Search alternatives:
resource » source (Expand Search)
Showing 121 - 140 results of 2,992 for search '((\ sources selection functions\ ) OR (( (sources OR sources) OR resource) detection function\ ))', query time: 0.36s Refine Results
  1. 121
  2. 122

    Characterization of analog rice produced from various carbohydrate sources and their functional components: a review by Dwi Ghina Nadhifa, Meta Mahendradatta, Ariny Poespitasari, Februadi Bastian, Andi Yuyun Adhnitasari

    Published 2025-06-01
    “…The information summarized in this review can be a reference for selecting the carbohydrate sources and ingredients for further development of analog rice based on its resulting characteristics and health benefits.…”
    Get full text
    Article
  3. 123

    ChiMSource improves the accuracy of studies on novel amino acid sequences by predicting alternative sources of mass spectrometry-derived peptides by Umut Çakır, Noujoud Gabed, Ali Yurtseven, Igor Kryvoruchko

    Published 2025-01-01
    “…Here, we present a highly flexible program that predicts alternative chimeric and non-chimeric sources of peptides detected by MS proteomics.…”
    Get full text
    Article
  4. 124
  5. 125

    Effect of cochlear implant surgery on vestibular function: meta-analysis study by Iman Ibrahim, Sabrina Daniela da Silva, Bernard Segal, Anthony Zeitouni

    Published 2017-06-01
    “…Study selection Published studies of adult patients who received unilateral or bilateral CIs and whose vestibular function or postural stability was assessed before and after surgery. …”
    Get full text
    Article
  6. 126

    PFW-YOLO Lightweight Helmet Detection Algorithm by Yue Hong, Hao Wang, Shuo Guo

    Published 2025-01-01
    “…However, due to the limited arithmetic and storage resources of edge-end devices, and the traditional detection algorithms have problems such as the number of parameters and large computational volume, the detection algorithms are difficult to be deployed practically. …”
    Get full text
    Article
  7. 127

    Design and analysis of intelligent service chain system for network security resource pool by Zenan WANG, Jiahao LI, Chaohong TAN, Dechang PI

    Published 2022-08-01
    “…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
    Get full text
    Article
  8. 128

    Failure Law of Sandstone and Identification of Premonitory Deterioration Information Based on Digital Image Correlation–Acoustic Emission Multi-Source Information Fusion by Zhaohui Chong, Guanzhong Qiu, Xuehua Li, Qiangling Yao

    Published 2025-02-01
    “…Additionally, by introducing the derivative functions of the multi-source information function for quantitative analysis, a comprehensive evaluation method was proposed based on the multi-source information fusion monitoring to forewarn red sandstone failure by levels during loading. …”
    Get full text
    Article
  9. 129
  10. 130

    A spatial matrix factorization method to characterize ecological assemblages as a mixture of unobserved sources: An application to fish eDNA surveys by Letizia Lamperti, Olivier François, David Mouillot, Laëtitia Mathon, Théophile Sanchez, Camille Albouy, Loïc Pellissier, Stéphanie Manel

    Published 2024-12-01
    “…Abstract Understanding how ecological assemblages vary in space and time is essential for advancing our knowledge of biodiversity dynamics and ecosystem functioning. Metabarcoding of environmental DNA (eDNA) is an efficient method for documenting biodiversity changes in both marine and terrestrial ecosystems. …”
    Get full text
    Article
  11. 131

    Yarn-electrospun PVDF-HFP/CNC smart textiles for self-powered sensor in wearable electronics by Jiawei Chen, Subhamoy Mahajan, Manisha Gupta, Cagri Ayranci, Tian Tang

    Published 2025-04-01
    “…The success of developing such sensor-integrated touchscreen gloves paves new avenues for human-technology interactions, highlights the dual functionality of these yarns as power sources and sensors, and represents a milestone in broadening the applications of wearable technologies.…”
    Get full text
    Article
  12. 132
  13. 133

    Millimeter-Wave Imaging with Range-Resolved 3D Depth Extraction Using Glow Discharge Detection and Frequency-Modulated Continuous Wave Radar by Arun Ramachandra Kurup, Daniel Rozban, Amir Abramovich, Yitzhak Yitzhaky, Natan Kopeika

    Published 2025-02-01
    “…Reflected signals are processed by the GDD, which functions as a heterodyne receiver, and Fast Fourier Transform (FFT) is used to extract range data. …”
    Get full text
    Article
  14. 134

    Recent Technological Advancements for Identifying and Exploiting Novel Sources of Pest and Disease Resistance for Peanut Improvement by Akshaya Kumar Biswal, Peggy Ozias-Akins, Carl Corley Holbrook

    Published 2024-12-01
    “…Recent technological advancements have revolutionized the identification of novel resistance sources and the development of resistant peanut cultivars. …”
    Get full text
    Article
  15. 135

    A Survey on the Functionalities of Data Catalog Tools by Jasmin Kropshofer, Johannes Schrott, Wolfram WoB, Lisa Ehrlinger

    Published 2025-01-01
    “…Currently, there is no generally accepted definition or interpretation regarding the required functionality of data catalog tools. This has not only led to a wide range of so-called data catalog tools but has also made it difficult for practitioners to gain an overview in order to make a targeted selection of a tool. …”
    Get full text
    Article
  16. 136
  17. 137

    Analysis of physicochemical, functional, and antioxidant properties of four different Indian seaweed species by Radheshyam B. Bajad, Meenatai G. Kamble, Sumit R. Gawai, Irshaan Syed, Mrinmoy Roy

    Published 2024-12-01
    “…Thus, the selected four marine seaweeds act as a good source of functional components and can be utilized for the development of functional food products such as bread, biscuits, cookies, tea, snacks, soups and beverages.…”
    Get full text
    Article
  18. 138
  19. 139
  20. 140