Search alternatives:
resource » source (Expand Search)
Showing 1,141 - 1,160 results of 2,992 for search '((\ sources selection functions\ ) OR (( (sources OR sources) OR resource) detection function\ ))', query time: 0.34s Refine Results
  1. 1141

    Development and Optimization of a Novel Deep Learning Model for Diagnosis of Quince Leaf Diseases by A. Naderi Beni, H. Bagherpour, J. Amiri Parian

    Published 2024-12-01
    “…IntroductionDetection of tree leaf diseases plays a crucial role in the horticultural field. …”
    Get full text
    Article
  2. 1142

    Chemometrically assisted optimization and validation of the HPLC method for the analysis of alectinib and its related impurity with measurement uncertainty evaluation and whiteness... by Serkan Levent, Abeer Elriş, Hazal Avcı, Saniye Özcan, Nafiz Öncü Can

    Published 2025-05-01
    “…The method’s optimization was carried out using the Box-Behnken design, whereas the optimized conditions were selected according to the desirability function. Validation of the method was done with the International Council for Harmonization, ICH Q2(R2) Guidelines. …”
    Get full text
    Article
  3. 1143

    Sigma Delta Modulation Controller and Associated Cybersecurity Issues with Battery Energy Storage Integrated with PV-Based Microgrid by Syeda Afra Saiara, Mohd. Hasan Ali

    Published 2024-12-01
    “…Battery energy storage systems (BESSs) play a crucial role in integrating renewable energy sources into microgrids. However, robust BESS controllers are needed to carry out this function properly. …”
    Get full text
    Article
  4. 1144
  5. 1145
  6. 1146

    High-Throughput Indirect Monitoring of TORC1 Activation Using the pTOMAN-G Plasmid in Yeast by Melissa Gómez, Guilherme Rocha, Diego Ruiz, Claudio Martínez, Francisco Salinas, Eduardo Kessi-Pérez

    Published 2025-06-01
    “…The target of rapamycin complex 1 (TORC1) is a highly conserved protein complex whose primary function is to link nutrient availability to cell growth in eukaryotes, particularly nitrogen sources. …”
    Get full text
    Article
  7. 1147

    Synovial cesys in children: clinical features, diagnostics, treatment (analytical review of the literature and own observation) by V.S. Konoplitskyi, Yu. Ye. Korobko, B.L. Pavlenko, H.M. Rudenko, O.A. Korobko, S.V. Klymenko

    Published 2025-06-01
    “…Thus, according to literature sources, the frequency of pathology in patients under 20 years of age reaches 10% in the population and less than 2% in children under 10 years of age. …”
    Get full text
    Article
  8. 1148

    MGSurvE: A framework to optimize trap placement for genetic surveillance of mosquito populations. by Héctor M Sánchez C, David L Smith, John M Marshall

    Published 2024-05-01
    “…For these projects, monitoring will be required to detect unintended spread of gene drive mosquitoes beyond field sites, and the emergence of alternative alleles, such as drive-resistant alleles or non-functional effector genes, within intervention sites. …”
    Get full text
    Article
  9. 1149

    Genetic diversity in wild species and cultivars of strawberry for the <i>FanAAMT</i> gene controlling fruit flavor volatiles by A. S. Lyzhin, I. V. Luk’yanchuk

    Published 2021-07-01
    “…‘Karmen’, ‘Ostara’, ‘Samson’, ‘Symphony’, ‘Troubadour’ and ‘Vima Tarda’, in which the functional allele of the FanAAMT gene was found. In the remaining studied strawberry genotypes the marker FanAAMT was not detected, which presumably indicates that the FanAAMT gene is absent. cells (R9.4.1).…”
    Get full text
    Article
  10. 1150

    Modern Concepts of Clinical and Diagnostic Criteria for Premature Ovarian Failure (Literature Review) by M. D. Salimova, Ya. G. Nadelyaeva, I. N. Danusevich

    Published 2021-01-01
    “…An information search was carried out using Internet resources (PubMed, Web of Science, eLibrary.Ru), literary sources for the period 2015–2019 were analyzed. …”
    Get full text
    Article
  11. 1151

    Near-infrared spectroscopy of the cerebellum in motor activation tasks by Yew Long Lo, Gerald Teck Heng Chia, Yan Teng Celeste Chen, Eng King Tan

    Published 2025-07-01
    “…Protocol 1 consisted of 5 optodes (4 sources and 1 detector, 4 recording channels) spaced 3 cm apart and comprising single-tipped LED light sources in conjunction with single-tipped fiber-optic detectors. …”
    Get full text
    Article
  12. 1152

    New Rotation Periods from the Kepler Bonus Background Light Curves by Zachary R. Claytor, Jamie Tayar

    Published 2025-01-01
    “…However, due to Kepler’s large 4″ pixels, many of its light curves are at high risk of contamination from background sources. The new Kepler Bonus Background light curves are deblended using a point-spread function algorithm, providing light curves of over 400,000 new background sources in addition to over 200,000 reanalyzed Kepler prime targets. …”
    Get full text
    Article
  13. 1153
  14. 1154

    Big data in visual field testing for glaucoma by Alex T. Pham, Annabelle A. Pan, Jithin Yohannan

    Published 2024-09-01
    “…In this study, we review the use of big data for evaluating the reliability of VF tests, gaining insights into real-world clinical practices and outcomes, understanding new disease associations and risk factors, characterizing the patterns of VF loss, defining the structure–function relationship of glaucoma, enhancing early diagnosis or earlier detection of progression, informing clinical decisions, and improving clinical trials. …”
    Get full text
    Article
  15. 1155

    Heterogeneously integrated light emitting diodes and photodetectors in the metal-insulator-metal waveguide platform by Kwon Kyungmok, Park Junghoon, You Jong-Bum, Yu Kyoungsik

    Published 2023-05-01
    “…Depending on its bias conditions, a metal-semiconductor-metal section can function as either a light emitting diode or a photodetector directly connected to the MIM waveguides. …”
    Get full text
    Article
  16. 1156

    Mitigating malicious denial of wallet attack using attribute reduction with deep learning approach for serverless computing on next generation applications by Amal K. Alkhalifa, Mohammed Aljebreen, Rakan Alanazi, Nazir Ahmad, Sultan Alahmari, Othman Alrusaini, Ali Alqazzaz, Hassan Alkhiri

    Published 2025-05-01
    “…Abstract Denial of Wallet (DoW) attacks are one kind of cyberattack whose goal is to develop and expand the financial sources of a group by causing extreme costs in their serverless computing or cloud environments. …”
    Get full text
    Article
  17. 1157

    The On-Chip D-LMS Filter Design Method of Wireless Sensor Node Based on FPGA by Jian Li, Maojin Li, Ming Meng, Zepeng Liu

    Published 2020-01-01
    “…In the real-time position technology of underground shallow source, the signal denoising performance of wireless sensor nodes directly determines the location speed and accuracy of underground burst point. …”
    Get full text
    Article
  18. 1158

    The influence of genetics on the endocannabinoid system gene expression and relevance for targeting reproductive conditions by Keisuke Tanaka, Akwasi A. Amoako, Sally Mortlock, Peter A. W. Rogers, Sarah J. Holdsworth-Carson, Jacqueline F. Donoghue, Wan Tinn Teh, Grant W. Montgomery, Brett McKinnon

    Published 2025-05-01
    “…Abstract Background Endocannabinoids are small lipid molecules that have critical roles in cellular proliferation and function. They are produced locally with their concentrations controlled via the endocannabinoid system (ECS). …”
    Get full text
    Article
  19. 1159

    Genome-Wide Scan for Copy Number Variations in Chinese Merino Sheep Based on Ovine High-Density 600K SNP Arrays by Yuezhen Tian, Jing An, Xinning Zhang, Jiang Di, Junmin He, Ayinuer Yasen, Yanpin Ma, Gaohaer Sailikehan, Xixia Huang, Kechuan Tian

    Published 2024-10-01
    “…Copy number variations (CNVs) have emerged as one of the most important sources of genetic variation, influencing phenotypic traits by altering gene expression and dosage. …”
    Get full text
    Article
  20. 1160

    Where there’s smoke there is fire: Türkiye and the international illegal wildlife trade by Özgün Emre Can

    Published 2025-06-01
    “…By guiding policymakers, conservationists, and authorities, the study fosters international cooperation, optimal resource use, and endangered species protection. International wildlife trafficking can occur when detection and law enforcement measures fail in both the countries of origin and destination, and, where relevant, in transit countries, showing the necessity for governments worldwide to make the international illegal wildlife trade a priority.…”
    Get full text
    Article