Search alternatives:
resource » source (Expand Search)
Showing 1,141 - 1,160 results of 2,992 for search '((\ sources selection function\ ) OR (( (sources OR sources) OR resource) detection functions\ ))', query time: 0.30s Refine Results
  1. 1141

    Genetic diversity in wild species and cultivars of strawberry for the <i>FanAAMT</i> gene controlling fruit flavor volatiles by A. S. Lyzhin, I. V. Luk’yanchuk

    Published 2021-07-01
    “…‘Karmen’, ‘Ostara’, ‘Samson’, ‘Symphony’, ‘Troubadour’ and ‘Vima Tarda’, in which the functional allele of the FanAAMT gene was found. In the remaining studied strawberry genotypes the marker FanAAMT was not detected, which presumably indicates that the FanAAMT gene is absent. cells (R9.4.1).…”
    Get full text
    Article
  2. 1142

    Investigating the AGN-neutrino connection with public IceCube data by Kuhlmann Julian, Capel Francesca

    Published 2025-01-01
    “…We present the first application of a newly developed hierarchical Bayesian analysis framework for the detection of point-like sources of high-energy neutrinos. …”
    Get full text
    Article
  3. 1143

    Melatonin: A Novel Indolamine in Oral Health and Disease by V. K. Chava, K. Sirisha

    Published 2012-01-01
    “…Recent studies, by Claustrat et al. (2005), detected few extrapineal sources of melatonin like retina, gastrointestinal tract, and salivary glands. …”
    Get full text
    Article
  4. 1144
  5. 1145

    Mitigating malicious denial of wallet attack using attribute reduction with deep learning approach for serverless computing on next generation applications by Amal K. Alkhalifa, Mohammed Aljebreen, Rakan Alanazi, Nazir Ahmad, Sultan Alahmari, Othman Alrusaini, Ali Alqazzaz, Hassan Alkhiri

    Published 2025-05-01
    “…Abstract Denial of Wallet (DoW) attacks are one kind of cyberattack whose goal is to develop and expand the financial sources of a group by causing extreme costs in their serverless computing or cloud environments. …”
    Get full text
    Article
  6. 1146

    The On-Chip D-LMS Filter Design Method of Wireless Sensor Node Based on FPGA by Jian Li, Maojin Li, Ming Meng, Zepeng Liu

    Published 2020-01-01
    “…In the real-time position technology of underground shallow source, the signal denoising performance of wireless sensor nodes directly determines the location speed and accuracy of underground burst point. …”
    Get full text
    Article
  7. 1147

    The influence of genetics on the endocannabinoid system gene expression and relevance for targeting reproductive conditions by Keisuke Tanaka, Akwasi A. Amoako, Sally Mortlock, Peter A. W. Rogers, Sarah J. Holdsworth-Carson, Jacqueline F. Donoghue, Wan Tinn Teh, Grant W. Montgomery, Brett McKinnon

    Published 2025-05-01
    “…Abstract Background Endocannabinoids are small lipid molecules that have critical roles in cellular proliferation and function. They are produced locally with their concentrations controlled via the endocannabinoid system (ECS). …”
    Get full text
    Article
  8. 1148

    Efficient Use of Variation in Evolutionary Optimization by John W. Pepper

    Published 2010-01-01
    “…Commonly used selection algorithms contain several sources of inefficiency, some of which are easily avoided and others of which are not. …”
    Get full text
    Article
  9. 1149

    Genome-Wide Scan for Copy Number Variations in Chinese Merino Sheep Based on Ovine High-Density 600K SNP Arrays by Yuezhen Tian, Jing An, Xinning Zhang, Jiang Di, Junmin He, Ayinuer Yasen, Yanpin Ma, Gaohaer Sailikehan, Xixia Huang, Kechuan Tian

    Published 2024-10-01
    “…Copy number variations (CNVs) have emerged as one of the most important sources of genetic variation, influencing phenotypic traits by altering gene expression and dosage. …”
    Get full text
    Article
  10. 1150

    A Gradient Grating Period Guided-Mode Resonance Spectrometer by Hsin-Yun Hsu, Yi-Hsuan Lan, Cheng-Sheng Huang

    Published 2018-01-01
    “…In this study, a GGP-GMR spectrometer less than 3 mm long that can achieve a wavelength detection range of 200 nm was demonstrated to reconstruct various incident spectra, including a single wavelength of light with a resolution of 0.5 nm, a single wavelength of light with varying intensity levels, and dual incident light sources.…”
    Get full text
    Article
  11. 1151

    Balancing Performance and Portability: A Study on CsI(Tl) Crystal Sizes for Real-Time Gamma-Ray Spectrum and Dose Monitoring by Nikolaos Voulgaris, Hikari Nishimura, Shingo Tamaki, Sachie Kusaka, Isao Murata

    Published 2024-07-01
    “…This was accomplished by calculating the detection efficiency and energy resolution through experimental measurements using standard gamma-ray sources and simulations using MCNP5. …”
    Get full text
    Article
  12. 1152

    Assessment of the nutritional constituents of Elaeis Guineensis Jacq exudates from different States of Nigeria by FI Obahiagbon, GE Ilori, JO Erhabor

    Published 2013-07-01
    “…The concentration of potassium was high in all the samples irrespective of their sources. The exudates could be classified as a rich source of nutrients that are needed in man, as some of the nutrients act as sources of energy, body builders, components of body organs and tissues, coenzymes and play notable roles in biochemical functions and deficiency diseases. …”
    Get full text
    Article
  13. 1153

    Identification of key genes associated with mesocotyl length through a genome-wide association study in rice by Li Xue, Li Xue, Sen Wang, Sen Wang, Qiuyu Zhang, Qiuyu Zhang, Bing Han, Di Cui, Longzhi Han, Jianxin Deng, Xiaoding Ma

    Published 2025-05-01
    “…In this study, 300 rice germplasm resources with a wide range of sources were selected as experimental materials. …”
    Get full text
    Article
  14. 1154

    Assessment of the nutritional constituents of Elaeis Guineensis Jacq exudates from different States of Nigeria by FI Obahiagbon, GE Ilori, JO Erhabor

    Published 2013-07-01
    “…The concentration of potassium was high in all the samples irrespective of their sources. The exudates could be classified as a rich source of nutrients that are needed in man, as some of the nutrients act as sources of energy, body builders, components of body organs and tissues, coenzymes and play notable roles in biochemical functions and deficiency diseases. …”
    Get full text
    Article
  15. 1155

    Numerical analysis of spectroscopic studies using supercontinuum generated by noise-like pulses by Christian A. Salcedo-Rodriguez, Eloisa Gallegos-Arellano, Julian M. Estudillo-Ayala, Juan M. Sierra-Hernandez, Jose D. Filoteo-Razo, Maximino R. Tapia-Garcia, Daniel A. Ramos-Gonzalez, Roberto Rojas-Laguna, Juan C. Hernandez-Garcia

    Published 2025-07-01
    “…Simulations were also performed for CH4, showing a visible absorption spectrum, thereby substantiating that these sources powered by NLPs can detect various gases with a high degree of selectivity.…”
    Get full text
    Article
  16. 1156

    Collective Mapping of Gas Leakages to Determine Safe Routes Using Multi-Robot System by Ronnier Frates Rohrich, Luis Felipe Messias, Jose Lima, Andre Schneider de Oliveira

    Published 2024-01-01
    “…In this study, robot groups act as multiple composite sensors that can move independently according to their assigned functions. Autonomous detection, collective mapping, and collective decision-making of the robots are behaviors bioinspired by the cognitive mechanisms observed in bacterial colonies. …”
    Get full text
    Article
  17. 1157

    High-Voltage CVT Fault Diagnosis Based on Effective Data Recognition and Multi-dimensional Information Fusion by Huishan ZHANG

    Published 2025-05-01
    “…In view of the poor identification of the effective data in online monitoring of high-voltage capacitor voltage transformer (CVT), this paper proposes a method for effective data identification based on the analysis of data correlation coefficients, with utilization of the data characteristics that multiple online monitoring data sources exhibit linear correlation. To address the prevalent problem in current high-voltage CVT fault diagnosis, such as limited information sources, poor accuracy, and significant interference in partial discharge devices leading to compromised fault signal detection and accuracy, a fault diagnosis method based on multi-dimensional information fusion is proposed. …”
    Get full text
    Article
  18. 1158

    Optimised Neural Network Model for Wind Turbine DFIG Converter Fault Diagnosis by Ramesh Kumar Behara, Akshay Kumar Saha

    Published 2025-06-01
    “…VMD’s robustness stems from its ability to decompose a signal into intrinsic mode functions (IMFs) with well-defined centre frequencies and bandwidths. …”
    Get full text
    Article
  19. 1159

    The influence of shot noise on the performance of phase singularity-based refractometric sensors by Maslova Valeria, Ermolaev Georgy, Andrianov Evgeny S., Arsenin Aleksey V., Volkov Valentyn S., Baranov Denis G.

    Published 2025-06-01
    “…This raises a natural question: What happens with the sensitivity and resolution of such a sensor when it operates close to a zero of the response function, where the detected signal may be greatly influenced by various noise sources? …”
    Get full text
    Article
  20. 1160

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article