Search alternatives:
resource » source (Expand Search)
Showing 381 - 400 results of 2,992 for search '(( sources selection function\ ) OR (( resource OR sources) detection functions\ ))', query time: 0.37s Refine Results
  1. 381

    The functional mechanisms of phosphite and its applications in crop plants by Zhenyi Li, Xiangjiu Kong, Zhiqiang Zhang, Fang Tang, Mingjiu Wang, Mingjiu Wang, Yan Zhao, Fengling Shi

    Published 2025-04-01
    “…Notably, ptxD also acts as an ideal selectable marker because its resistant is specific to Phi, thereby eliminating the risk of false positive clones. …”
    Get full text
    Article
  2. 382

    Development of curd semi-finished product with functional properties by L. Yu. Lavrova, E. L. Bortsova, S. A. Ermakov

    Published 2023-09-01
    “…Thanks to the research done, a curd product with functional properties and high quality and safety indicators was obtained, which can be recommended for feeding various groups of the adult population and in the diets of therapeutic and preventive nutrition.…”
    Get full text
    Article
  3. 383

    A lightweight object detection approach based on edge computing for mining industry by Muhammad Wahab Hanif, Zhanli Li, Zhenhua Yu, Rehmat Bashir

    Published 2024-11-01
    “…These enhancements enable more accurate and efficient detection in resource‐constrained edge environments, contributing to safer and more reliable monitoring in coal mining operations.…”
    Get full text
    Article
  4. 384

    Feature selection using a multi-strategy improved parrot optimization algorithm in software defect prediction by Qi Fei, Guisheng Yin, Zhian Sun

    Published 2025-04-01
    “…Finally, to further enhance the classification performance of defect prediction, a heterogeneous data stacking ensemble learning algorithm (HEDSE) based on feature selection is proposed. Experimental evaluations on 16 open-source software defect datasets indicate that the proposed HEDSE outperforms existing methods, providing a novel and effective solution for software defect prediction. …”
    Get full text
    Article
  5. 385

    The Host Galaxies of Pulsar Timing Array Sources: Converting Supermassive Black Hole Binary Parameters into Electromagnetic Observables by Niccolò Veronesi, Maria Charisi, Stephen R. Taylor, Jessie Runnoe, Daniel J. D’Orazio

    Published 2025-01-01
    “…However, the large uncertainty in source localization will make the identification of its host environment challenging. …”
    Get full text
    Article
  6. 386
  7. 387
  8. 388
  9. 389

    Rapid urban health security assessment tool: a new resource for evaluating local-level public health preparedness by Rebecca Katz, Matthew R Boyce

    Published 2020-06-01
    “…Plans and policies for responding to public health emergencies are generally framed at higher levels of governance, but developing, improving and sustaining the capacities necessary for implementing these policies is a direct function of local-level authorities. Evaluating local-level public health capacities is an important process for identifying strengths and weaknesses that can impact the preparedness for, detection of and response to health security threats. …”
    Get full text
    Article
  10. 390

    Assessing the stability of indoor farming systems using data outlier detection by Jean Pompeo, Ziwen Yu, Chi Zhang, Songzi Wu, Ying Zhang, Celina Gomez, Melanie Correll

    Published 2025-03-01
    “…The residual analysis highlighted that outliers could be attributed to potential issues such as sensor noise, drift, or other sources of uncertainty in data collection. Across different trials, the system displayed varying degrees of resistance to cumulative Agr.Ops, with some trials showing increased resilience over time.DiscussionThe alternative decomposition method used effectively identified outliers and provided valuable insights into the functionality of the system under different operational loads. …”
    Get full text
    Article
  11. 391

    MeStanG—Resource for High-Throughput Sequencing Standard Data Sets Generation for Bioinformatic Methods Evaluation and Validation by Daniel Ramos Lopez, Francisco J. Flores, Andres S. Espindola

    Published 2025-01-01
    “…Metagenomics analysis has enabled the measurement of the microbiome diversity in environmental samples without prior targeted enrichment. Functional and phylogenetic studies based on microbial diversity retrieved using HTS platforms have advanced from detecting known organisms and discovering unknown species to applications in disease diagnostics. …”
    Get full text
    Article
  12. 392

    Enhancing the power quality in radial electrical systems using optimal sizing and selective allocation of distributed generations. by Bachirou Bogno, Deli Goron, Nisso Nicodem, S Shanmugan, Dieudonné Kidmo Kaoga, Kitmo, Akhlaque Ahmad Khan, Yasser Fouad, Michel Aillerie

    Published 2024-01-01
    “…Accordingly, a proposed configuration system is shown in this work to inject multiple renewable energy sources (MRES) from selected regulated nodes. The feasibility of the proposed system is evaluated using particle swarm optimization (PSO), which was used to locate stable nodes and locations, sensitive to voltage fluctuations. …”
    Get full text
    Article
  13. 393

    Neural Posterior Estimation for Cataloging Astronomical Images with Spatially Varying Backgrounds and Point Spread Functions by Aakash Patel, Tianqing Zhang, Camille Avestruz, Jeffrey Regier, The LSST Dark Energy Science Collaboration

    Published 2025-01-01
    “…In experiments with semisynthetic images, we evaluate the method on key cataloging tasks: light source detection, star/galaxy separation, and flux measurement. …”
    Get full text
    Article
  14. 394

    Synthesis and properties of carbon quantum dots as an antimicrobial agent and detection of ciprofloxacin by Fangzhou Shen, Zhaoyang Lu, Kangli Yan, Kang Luo, Shuchen Pei, Pu Xiang

    Published 2025-08-01
    “…This study introduces a novel approach for the fabrication of N-CQDs derived from natural botanical sources, underscoring their potential dual functionality as fluorescent sensors and antimicrobial materials.…”
    Get full text
    Article
  15. 395

    The Bright Feature Transform for Prominent Point Scatterer Detection and Tone Mapping by Gregory D. Vetaw, Suren Jayasuriya

    Published 2025-03-01
    “…We then modify the BFT to present a difference of trigonometric functions to mitigate speckle scatterers and other random noise sources found in the imagery. …”
    Get full text
    Article
  16. 396

    TEDVIL: Leveraging Transformer-Based Embeddings for Vulnerability Detection in Lifted Code by Gary A. McCully, John D. Hastings, Shengjie Xu

    Published 2025-01-01
    “…Notably, these results are achieved when the embedding model is trained with a dataset of just 48,000 functions, demonstrating effectiveness in resource-constrained settings. …”
    Get full text
    Article
  17. 397

    Comparative Analysis of Deep Learning Models for Intrusion Detection in IoT Networks by Abdullah Waqas, Sultan Daud Khan, Zaib Ullah, Mohib Ullah, Habib Ullah

    Published 2025-07-01
    “…However, the constrained processing capacities and resource limitations of IoT networks make them especially susceptible to cyber threats. …”
    Get full text
    Article
  18. 398
  19. 399
  20. 400