Search alternatives:
functions » function (Expand Search)
Showing 121 - 140 results of 2,295 for search '(( resources detection functions ) OR (( source OR sources) selection functions ))', query time: 0.33s Refine Results
  1. 121

    A statistical approach to assess interspecific consumptive competition and functional redundancy in ephemeral resource uses using camera traps by Yoshihiro Nakashima, Akane Hashizume, Akane Kanda

    Published 2024-07-01
    “…We extended time‐to‐detection occupancy modeling to quantify interspecific consumptive competition and redundancy of ecosystem functions through consumption between two species, while accounting for observation censoring. …”
    Get full text
    Article
  2. 122

    Identification of swine- specific microbial genetic markers using competitive DNA hybridization by FAN Lihua, MO Hongfei, ZHANG Xiaofeng, SHUAI Jiangbing, CHEN Qing

    Published 2017-03-01
    “…The putative protein transcript of each sequence was analyzed based on the similarity of gene sequences by using BLASTX with the GenBank non-redundant database,and their biochemical functions were therefrom predicted.Sequence analyses of five hundred randomly selected clones from the libraries obtained by three rounds of metagenomic GFE revealed that this subset contained a total of 384 non-redundant sequences and most sequences (87%) ranged from 400 bp to 600 bp in size. …”
    Get full text
    Article
  3. 123
  4. 124
  5. 125

    Antimicrobial Activity of Chitosan from Different Sources Against Non-<i>Saccharomyces</i> Wine Yeasts as a Tool for Producing Low-Sulphite Wine by Francesco Tedesco, Rocchina Pietrafesa, Gabriella Siesto, Carmen Scieuzo, Rosanna Salvia, Patrizia Falabella, Angela Capece

    Published 2024-10-01
    “…Finally, the efficiency of different antimicrobial treatments was evaluated during laboratory-scale fermentations inoculated with a selected <i>S. cerevisiae</i> strain. The tested strains exhibited medium/high resistance to the chitosan; in some cases, the behaviour varied in the function of species/strain, and only four strains exhibited different resistance levels, depending on the chitosan source. …”
    Get full text
    Article
  6. 126
  7. 127
  8. 128

    PFW-YOLO Lightweight Helmet Detection Algorithm by Yue Hong, Hao Wang, Shuo Guo

    Published 2025-01-01
    “…However, due to the limited arithmetic and storage resources of edge-end devices, and the traditional detection algorithms have problems such as the number of parameters and large computational volume, the detection algorithms are difficult to be deployed practically. …”
    Get full text
    Article
  9. 129

    cogsworth: A Gala of COSMIC Proportions Combining Binary Stellar Evolution and Galactic Dynamics by Tom Wagg, Katelyn Breivik, Mathieu Renzo, Adrian M. Price-Whelan

    Published 2025-01-01
    “…Alternatively, several analytic models are available for galactic potentials and star formation histories. cogsworth can also transform the intrinsic simulated population into an observed population using dust maps, bolometric correction functions, and survey selection functions. We provide a detailed explanation of the functionality of cogsworth and demonstrate its capabilities through a series of use cases: (1) we predict the spatial distribution of compact objects and runaways in both dwarf and Milky Way–like galaxies; (2) using a star cluster from a hydrodynamical simulation, we show how supernovae can change the orbits of stars in several ways; and (3) we predict the separation of disrupted binary stellar companions on the sky and create a synthetic Gaia color–magnitude diagram. …”
    Get full text
    Article
  10. 130

    Design and analysis of intelligent service chain system for network security resource pool by Zenan WANG, Jiahao LI, Chaohong TAN, Dechang PI

    Published 2022-08-01
    “…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
    Get full text
    Article
  11. 131

    Today’s Mechanisms of Financing the 4th Energy-Transition by E. V. Altukhova

    Published 2024-05-01
    “…Current trends of sustainable development define priorities and new approaches to sources and forms of financing. Serious impact on selection of finance mechanisms is made by sectoral specific features demonstrating key lines of development. …”
    Get full text
    Article
  12. 132
  13. 133

    Cyclostationary Near-field Acoustic Holography for Gearboxes by Zhu Song, Zhang Erliang, Gao Xiaoyu

    Published 2024-12-01
    “…Firstly, the set of cyclic frequencies was estimated from the noise signal; secondly, the cyclic frequency of interest was selected, and the corresponding cyclic spectral density function was calculated; thirdly, the equivalent source NAH method was developed to reconstruct the potential sound source of the gearbox. …”
    Get full text
    Article
  14. 134

    Conception de l’artefact, conception du collectif : dynamique d’un processus de conception ouvert et continu dans une communauté de développement de logiciels libres by Flore Barcellini

    Published 2009-04-01
    “…This research deals with Open Source Software (OSS) Design, seen as a new form of work organization based on: a design process open to users voluntary participation; a continuous design process; an distribution of the design process into three activity spaces on the Internet (discussion, documentation et implementation spaces). …”
    Get full text
    Article
  15. 135
  16. 136

    Fracture maturity controls the complexity of earthquake rupture: evidence from source processes of six moderate earthquakes during swarm activities off the east coast of Izu Penins... by Yukako Tanaka, Takuji Yamada

    Published 2025-08-01
    “…We first selected waveforms of smaller earthquakes (Mw3.4–3.9) as empirical Green’s functions and carried out the waveform inversion with 200 time windows for two horizontal components of 10-s-long K-net waveforms. …”
    Get full text
    Article
  17. 137

    Research Progress on Dual Function Radar and Communication Signal Design and its Application in Typical Detection Scenarios by Yaping HE, Longfei SHI, Dong WANG, Jianglan TANG, Junxian CHEN, Jiazhi MA, Jialei LIU

    Published 2025-08-01
    “…Dual Function Radar and Communication (DFRC)-integrated electronic equipment platform, which combines detection and communication functions, effectively addresses issues such as platform limitations, resource constraints, and electromagnetic compatibility by sharing hardware platforms and transmitting waveforms. …”
    Get full text
    Article
  18. 138

    Continuous-Variable Quantum Key Distribution Protocol Based on Post-Selection by Hao YU, Bao FENG, Zichun PAN, Wenhe ZHUO, Zhenwei LI

    Published 2019-07-01
    “…In the paper, we present a CVQKD protocol based on post-selection method, which need not any extra single photon source. …”
    Get full text
    Article
  19. 139

    LFN-YOLO: precision underwater small object detection via a lightweight reparameterized approach by Mingxin Liu, Mingxin Liu, Yujie Wu, Ruixin Li, Cong Lin, Cong Lin

    Published 2025-01-01
    “…Underwater object detection plays a significant role in fisheries resource assessment and ecological environment protection. …”
    Get full text
    Article
  20. 140

    Molecular signature of selective microRNAs in Cyprinus carpio (Linnaeus 1758):a computational approach by Soumendu Ghosh, Manojit Bhattacharya, Avijit Kar, Basanta Kumar Das, Bidhan Chandra Patra

    Published 2019-03-01
    “…Using web based tools total 10 selected miRNAs belongs to 10 different families were illustrated and functionally categorized in Cyprinus carpio. …”
    Get full text
    Article