Search alternatives:
source » sources (Expand Search)
resources » resourcess (Expand Search)
Showing 1,381 - 1,400 results of 1,810 for search '(( source detection functions ) OR (( resources OR resources) detection function ))', query time: 0.24s Refine Results
  1. 1381

    Feeding black soldier fly (Hermetia illucens) larvae with mushrooms and then exposing them to UVB produces larvae extremely rich in vitamins D2 and D3 by Lisa Morand-Laffargue, Florence Charles, Charlotte Sabran, Patrick Borel

    Published 2025-12-01
    “…Black soldier fly larvae (BSFL) are a sustainable source of protein for feed but they can also be a sustainable source of some phytochemicals due to their ability to bioaccumulate them. …”
    Get full text
    Article
  2. 1382

    Soil methane emission suppression control using unmanned aircraft vehicle swarm application of biochar mulch - A simulation study by Di An, Derek Hollenbeck, Kai Cao, YangQuan Chen

    Published 2023-05-01
    “…In this paper, we present a soil methane emissions suppression approach using swarms of unmanned aerial vehicles (UAVs), by spreading biochar mulch on top of the detected methane emissions area/source. Soil microorganisms can produce methane and release it into the atmosphere causing climate change such as global warming. …”
    Get full text
    Article
  3. 1383

    The Influence of Thickness and Spectral Properties of Green Color-Emitting Polymer Thin Films on Their Implementation in Wearable PLED Applications by Kyparisis Papadopoulos, Despoina Tselekidou, Alexandros Zachariadis, Argiris Laskarakis, Stergios Logothetidis, Maria Gioti

    Published 2024-10-01
    “…Finally, we applied the functional green light-emitting PLED devices based on the two studied materials for the detection of Rhodamine 6G. …”
    Get full text
    Article
  4. 1384

    Pediatric Adenotonsillectomy Trial for Snoring (PATS): protocol for a randomised controlled trial to evaluate the effect of adenotonsillectomy in treating mild obstructive sleep-di... by Rui Wang, Jessie P. Bakker, Ronald D. Chervin, Susan L. Garetz, Fauziya Hassan, Stacey L. Ishman, Ron B. Mitchell, Michael G. Morrical, Syed K. Naqvi, Jerilynn Radcliffe, Emily I. Riggan, Carol L. Rosen, Kristie Ross, Michael Rueschman, Ignacio E. Tapia, H. Gerry Taylor, David A. Zopf

    Published 2020-03-01
    “…The study’s coprimary endpoints are (1) change from baseline in executive behaviour relating to self-regulation and organisation skills as measured by the Behavioural Rating Inventory of Executive Function (BRIEF) Global Composite Score (GEC); and (2) change from baseline in vigilance as measured on the Go-No-Go (GNG) signal detection parameter (d-prime). …”
    Get full text
    Article
  5. 1385

    Predicting the Likelihood of Operational Risk Occurrence in the Banking Industry Using Machine Learning Algorithms by Hamed Naderi, Mohammad Ali Rastegar Sorkhe, Bakhtiar Ostadi, Mehrdad Kargari

    Published 2025-12-01
    “…Machine learning models can process complex datasets, identify hidden patterns, and facilitate early risk detection, enabling banks to implement preventive measures before risks materialize. …”
    Get full text
    Article
  6. 1386

    Antioxidant Activity and Potential Bioactive Peptides from Skin Protein Hydrolysate of Yellowfin Tuna (<I>Thunnus albacares</I>) by Sitti Hardiyanti Rachman, Joko Santoso, Sugeng Heri Suseno

    Published 2023-04-01
    “…FPH possesses a molecular weight of 10.15-48.50 kDa. Functional groups detected were amides A, B, I, II, and III. …”
    Get full text
    Article
  7. 1387

    Granular analysis of pathways to care and durations of untreated psychosis: A marginal delay model. by Walter S Mathis, Maria Ferrara, Shadie Burke, Emily Hyun, Fangyong Li, Bin Zhou, John Cahill, Emily R Kline, Matcheri S Keshavan, Vinod H Srihari

    Published 2022-01-01
    “…Marginal-delay, or the portion of overall delay attributable to a specific node, was computed as the number of days between the start dates of contiguous nodes on the PTC. Sources of delay within the network of care were quantified and patient characteristic (sex, age, race, income, insurance, living, education, employment, and function) influences on such delays were analyzed via bivariate and mixed model testing.…”
    Get full text
    Article
  8. 1388

    A Hidden Pulse: Uncovering a New Timing Signal in Cygnus X-1 with AstroSat by Sandeep K. Rout, Federico García, Mariano Méndez, Abhay Kumar, Santosh Vadawale, David M. Russell, Pei Jin

    Published 2025-01-01
    “…This dip in coherence, which we detect for the first time in Cygnus X-1 at energies above 3 keV, appears in a state in which the source shows high-amplitude radio variability and significant hard X-ray polarization. …”
    Get full text
    Article
  9. 1389

    Melatonin: A Novel Indolamine in Oral Health and Disease by V. K. Chava, K. Sirisha

    Published 2012-01-01
    “…Recent studies, by Claustrat et al. (2005), detected few extrapineal sources of melatonin like retina, gastrointestinal tract, and salivary glands. …”
    Get full text
    Article
  10. 1390

    De Novo Synthesis of Anticholinergic Hyoscyamine and Scopolamine in <i>Nicotiana benthamiana</i> Based on Elucidating Tropane Alkaloid Biosynthetic Pathway of <i>Anisodus luridus</... by Mengling Wen, Junlan Zeng, Fei Qiu, Fangyuan Zhang, Zhihua Liao

    Published 2024-10-01
    “…Its high yield of hyoscyamine makes <i>A. luridus</i> a valuable plant source for commercially producing TAs. In this study, we conduct homologous gene research across transcriptome data of different tissues together with functionally tested sequences in <i>Atropa belladonna</i> as a reference and identify 13 candidate genes for TAs biosynthesis in <i>A. luridus</i>. …”
    Get full text
    Article
  11. 1391

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  12. 1392

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  13. 1393
  14. 1394

    Human Supernumerary Teeth-Derived Apical Papillary Stem Cells Possess Preferable Characteristics and Efficacy on Hepatic Fibrosis in Mice by Jun Yao, Nan Chen, Xiaojing Wang, Leisheng Zhang, Jiali Huo, Ying Chi, Zongjin Li, Zhongchao Han

    Published 2020-01-01
    “…Dental tissue has been acknowledged as an advantaged source for high-quality dental pulp stem cell (DPSC) preparation. …”
    Get full text
    Article
  15. 1395
  16. 1396
  17. 1397

    Phytochemical Profiling and Antioxidant Activity of True Leaves and Cotyledons of <i>Adenocaulon himalaicum</i> by Sang-Yun Lee, Nari Yoon, Neil Patrick Uy, Chung-Ho Choi, Sanghyun Lee

    Published 2025-03-01
    “…The young leaf of <i>A. himalaicum</i> has a rich phytochemical profile and robust antioxidant activity; hence, it has potential as natural antioxidant sources for human health and valuable pharmacognosy raw materials for pharmaceutical and functional food applications.…”
    Get full text
    Article
  18. 1398

    Mobile phone encryption as an obstacle in criminal investigation: Review of comparative solutions by Pisarić Milana

    Published 2021-01-01
    “…In detecting criminal offences, the police increasingly rely on electronic evidence. …”
    Get full text
    Article
  19. 1399
  20. 1400

    Fine-grained access control method for private data in android system by Gang Liu, Guofang Zhang, Quan Wang, Shaomin Ji, Lizhi Zhang

    Published 2019-03-01
    “…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
    Get full text
    Article