Search alternatives:
functions » function (Expand Search)
Showing 901 - 920 results of 2,295 for search '(( resources detection functions ) OR (( source OR sources) selection functions ))', query time: 0.32s Refine Results
  1. 901

    Antibiotics and Antimicrobial Resistance Genes in a Gut Microbiota as a Reservoir—A Review by Bismark Dabuo, Abudu Abubakari, Frances Ellen Sankah, Hannah Aryeley Aryee

    Published 2025-01-01
    “…This emphasizes how important it is that we understand how the human body functions on the inside as well as the outside sources of infections. …”
    Get full text
    Article
  2. 902

    Significance of the pineal gland hormone melatonin in maintaining the health of women of reproductive age (a review) by M. V. Danilova, E. N. Usoltseva

    Published 2020-01-01
    “…In our search, we prioritized the free access to full text articles. The selection of sources was limited to the period from 2012 to 2019.Results. …”
    Get full text
    Article
  3. 903

    An Emergency Response Framework Design and Performance Analysis for Ship Fire Incidents in Waterway Tunnels by Jian Deng, Shaoyong Liu, Xiaohan Zeng

    Published 2025-07-01
    “…The framework is mapped into a Petri net model encompassing three key stages: detection and early warning, emergency response actions, and recovery. …”
    Get full text
    Article
  4. 904

    Optimization of multi-element geochemical anomaly recognition in the Takht-e Soleyman area of northwestern Iran using swarm-intelligence support vector machine by Hamid Sabbaghi, Seyed Hassan Tabatabaei, Nader Fathianpour

    Published 2025-03-01
    “…Mineral exploration is becoming increasingly challenging because the depths at which undiscovered mineral deposits can be found are progressively increasing under barren cover. Therefore, detecting metal resources under barren cover is a significant step for industrial progress. …”
    Get full text
    Article
  5. 905

    Urban Hierarchy Migration Model and Impact Mechanism of Graduates Admitted to the Guangdong Provincial Civil Service Examination by Wu Jinghao, Liu Ye, Tang Honglin

    Published 2025-02-01
    “…Compared to other non-establishment employment models, this employment model has a stronger possibility of migrating down the urban hierarchy, which may be caused by significant differences in the sources of job settings, competition intensity, and subjective willingness. …”
    Get full text
    Article
  6. 906
  7. 907

    The On-Chip D-LMS Filter Design Method of Wireless Sensor Node Based on FPGA by Jian Li, Maojin Li, Ming Meng, Zepeng Liu

    Published 2020-01-01
    “…In the real-time position technology of underground shallow source, the signal denoising performance of wireless sensor nodes directly determines the location speed and accuracy of underground burst point. …”
    Get full text
    Article
  8. 908
  9. 909

    Battery Energy Storage System Placement And Sizing In Distribution Networks by Sorokin Dmitry

    Published 2024-01-01
    “…The methodology is applicable to BESS which implement the functions of ensuring the reliability of power supply to consumers (use of BESS as a backup or emergency source of power supply), as well as the function of regulating voltage levels in the electrical network (regulating reactive power by the BESS inverter).…”
    Get full text
    Article
  10. 910

    An Optimization Algorithm for Forward-Scatter Radar Network Node Deployment Based on BFGS and Improved NSGA-II by Yuqing Zheng, Xiaofeng Ai, Zhiming Xu, Jing Wu, Feng Zhao

    Published 2025-04-01
    “…A multi-objective optimization model was subsequently established with the objective functions of minimizing node cost and maximizing spatial detection area. …”
    Get full text
    Article
  11. 911

    Cryopreservation and culture strategies for testicular tissue and cells in small and large animals by Valeria Vurchio, Martina Colombo, Rolando Pasquariello, Gaia Cecilia Luvoni

    Published 2025-07-01
    “…Spermatogenic cells from cryopreserved testicular tissue can be cultured in vitro and resume their functions after thawing, contributing to the preservation of fertility and genetic resources in both small and large animals. …”
    Get full text
    Article
  12. 912
  13. 913
  14. 914

    Metaphorics and intertexts in the key text positions of political media discourse by V. O. Pareshneva

    Published 2022-07-01
    “…The study examines various ways that serve to intensify and improve precedent phenomena used as a source-sphere in translating the author’s axiological space and shaping vectors of interpretation for political articles metatext.The headline is a brief representation of objective and reflexive prognostics, which steers the “correct” perception of the entire text. …”
    Get full text
    Article
  15. 915

    Developing a Comprehensive Physical Education Curriculum in Secondary Schools: Identifying and Exploring the Key Components of Content by Yurij Vaskov

    Published 2022-12-01
    “…A systematic review of relevant literature was conducted using publications from the Vernadskyi National Library and sources in the Google search system. Keywords were used for the search in accordance with the topic of the study, and 26 sources were selected for analysis. …”
    Get full text
    Article
  16. 916

    A thorough assessment of 10-MDP primers in modern dental adhesive systems by Ahmed A Abduljawad, Harraa SM Salih, Omar F Tawfiq

    Published 2024-09-01
    “…We focus on its chemistry, interactions with tooth substrates, interactions with zirconium and other metals, adhesive’s longevity, clinical applications, and potential drawbacks. Sources: Our sources are the Internet, such as Google Scholar and PubMed. …”
    Get full text
    Article
  17. 917

    A Review on Flavonoids as a Potential Biomolecule for Inhibiting the Effect of Head and Neck Cancer by Muhammad Moazzam Ashraf

    Published 2024-01-01
    “…Results: Plants have been major sources of flavonoids but fungi, especially endophytic fungi are also valuable sources of natural therapeutic agent flavonoids. …”
    Get full text
    Article
  18. 918

    Harmonic State Estimation Method Based on Bayesian Optimized Elastic Network Regression by Siqi MA, Zhong WANG

    Published 2022-08-01
    “…Firstly, when the least square method is used to estimate the harmonic state, the weighted 1-norm and 2-norm are added to the penalty function at the same time; In addition, in order to estimate the harmonic state more efficiently and accurately, the Gaussian process and Bayesian optimization are applied to select the weight of 1-norm and 2-norm; Finally, the effectiveness of the proposed method is verified in IEEE14 node. …”
    Get full text
    Article
  19. 919

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  20. 920

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article