Search alternatives:
functions » function (Expand Search)
Showing 601 - 620 results of 2,583 for search '(( resource selection functions ) OR (( source OR sources) detection functions ))', query time: 0.34s Refine Results
  1. 601

    The structural and functional brain alternations in tobacco use disorder: a systematic review and meta-analysis by Longyao Ma, Longyao Ma, Qiuying Tao, Qiuying Tao, Jinghan Dang, Jinghan Dang, Jieping Sun, Jieping Sun, Xiaoyu Niu, Xiaoyu Niu, Mengzhe Zhang, Mengzhe Zhang, Yimeng Kang, Yimeng Kang, Weijian Wang, Weijian Wang, Jingliang Cheng, Jingliang Cheng, Yong Zhang, Yong Zhang

    Published 2025-04-01
    “…BackgroundWhile numerous previous studies have indicated that nicotine intake results in gray matter and functional brain abnormalities in tobacco use disorder (TUD), the majority of results could not be replicated or even reversed. …”
    Get full text
    Article
  2. 602

    Speech Enhancement Using Sliding Window Empirical Mode Decomposition and Hurst-based Technique by Selvaraj POOVARASAN, Eswaran CHANDRA

    Published 2019-07-01
    “…Hurst exponent statistics was adopted for identifying and selecting the set of Intrinsic Mode Functions (IMF) that are most affected by the noise components. …”
    Get full text
    Article
  3. 603
  4. 604

    Technical progress of construction and safe operation of underground gas storage under complex geological conditions by Qiqi WANYAN, Yun WANG, Dongxu LI, Hongcheng XU, Chun LI, Kang LI, Jingcui LI, Lifeng LI

    Published 2023-10-01
    “…Predictably, the site resource of gas storage in China will have more deteriorated quality and more complicated types in the future, which will gradually change to the new types of oil reservoirs, low-permeability gas reservoirs, complex connected old salt caverns and water layers. …”
    Get full text
    Article
  5. 605
  6. 606
  7. 607
  8. 608
  9. 609
  10. 610
  11. 611

    Shelf-Life Evaluation of a Novel Functional Product from a Blend of Powdered Vegetables by Aisha Idris Ali, Virginia Paul, Munir Abba Dandago, Fatima Idris Ali, Daniel Amiteye

    Published 2023-06-01
    “… Perishable fresh vegetables that do not meet cosmetic standards and other crop waste rich resources are presently wasted. Mangifera indica leaves, Psidium guajava leaves, Petroselinum crispum leaves and Daucus carota were selected as model vegetables to show that they can be converted into a shelf-stable novel functional powdered product. …”
    Get full text
    Article
  12. 612
  13. 613
  14. 614

    The availability and functionality of medical equipment and the barriers to their use at comprehensive specialized hospitals in the Amhara region, Ethiopia by Alem Endeshaw Woldeyohanins, Nigatu Mihretu Molla, Abibo Wondie Mekonen, Abrham Wondimu

    Published 2025-01-01
    “…Eight (n = 8) comprehensive specialized hospitals in the Amhara region were selected purposefully and included in this study. The data used to assess the availability and functionality of medical equipment items (n = 78) listed by the Ethiopian Ministry of Health that are supposed to be available in all of the comprehensive specialized hospitals were collected from 29 May to 18 June 2023. …”
    Get full text
    Article
  15. 615

    Deep Defense Against Mal-Doc: Utilizing Transformer and SeqGAN for Detecting and Classifying Document Type Malware by Gati Lother Martin, Sang-Min Lee, Jong-Hyun Kim, Young-Seob Jeong, Ah Reum Kang, Jiyoung Woo

    Published 2025-03-01
    “…The proposed model will solve this gap by detecting and classifying document-type malware families using script codes, including tags, to write documents and script languages to execute malicious functions. …”
    Get full text
    Article
  16. 616

    Enhancing Cybersecurity Through Fusion of Optimization With Deep Wavelet Neural Networks on Denial of Wallet Attack Detection in Serverless Computing by P. Renukadevi, Sibi Amaran, A. Vikram, T. Prabhakara Rao, Mohamad Khairi Ishak

    Published 2025-01-01
    “…A Denial of Wallet (DoW) attack is a cyberattack designed to drain financial resources by causing excessive charges or costs on a serverless computing or cloud platform. …”
    Get full text
    Article
  17. 617
  18. 618

    Edge enhancement of potential field data using the enhanced gradient (EG) filter by Ahmad Alvandi, Korimilli N Durga Prasad, Hazel Deniz Toktay

    Published 2024-08-01
    “…The EG is tested on two dimensional (2D) and three dimensional (3D) synthetic magnetic models with sources buried at different depths and variable properties. …”
    Get full text
    Article
  19. 619
  20. 620

    Bearing-Only Multi-Target Localization Incorporating Waveguide Characteristics for Low Detection Rate Scenarios in Shallow Water by Xiaohan Mei, Bo Zhang, Duo Zhai, Zhaohui Peng

    Published 2024-12-01
    “…A <i>β</i>-S-dimensional assignment (<i>β</i>-SDA) method incorporating waveguide characteristics is proposed to address the BOMTL problem in shallow water with low detection rates. The estimated distance for the warping transformation is derived from the intersection points of the bearing lines, then the autocorrelation function of the broadband beamforming output is transformed using a warping operator to obtain the corresponding characteristic spectrum. …”
    Get full text
    Article