CRNN), keypoints localization using Key.Net, and hue consistency. …”
    Get full text
    Article
  17. 1477

    Six-Month Treatment Outcomes of Vital Pulp Therapy in Adults Using Biomaterials: A Prospective Cohort Pilot Study by Melinda Polyák, Eszter Ágnes Szalai, Péter Komora, János Vág

    Published 2025-04-01
    “…Sample size calculations suggested 140 participants would be needed to detect a significant effect of pulp condition. Both materials were effective, though MTA+ showed higher success based on the strict success criteria. …”
    Get full text
    Article
  18. 1478

    Tumor-specific CD8+ T cells from the bone marrow resist exhaustion and exhibit increased persistence in tumor-bearing hosts as compared with tumor-infiltrating lymphocytes by Ivan Borrello, Amy Thomas, Luca Biavati, Robert Leone, Elizabeth M Zawidzka, Claudio Zanettini, Luigi Marchionni

    Published 2025-02-01
    “…Importantly, in a competitive transfer experiment, BM T cells infiltrated the tumor more efficiently than TILs, displayed a higher polyfunctionality with interleukin-2, interferon-γ, tumor necrosis factor-α production and showed greater persistence compared with TILs.Conclusions T cells from the BM appear superior to TILs as a source of cells for cellular therapy. They possess a memory-enriched phenotype and exhibit improved effector function, greater persistence within a tumor-bearing host, and the capacity for increased tumor infiltration. …”
    Get full text
    Article
  19. 1479

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  20. 1480

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article