Search alternatives:
resource » source (Expand Search)
Showing 321 - 340 results of 2,685 for search '(( sources detection functions\ ) OR (( success OR resource) detection function\ ))', query time: 0.24s Refine Results
  1. 321

    Joint Multifractal Analysis and Source Testing of River Level Records Based on Multifractal Detrended Cross-Correlation Analysis by Liang Wu, Manling Wang, Tongzhou Zhao

    Published 2020-01-01
    “…It is important for the detection of change in multifractality in space. Besides, the cross-correlations in two analyzed series make the analysis of sources of joint multifractality difficult. …”
    Get full text
    Article
  2. 322

    Rapid urban health security assessment tool: a new resource for evaluating local-level public health preparedness by Rebecca Katz, Matthew R Boyce

    Published 2020-06-01
    “…Plans and policies for responding to public health emergencies are generally framed at higher levels of governance, but developing, improving and sustaining the capacities necessary for implementing these policies is a direct function of local-level authorities. Evaluating local-level public health capacities is an important process for identifying strengths and weaknesses that can impact the preparedness for, detection of and response to health security threats. …”
    Get full text
    Article
  3. 323

    Algorithms for Automatic Detection and Location of Infrasound Events in the PSDL System by Asming Vladimir Ernestovich, Fedorov Andrey Viktorovich

    Published 2024-12-01
    “…An algorithm for detecting infrasound signals by calculating the cross-correlation function between records of individual sensors in a array is described. …”
    Get full text
    Article
  4. 324

    Code vulnerability detection method based on graph neural network by Hao CHEN, Ping YI

    Published 2021-06-01
    “…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
    Get full text
    Article
  5. 325

    Exploring RNA cargo in extracellular vesicles for pleural mesothelioma detection by Agnieszka Kraft, Michaela B. Kirschner, Vanessa Orlowski, Manuel Ronner, Caroline Bodmer, Valentina Boeva, Isabelle Opitz, Mayura Meerang

    Published 2025-02-01
    “…Conclusions This is the first study to characterize the transcriptomic profile of EVs secreted by PM primary cell cultures, demonstrating their potential as biomarker source for early detection. Further investigation of the functional role of PM-EVs will provide new insights into disease biology and therapeutic avenues.…”
    Get full text
    Article
  6. 326

    Polymethacrylate Sphere-Based Assay for Ultrasensitive miRNA Detection by Samira Hosseini, Patricia Vázquez-Villegas, Richard C. Willson, Marco Rito-Palomares, Margarita Sanchez-Dominguez, Leo H. Koole, Marc J. Madou, Sergio O. Martínez-Chapa

    Published 2020-01-01
    “…Furthermore, MiR159 presence, which is known to be inversely correlated to breast cancer incidence and progression, was successfully detected in a competitive assay, which is promising for upgrading the current assay to clinical use.…”
    Get full text
    Article
  7. 327

    Difficulties in generating specific antibodies for immunohistochemical detection of nitrosylated tubulins. by Anton Kamnev, Matthias Muhar, Martina Preinreich, Hermann Ammer, Friedrich Propst

    Published 2013-01-01
    “…We suggest that different tagging strategies or alternative methods such as fluorescence resonance energy transfer techniques might be more successful.…”
    Get full text
    Article
  8. 328

    Schizophrenia Detection and Classification: A Systematic Review of the Last Decade by Arghyasree Saha, Seungmin Park, Zong Woo Geem, Pawan Kumar Singh

    Published 2024-11-01
    “…The SZ symptoms can significantly impair daily functioning, underscoring the need for advanced diagnostic tools. …”
    Get full text
    Article
  9. 329
  10. 330

    The Host Galaxies of Pulsar Timing Array Sources: Converting Supermassive Black Hole Binary Parameters into Electromagnetic Observables by Niccolò Veronesi, Maria Charisi, Stephen R. Taylor, Jessie Runnoe, Daniel J. D’Orazio

    Published 2025-01-01
    “…However, the large uncertainty in source localization will make the identification of its host environment challenging. …”
    Get full text
    Article
  11. 331
  12. 332
  13. 333

    Detection of the Trajectories of Moving Rectilinearly Air Targets in the Secondary Processing of Radar Information by G. S. Nakhmanson, D. S. Akinshin

    Published 2019-12-01
    “…Introduction. The primary functions of secondary processing of radar information are to detect and maintain the trajectories of air targets (AT). …”
    Get full text
    Article
  14. 334

    Reduced graphene oxide-based electrochemical aptasensor for the multiplexed detection of imidacloprid, thiamethoxam, and clothianidin in food samples by Asma Zaid Almenhali, Pandiyaraj Kanagavalli, Marwa Abd-Ellah, Salma Khazaal, Nada El Darra, Shimaa Eissa

    Published 2025-03-01
    “…Nonetheless, no aptasensor was reported for the multiplexed detection of neonicotinoids. Herein, a graphene-based electrochemical biosensor was fabricated with three aptamers for the detection of imidacloprid, thiamethoxam, and clothianidin. …”
    Get full text
    Article
  15. 335

    MeStanG—Resource for High-Throughput Sequencing Standard Data Sets Generation for Bioinformatic Methods Evaluation and Validation by Daniel Ramos Lopez, Francisco J. Flores, Andres S. Espindola

    Published 2025-01-01
    “…Metagenomics analysis has enabled the measurement of the microbiome diversity in environmental samples without prior targeted enrichment. Functional and phylogenetic studies based on microbial diversity retrieved using HTS platforms have advanced from detecting known organisms and discovering unknown species to applications in disease diagnostics. …”
    Get full text
    Article
  16. 336

    Neural Posterior Estimation for Cataloging Astronomical Images with Spatially Varying Backgrounds and Point Spread Functions by Aakash Patel, Tianqing Zhang, Camille Avestruz, Jeffrey Regier, The LSST Dark Energy Science Collaboration

    Published 2025-01-01
    “…In experiments with semisynthetic images, we evaluate the method on key cataloging tasks: light source detection, star/galaxy separation, and flux measurement. …”
    Get full text
    Article
  17. 337

    Survey on key technologies for protective DNS service by MA Yongzheng, LI Hongtao, MA Zhongsheng, HU Weihong, ZHANG Zhongxian

    Published 2024-10-01
    “…The domain name system (DNS) is a naming service for Internet resources that provides the function of converting from domain names to IP addresses. …”
    Get full text
    Article
  18. 338

    Improving dependability with low power fault detection model for skinny-hash. by Sonal Arvind Barge, Gerardine Immaculate Mary

    Published 2024-01-01
    “…Two fault detection approaches are proposed to detect faults in cryptographic algorithms running on IoT devices. …”
    Get full text
    Article
  19. 339

    Study on lightweight strategies for L-YOLO algorithm in road object detection by Ji Hong, Kuntao Ye, Shubin Qiu

    Published 2025-03-01
    “…The demand for real-time, efficient object detection systems is growing. However, traditional algorithms often suffer from large parameter sizes and high computational costs, limiting their applicability in resource-constrained environments. …”
    Get full text
    Article
  20. 340

    The Bright Feature Transform for Prominent Point Scatterer Detection and Tone Mapping by Gregory D. Vetaw, Suren Jayasuriya

    Published 2025-03-01
    “…We then modify the BFT to present a difference of trigonometric functions to mitigate speckle scatterers and other random noise sources found in the imagery. …”
    Get full text
    Article