Search alternatives:
functions » function (Expand Search)
Showing 841 - 860 results of 1,810 for search '(( resources detection functions ) OR (( source OR sources) detection functions ))*', query time: 0.39s Refine Results
  1. 841

    An Emergency Response Framework Design and Performance Analysis for Ship Fire Incidents in Waterway Tunnels by Jian Deng, Shaoyong Liu, Xiaohan Zeng

    Published 2025-07-01
    “…The framework is mapped into a Petri net model encompassing three key stages: detection and early warning, emergency response actions, and recovery. …”
    Get full text
    Article
  2. 842

    Optimization of multi-element geochemical anomaly recognition in the Takht-e Soleyman area of northwestern Iran using swarm-intelligence support vector machine by Hamid Sabbaghi, Seyed Hassan Tabatabaei, Nader Fathianpour

    Published 2025-03-01
    “…Mineral exploration is becoming increasingly challenging because the depths at which undiscovered mineral deposits can be found are progressively increasing under barren cover. Therefore, detecting metal resources under barren cover is a significant step for industrial progress. …”
    Get full text
    Article
  3. 843

    GENERATION AND COLLECTION OF TOBACCO AEROSOL FOR SHISHA by N. N. Bubnova, M. V. Shkidyuk

    Published 2020-11-01
    “…Qualitative characteristics of tobacco aerosol for shisha are determined by the functional purpose and depend on the component composition of the tobacco mixture and the coal used.The purpose of the research is to develop a methodology for the comprehensive assessment of tobacco for shisha based on modern methods of product quality control and includes the following steps:- monitoring of the studies to determine the component composition of the hookah mixture and the aerosol produced;- analysis of hookah mixture testing modes and development of an aerosol generation protocol;- development of a method for collecting aerosol on a laboratory smoking machine; - quantitative analysis of toxic analytes by HPLC MS / MS method.Methods have been developed for the machine generation and collection of tobacco aerosol for hookah, taking into account low concentrations of the analyzed toxic substances.The expediency of using the HPLC MS / MS method to determine the quantity of the following substances in tobacco aerosol for shisha has been substantiated:- carbonyl compounds (formaldehyde, acetaldehyde, acrolein) by detection on an electrospray source in the negative polarity mode- tobacco specific nitrosoamines (NNN and NNK) by detection on an electrospray source in the positive polarity mode.During the research laboratory and analytical equipment was used: a five-channel linear CERULEAN SM 405 smoking machine; Thermo Scientific Dionex UltiMate 3000 liquid chromatograph and TSQ Quantiva mass spectrometer.Obtaining experimental data on the quantitative determination of the component composition of the aerosol produced by tobacco for shisha using hookah systems is relevant for assessing toxic characteristics of the product.…”
    Get full text
    Article
  4. 844

    Weibull-Type Incubation Period and Time of Exposure Using <i>γ</i>-Divergence by Daisuke Yoneoka, Takayuki Kawashima, Yuta Tanoue, Shuhei Nomura, Akifumi Eguchi

    Published 2025-03-01
    “…Accurately determining the exposure time to an infectious pathogen, together with the corresponding incubation period, is vital for identifying infection sources and implementing targeted public health interventions. …”
    Get full text
    Article
  5. 845
  6. 846

    Ultra-high-energy γ-ray emission associated with the tail of a bow-shock pulsar wind nebula

    Published 2025-04-01
    “…The source energy spectrum extended up to 300 TeV, which was well fitted by a log-parabola function with N0 = (1.93 ± 0.23) × 10−16 TeV−1 cm−2 s−1, α = 2.14 ± 0.27, and β = 1.20 ± 0.41 at E0 = 30 TeV. …”
    Get full text
    Article
  7. 847

    Historical traces in Southern Grevena during Ottoman occupation by Vasileios D. Spanos

    Published 2024-11-01
    “…In particular, attention was paid to the detection of all reports of the settlement, in written sources (published and unpublished), so that all the information concerning each settlement, even the simple reports, become known and accessible to the research and also in order to record all types with which each toponym is found, which also facilitates its etymology (although this identification was not always possible). …”
    Get full text
    Article
  8. 848

    Cryopreservation and culture strategies for testicular tissue and cells in small and large animals by Valeria Vurchio, Martina Colombo, Rolando Pasquariello, Gaia Cecilia Luvoni

    Published 2025-07-01
    “…Spermatogenic cells from cryopreserved testicular tissue can be cultured in vitro and resume their functions after thawing, contributing to the preservation of fertility and genetic resources in both small and large animals. …”
    Get full text
    Article
  9. 849
  10. 850
  11. 851

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  12. 852

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  13. 853

    Operational monitoring of acoustic sensor networks by V. A. Boltenkov, G. Kh. M. Al-Jasri

    Published 2015-06-01
    “…Both of them are based on the placement of the test sound source within a network. The signal processing for ASN sensors had to detect the failed element. …”
    Get full text
    Article
  14. 854

    Research on a traffic flow statistical algorithm based on YBOVDT and SAM2 by Yuanyuan Wang, Zheng Ding, Jiange Liu, Kexiao Wu, Md Sharid Kayes Dipu, Tingmei Ma, Yonghao Ma, Haiyan Zhang

    Published 2025-05-01
    “…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
    Get full text
    Article
  15. 855

    Sigma Delta Modulation Controller and Associated Cybersecurity Issues with Battery Energy Storage Integrated with PV-Based Microgrid by Syeda Afra Saiara, Mohd. Hasan Ali

    Published 2024-12-01
    “…Battery energy storage systems (BESSs) play a crucial role in integrating renewable energy sources into microgrids. However, robust BESS controllers are needed to carry out this function properly. …”
    Get full text
    Article
  16. 856

    Prediction of new candidate proteins and analysis of sub-modules and protein hubs associated with seed development in rice (Oryza sativa) using an ensemble network-based systems bi... by M. R. P. De Silva, J. W. J. K. Weeraman, S. Piyatissa, P. C. Fernando

    Published 2025-05-01
    “…Abstract Background Rice is a critical global food source, but it faces challenges due to nutritional deficiencies and the pressures of a growing population. …”
    Get full text
    Article
  17. 857

    The role of vitamin K in the pathology of newborns and infants (literature review) by Y.V. Marushko, A.O. Pysariev, T.V. Kurilina, O.A. Bovkun

    Published 2024-10-01
    “…PIVKA II is used as a functional marker for the detection of vitamin K deficiency. …”
    Get full text
    Article
  18. 858

    21 Balmer Jump Street: The Nebular Continuum at High Redshift and Implications for the Bright Galaxy Problem, UV Continuum Slopes, and Early Stellar Populations by Harley Katz, Alex J. Cameron, Aayush Saxena, Laia Barrufet, Nichloas Choustikov, Nikko J. Cleri, Anna de Graff, Richard S. Ellis, Robert A.E. Fosbury, Kasper E. Heintz, Michael Maseda, Jorryt Matthee, Ian McConachie, Pascal A. Oesch

    Published 2025-07-01
    “…We conclude by exploring the properties of spectroscopically confirmed $z>10$ galaxies, finding that UV slopes and UV downturns are in some cases redder or steeper than expected from SPS models, which may hint at more exotic (e.g. hotter/more massive stars or AGN) ionizing sources.…”
    Get full text
    Article
  19. 859

    A data driven approach using local measurements to locate turbine governors causing forced oscillations by Sigurd Hofsmo Jakobsen, Xavier Bombois, Santiago Sanchez Acevedo, Hallvar Haugdal, Salvatore D’Arco

    Published 2025-07-01
    “…When forced oscillations are detected, they are located by finding the transfer functions that describe the behaviour of the corresponding plant the worst. …”
    Get full text
    Article
  20. 860