Search alternatives:
functions » function (Expand Search)
Showing 761 - 780 results of 1,810 for search '(( resource detection functions ) OR (( source OR sources) detection functions ))', query time: 0.34s Refine Results
  1. 761

    MGSurvE: A framework to optimize trap placement for genetic surveillance of mosquito populations. by Héctor M Sánchez C, David L Smith, John M Marshall

    Published 2024-05-01
    “…For these projects, monitoring will be required to detect unintended spread of gene drive mosquitoes beyond field sites, and the emergence of alternative alleles, such as drive-resistant alleles or non-functional effector genes, within intervention sites. …”
    Get full text
    Article
  2. 762

    Where there’s smoke there is fire: Türkiye and the international illegal wildlife trade by Özgün Emre Can

    Published 2025-06-01
    “…By guiding policymakers, conservationists, and authorities, the study fosters international cooperation, optimal resource use, and endangered species protection. International wildlife trafficking can occur when detection and law enforcement measures fail in both the countries of origin and destination, and, where relevant, in transit countries, showing the necessity for governments worldwide to make the international illegal wildlife trade a priority.…”
    Get full text
    Article
  3. 763

    Investigating the AGN-neutrino connection with public IceCube data by Kuhlmann Julian, Capel Francesca

    Published 2025-01-01
    “…We present the first application of a newly developed hierarchical Bayesian analysis framework for the detection of point-like sources of high-energy neutrinos. …”
    Get full text
    Article
  4. 764

    Potential for non‐destructive astrochemistry using the ExoMars PanCam by Michael C. Storrie‐Lombardi, J.‐P. Muller, M. R. Fisk, A. D. Griffiths, A. J. Coates

    Published 2008-06-01
    “…This non‐destructive triage allows prioritized deployment of organic detection experiments requiring sample destruction and/or expenditure of non‐replaceable resources. …”
    Get full text
    Article
  5. 765

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  6. 766

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  7. 767
  8. 768

    Urinary Exosomes by Irena Dimov, Ljubinka Jankovic Velickovic, Vladisav Stefanovic

    Published 2009-01-01
    “…Thus, UE have valuable potential as a source of biomarkers for early detection of various types of diseases, monitoring the disease evolution and/or response to therapy. …”
    Get full text
    Article
  9. 769

    Does tinnitus and emotional distress influence central auditory processing? A comparison of acute and chronic tinnitus in normal-hearing individuals. by Qian Zhou, Wenling Jiang, Haibin Sheng, Qinjie Zhang, Dian Jin, Haifeng Li, Meiping Huang, Lu Yang, Yan Ren, Zhiwu Huang

    Published 2025-01-01
    “…<h4>Design</h4>This study compared the auditory afferent and efferent functions of normal-hearing patients with acute tinnitus, chronic tinnitus, and control group using gap detection test, the Mandarin Hearing in Noise Test (MHINT), and contralateral suppression of transient evoked otoacoustic emissions (TEOAEs).…”
    Get full text
    Article
  10. 770

    Design of the Field Protection and Signal Priority at Intersection System for Autonomous-rail Rapid Transit by SHI Yangyang, LIU Guangyong, WU Jinyong

    Published 2022-06-01
    “…It provides auxiliary driving information for the driver through automation equipment, realizes the functions of route protection, virtual section occupied/unoccupied detection, signal control, entering/leaving station detection, platform door linkage control, berth status detection and management in deport and so on, which improves system security and reduces driver working intensity. …”
    Get full text
    Article
  11. 771

    Microalgal Metabolomes and Recent Biotechnological Advances for Their Industrial Application by Dinesh Kumar Saini, Geetanjali Manchanda, Ratiram Gomaji Chaudhary, Raghvendra Pratap Singh

    Published 2024-10-01
    “…These organisms are photosynthetic, use CO<sub>2</sub> as their sole carbon source, and grow rapidly under different environmental conditions. …”
    Get full text
    Article
  12. 772

    Towards an RFI Mitigation Algorithm in Synthetic Aperture Interferometer Radiometry: Application to the SMOS Space Mission by Ali Khazaal

    Published 2025-01-01
    “…The second step employs a modified version of the previous algorithm, incorporating a dynamic, source-specific search to detect and correct residual interferences. …”
    Get full text
    Article
  13. 773

    Assessment of the nutritional constituents of Elaeis Guineensis Jacq exudates from different States of Nigeria by FI Obahiagbon, GE Ilori, JO Erhabor

    Published 2013-07-01
    “…The concentration of potassium was high in all the samples irrespective of their sources. The exudates could be classified as a rich source of nutrients that are needed in man, as some of the nutrients act as sources of energy, body builders, components of body organs and tissues, coenzymes and play notable roles in biochemical functions and deficiency diseases. …”
    Get full text
    Article
  14. 774

    Green Chemistry Method for Analyzing Bisphenol A in Milk by Angela M. Encerrado Manriquez, Wen-Yee Lee

    Published 2025-01-01
    “…., its ability to mimic hormone functions). Studies have reported that BPA can leach into various food sources, including milk, a dietary staple for infants. …”
    Get full text
    Article
  15. 775

    Assessment of the nutritional constituents of Elaeis Guineensis Jacq exudates from different States of Nigeria by FI Obahiagbon, GE Ilori, JO Erhabor

    Published 2013-07-01
    “…The concentration of potassium was high in all the samples irrespective of their sources. The exudates could be classified as a rich source of nutrients that are needed in man, as some of the nutrients act as sources of energy, body builders, components of body organs and tissues, coenzymes and play notable roles in biochemical functions and deficiency diseases. …”
    Get full text
    Article
  16. 776

    Research on a traffic flow statistical algorithm based on YBOVDT and SAM2 by Yuanyuan Wang, Zheng Ding, Jiange Liu, Kexiao Wu, Md Sharid Kayes Dipu, Tingmei Ma, Yonghao Ma, Haiyan Zhang

    Published 2025-05-01
    “…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
    Get full text
    Article
  17. 777

    Distribution, behavior and diet of the Asiatic black bear in human modified landscapes by Hadi Fahimi, Mahmood Soofi, Nahid Ahmadi, Ali T. Qashqaei, Hamidreza Heidari, Haaken Bungum, Bent Rech, Jonas Trepel, Matthias Waltert

    Published 2024-11-01
    “…Elevation, precipitation, village density, and PA size did not substantially influence occupancy. Black bear detection probability became 100 % only above 14 km survey effort, indicating its overall rarity, and bears were much more easily detected during and after rainfall. …”
    Get full text
    Article
  18. 778

    Fine-grained access control method for private data in android system by Gang Liu, Guofang Zhang, Quan Wang, Shaomin Ji, Lizhi Zhang

    Published 2019-03-01
    “…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
    Get full text
    Article
  19. 779

    Investigation and Application of Water-Saving Monitoring Technology in Public Institutions by WANG Kang, ZHENG Yongjie, ZHANG Zhen, TANG Yanping, SONG Wenhao, GUO Xiaoming

    Published 2022-01-01
    “…Considering the characteristics of water use and the current situation of water facilities in public institutions,this study comprehensively employs the Internet of Things (IoT),cloud deployment,databases,three-dimensional (3D) visualization,and other advanced techniques to create a water-saving reconstruction scheme with integrated software and hardware for public institutions.Therefore,a smart water management platform for public institutions is built to implement advanced water-saving concepts and improve the water management level.The main research results are as follows:① By intelligent remote monitoring equipment,the multiclass water measurement network is designed to realize the fine collection of zonal water use data;② this study designs a reconstruction scheme of water facilities and explores the utilization mode of unconventional water sources to improve the utilization efficiency of water resources;③ multiple algorithms and statistical methods are used to analyze the time series of water use data,and thus this study realizes the analysis of pipeline network leakage and damage,identification of water use anomalies,and water-saving statistical analysis,and the investigation of water use laws;④ the platform with functions of monitoring and early warning is established to achieve real-time remote monitoring of water use,statistical analysis of historical water use,and identification and warning of pipe network leakage,so as to detect water anomalies in time and save water.The research results are first applied to the construction of the water-saving institution of the Pearl River Water Resources Commission to build a benchmark for the construction of water-saving institutions in the southern region.On the basis of application experience,the comprehensively integrated monitoring technology for water-saving in public institutions is developed,which provides a new idea for public institutions to save water.…”
    Get full text
    Article
  20. 780

    Audio recognition method of belt conveyor roller fault based on convolutional neural network and linear regression by Xiangyuan CHEN, Wei QIN, Yanchi LIU, Minghua LUO

    Published 2025-06-01
    “…Aiming at the problems of complex sound source and insignificant characteristics in the audio recognition of roller fault of belt conveyor in coal mine, an audio recognition method of roller fault based on convolution neural network and linear regression is proposed. …”
    Get full text
    Article