Search alternatives:
resources » sources (Expand Search)
resource » source (Expand Search)
Showing 1,121 - 1,140 results of 1,810 for search '((\ sources detection functions\ ) OR (( (resources OR sources) OR resource) detection function\ ))', query time: 0.39s Refine Results
  1. 1121
  2. 1122

    Estimating fish stock biomass using a Bayesian state-space model: accounting for catchability change due to technological progress by Makoto Nishimoto, Yoshinori Aoki, Naoto Matsubara, Paul Hamer, Yuichi Tsuda

    Published 2024-12-01
    “…The assessment of trends in fish stocks using long-term time-series data is important for effective fisheries resource management. Despite technological advancements in recent decades, the resulting increase in fisheries catch potential with applied effort is often not adequately considered in stock assessments. …”
    Get full text
    Article
  3. 1123

    Mitigating malicious denial of wallet attack using attribute reduction with deep learning approach for serverless computing on next generation applications by Amal K. Alkhalifa, Mohammed Aljebreen, Rakan Alanazi, Nazir Ahmad, Sultan Alahmari, Othman Alrusaini, Ali Alqazzaz, Hassan Alkhiri

    Published 2025-05-01
    “…Abstract Denial of Wallet (DoW) attacks are one kind of cyberattack whose goal is to develop and expand the financial sources of a group by causing extreme costs in their serverless computing or cloud environments. …”
    Get full text
    Article
  4. 1124
  5. 1125
  6. 1126
  7. 1127

    Effect of Perfluorane on Electric Pulse-Modified Red Blood Cell Membranes by V. V. Moroz, Ye. K. Kozlova, M. S. Bogushevich, P. Yu. Alekseyeva, A. M. Chernysh

    Published 2005-06-01
    “…As a plasma substitute clinical medicine uses perfluorane that is an antishock, antiischemic, and cardioprotective agent having a function of transferring O2 and CO2. The authors have investigated the interaction of perfluorane particles with human erythrocytic membranes. …”
    Get full text
    Article
  8. 1128

    Quantification of glucagon and oxyntomodulin by protein precipitation-immunoaffinity enrichment-LC-MS/MS by Jessica O. Becker, Sara K. Shijo, Huu-Hien Huynh, Katrina L. Forrest, Michael J. MacCoss, Michelle A. Emrick, Elisha Goonatilleke, Andrew N. Hoofnagle

    Published 2025-04-01
    “…A glucagon calibration material was sourced commercially and characterized for purity and concentration by high-performance liquid chromatography-ultraviolet detection and amino acid analysis. …”
    Get full text
    Article
  9. 1129
  10. 1130

    Unveiling smart contract vulnerabilities: Toward profiling smart contract vulnerabilities using enhanced genetic algorithm and generating benchmark dataset by Sepideh HajiHosseinKhani, Arash Habibi Lashkari, Ali Mizani Oskui

    Published 2025-06-01
    “…Many of them, such as rule-based methods, machine learning techniques, and neural networks, also struggle to detect complex vulnerabilities due to limited data availability. …”
    Get full text
    Article
  11. 1131

    Impulse Shaping Method Based on Bayesian Deconvolution by JIA Tonghui, LIU Yi, WANG Ming, MA Yingjie, WANG Bo

    Published 2025-04-01
    “…The initial step of this method entailed expressing the measured pulse signal as the convolution of the current impulse pulse signal and the detection system response function. Then, the measured signal was expressed in the continuous time domain and decomposed into the form of an impulse signal and a double exponential kernel convolution by derivation. …”
    Get full text
    Article
  12. 1132

    Examination and Tracing of Stable Isotopes of Carbon and Hydrogen in Diesel Oil from Different Regions by Han-yu ZHANG, Zhao-wei JIE, Han-yang ZHENG, Xiao-han ZHU, Wei-ya XIE, Can HU, Zhan-fang LIU, Hong-ling GUO, Jun ZHU, Hong-cheng MEI

    Published 2025-03-01
    “…Diesel is often used as an accelerant in arson cases, so identifying its source is crucial to the investigation. Stable isotope analysis is a method for detecting molecular elements at the element level. …”
    Get full text
    Article
  13. 1133

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  14. 1134

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  15. 1135
  16. 1136
  17. 1137

    Exploring the role of mitochondrial metabolism and immune infiltration in myocardial infarction: novel insights from bioinformatics and experimental validation by Jingyi Hou, Jingyi Hou, Jingyi Hou, Lihan Wang, Lihan Wang, Naiqiang Zhu, Xueli Li

    Published 2025-05-01
    “…This study aimed to clarify the roles of mitochondrial metabolism and immune infiltration in MI, using a combination of bioinformatics analyses and experimental validation.MethodsMI chip data (GSE96561, GSE181872, and GSE183272) were obtained from the Gene Expression Omnibus (GEO) database, and mitochondrial gene data were sourced from the MitoCarta3.0 database. Differentially expressed genes (DEGs) were identified and subjected to functional enrichment analyses. …”
    Get full text
    Article
  18. 1138

    The role of internal auditors in preventing financial fraud in the Republic of Serbia by Jeremić Nebojša, Jakovljević Nemanja

    Published 2023-01-01
    “…The findings and recommendations presented in the paper can serve as a valuable resource for policymakers, regulatory bodies and organizations seeking to strengthen their financial fraud defense mechanisms and their internal audit function.…”
    Get full text
    Article
  19. 1139

    Fine-grained access control method for private data in android system by Gang Liu, Guofang Zhang, Quan Wang, Shaomin Ji, Lizhi Zhang

    Published 2019-03-01
    “…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
    Get full text
    Article
  20. 1140