Showing 1,141 - 1,160 results of 2,992 for search '((\ sources selection function\ ) OR (( (resource OR source) OR sources) detection functions\ ))', query time: 0.41s Refine Results
  1. 1141

    Does tinnitus and emotional distress influence central auditory processing? A comparison of acute and chronic tinnitus in normal-hearing individuals. by Qian Zhou, Wenling Jiang, Haibin Sheng, Qinjie Zhang, Dian Jin, Haifeng Li, Meiping Huang, Lu Yang, Yan Ren, Zhiwu Huang

    Published 2025-01-01
    “…<h4>Design</h4>This study compared the auditory afferent and efferent functions of normal-hearing patients with acute tinnitus, chronic tinnitus, and control group using gap detection test, the Mandarin Hearing in Noise Test (MHINT), and contralateral suppression of transient evoked otoacoustic emissions (TEOAEs).…”
    Get full text
    Article
  2. 1142

    Development and Optimization of a Novel Deep Learning Model for Diagnosis of Quince Leaf Diseases by A. Naderi Beni, H. Bagherpour, J. Amiri Parian

    Published 2024-12-01
    “…IntroductionDetection of tree leaf diseases plays a crucial role in the horticultural field. …”
    Get full text
    Article
  3. 1143

    21 Balmer Jump Street: The Nebular Continuum at High Redshift and Implications for the Bright Galaxy Problem, UV Continuum Slopes, and Early Stellar Populations by Harley Katz, Alex J. Cameron, Aayush Saxena, Laia Barrufet, Nichloas Choustikov, Nikko J. Cleri, Anna de Graff, Richard S. Ellis, Robert A.E. Fosbury, Kasper E. Heintz, Michael Maseda, Jorryt Matthee, Ian McConachie, Pascal A. Oesch

    Published 2025-07-01
    “…Second, we present a dataset of 58 galaxies observed with NIRSpec on JWST at $2.5<z<9.0$ that are selected to have strong nebular continuum emission via the detection of the Balmer jump. …”
    Get full text
    Article
  4. 1144

    Design of the Field Protection and Signal Priority at Intersection System for Autonomous-rail Rapid Transit by SHI Yangyang, LIU Guangyong, WU Jinyong

    Published 2022-06-01
    “…It provides auxiliary driving information for the driver through automation equipment, realizes the functions of route protection, virtual section occupied/unoccupied detection, signal control, entering/leaving station detection, platform door linkage control, berth status detection and management in deport and so on, which improves system security and reduces driver working intensity. …”
    Get full text
    Article
  5. 1145

    Assessment of the nutritional constituents of Elaeis Guineensis Jacq exudates from different States of Nigeria by FI Obahiagbon, GE Ilori, JO Erhabor

    Published 2013-07-01
    “…The concentration of potassium was high in all the samples irrespective of their sources. The exudates could be classified as a rich source of nutrients that are needed in man, as some of the nutrients act as sources of energy, body builders, components of body organs and tissues, coenzymes and play notable roles in biochemical functions and deficiency diseases. …”
    Get full text
    Article
  6. 1146

    The Intelligent Infectious Disease Active Surveillance and early warning system in China: An application of dengue prevention and control by Liangyu Kang, Jian Hu, Kangning Cai, Wenzhan Jing, Min Liu, Wannian Liang

    Published 2024-01-01
    “…Firstly, the system can proactively capture and integrate heterogeneous surveillance data from multiple sources. Based on these multi-channel data, users can select appropriate warning indicators and AI models to automatically trigger early warnings. …”
    Get full text
    Article
  7. 1147

    Research on Multipoint Leak Location of Gas Pipeline Based on Variational Mode Decomposition and Relative Entropy by Yongmei Hao, Zhanghao Du, Juncheng Jiang, ZhiXiang Xing, Xinming Yan, Shuli Wang, Yongchao Rao

    Published 2020-01-01
    “…Pipeline leak detection has always been a relatively difficult technical problem; especially in urban pipeline leak detection, there are still many problems to be solved. …”
    Get full text
    Article
  8. 1148

    Assessment of the nutritional constituents of Elaeis Guineensis Jacq exudates from different States of Nigeria by FI Obahiagbon, GE Ilori, JO Erhabor

    Published 2013-07-01
    “…The concentration of potassium was high in all the samples irrespective of their sources. The exudates could be classified as a rich source of nutrients that are needed in man, as some of the nutrients act as sources of energy, body builders, components of body organs and tissues, coenzymes and play notable roles in biochemical functions and deficiency diseases. …”
    Get full text
    Article
  9. 1149

    Depressive disorders in women of climacteric age (review of foreign literature for 2012–2016) by N. A. Bokhan, E. V. Lukiyanova, G. G. Simutkin

    Published 2018-07-01
    “…In the abstract-bibliographic and scientometric database Web of Science Core Collection 70 bibliographic sources are selected across foreign journals between 2012 and 2016, including journals with high Impact Factor. …”
    Get full text
    Article
  10. 1150

    Research on a traffic flow statistical algorithm based on YBOVDT and SAM2 by Yuanyuan Wang, Zheng Ding, Jiange Liu, Kexiao Wu, Md Sharid Kayes Dipu, Tingmei Ma, Yonghao Ma, Haiyan Zhang

    Published 2025-05-01
    “…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
    Get full text
    Article
  11. 1151

    Chemometrically assisted optimization and validation of the HPLC method for the analysis of alectinib and its related impurity with measurement uncertainty evaluation and whiteness... by Serkan Levent, Abeer Elriş, Hazal Avcı, Saniye Özcan, Nafiz Öncü Can

    Published 2025-05-01
    “…The method’s optimization was carried out using the Box-Behnken design, whereas the optimized conditions were selected according to the desirability function. Validation of the method was done with the International Council for Harmonization, ICH Q2(R2) Guidelines. …”
    Get full text
    Article
  12. 1152
  13. 1153

    Investigation of the Impact of Light Colour on Surface Colour Perception: A Case Study on Red Surfaces by Havva Gül Sümer, Leyla Dokuzer Öztürk

    Published 2025-07-01
    “…These results offer valuable insights for the selection of suitable light sources not only for art exhibition spaces but also for other environments featuring colourful objects. …”
    Get full text
    Article
  14. 1154

    Numerical modeling of complex radiative heat transfer by N. I. Moskalenko, L. V. Rodionov, M. S. Khamidullina, I. A. Afanasyev

    Published 2017-12-01
    “…The application of numerical simulation of the fine structure of the absorption and emission in the complex problems of radiative heat transfer is consider when the structural characteristics of the environment and the boundary conditions are different strong inhomogeneities in temperature, chemical composition and distribution of the radiation sources. The very nature of radiative heat transfer and temperature variation trends over time are determined by the acute effects of selection of the spectra and their modeling require knowledge of spectral line parameters: intensity, half-width position of the centers, contours. …”
    Get full text
    Article
  15. 1155

    Fine-grained access control method for private data in android system by Gang Liu, Guofang Zhang, Quan Wang, Shaomin Ji, Lizhi Zhang

    Published 2019-03-01
    “…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
    Get full text
    Article
  16. 1156

    Where there’s smoke there is fire: Türkiye and the international illegal wildlife trade by Özgün Emre Can

    Published 2025-06-01
    “…By guiding policymakers, conservationists, and authorities, the study fosters international cooperation, optimal resource use, and endangered species protection. International wildlife trafficking can occur when detection and law enforcement measures fail in both the countries of origin and destination, and, where relevant, in transit countries, showing the necessity for governments worldwide to make the international illegal wildlife trade a priority.…”
    Get full text
    Article
  17. 1157

    MGSurvE: A framework to optimize trap placement for genetic surveillance of mosquito populations. by Héctor M Sánchez C, David L Smith, John M Marshall

    Published 2024-05-01
    “…For these projects, monitoring will be required to detect unintended spread of gene drive mosquitoes beyond field sites, and the emergence of alternative alleles, such as drive-resistant alleles or non-functional effector genes, within intervention sites. …”
    Get full text
    Article
  18. 1158

    Audio recognition method of belt conveyor roller fault based on convolutional neural network and linear regression by Xiangyuan CHEN, Wei QIN, Yanchi LIU, Minghua LUO

    Published 2025-06-01
    “…Aiming at the problems of complex sound source and insignificant characteristics in the audio recognition of roller fault of belt conveyor in coal mine, an audio recognition method of roller fault based on convolution neural network and linear regression is proposed. …”
    Get full text
    Article
  19. 1159

    Practical Implementation of a Smart Home Model Using Arduino and Sensors by Soufiane Hachani, Okba Benelmir

    Published 2025-05-01
    “…Controlling outdoor lighting based on ambient light intensity detected by a light sensor. Activating a security alarm by touch detection using a touch sensor. …”
    Get full text
    Article
  20. 1160

    Mitigating malicious denial of wallet attack using attribute reduction with deep learning approach for serverless computing on next generation applications by Amal K. Alkhalifa, Mohammed Aljebreen, Rakan Alanazi, Nazir Ahmad, Sultan Alahmari, Othman Alrusaini, Ali Alqazzaz, Hassan Alkhiri

    Published 2025-05-01
    “…Abstract Denial of Wallet (DoW) attacks are one kind of cyberattack whose goal is to develop and expand the financial sources of a group by causing extreme costs in their serverless computing or cloud environments. …”
    Get full text
    Article