Showing 761 - 780 results of 1,810 for search '(( resource detection functions ) OR (( source OR sources) detection function ))', query time: 0.31s Refine Results
  1. 761
  2. 762

    Towards an RFI Mitigation Algorithm in Synthetic Aperture Interferometer Radiometry: Application to the SMOS Space Mission by Ali Khazaal

    Published 2025-01-01
    “…The second step employs a modified version of the previous algorithm, incorporating a dynamic, source-specific search to detect and correct residual interferences. …”
    Get full text
    Article
  3. 763

    MGSurvE: A framework to optimize trap placement for genetic surveillance of mosquito populations. by Héctor M Sánchez C, David L Smith, John M Marshall

    Published 2024-05-01
    “…For these projects, monitoring will be required to detect unintended spread of gene drive mosquitoes beyond field sites, and the emergence of alternative alleles, such as drive-resistant alleles or non-functional effector genes, within intervention sites. …”
    Get full text
    Article
  4. 764

    Modern Concepts of Clinical and Diagnostic Criteria for Premature Ovarian Failure (Literature Review) by M. D. Salimova, Ya. G. Nadelyaeva, I. N. Danusevich

    Published 2021-01-01
    “…An information search was carried out using Internet resources (PubMed, Web of Science, eLibrary.Ru), literary sources for the period 2015–2019 were analyzed. …”
    Get full text
    Article
  5. 765
  6. 766

    Biological properties of cord blood hematopoietic stem cells by S. A. Rumiantsev, E. Yu. Osipova, S. E. Ipatov, T. V. Shamanskaya, O. A. Mayorova, A. G. Rumyantsev

    Published 2014-07-01
    “…Phased developments of the technology of stem cells detection and selection, their proliferation, differentiation and function assessment using cultivation in vitro and in vivo in animal model was described. …”
    Get full text
    Article
  7. 767

    Learning Transferable Convolutional Proxy by SMI-Based Matching Technique by Wei Jin, Nan Jia

    Published 2020-01-01
    “…The classification responses are also smoothened by manifolds of both the source domain and proxy space. By minimizing an objective function of SMI, classification error, and manifold regularization, we learn the convolutional networks of both source and target domains. …”
    Get full text
    Article
  8. 768

    Investigation of TsGAN-based multimodal image fusion to augment image pre-processing abilities by Priyanka Bhatambarekar, Gayatri Phade

    Published 2025-07-01
    “…The TSGAN framework generates a unified texture map that captures essential gradient preservation into the generator’s loss function, the model successfully retains critical information about texture from the input source images. …”
    Get full text
    Article
  9. 769

    Audio recognition method of belt conveyor roller fault based on convolutional neural network and linear regression by Xiangyuan CHEN, Wei QIN, Yanchi LIU, Minghua LUO

    Published 2025-06-01
    “…Aiming at the problems of complex sound source and insignificant characteristics in the audio recognition of roller fault of belt conveyor in coal mine, an audio recognition method of roller fault based on convolution neural network and linear regression is proposed. …”
    Get full text
    Article
  10. 770

    Distribution, behavior and diet of the Asiatic black bear in human modified landscapes by Hadi Fahimi, Mahmood Soofi, Nahid Ahmadi, Ali T. Qashqaei, Hamidreza Heidari, Haaken Bungum, Bent Rech, Jonas Trepel, Matthias Waltert

    Published 2024-11-01
    “…Elevation, precipitation, village density, and PA size did not substantially influence occupancy. Black bear detection probability became 100 % only above 14 km survey effort, indicating its overall rarity, and bears were much more easily detected during and after rainfall. …”
    Get full text
    Article
  11. 771

    An Optimization Algorithm for Forward-Scatter Radar Network Node Deployment Based on BFGS and Improved NSGA-II by Yuqing Zheng, Xiaofeng Ai, Zhiming Xu, Jing Wu, Feng Zhao

    Published 2025-04-01
    “…A multi-objective optimization model was subsequently established with the objective functions of minimizing node cost and maximizing spatial detection area. …”
    Get full text
    Article
  12. 772

    Editorial by Teddy Surya Gunawan

    Published 2025-05-01
    “…Contributions on flexible antenna designs, mobile applications for dyslexic learners, and modified grey relational analysis further showcase how electronics and AI are increasingly embedded in daily societal functions. In Materials and Manufacturing Engineering, the research on MSW-derived biochar for iron production and voltage-induced void formation in boiler tubes exemplifies innovation in resource utilization and reliability of industrial systems. …”
    Get full text
    Article
  13. 773

    How to trace the origins of short-lived atmospheric species: an Arctic example by A. Da Silva, L. Marelle, J.-C. Raut, Y. Gramlich, K. Siegel, K. Siegel, S. L. Haslett, S. L. Haslett, C. Mohr, C. Mohr, J. L. Thomas

    Published 2025-05-01
    “…Knowing the exact modeled tracer emission sources in WRF-Chem enables a precise quantification of the source detection accuracy. …”
    Get full text
    Article
  14. 774

    Two rare cases of severe community-acquired bloodstream infections: a clinical case report by Li-Na Meng, Gang Li

    Published 2024-12-01
    “…Detailed medical history inquiries, assessment of underlying immune status, detection of the source of infection, and initial precise identification and treatment of the infectious agents can improve the prognosis of CABSI.Case descriptionIn this paper, two incidences of severe CABSI with insidious onset and rapid progression are described. …”
    Get full text
    Article
  15. 775

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  16. 776

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  17. 777
  18. 778

    An Improved Fitting Method for Predicting the Zernike Coefficient–Wavelength Curves by Fang Wang, Qiyuan Zhang, Haoyu Wang, Dayong Zhu, Huaikang Zhu, Wenxin Jia, Sen Han

    Published 2021-01-01
    “…Broadband transmitted wavefront measurement is a detection method that uses transmitted wavefronts at a few specific wavelengths though a function of Zernike coefficients and wavelength to predict other transmitted wavefronts at any wavelength within a certain range. …”
    Get full text
    Article
  19. 779

    A Novel Method for Traceability of Crude Oil Leakage on Offshore Platforms Based on Improved YOLOv5 Model Multi-Target Identification and Correlation Analysis by Zhenghua Wang, Shihai Zhang, Chongnian Qu, Zongyi Zhang, Feng Sun

    Published 2025-01-01
    “…Based on the positional relationship between the spilled crude oil target and the source target detection anchor frame, the possible source targets are classified into three association levels and assigned different association weights. …”
    Get full text
    Article
  20. 780

    Design of the Field Protection and Signal Priority at Intersection System for Autonomous-rail Rapid Transit by SHI Yangyang, LIU Guangyong, WU Jinyong

    Published 2022-06-01
    “…It provides auxiliary driving information for the driver through automation equipment, realizes the functions of route protection, virtual section occupied/unoccupied detection, signal control, entering/leaving station detection, platform door linkage control, berth status detection and management in deport and so on, which improves system security and reduces driver working intensity. …”
    Get full text
    Article