Showing 321 - 340 results of 2,583 for search '(( resource selection functions ) OR (( source OR sources) detection function ))', query time: 0.37s Refine Results
  1. 321
  2. 322
  3. 323
  4. 324

    Signatures of positive selection for local adaptation of African native cattle populations: A review by Wondossen AYALEW, Xiao-yun WU, Getinet Mekuriaw TAREKEGN, Min CHU, Chun-nian LIANG, Tesfaye SISAY TESSEMA, Ping YAN

    Published 2023-07-01
    “…Although there are no functional genomics studies, recent advancements in genotyping and sequencing technologies have identified and annotated limited functional genes and causal variants associated with unique adaptive and economical traits of African cattle populations. …”
    Get full text
    Article
  5. 325

    Impact of Artificial Intelligence on Human Resource Management Practices: A Qualitative Study in Hyderabad, Pakistan’s Banking Sector by Sahar Akhtar Mughal, Mohammed Bilal Memon, Faraz Ali Memon

    Published 2025-06-01
    “… Artificial Intelligence (AI) is reshaping the way Human Resource Management (HRM) functions within organizations. …”
    Get full text
    Article
  6. 326

    Educational content selection in human rights education at the early childhood education and care level by Anette Ringen Rosenberg

    Published 2025-07-01
    “…It aims to discuss the function of four content selection dimensions for discussing HRE content at the ECEC level. …”
    Get full text
    Article
  7. 327

    Client Selection for Generalization in Accelerated Federated Learning: A Multi-Armed Bandit Approach by Dan Ben Ami, Kobi Cohen, Qing Zhao

    Published 2025-01-01
    “…It has attracted a growing interest in recent years due to its advantages in terms of privacy considerations, and communication resources. In FL, selected clients train their local models and send a function of the models to the server, which consumes a random processing and transmission time. …”
    Get full text
    Article
  8. 328

    Genomic signal selection analysis reveals genes related to the lambing trait of Hotan sheep by XinKun Wang, Wei Li, QiaoYan Huang, HuiPing Sun, LeXiao Zhu, RuoHuai Gu, Feng Xing

    Published 2025-07-01
    “…We identified 290 selected regions and 332 genes across the Hotan sheep genome by using two widely adopted selective scanning detection methods (FST statistics and Piratio). …”
    Get full text
    Article
  9. 329

    Exploration of crop germplasm resources knowledge mining in Chinese ancient books: a route toward sustainable agriculture by Wenjuan Zhao, Suoling Zhu, Yuan Cao

    Published 2025-04-01
    “…It is a complement to the current collection and utilization of germplasm resources. Furthermore, some of the excellent varieties discovered still possess good trait stability after nearly a century of natural evolution and artificial selection, which provides a solid germplasm base for sustainable agricultural development. …”
    Get full text
    Article
  10. 330

    Algorithms for Automatic Detection and Location of Infrasound Events in the PSDL System by Asming Vladimir Ernestovich, Fedorov Andrey Viktorovich

    Published 2024-12-01
    “…An algorithm for detecting infrasound signals by calculating the cross-correlation function between records of individual sensors in a array is described. …”
    Get full text
    Article
  11. 331

    Code vulnerability detection method based on graph neural network by Hao CHEN, Ping YI

    Published 2021-06-01
    “…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
    Get full text
    Article
  12. 332

    Detection, Parameter Estimation and Direction Finding of Periodic Pulse Signals by V. B. Manelis, I. S. Faustov, V. A. Kozmin

    Published 2025-07-01
    “…Simple-to-implement algorithms for detecting periodic pulse signals, evaluating their parameters, and direction finding of the source have been developed. …”
    Get full text
    Article
  13. 333

    Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks by B. Paramasivan, M. Kaliappan

    Published 2014-01-01
    “…The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. …”
    Get full text
    Article
  14. 334
  15. 335

    Is there a future for livestock in a sustainable food system? Efficiency, sufficiency, and consistency strategies in the food-resource nexus by Isabel Jaisli, Gianluca Brunori

    Published 2024-12-01
    “…Livestock production has been identified as the most relevant factor for the sustainability of future food system and is anticipated to be increasingly influenced by competition for critical resources such as land and water, the rivalry between food and feed, and the imperative to function within a carbon-constrained economy. …”
    Get full text
    Article
  16. 336

    Advances in preparation and application of coal-based functional nanomaterials by Shenyong LI, Shenjun QIN, Changquan MEN, Jiajia HOU, Dawei LYU, Xue ZHENG, Wei PANG, Longlong HAO, Daoyuan ZHAO, Shaozhuo ZHANG

    Published 2025-07-01
    “…However, traditional coal utilization as a primary carbon emission source fundamentally conflicts with the “dual-carbon” strategic goals. …”
    Get full text
    Article
  17. 337

    Fast detection method for radionuclides based on Sequential Bayesian approach by WAN Linjian, ZHANG Xuan, ZHANG Chunlei, HUANG Jianwei, LIU Jiacheng, ZHANG Xiaole, LI Dehong, YANG Zhijun

    Published 2025-01-01
    “…Finally, experimental verifications were conducted on the feasibility, detection performance, and universality of the method by placing a set of standard point sources at different distances from the front of a LaBr3(Ce) detection system in both low and natural radiation background environments. …”
    Get full text
    Article
  18. 338
  19. 339

    Introduction of AI Technology for Objective Physical Function Assessment by Nobuji Kouno, Satoshi Takahashi, Masaaki Komatsu, Yusuke Sakaguchi, Naoaki Ishiguro, Katsuji Takeda, Kyoko Fujioka, Ayumu Matsuoka, Maiko Fujimori, Ryuji Hamamoto

    Published 2024-11-01
    “…This paper explored how artificial intelligence (AI) could predict physical function scores from various patient data sources and reviewed methods to measure objective physical function using this technology. …”
    Get full text
    Article
  20. 340

    Exploring RNA cargo in extracellular vesicles for pleural mesothelioma detection by Agnieszka Kraft, Michaela B. Kirschner, Vanessa Orlowski, Manuel Ronner, Caroline Bodmer, Valentina Boeva, Isabelle Opitz, Mayura Meerang

    Published 2025-02-01
    “…Conclusions This is the first study to characterize the transcriptomic profile of EVs secreted by PM primary cell cultures, demonstrating their potential as biomarker source for early detection. Further investigation of the functional role of PM-EVs will provide new insights into disease biology and therapeutic avenues.…”
    Get full text
    Article