Search alternatives:
resource » source (Expand Search)
sourcess » source (Expand Search), success (Expand Search)
Showing 861 - 880 results of 1,810 for search '(( sources detection functions ) OR (( resource OR sourcess) detection function ))', query time: 0.31s Refine Results
  1. 861

    Complexity of immunobiology of tumor necrosis factor and novel anti-TNF therapy by S. А. Nedospasov

    Published 2023-06-01
    “…Systemic anti-cytokine therapy is known to be accompanied by undesirable side effects, which can hypothetically be explained by the neutralization of these protective functions. Thus, we developed prototypes of TNF blockers which limit the bioavailability of this cytokine only from its main “pathogenic” source – myeloid cells. …”
    Get full text
    Article
  2. 862

    Leveraging Blockchain Technology With Enhanced MDSVA for Robust Meteorological Sensor Data Validation by Md Abdullah Al Mamun, Mei Li, Bijon Kumar Pramanik, Faisal Hussain, A. Z. M. Shakilur Rahman

    Published 2025-01-01
    “…Our enhanced MDSVA introduces a sophisticated five-component validation function that simultaneously addresses drift and noise compensation, environmental adaptation, periodic variations, dynamic thresholds, and transient adjustments. …”
    Get full text
    Article
  3. 863

    LeafDPN: An Improved DPN Model for the Identification of Bacterial Blight in Soybean in Natural Environments by Rui Cong, Ying Xu, Hao Su, Jiaying Zhou, Yuxi Hu, Dawei Xin, Qingshan Chen, Rongsheng Zhu, Shuang Song

    Published 2024-12-01
    “…<i>glycinea</i>, is one of the most devastating diseases in soybean with significant yield losses ranging from 4% to 40%. The timely detection of BBS is the foundation for disease control. …”
    Get full text
    Article
  4. 864

    Adaptive conflict resolution for IoT transactions: A reinforcement learning-based hybrid validation protocol by Mohammad A. Al Khaldy, Ahmad Nabot, Ahmad al-Qerem, Issam Jebreen, Abdulbasit A. Darem, Asma A. Alhashmi, Mohammad Alauthman, Amjad Aldweesh

    Published 2025-07-01
    “…The RL-based mechanism continuously adapts decision-making by learning from system states, prioritizing transactions, and dynamically resolving conflicts using a reward function that accounts for key performance parameters, including the number of conflicting transactions, cost of aborting transactions, temporal validity constraints, and system resource utilization. …”
    Get full text
    Article
  5. 865

    Assessing chronic obstructive pulmonary disease risk based on exhalation and cough sounds by Geyi Wen, Chenshuo Wang, Wei Zhao, Jinliang Meng, Yanyan Xu, Ruiqi Wang, Zijing Zeng

    Published 2025-07-01
    “…Following this, each individual completed pulmonary function tests and participated in questionnaire surveys. …”
    Get full text
    Article
  6. 866
  7. 867

    High-Voltage CVT Fault Diagnosis Based on Effective Data Recognition and Multi-dimensional Information Fusion by Huishan ZHANG

    Published 2025-05-01
    “…In view of the poor identification of the effective data in online monitoring of high-voltage capacitor voltage transformer (CVT), this paper proposes a method for effective data identification based on the analysis of data correlation coefficients, with utilization of the data characteristics that multiple online monitoring data sources exhibit linear correlation. To address the prevalent problem in current high-voltage CVT fault diagnosis, such as limited information sources, poor accuracy, and significant interference in partial discharge devices leading to compromised fault signal detection and accuracy, a fault diagnosis method based on multi-dimensional information fusion is proposed. …”
    Get full text
    Article
  8. 868

    Identification of key genes associated with mesocotyl length through a genome-wide association study in rice by Li Xue, Li Xue, Sen Wang, Sen Wang, Qiuyu Zhang, Qiuyu Zhang, Bing Han, Di Cui, Longzhi Han, Jianxin Deng, Xiaoding Ma

    Published 2025-05-01
    “…In this study, 300 rice germplasm resources with a wide range of sources were selected as experimental materials. …”
    Get full text
    Article
  9. 869

    Specific performance of IDT edge fingers by E. DANICKI, T, GAFKA

    Published 2014-05-01
    “…The theory shows that the edge strips of the system works differently as compared with these positioned inside the system. The familiar δ-function model however, can still be applied provided that the δ-sources of SAW are properly scaled and shifted from their position at the centres of the strips. …”
    Get full text
    Article
  10. 870

    Identification of multiple power quality disturbances in hybrid microgrid using deep stacked auto-encoder based bi-directional LSTM classifier by Ravi Kumar Jalli, Lipsa Priyadarshini, P.K. Dash, Ranjeeta Bisoi

    Published 2025-03-01
    “…In recent years microgrid technology has created widespread interest for the integration of renewable energy sources into main utility grid to supply clean energy to the end users. …”
    Get full text
    Article
  11. 871
  12. 872

    Bovine PMN responses to extracellular vesicles released by Besnoitia besnoiti tachyzoites and B. besnoiti-infected host cells by Gabriel Espinosa, Constanza Salinas-Varas, Lisbeth Rojas-Barón, Christian Preußer, Elke Pogge von Strandmann, Ulrich Gärtner, Iván Conejeros, Carlos Hermosilla, Anja Taubert

    Published 2024-12-01
    “…Therefore, we tested whether exposure of bovine PMN to EVs from different cellular sources affects classical PMN effector functions and cytokine/chemokine secretion. …”
    Get full text
    Article
  13. 873

    Synergizing Multi-Temporal Remote Sensing and Systemic Resilience for Rainstorm–Flood Risk Zoning in the Northern Qinling Foothills: A Geospatial Modeling Approach by Dong Liu, Jiaqi Zhang, Xin Wang, Jianbing Peng, Rui Wang, Xiaoyan Huang, Denghui Li, Long Shao, Zixuan Hao

    Published 2025-06-01
    “…This framework quantitatively evaluates the nonlinear response mechanisms of town–village systems to flood disasters, emphasizing the synergistic effects of spatial scale, morphology, and functional organization. The proposed framework uniquely integrates three innovative modules: (1) a hybrid risk identification engine combining normalized difference vegetation index (NDVI) temporal anomaly detection and spatiotemporal hotspot analysis; (2) a morpho-functional resilience quantification model featuring a newly developed spatial morphological resilience index (SMRI) that synergizes landscape compactness, land-use diversity, and ecological connectivity through the entropy-weighted analytic hierarchy process (AHP); and (3) a dynamic scenario simulator embedding rainfall projections into a coupled hydrodynamic model. …”
    Get full text
    Article
  14. 874

    Mobile phone encryption as an obstacle in criminal investigation: Review of comparative solutions by Pisarić Milana

    Published 2021-01-01
    “…In detecting criminal offences, the police increasingly rely on electronic evidence. …”
    Get full text
    Article
  15. 875
  16. 876

    Maximum Entropy Principle Based on Bank Customer Account Validation Using the Spark Method by Xiaorong Qiu, Ye Xu, Yingzhong Shi, S. Kannadhasan Deepa, S. Balakumar

    Published 2023-01-01
    “…This research works in the field of money laundering detection from real bank data. Banking data analysis is a complex process that involves information gathered from various sources, mainly in terms of personality, such as bills or bank account transactions which have qualitative characteristics such as the testimony of eyewitnesses. …”
    Get full text
    Article
  17. 877

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  18. 878

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  19. 879

    Motivation and stimulation of employment specialists in the sphere of information technologies by S. Bazhenov

    Published 2016-04-01
    “…In conducting this study the main sources of raw data served as the information contained in scientific, reference, periodical literature on the subject in question, including the sources of information and telecommunications network "Internet". …”
    Get full text
    Article
  20. 880

    Renal Biopsy Pathological Tissue Segmentation: A Comprehensive Review and Experimental Analysis by Yan Liu, Taiping Wang, Xinxin He, Wei Wang, Qiang He, Juan Jin

    Published 2025-01-01
    “…This study provides a novel technical framework for precise renal pathological tissue segmentation and lays the foundation for future lesion detection and intelligent diagnostic applications.…”
    Get full text
    Article