Showing 1,601 - 1,620 results of 3,330 for search '(( sources detection functions\ ) OR (( success OR source) selection function\ ))', query time: 0.40s Refine Results
  1. 1601

    A metabolic profiling approach to characterize and discriminate plant-based beverages and milk by Gaia Meoni, Ingrid Sousa, Leonardo Tenori, Giovanni Niero, Marta Pozza, Massimo De Marchi, Carmen L. Manuelian

    Published 2025-06-01
    “…ABSTRACT: The rising demand for nondairy and nonanimal protein sources has increased plant-based beverages (PBB) consumption. …”
    Get full text
    Article
  2. 1602

    Provenance-Finding of Dust Storms Using AVHRR Sensor Images of NOAA Satellite (Case Study: Southwest of Iran) by Mohammad Hossein Rezaei Moghaddam, Mojtaba Mahdian Boruojeni

    Published 2016-03-01
    “…Dust pollution of this area drawn to the south of Khuzestan. 4- Conclusion In general, using 24 AVHRR images and the use of detection techniques, a total 62 points were identified as the source of dust production. …”
    Get full text
    Article
  3. 1603

    Do domain-specific protein language models outperform general models on immunology-related tasks? by Nicolas Deutschmann, Aurelien Pelissier, Anna Weber, Shuaijun Gao, Jasmina Bogojeska, María Rodríguez Martínez

    Published 2024-06-01
    “…Overall, our analyzes reveal the promising potential of PLMs in modeling protein function while providing insights into their information-handling capabilities. …”
    Get full text
    Article
  4. 1604

    PAMFPN: Position-Aware Multi-Kernel Feature Pyramid Network with Adaptive Sparse Attention for Robust Object Detection in Remote Sensing Imagery by Xiaofei Yang, Suihua Xue, Lin Li, Sihuan Li, Yudong Fang, Xiaofeng Zhang, Xiaohui Huang

    Published 2025-06-01
    “…Firstly, we design a position-interactive context module (PICM) that incorporates distance-aware sparse attention and dynamic positional encoding. It selectively focuses computation on sparse targets through a decay function that suppresses background noise while enhancing spatial correlations of critical regions. …”
    Get full text
    Article
  5. 1605

    Weibull-Type Incubation Period and Time of Exposure Using <i>γ</i>-Divergence by Daisuke Yoneoka, Takayuki Kawashima, Yuta Tanoue, Shuhei Nomura, Akifumi Eguchi

    Published 2025-03-01
    “…Accurately determining the exposure time to an infectious pathogen, together with the corresponding incubation period, is vital for identifying infection sources and implementing targeted public health interventions. …”
    Get full text
    Article
  6. 1606
  7. 1607

    Investigation of TsGAN-based multimodal image fusion to augment image pre-processing abilities by Priyanka Bhatambarekar, Gayatri Phade

    Published 2025-07-01
    “…The TSGAN framework generates a unified texture map that captures essential gradient preservation into the generator’s loss function, the model successfully retains critical information about texture from the input source images. …”
    Get full text
    Article
  8. 1608

    Modelling and Forecasting Energy Efficiency Impact on the Human Health by Yuliia Matvieieva, Hedy Ben Hamida

    Published 2022-06-01
    “…In the study framework, the VOSviewer 1.6.18 tools allowed the detection of six clusters of research streams: renewable resources, sustainable development, public, energy policy, energy efficiency, and solar energy. …”
    Get full text
    Article
  9. 1609

    Preliminary Design of a GNSS Interference Mapping CubeSat Mission: JamSail by Luis Cormier, Tasneem Yousif, Samuel Thompson, Angel Arcia Gil, Nishanth Pushparaj, Paul Blunt, Chantal Cappelletti

    Published 2024-10-01
    “…First, a flexible, low-cost GNSS interference detection payload capable of characterising and geolocating the sources of radio interference regarding the E1/L1 and E5a/L5 bands will be demonstrated on a global scale. …”
    Get full text
    Article
  10. 1610

    Double-moment normalization of hail size number distributions over Switzerland by A. Ferrone, J. Kopp, M. Lainer, M. Gabella, U. Germann, A. Berne

    Published 2024-12-01
    “…These results highlight the invariance of the normalized distribution and the adaptability of the method to different data sources.</p>…”
    Get full text
    Article
  11. 1611

    THEORY AND PRACTICE OF ASSESSING THE LEVEL OF INSTABILITY OF THE EXTERNAL ENVIRONMENT OF THE ENTERPRISE IN A HYBRID WAR by I. Zapukhliak, A. Shegda, О. Mykytiuk, T. Onysenko, K. Petrenko

    Published 2022-03-01
    “…The article proposes a methodological approach to comprehensive assessment of the level of instability of environmental factors of enterprises, which, unlike others, involves the detection of instability in terms of seven components (socio-demographic, economic, technological, environmental, political, legal, ethical) on four criteria: complexity, interdependence, variability and uncertainty of factors, which makes it possible to determine their sources and nature, and thus form an effective response of the enterprise to change. …”
    Get full text
    Article
  12. 1612

    Machine learning models for clinical and structural knee osteoarthritis prediction: Recent advancements and future directions by Gabby B. Joseph, Charles E. McCulloch, Michael C. Nevitt, Nancy E. Lane, Sharmila Majumdar, Thomas M. Link

    Published 2025-09-01
    “…These evolving strategies underscore the growing potential of ML to improve the detection of early OA, individualized risk stratification, and personalized interventions in OA clinical care.…”
    Get full text
    Article
  13. 1613

    Global path planning algorithm for mining vehicles integrating simplified visibility graph and A* algorithm by ZHANG Chuanwei, LU Siyan, QIN Peilin, ZHOU Rui, ZHAO Ruiqi, YANG Jiajia, ZHANG Tianle, ZHAO Cong

    Published 2024-10-01
    “…The visual tangent points were sequentially stored in the OPEN list as nodes, and nodes were selected for the CLOSED list based on the A* algorithm's evaluation function to ensure the shortest path. …”
    Get full text
    Article
  14. 1614

    An ultra low frequency spike timing dependent plasticity based approach for reducing alcohol drinking by Anders J. Asp, Suelen Lucio Boschen, Su-Youne Chang, Jiwon Kim, Jodi L. Silvernail, J. Luis Lujan

    Published 2024-12-01
    “…Unfortunately, existing pharmacological and behavioral therapies for AUD are associated with poor success rates, with approximately 40% of individuals relapsing within three years of treatment. …”
    Get full text
    Article
  15. 1615

    Bacterial communities associated with ambrosia beetles: current knowledge and existing gaps by Juan Carlos Cambronero-Heinrichs, Juan Carlos Cambronero-Heinrichs, Peter H. W. Biedermann, Laura Besana, Andrea Battisti, Davide Rassati

    Published 2025-04-01
    “…Ambrosia beetles (Curculionidae: Scolytinae and Platypodinae) are wood-boring insects studied as examples of fungus-insect symbiosis and for their success as invasive species. While most research on their microbiota has focused on fungal associates, their bacterial communities remain largely understudied. …”
    Get full text
    Article
  16. 1616

    Phosphodiesterase 10A as a Therapeutic Target in Neuropsychopharmacology: A Review by A. R. Dorotenko, I. M. Sukhanov, G. V. Iskarevskii, A. S. Ulitina, A. A. Savchenko, M. А. Tur

    Published 2025-05-01
    “…Some researchers also believe that PDE10A inhibitors improve cognitive functions. Despite the promising results of preclinical studies, clinical trials of PDE10A inhibitors have not been successful. …”
    Get full text
    Article
  17. 1617

    FXYD2 marks and regulates maturity of β cells via ion channel-mediated signal transduction by Clarissa Tacto, Meghan Tahbaz, Andrew Salib, Shudi Wang, Fritz Cayabyab, Jinhyuk Choi, Kiyoka Kim, Yu Hamba, Harvey Perez, Paul D. Gershon, Robert Damoiseaux, Tae Gyu Oh, Eiji Yoshihara

    Published 2025-06-01
    “…These results suggest that FXYD2 marks and regulates human β cell maturation via channel-sensing signal transduction and that it can be used as a selection marker for functional heterogeneity of stem cell derived human islet organoids.…”
    Get full text
    Article
  18. 1618

    A Comparison of Feminist Term Translation Practices in Academic Journals of Gender and Women’s Studies in Turkiye by Göksenin Abdal, Tuba Ayık Akça

    Published 2022-12-01
    “…Feminist term translation brings both linguistic and pragmatic sides of translation together and turns the act of translation into a function-driven process rather than a solely form-based transfer. …”
    Get full text
    Article
  19. 1619

    The methodology of translating the metonymic images of the Resurrection in the Holy Qur’an according to Larson’s theory, the translation of Makarim Al-Shirazi and Hussain Ansaryan... by Hossein Bayat, Ali Zeighami, Sayyed Reza Mirahmadi, Ebrahim Rezapour

    Published 2022-03-01
    “…His semantic translation is a faithful translation into the source language and a reliable way to translate texts, especially religious texts. …”
    Get full text
    Article
  20. 1620

    Dynamic and efficient vehicular cloud management scheme with privacy protection by Min XIAO, Tao YAO, Yuanni LIU, Yonghong HUANG

    Published 2022-12-01
    “…The vehicular cloud (VC) formed by vehicles is used for localization processing and consumption of traffic sensing data to achieve timely intelligent traffic management.The vehicle cloud is highly dynamic, self-organizing and timely, in which the identity and location privacy of vehicle users need to be protected as this poses challenges to the vehicular cloud management.A dynamic and self-organizing vehicle cloud management scheme based on the asymmetric group key agreement protocol was designed, where the vehicle cloud is automatically formed through the self-organized group key agreement of vehicles.The group key was used to control the provision and access of vehicle cloud services, and the dynamic management of the vehicle cloud was implemented through group key update.The scheme used traceable one-time pseudonym technology to achieve anonymous authentication and conditional privacy protection of vehicle users, and the group key agreement stage only included one bilinear pair operation to achieve high efficiency.In addition, the key negotiation and update process used lightweight signatures, supporting batch verification, to achieve efficient message source authentication and integrity authentication.Then the security and efficiency of vehicle cloud communications in the self-organizing environment can be ensured.The dynamic key update mechanism of the key agreement protocol realized the dynamic joining or exiting of vehicles in the vehicle cloud, adapting to the dynamic characteristics of the vehicle cloud.Under the random oracle model and the difficult assumption of the inverse computational Diffie Hellman (ICDH) problem, it was proved that the asymmetric group key agreement scheme satisfied the selective-plaintext security.The security analysis shows that the scheme can protect the identity and location privacy of vehicle users, realize the legal tracking of malicious vehicles, and ensure the confidentiality, integrity and anti-counterfeiting of communications, as well as the forward security of vehicle cloud dynamic management.The performance comparison analysis shows that this scheme has certain advantages in communication and computing efficiency under the condition of the same function and security level.…”
    Get full text
    Article