Showing 1,121 - 1,140 results of 2,992 for search '((\ sources selection function\ ) OR (( (resource OR source) OR sources) detection functions\ ))', query time: 0.32s Refine Results
  1. 1121

    Real-World Efficacy of Explainable Artificial Intelligence using the SAGE Framework and Scenario-Based Design by Eleanor Mill, Wolfgang Garn, Chris Turner

    Published 2024-12-01
    “…The first of its kind, it leverages three distinct but complementary frameworks to support a user-centric and context-sensitive, post-hoc explanation for fraud detection. Using the principles of scenario-based design, it amalgamates two independent real-world sources to establish a realistic card fraud prediction scenario. …”
    Get full text
    Article
  2. 1122

    Green Chemistry Method for Analyzing Bisphenol A in Milk by Angela M. Encerrado Manriquez, Wen-Yee Lee

    Published 2025-01-01
    “…A simple, fast, green, and sensitive method for determining Bisphenol A (BPA) levels in commercial milk was developed using a solventless sample preparation technique known as stir bar sorptive extraction, coupled with thermal desorption–gas chromatography/mass spectrometry. BPA was selected due to its ubiquitous presence in the environment and its classification as an endocrine-disrupting chemical of concern (i.e., its ability to mimic hormone functions). …”
    Get full text
    Article
  3. 1123

    How to trace the origins of short-lived atmospheric species: an Arctic example by A. Da Silva, L. Marelle, J.-C. Raut, Y. Gramlich, K. Siegel, K. Siegel, S. L. Haslett, S. L. Haslett, C. Mohr, C. Mohr, J. L. Thomas

    Published 2025-05-01
    “…Knowing the exact modeled tracer emission sources in WRF-Chem enables a precise quantification of the source detection accuracy. …”
    Get full text
    Article
  4. 1124

    Venous Thromboembolism Prophylaxis in Intensive Care Units (Review) by L. V. Popova, T. B. Kondratieva, M. Z. Kanevskaya, T. L. Aleinikova, E. S. Zykova, А. V. Krivova, A. M. Kuznetsov

    Published 2020-07-01
    “…VTE is common and potentially life-threatening in patients admitted to ICU, even in spite of preventive care.The purpose of the review is to justify the necessity of preventive care for venous thromboembolism in ICU patients.From over 300 initially selected sources of literature databases (Scopus, Web of science, RSCI, etc.), 99 sources were chosen including 69 that were published during the last five years (2015-2020). …”
    Get full text
    Article
  5. 1125
  6. 1126

    Evaluation of Adulticidal Clorine with Black Sand, White Sand and Silica Sand for Decline Coliform Bacteria by Rezania Asyfiradayati, Eni Budiyati, Mitoriana Porusia, Muhammad Rivandi Athaya, Afnan Zain Muzakki, Jenita Berlian Nindyasari, Siti Rohana Mohd Yatim

    Published 2025-07-01
    “…This finding suggests that material selection significantly influences the functional performance of chlorine-based water disinfection systems.…”
    Get full text
    Article
  7. 1127

    Diagnostic potential of the B9D2 gene in colorectal cancer based on whole blood gene expression data and machine learning by Zhaorui Wang, Yongcheng Fu, Haozhe Zhang, Na Liu, Ningjing Lei

    Published 2025-08-01
    “…The B9D2 gene, which is essential for ciliary function, has been rarely explored in CRC. This study is the first to investigate the diagnostic potential of B9D2 in CRC, using bioinformatics and machine learning to uncover its novel role in early detection, with implications for clinical translation. …”
    Get full text
    Article
  8. 1128

    Impact of health literacy in patients with chronic musculoskeletal disease--systematic review. by Yoon K Loke, Ina Hinz, Xia Wang, Gill Rowlands, David Scott, Charlotte Salter

    Published 2012-01-01
    “…We assessed risk of bias from participant selection, methods of measuring health literacy and functional outcomes, missing data, and potential for confounding.…”
    Get full text
    Article
  9. 1129

    Identification of hypertension gene expression biomarkers based on the DeepGCFS algorithm. by Zongjin Li, Liqin Tian, Libing Bai, Zeyu Jia, Xiaoming Wu, Changxin Song

    Published 2025-01-01
    “…The algorithm then uses hybrid clustering methods for gene module detection. Finally, it combines integrated feature selection methods to determine the gene biomarkers. …”
    Get full text
    Article
  10. 1130

    Investigating the AGN-neutrino connection with public IceCube data by Kuhlmann Julian, Capel Francesca

    Published 2025-01-01
    “…We present the first application of a newly developed hierarchical Bayesian analysis framework for the detection of point-like sources of high-energy neutrinos. …”
    Get full text
    Article
  11. 1131

    A Variant Character Dataset for Historical Narratives of Middle and Late Imperial China by Jiwon Lee, Youngim Jung

    Published 2025-05-01
    “…The construction method of the dataset involves collecting variant character sets from authoritative sources, filtering out duplicates and non-target sets, and selecting representative character by applying prioritization principles. …”
    Get full text
    Article
  12. 1132

    Gene-Environment Interactions in Stress Response Contribute Additively to a Genotype-Environment Interaction. by Takeshi Matsui, Ian M Ehrenreich

    Published 2016-07-01
    “…To shed light on this problem, we genetically dissected an environment-specific poor growth phenotype in a cross of two budding yeast strains. This phenotype is detectable when certain segregants are grown on ethanol at 37°C ('E37'), a condition that differs from the standard culturing environment in both its carbon source (ethanol as opposed to glucose) and temperature (37°C as opposed to 30°C). …”
    Get full text
    Article
  13. 1133

    The influence of genetics on the endocannabinoid system gene expression and relevance for targeting reproductive conditions by Keisuke Tanaka, Akwasi A. Amoako, Sally Mortlock, Peter A. W. Rogers, Sarah J. Holdsworth-Carson, Jacqueline F. Donoghue, Wan Tinn Teh, Grant W. Montgomery, Brett McKinnon

    Published 2025-05-01
    “…Abstract Background Endocannabinoids are small lipid molecules that have critical roles in cellular proliferation and function. They are produced locally with their concentrations controlled via the endocannabinoid system (ECS). …”
    Get full text
    Article
  14. 1134

    Efficient Use of Variation in Evolutionary Optimization by John W. Pepper

    Published 2010-01-01
    “…Commonly used selection algorithms contain several sources of inefficiency, some of which are easily avoided and others of which are not. …”
    Get full text
    Article
  15. 1135

    Identification of multiple power quality disturbances in hybrid microgrid using deep stacked auto-encoder based bi-directional LSTM classifier by Ravi Kumar Jalli, Lipsa Priyadarshini, P.K. Dash, Ranjeeta Bisoi

    Published 2025-03-01
    “…Thus to design an effective PQD recognition system, this paper proposes a novel time-frequency analysis method based on adaptively fast complementary ensemble local mean decomposition (AFCELMD) technique that decomposes the multicomponent PQD signal into a series of demodulated product functions (PFs). Out of the several PFs the most sensitive one is selected adaptively and used for feature extraction and classification through a deep stacked auto-encoder (dSAE) hybridized with a time-recursive bi-directional long short term memory (BiLSTM) network classifier. …”
    Get full text
    Article
  16. 1136

    High-Throughput Indirect Monitoring of TORC1 Activation Using the pTOMAN-G Plasmid in Yeast by Melissa Gómez, Guilherme Rocha, Diego Ruiz, Claudio Martínez, Francisco Salinas, Eduardo Kessi-Pérez

    Published 2025-06-01
    “…The target of rapamycin complex 1 (TORC1) is a highly conserved protein complex whose primary function is to link nutrient availability to cell growth in eukaryotes, particularly nitrogen sources. …”
    Get full text
    Article
  17. 1137

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  18. 1138

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  19. 1139

    Bovine PMN responses to extracellular vesicles released by Besnoitia besnoiti tachyzoites and B. besnoiti-infected host cells by Gabriel Espinosa, Constanza Salinas-Varas, Lisbeth Rojas-Barón, Christian Preußer, Elke Pogge von Strandmann, Ulrich Gärtner, Iván Conejeros, Carlos Hermosilla, Anja Taubert

    Published 2024-12-01
    “…Therefore, we tested whether exposure of bovine PMN to EVs from different cellular sources affects classical PMN effector functions and cytokine/chemokine secretion. …”
    Get full text
    Article
  20. 1140

    Urinary Exosomes by Irena Dimov, Ljubinka Jankovic Velickovic, Vladisav Stefanovic

    Published 2009-01-01
    “…Thus, UE have valuable potential as a source of biomarkers for early detection of various types of diseases, monitoring the disease evolution and/or response to therapy. …”
    Get full text
    Article