Search alternatives:
resourcess » resource (Expand Search)
Showing 1,221 - 1,240 results of 2,295 for search '((\ sources selection functions\ ) OR (( resources OR resourcess) detection function\ ))', query time: 0.21s Refine Results
  1. 1221

    The accuracy of a novel stunting risk detection application based on nutrition and sanitation indicators in children aged under five years by Tria Astika Endah Permatasari, Yudi Chadirin, Ernirita Ernirita, Anisa Nurul Syafitri, Devina Alifia Fadhilah

    Published 2025-05-01
    “…Methods This cross-sectional study was conducted between June and September 2023 and involved 316 mother-child pairs selected by simple random sampling from urban (n = 244) and rural (n = 72) areas in Bogor, West Java Province, Indonesia. …”
    Get full text
    Article
  2. 1222
  3. 1223

    Design of Smart Plant Electrical Signal Monitoring System for Indoor Farming by Afif Saifuddin, Wiratmoko Ardan, Nugroho Andri Prima, Okayasu Takashi, Sutiarso Lilik

    Published 2025-01-01
    “…Calibration for this system needs a function generator. The calibration result is analyzed using statistical methods such as MAPE. …”
    Get full text
    Article
  4. 1224
  5. 1225

    Intra action review of the cholera outbreak response in Kadoma city, Zimbabwe, 2024 by Clayton Munemo, Chido Zibanayi, Hamilton Gomba, Precious Banda, Sarah Tengawarima, Sikhanyisiwe Moyo, Daniel Chirundu

    Published 2025-08-01
    “…The working groups covered eight response pillars aligned to the five core functions of the Incident Management System (IMS). …”
    Get full text
    Article
  6. 1226

    The role of oxygenation in kidney and liver machine perfusion by M. S. Novruzbekov, A. G. Balkarov, E. Yu. Anosova, I. V. Dmitriev, Yu. A. Anisimov, N. S. Zhuravel, E. V. Klychnikova, A. S. Bogdanova, B. I. Yaremin

    Published 2023-12-01
    “…An analysis of literature sources in English and Russian from 2009 to 2023 on this topic was performed in the databases PubMed, MEDLINE, Google Scholar. …”
    Get full text
    Article
  7. 1227

    Comparative analysis of anthocyanin content in various tomato samples in connection with breeding by E. A. Dzhos, M. I. Mamedov, O. N. Pyshnaya, N. A. Golubkina, O. V. Verba, A. A. Matyukina

    Published 2022-12-01
    “…It has been shown that selection for high content of anthocyanins can be performed at various stages of fruit ripening (large ripe fruit, blangetongue, biological ripeness), selecting the most intense colouring. …”
    Get full text
    Article
  8. 1228

    Lightweight deep learning system for automated bone age assessment in Chinese children: enhancing clinical efficiency and diagnostic accuracy by Pang Hai, Zhang Bin, Liu Kesheng, Li Cong, Xu Fei

    Published 2025-07-01
    “…In the first stage, the YOLOv8 algorithm precisely localizes 13 key epiphyses in hand radiographs, achieving a mean Average Precision (mAP) of 99.5% at Intersection over Union (IoU) = 0.5 and 94.0% within IoU 0.5–0.95, demonstrating robust detection performance. The second stage employs a modified EfficientNetB3 architecture for fine-grained epiphyseal grade classification, enhanced by the Rectified Adam (RAdam) optimizer and a composite loss function combining center loss and weighted cross-entropy to mitigate class imbalance. …”
    Get full text
    Article
  9. 1229
  10. 1230

    Memory Mining and Spatial Transformation of Daily Landscape in Renewal of Tianjin Old City by Chunyan ZHANG, Xinyi ZHANG, Tianying HOU

    Published 2025-03-01
    “…Three novels by renowned Tianjin author Feng Jicai — Yin-Yang Eight Trigams, Three-Inch Golden Lotus, and Faces in the Crowd — are selected as primary data sources. Through text mining and semantic sentiment analysis, these works reveal three distinct emotional characteristics of daily landscapes. 1) Bustling Scenes: Positive emotional spaces, such as religious sites and venues associated with traditional artisans and eccentric figures, reflect the region’s commitment to preserving traditions and fostering a sense of collective enjoyment. …”
    Get full text
    Article
  11. 1231

    A dataset of hidden small non-coding RNA in the testis of heat-stressed models revealed by Pandora-seq by Mailin Gan, Yuhang Lei, Kai Wang, Yan Wang, Tianci Liao, Jianfeng Ma, Li Zhu, Linyuan Shen

    Published 2024-07-01
    “…Subsequently, we conducted functional enrichment analysis on the potential predicted target genes of differentially expressed miRNAs and tsRNAs. …”
    Get full text
    Article
  12. 1232
  13. 1233
  14. 1234
  15. 1235
  16. 1236
  17. 1237

    Mitigating malicious denial of wallet attack using attribute reduction with deep learning approach for serverless computing on next generation applications by Amal K. Alkhalifa, Mohammed Aljebreen, Rakan Alanazi, Nazir Ahmad, Sultan Alahmari, Othman Alrusaini, Ali Alqazzaz, Hassan Alkhiri

    Published 2025-05-01
    “…Abstract Denial of Wallet (DoW) attacks are one kind of cyberattack whose goal is to develop and expand the financial sources of a group by causing extreme costs in their serverless computing or cloud environments. …”
    Get full text
    Article
  18. 1238

    ANALISIS STAKEHOLDERS DALAM PENGEMBANGAN PROGRAM DIKLAT DI BALAI DIKLAT APARATUR KEMENTERIAN KELAUTAN DAN PERIKANAN STAKEHOLDERS ANALYSIS IN DEVELOPMENT OF TRAINING PROGRAM ON TRAI... by Yudistira Adi Nugroho

    Published 2019-10-01
    “…Data retrieval is done by means of field research through interviews with several informants. The selection of informants is based on purposive sampling technique, namely the technique of selecting informants to get data sources based on people who are considered to know the best about what the researchers expect. …”
    Get full text
    Article
  19. 1239

    ANALISIS STAKEHOLDERS DALAM PENGEMBANGAN PROGRAM DIKLAT DI BALAI DIKLAT APARATUR KEMENTERIAN KELAUTAN DAN PERIKANAN STAKEHOLDERS ANALYSIS IN DEVELOPMENT OF TRAINING PROGRAM ON TRAI... by Yudistira Adi Nugroho

    Published 2019-10-01
    “…Data retrieval is done by means of field research through interviews with several informants. The selection of informants is based on purposive sampling technique, namely the technique of selecting informants to get data sources based on people who are considered to know the best about what the researchers expect. …”
    Get full text
    Article
  20. 1240

    Re-Infection Outcomes Following One- And Two-Stage Surgical Revision of Infected Knee Prosthesis: A Systematic Review and Meta-Analysis. by Setor K Kunutsor, Michael R Whitehouse, Erik Lenguerrand, Ashley W Blom, Andrew D Beswick, INFORM Team

    Published 2016-01-01
    “…<h4>Design</h4>Systematic review and meta-analysis.<h4>Data sources</h4>MEDLINE, EMBASE, Web of Science, Cochrane Library, reference lists of relevant studies to August 2015, and correspondence with investigators.…”
    Get full text
    Article