Showing 1,401 - 1,420 results of 1,810 for search '(( resources detection function ) OR (( source OR sources) detection functions ))', query time: 0.23s Refine Results
  1. 1401
  2. 1402

    On path length, beam divergence, and retroreflector array size in open-path FTIR spectroscopy by C. E. N. Power, C. E. N. Power, A. Wiacek, A. Wiacek

    Published 2025-06-01
    “…<p>Open-path Fourier transform infrared (OP-FTIR) spectroscopy is an established technique used to measure boundary layer trace gas concentrations, consisting (in this work) of a spectrometer with an active mid-IR source coupled to a single transmitting and receiving telescope, as well as a cube-corner retroreflector array separated from the spectrometer and telescope by an atmospheric path. …”
    Get full text
    Article
  3. 1403

    Fast-timing spectroscopy with the ν-ball2 spectrometer by Pascu S., Hiver C., Podolyák Zs., Regan P.H., von Tresckow M., Wilson J.N.

    Published 2025-01-01
    “…In the first stage, the neutron beam was produced by the LICORNE source in an inverse kinematics reaction with a pulsed 7Li beam delivered by the Tandem accelerator, incident on an H2 gas cell. …”
    Get full text
    Article
  4. 1404
  5. 1405

    A lightweight transformer based multi task learning model with dynamic weight allocation for improved vulnerability prediction by Lan Liu, Zhanfa Hui, Guiming Chen, Tingfeng Cai, Chiyu Zhou

    Published 2025-08-01
    “…Traditional methods, such as single-task learning and ensemble approaches, often struggle with these challenges, particularly in detecting rare but critical vulnerabilities. To address this, we propose the MTLPT: Multi-Task Learning with Position Encoding and Lightweight Transformer for Vulnerability Prediction, a novel multi-task learning framework that leverages custom lightweight Transformer blocks and position encoding layers to effectively capture long-range dependencies and complex patterns in source code. …”
    Get full text
    Article
  6. 1406

    Investigation of some probiotic properties of Lactobacillaceae strains isolated from traditional Tulum cheese in Turkey by Eda Kiliç Kanak, Suzan Öztürk Yilmaz

    Published 2023-01-01
    “…Important information was obtained on the probiotic and functional properties of Lactobacillaceae strains isolated from traditionally fermented Tulum cheese, which can be used as a rich source of probiotic bacteria. …”
    Get full text
    Article
  7. 1407

    Gene Network Biological Validity Based on Gene-Gene Interaction Relevance by Francisco Gómez-Vela, Norberto Díaz-Díaz

    Published 2014-01-01
    “…Finally, the ability of GeneNetVal to detect biological functionality of the network is shown.…”
    Get full text
    Article
  8. 1408

    IRRADIATION EFFECT ON PEROXIDATION INDEX ON OKARABASED SOYBEAN FLOUR by Ana Paula Nunes

    Published 2019-02-01
    “…SSF samples were processed at “Centro de Energia Nuclear na Agricultura (CENA)”, University of Piracicaba-SP, irradiated with doses of 1 and 3 KGy in 60Co source. The dose rate was 0.269/hs. Analyses were performed to determine the peroxide index of control samples and irradiated in triplicate in 1, 15, 30 and 45 storage days in accordance with methodology for oils and fats with modifications. …”
    Get full text
    Article
  9. 1409

    Bioactive components derived from bovine milk by Katarina Lisak Jakopović, Irena Barukčić, Rajka Božanić

    Published 2019-01-01
    “…Milk is considered as a very good source of bioactive components and it has been known to contain macro- as well as micronutrients of high nutritional and therapeutic value. …”
    Get full text
    Article
  10. 1410

    THE SOLUTION TO THE EQUATION OF THE SHOCK WAVE BURGERS IN THE PTC MATHCAD ENVIRONMENT by R. E. Oleynikova

    Published 2022-08-01
    “…However, this error is detected through the values of the nonlinear term included in the differential equation, which is determined according to the binomial representation through the quadratic forms of the matrix of the trial function. …”
    Get full text
    Article
  11. 1411
  12. 1412
  13. 1413

    Identifying accounting control issues from online employee reviews by Lukui Huang, Alan Abrahams, Juthamon Sithipolvanichgul, Richard Gruss, Peter Ractham

    Published 2025-09-01
    “…The dataset is unique in that it provides a new source of data that has not been previously used in internal control research, offering new opportunities for exploring the relationship between employee feedback and control weaknesses, and shedding light on potential improvements in internal control practices. …”
    Get full text
    Article
  14. 1414
  15. 1415
  16. 1416

    Phenolic Content, Antioxidant Activity and Quality Characteristics of Hulled Wheats Originating from Türkiye by Fatma Ruveyda Alkan, Buket Çetiner, Hüseyin Akşit, Samed Şimşek

    Published 2025-07-01
    “…This study investigated selected quality and functional characteristics of 17 hulled wheat accessions (Triticum monococcum and Triticum dicoccum) preserved in the Türkiye Seed Gene Bank, along using four modern wheat cultivars (Triticum aestivum L. and Triticum durum Desf.). …”
    Get full text
    Article
  17. 1417
  18. 1418
  19. 1419

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  20. 1420

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article