Search alternatives:
functions » function (Expand Search)
Showing 1,741 - 1,760 results of 2,583 for search '(( resource selection functions ) OR (( source OR sources) detection functions ))', query time: 0.41s Refine Results
  1. 1741

    Repair of aircraft engine parts made of heat-resistant nickel alloys using additive plasma technologies by Konstantin Balushok, Sergey Chigileychik

    Published 2024-10-01
    “…No wear of the labyrinth ridges or cracks was detected. The functionality of the restored disk has been confirmed. …”
    Get full text
    Article
  2. 1742

    Unlocking the potential of circulating small extracellular vesicles in neurodegenerative disease through targeted biomarkers and advancements in biosensing by Saqer Al Abdullah, Ivy Cocklereece, Kristen Dellinger

    Published 2024-04-01
    “…Neurodegenerative diseases (NDDs) gradually affect neurons impacting both their function and structure, and they afflict millions worldwide. …”
    Get full text
    Article
  3. 1743

    Monitoring cognitive resilience in military personnel in extreme operational environments: The role of smart technologies and nutritional strategies-A scoping review protocol. by Rodica Siminiuc, Dinu Turcanu

    Published 2025-01-01
    “…Exposure to multiple stressors, including sleep deprivation, intense physical exertion, and limited access to food resources, can affect cognitive function and decision-making ability. …”
    Get full text
    Article
  4. 1744
  5. 1745

    Extracting Realistic Pedestrian, Cycling, and Driving Street Networks from OpenStreetMap by J. P. Duque, M. A. Brovelli

    Published 2025-07-01
    “…While OSM is a valuable source of information, it is not exempt from inconsistencies and errors, particularly affecting pedestrian and cycling networks, which can lead to inaccurate navigation or unsafe routes. …”
    Get full text
    Article
  6. 1746

    Regional and strain-level prevalence of nitrogen-fixing Bradyrhizobium with potential N2O reduction in South Korea by Jaeyoung Ro, Hor-Gil Hur, Sujin Lee

    Published 2025-06-01
    “…Abstract Agricultural practices are the largest anthropogenic source of nitrous oxide (N2O), a potent greenhouse gas contributing to global climate change. …”
    Get full text
    Article
  7. 1747

    Repair-mediated duplication by capture of proximal chromosomal DNA has shaped vertebrate genome evolution. by John K Pace, Shurjo K Sen, Mark A Batzer, Cédric Feschotte

    Published 2009-05-01
    “…These events are thought to be a source of genomic instability and human diseases, but it is unclear whether they have contributed significantly to genome evolution. …”
    Get full text
    Article
  8. 1748

    Devicology: Expanding fieldwork possibilities for architectural observations in inhabited interiors by Tatiana Knoroz

    Published 2022-04-01
    “…Originally celebrated by the public as a highly desirable living environment, danchi are now becoming a source of problems for the government. After briefly introducing the reader to the history of danchi, this paper will turn to investigate the interior lives of their current residents who stay hidden from the media attention behind dilapidating concrete walls and layers of social stigma. …”
    Get full text
    Article
  9. 1749

    Application of Machine Learning in Construction Productivity at Activity Level: A Critical Review by Ying Terk Lim, Wen Yi, Huiwen Wang

    Published 2024-11-01
    “…The review further found that the selection of ML models relies on each particular application, available data, and computational resources. …”
    Get full text
    Article
  10. 1750

    On Power-Off Temperature Attacks Potential Against Security Sensors by Maryam Esmaeilian, Vincent Beroulle, David Hély

    Published 2025-03-01
    “…Although numerous security sensors and attack detectors have been proposed in the literature to detect different sources of FIAs, it is crucial to ensure that these mechanisms themselves have not been tampered. …”
    Get full text
    Article
  11. 1751

    Carbon-Based Nanoadsorbents for the Removal of Emerging Pollutants by M. Venkata Ratnam, P. Akilamudhan, K. Senthil Kumar, S. Narasimha Reddy, K. Nagamalleswara Rao, Feroz Shaik, D. M. Reddy Prasad

    Published 2023-01-01
    “…Emerging contaminants (ECs) are substances that have been detected in water but have not been thoroughly tested or regulated. …”
    Get full text
    Article
  12. 1752

    Construction and Preliminary Application of the Carbon-based Spatial Governance Performance Evaluation System ——Taking Zhejiang Province as an Example by Lin Qu, Ganlin Xia, Cunkuan Bao

    Published 2023-06-01
    “…Variations in spatial governance result in differences in the scale, intensity and efficiency of social and economic activities, as well as energy and resource consumption and carbon emissions across diverse functional spaces. …”
    Get full text
    Article
  13. 1753

    Study About the Performance of Ascon in Arduino Devices by Ventura Sarasa Laborda, Luis Hernández-Álvarez, Luis Hernández Encinas, José Ignacio Sánchez García , Araceli Queiruga-Dios

    Published 2025-04-01
    “…In 2023, the Ascon cipher suite was selected as the winner of the National Institute of Standards and Technology (NIST) standardization process for lightweight cryptography, and has emerged as the leading candidate for cryptographic algorithms in resource-constrained environments. …”
    Get full text
    Article
  14. 1754

    A Dataset of Lower Band Whistler Mode Chorus and Exohiss with Instrumental Noise Thresholds by Ondřej Santolík, Ivana Kolmašová, Ulrich Taubenschuss, Miroslav Hanzelka, David P. Hartley

    Published 2025-07-01
    “…It is based on more than 124 million selected survey measurements of magnetic fluctuations, recorded between 2001 and 2020 by the two NASA Van Allen Probes and four ESA Cluster spacecraft. …”
    Get full text
    Article
  15. 1755

    Data-Governance Approach Implemented in the Activities of State Supervisory Authorities of the Russian Federation by Ekaterina Sviridova

    Published 2023-10-01
    “…The Russian market for IT solutions in the field of data and metadata management is analyzed, and their functionality is described. Open source solutions that can also be used for data management are also considered. …”
    Get full text
    Article
  16. 1756

    Glyceraldehyde-3-phosphate dehydrogenase acts as a mitochondrial trans-S-nitrosylase in the heart. by Mark J Kohr, Elizabeth Murphy, Charles Steenbergen

    Published 2014-01-01
    “…Mitochondrial proteins have been shown to be common targets of S-nitrosylation (SNO), but the existence of a mitochondrial source of nitric oxide remains controversial. SNO is a nitric oxide-dependent thiol modification that can regulate protein function. …”
    Get full text
    Article
  17. 1757

    “Locality – Adaptation” Research of Hydropower Resettlement Communities in the Jinsha River Basin: A Case Study of Ludila Hydropower Station by Fang WANG, Zhuoqi LI, Haoyi XU, Jiaqi YAN

    Published 2025-04-01
    “…Among them, Taoyuan Longwang Temple fully retains the original worship function (retention rate is 100%) and forms a functional complement with the new water supply system of Dalongtan Reservoir (replacing the function of 90% of the inundated irrigation area). …”
    Get full text
    Article
  18. 1758

    Identification of Intracranial Germ Cell Tumors Based on Facial Photos: Exploratory Study on the Use of Deep Learning for Software Development by Yanong Li, Yixuan He, Yawei Liu, Bingchen Wang, Bo Li, Xiaoguang Qiu

    Published 2025-01-01
    “…Due to their insidious onset and impact on critical functional areas of the brain, these tumors often result in irreversible abnormalities in growth and development, as well as cognitive and motor impairments in affected children. …”
    Get full text
    Article
  19. 1759

    Artificial intelligence analysis in cyber domain: A review by Liguo Zhao, Derong Zhu, Wasswa Shafik, S Mojtaba Matinkhah, Zubair Ahmad, Lule Sharif, Alisa Craig

    Published 2022-04-01
    “…The results in this study demonstrated that using a proportional collection of instances trained with the deep learning algorithm, a classified data set can accurately detect suspicious behavior. This method permits for the allocation of multiple log source types through a sliding time window and provides a scalable solution, which is a much-needed function.…”
    Get full text
    Article
  20. 1760