Showing 1,321 - 1,340 results of 1,810 for search '(( sources detection functions ) OR (( resources OR resources) detection function ))', query time: 0.28s Refine Results
  1. 1321

    Microfluidic Nanobioplatform-Based Immunosensor for Monitoring of 25-Hydroxy Vitamin-D3 by Deepika Chauhan, Zimad Hashmi, Rishi Raj, Pratima R. Solanki

    Published 2024-01-01
    “…The use of proposed immunosensor to serum samples would allow early detection of 25-VitD _3 deficiency, particularly in rural and resource-constrained settings.…”
    Get full text
    Article
  2. 1322

    Direction of Arrival Estimation Based on the Multistage Nested Wiener Filter by Xiaodong He, Bin Tang

    Published 2015-02-01
    “…The computation of the proposed method is simple, and the number of detectable signal sources could exceed the number of antenna elements.…”
    Get full text
    Article
  3. 1323

    Accelerated low-intensity rTMS does not rescue anxiety behaviour or abnormal connectivity in young adult rats following chronic restraint stress by Lauren A. Hennessy, Bhedita J. Seewoo, Liz A. Jaeschke, Leah A. Mackie, Abbey Figliomeni, Yasmin Arena-Foster, Sarah J. Etherington, Sarah A. Dunlop, Paul E. Croarkin, Jennifer Rodger

    Published 2022-09-01
    “…Behaviour was assessed using the Elevated Plus Maze and Forced Swim Test, and functional, chemical, and structural brain changes measured using magnetic resonance imaging techniques. …”
    Get full text
    Article
  4. 1324

    The biomarker potential of circPOLD1 and its binding protein YBX1 in cervical carcinogenesis by Lu Zhao, Xin Chen, Yanan Zhang, Yixuan Cen, Tingjia Zhu, Lingfang Wang, Lili Xia, Yang Li, Xiaodong Cheng, Xing Xie, Weiguo Lu, Junfen Xu

    Published 2025-05-01
    “…Mechanistically, circPOLD1 functioned as an oncogene by binding to and phosphorylating YBX1, activating the AKT/mTOR/HIF-1α pathway to enhance glycolysis-driven tumorigenesis. …”
    Get full text
    Article
  5. 1325

    A Novel Method for Traceability of Crude Oil Leakage on Offshore Platforms Based on Improved YOLOv5 Model Multi-Target Identification and Correlation Analysis by Zhenghua Wang, Shihai Zhang, Chongnian Qu, Zongyi Zhang, Feng Sun

    Published 2025-01-01
    “…Based on the positional relationship between the spilled crude oil target and the source target detection anchor frame, the possible source targets are classified into three association levels and assigned different association weights. …”
    Get full text
    Article
  6. 1326

    Molecular mechanisms of leukemogenesis by D. A. Domninskiy

    Published 2022-11-01
    “…Such targets can be enzymes, proteins with other (non-enzymatic) functions, genomic DNA, mRNA, or, for example, certain lipid components of cell membranes. …”
    Get full text
    Article
  7. 1327

    Soil methane emission suppression control using unmanned aircraft vehicle swarm application of biochar mulch - A simulation study by Di An, Derek Hollenbeck, Kai Cao, YangQuan Chen

    Published 2023-05-01
    “…In this paper, we present a soil methane emissions suppression approach using swarms of unmanned aerial vehicles (UAVs), by spreading biochar mulch on top of the detected methane emissions area/source. Soil microorganisms can produce methane and release it into the atmosphere causing climate change such as global warming. …”
    Get full text
    Article
  8. 1328
  9. 1329

    Genotyping from targeted NGS data based on a small set of SNPs correctly matches patient samples by Deyan Yordanov Yosifov, Christof Schneider, Stephan Stilgenbauer, Daniel Mertens, Eugen Tausch

    Published 2025-07-01
    “…In two cohorts of totally 1441 patients with sequential samples, we could identify 3 sample swaps, 7 mislabelled samples (3 externally and 4 internally) and 1 mistake of unknown origin. We provide an R function for automated detection of sample swaps and mislabelling to the community as a free and open-source tool.…”
    Get full text
    Article
  10. 1330

    Blind super-resolution network based on local fuzzy discriminative loss for fabric data augmentation by Ning Dai, Xiaohan Hu, Kaixin Xu, Xudong Hu, Yanhong Yuan, Bo Cao, Luhong Shi

    Published 2025-01-01
    “…In the field of fabric defect detection, the development of algorithms has been hindered by issues such as poor quality and limited quantity of open-source datasets. …”
    Get full text
    Article
  11. 1331

    Evaluation of the authenticity of Citri Grandis Exocarpium based on metabolomics and transcriptomics by Haiting Huang, Yu Liu, Jianmu Su, Xiangxiu Liang, Hong Wu, Mei Bai

    Published 2025-01-01
    “…Flavonoids related to medicinal effects, such as naringin and hesperidin, were significantly more abundant in Huazhou pomelo than in Sanhong pomelo, with compounds such as 5-demethylnobiletin detected only in Huazhou pomelo. The integrative metabolomics and transcriptomics analysis identified 11 key structural genes and transcription factors potentially involved in flavonoid biosynthesis, providing candidate targets for functional validation. …”
    Get full text
    Article
  12. 1332

    Pediatric Adenotonsillectomy Trial for Snoring (PATS): protocol for a randomised controlled trial to evaluate the effect of adenotonsillectomy in treating mild obstructive sleep-di... by Rui Wang, Jessie P. Bakker, Ronald D. Chervin, Susan L. Garetz, Fauziya Hassan, Stacey L. Ishman, Ron B. Mitchell, Michael G. Morrical, Syed K. Naqvi, Jerilynn Radcliffe, Emily I. Riggan, Carol L. Rosen, Kristie Ross, Michael Rueschman, Ignacio E. Tapia, H. Gerry Taylor, David A. Zopf

    Published 2020-03-01
    “…The study’s coprimary endpoints are (1) change from baseline in executive behaviour relating to self-regulation and organisation skills as measured by the Behavioural Rating Inventory of Executive Function (BRIEF) Global Composite Score (GEC); and (2) change from baseline in vigilance as measured on the Go-No-Go (GNG) signal detection parameter (d-prime). …”
    Get full text
    Article
  13. 1333

    Experiments on the application of the infrasound method of remote monitoring of snow avalanches in the Khibiny Mountains by A. V. Fedorov, I. S. Fedorov, V. E. Asming, A. Yu. Motorin

    Published 2025-05-01
    “…Visual slope observations are still the main method of avalanche detection. As a result, avalanche statistics, especially in remote mountain areas, remain incomplete. …”
    Get full text
    Article
  14. 1334

    Predicting the Likelihood of Operational Risk Occurrence in the Banking Industry Using Machine Learning Algorithms by Hamed Naderi, Mohammad Ali Rastegar Sorkhe, Bakhtiar Ostadi, Mehrdad Kargari

    Published 2025-12-01
    “…Machine learning models can process complex datasets, identify hidden patterns, and facilitate early risk detection, enabling banks to implement preventive measures before risks materialize. …”
    Get full text
    Article
  15. 1335

    Venous Thromboembolism Prophylaxis in Intensive Care Units (Review) by L. V. Popova, T. B. Kondratieva, M. Z. Kanevskaya, T. L. Aleinikova, E. S. Zykova, А. V. Krivova, A. M. Kuznetsov

    Published 2020-07-01
    “…VTE is common and potentially life-threatening in patients admitted to ICU, even in spite of preventive care.The purpose of the review is to justify the necessity of preventive care for venous thromboembolism in ICU patients.From over 300 initially selected sources of literature databases (Scopus, Web of science, RSCI, etc.), 99 sources were chosen including 69 that were published during the last five years (2015-2020). …”
    Get full text
    Article
  16. 1336

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  17. 1337

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  18. 1338
  19. 1339
  20. 1340