Showing 961 - 980 results of 1,810 for search '(( resource detection function ) OR (( source OR sources) detection function ))', query time: 0.21s Refine Results
  1. 961

    Possibilities for computer-based assessment the quality indicators of Kashkaval cheese using image processing by Balabanov Alexandar, Andreeva Hristina, Danev Angel, Bosakova-Ardenska Atanaska, Ivanov Galin, Balabanova Tatyana

    Published 2025-01-01
    “…The current study presents two open-source software products – ImageJ and Scilab and their functionalities that are applied for image analysis of three samples of Kashkaval cheese, which are produced using different sodium chloride content. …”
    Get full text
    Article
  2. 962

    Probing Cosmic Isotropy with the FAST All Sky H i Survey by Yi-Wen Wu, Jun-Qing Xia

    Published 2025-01-01
    “…To mitigate the potential influence of spurious clustering effects due to these sensitivity variations, we focus on extragalactic H i sources within the sensitivity range of [0.65, 1.0]. …”
    Get full text
    Article
  3. 963
  4. 964

    Effect of Perfluorane on Electric Pulse-Modified Red Blood Cell Membranes by V. V. Moroz, Ye. K. Kozlova, M. S. Bogushevich, P. Yu. Alekseyeva, A. M. Chernysh

    Published 2005-06-01
    “…A clinical defibrillator was used as a source of an impulse electrical field. An electrical impulse was applied to the titanium electrodes placed into the quartz cuvette containing a red blood suspension. …”
    Get full text
    Article
  5. 965

    Unveiling smart contract vulnerabilities: Toward profiling smart contract vulnerabilities using enhanced genetic algorithm and generating benchmark dataset by Sepideh HajiHosseinKhani, Arash Habibi Lashkari, Ali Mizani Oskui

    Published 2025-06-01
    “…This dataset consists of 111,897 Solidity source code samples, ensuring the practical validation of the proposed approach. …”
    Get full text
    Article
  6. 966

    FAM3C Regulates Glioma Cell Proliferation, Invasion, Apoptosis, and Epithelial Mesenchymal Transition via the Notch Pathway by Xiaochao Xia, Zihao Wang, Lvmeng Song, Yinchuan Cheng, Ping Xiong, Shun Li

    Published 2024-12-01
    “…Methods We utilized open‐source bioinformatics tools and platforms to analyze the transcriptional expression levels, prognosis, and correlation with clinical variables of FAM3C in gliomas, and subsequently, to hypothesize its potential molecular functions and possibly associated signaling pathways. …”
    Get full text
    Article
  7. 967

    Impulse Shaping Method Based on Bayesian Deconvolution by JIA Tonghui, LIU Yi, WANG Ming, MA Yingjie, WANG Bo

    Published 2025-04-01
    “…The initial step of this method entailed expressing the measured pulse signal as the convolution of the current impulse pulse signal and the detection system response function. Then, the measured signal was expressed in the continuous time domain and decomposed into the form of an impulse signal and a double exponential kernel convolution by derivation. …”
    Get full text
    Article
  8. 968

    Quality and content evaluation of thyroid eye disease treatment information on TikTok and Bilibili by Haisheng Wang, Huahong Zhang, Jiamin Cao, Feng Zhang, Wei Xiong

    Published 2025-07-01
    “…Abstract Thyroid eye disease (TED) is an autoimmune condition that commonly impacts patients’ visual function, appearance, and psychological well-being. …”
    Get full text
    Article
  9. 969
  10. 970
  11. 971

    Venous Thromboembolism Prophylaxis in Intensive Care Units (Review) by L. V. Popova, T. B. Kondratieva, M. Z. Kanevskaya, T. L. Aleinikova, E. S. Zykova, А. V. Krivova, A. M. Kuznetsov

    Published 2020-07-01
    “…VTE is common and potentially life-threatening in patients admitted to ICU, even in spite of preventive care.The purpose of the review is to justify the necessity of preventive care for venous thromboembolism in ICU patients.From over 300 initially selected sources of literature databases (Scopus, Web of science, RSCI, etc.), 99 sources were chosen including 69 that were published during the last five years (2015-2020). …”
    Get full text
    Article
  12. 972

    Depressive disorders in women of climacteric age (review of foreign literature for 2012–2016) by N. A. Bokhan, E. V. Lukiyanova, G. G. Simutkin

    Published 2018-07-01
    “…In the abstract-bibliographic and scientometric database Web of Science Core Collection 70 bibliographic sources are selected across foreign journals between 2012 and 2016, including journals with high Impact Factor. …”
    Get full text
    Article
  13. 973
  14. 974

    The influence of genetics on the endocannabinoid system gene expression and relevance for targeting reproductive conditions by Keisuke Tanaka, Akwasi A. Amoako, Sally Mortlock, Peter A. W. Rogers, Sarah J. Holdsworth-Carson, Jacqueline F. Donoghue, Wan Tinn Teh, Grant W. Montgomery, Brett McKinnon

    Published 2025-05-01
    “…Abstract Background Endocannabinoids are small lipid molecules that have critical roles in cellular proliferation and function. They are produced locally with their concentrations controlled via the endocannabinoid system (ECS). …”
    Get full text
    Article
  15. 975
  16. 976

    The Influence of Thickness and Spectral Properties of Green Color-Emitting Polymer Thin Films on Their Implementation in Wearable PLED Applications by Kyparisis Papadopoulos, Despoina Tselekidou, Alexandros Zachariadis, Argiris Laskarakis, Stergios Logothetidis, Maria Gioti

    Published 2024-10-01
    “…Finally, we applied the functional green light-emitting PLED devices based on the two studied materials for the detection of Rhodamine 6G. …”
    Get full text
    Article
  17. 977

    Torsion Pendulum Apparatus for Ground Testing of Space Inertial Sensor by Shaoxin Wang, Zuolei Wang, Dongxu Liu, Peng Dong, Jian Min, Ziren Luo, Keqi Qi, Jungang Lei

    Published 2024-12-01
    “…The precise movement of the test mass along a geodesic is crucial for gravitational wave detection in space. To maintain this motion, the core payload-inertial sensor incorporates multiple functional units designed to mitigate various sources of stray force noise affecting the test mass. …”
    Get full text
    Article
  18. 978

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  19. 979

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  20. 980

    Renal Biopsy Pathological Tissue Segmentation: A Comprehensive Review and Experimental Analysis by Yan Liu, Taiping Wang, Xinxin He, Wei Wang, Qiang He, Juan Jin

    Published 2025-01-01
    “…This study provides a novel technical framework for precise renal pathological tissue segmentation and lays the foundation for future lesion detection and intelligent diagnostic applications.…”
    Get full text
    Article