Search alternatives:
selection » detection (Expand Search)
resource » source (Expand Search)
sourcess » source (Expand Search), success (Expand Search)
Showing 1,461 - 1,480 results of 2,814 for search '(( sources selection functions\ ) OR ((\ resource OR sourcess) selection function\ ))', query time: 0.34s Refine Results
  1. 1461

    Incorporating Non-Coding Annotations into Rare Variant Analysis. by Tom G Richardson, Colin Campbell, Nicholas J Timpson, Tom R Gaunt

    Published 2016-01-01
    “…<h4>Methods & results</h4>We conducted a candidate gene analysis using the UK10K sequence and lipids data, filtering according to functional annotations using the resource CADD (Combined Annotation-Dependent Depletion) and contrasting results with 'nonsynonymous' and 'loss of function' consequence analyses. …”
    Get full text
    Article
  2. 1462

    TOP: A Combined Logical and Physical Obfuscation Method for Securing Networks-on-Chip Against Reverse Engineering Attacks by Mona Hashemi, Siamak Mohammadi, Trevor E. Carlson

    Published 2025-01-01
    “…First, our centralized approach combines power-gating and structure obfuscation, ensuring efficiency and scalability to corrupt the function and traffic pattern of the network when an incorrect key is presented. …”
    Get full text
    Article
  3. 1463

    A mixed-method approach to develop an eco-robust supply chain management framework for Bangladeshi RMG industries by Md Al Amin, Roberto Baldacci

    Published 2025-06-01
    “…The methodology employs a mixed-method approach: expert insights were collected and prioritized using the Analytical Hierarchy Process to rank ERSCM strategies, which were then mapped to sustainability and resilience goals through Quality Function Deployment. This relationship analysis was followed by a Mixed-Integer Linear Programming optimization to select cost-effective strategies that maximize eco-robust performance under budget constraints. …”
    Get full text
    Article
  4. 1464
  5. 1465

    Chromosome-level genome sequencing and assembly of the parasitoid wasp Leptopilina myrica by Zhi Dong, Zixuan Xu, Junwei Zhang, Yulong Guo, Qichao Zhang, Lan Pang, Ting Feng, Wenqi Shi, Yifeng Sheng, Jianhua Huang, Jiani Chen

    Published 2025-02-01
    “…Despite their ecological significance, the genomic basis of host selection and parasitism in this genus remains underexplored. …”
    Get full text
    Article
  6. 1466

    The role of oxygenation in kidney and liver machine perfusion by M. S. Novruzbekov, A. G. Balkarov, E. Yu. Anosova, I. V. Dmitriev, Yu. A. Anisimov, N. S. Zhuravel, E. V. Klychnikova, A. S. Bogdanova, B. I. Yaremin

    Published 2023-12-01
    “…An analysis of literature sources in English and Russian from 2009 to 2023 on this topic was performed in the databases PubMed, MEDLINE, Google Scholar. …”
    Get full text
    Article
  7. 1467

    Comparative analysis of anthocyanin content in various tomato samples in connection with breeding by E. A. Dzhos, M. I. Mamedov, O. N. Pyshnaya, N. A. Golubkina, O. V. Verba, A. A. Matyukina

    Published 2022-12-01
    “…It has been shown that selection for high content of anthocyanins can be performed at various stages of fruit ripening (large ripe fruit, blangetongue, biological ripeness), selecting the most intense colouring. …”
    Get full text
    Article
  8. 1468
  9. 1469

    Routing algorithm for heterogeneous computing force requests based on computing first network by ZHANG Gang, LI Xi

    Published 2025-02-01
    “…By constructing a solution matrix and utilizing evaluation functions, random selection of feasible solutions, and the principle of low demand priority avoidance, a set of feasible solution sets was ultimately found. …”
    Get full text
    Article
  10. 1470

    Memory Mining and Spatial Transformation of Daily Landscape in Renewal of Tianjin Old City by Chunyan ZHANG, Xinyi ZHANG, Tianying HOU

    Published 2025-03-01
    “…Three novels by renowned Tianjin author Feng Jicai — Yin-Yang Eight Trigams, Three-Inch Golden Lotus, and Faces in the Crowd — are selected as primary data sources. Through text mining and semantic sentiment analysis, these works reveal three distinct emotional characteristics of daily landscapes. 1) Bustling Scenes: Positive emotional spaces, such as religious sites and venues associated with traditional artisans and eccentric figures, reflect the region’s commitment to preserving traditions and fostering a sense of collective enjoyment. …”
    Get full text
    Article
  11. 1471

    The MinDag app for symptom monitoring and feedback to patients and clinicians during the initial treatment of bipolar disorder – a feasibility study by Margrethe Collier Høegh, Stine Holmstul Glastad, Siv Hege Lyngstad, Magnus Johan Engen, Sofie Ragnhild Aminoff, Ingrid Melle, Thomas Bjella, Trine Vik Lagerberg

    Published 2025-04-01
    “…Development of digital tools to support the treatment of bipolar disorder and other mental health conditions is resource demanding, and there is a need to clarify criteria to establish proof of concept to guide the selection of tools for upscaling and implementation.…”
    Get full text
    Article
  12. 1472

    Exome analysis reveals species divergence in TYR and identifies species genetic markers in five endemic Macaca species on Sulawesi Island by Xiaochan Yan, Nami Arakawa, Kanthi Arum Widayati, Laurentia Henrieta Permita Sari Purba, Fahri Fahri, Bambang Suryobroto, Yohey Terai, Hiroo Imai

    Published 2025-07-01
    “…Additionally, it explores how these genetic differences influence biological functions, and identifies species-specific genetic markers for species identification and conservation. …”
    Get full text
    Article
  13. 1473

    A system for generating chatbots to support learning in the field of exact sciences using generative artificial intelligence models by Oleksandr Prokhorov, Dmytro Shymko, Olena Kuzminska, Andrey Chukhray, Oleksii Shatalov, Oleksandr Kholodniak

    Published 2025-05-01
    “…The objectives include: analyzing the challenges and peculiarities of creating chatbots and preparing high-quality datasets; developing the structure and describing the functionality of the chatbot generation system; providing examples of creating various types of chatbots; conducting experiments to determine the effectiveness and cost of chatbot generation. …”
    Get full text
    Article
  14. 1474

    Seeing Beyond Noise: Improving Cryptocurrency Forecasting with Linear Bias Correction by Sibtain Syed, Syed Muhammad Talha, Arshad Iqbal, Naveed Ahmad, Mohammed Ali Alshara

    Published 2024-12-01
    “…The proposed methodology includes collecting cryptocurrency data and precious metal data from Coindesk and BullionVault, respectively, and then finding the optimal model input combination for each cryptocurrency by lag adjustment and correlating feature selection. Hyperparameter tuning was performed by trial-and-error technique, and an early stopping function was applied to minimize time and space complexity. …”
    Get full text
    Article
  15. 1475

    Mitigating malicious denial of wallet attack using attribute reduction with deep learning approach for serverless computing on next generation applications by Amal K. Alkhalifa, Mohammed Aljebreen, Rakan Alanazi, Nazir Ahmad, Sultan Alahmari, Othman Alrusaini, Ali Alqazzaz, Hassan Alkhiri

    Published 2025-05-01
    “…Abstract Denial of Wallet (DoW) attacks are one kind of cyberattack whose goal is to develop and expand the financial sources of a group by causing extreme costs in their serverless computing or cloud environments. …”
    Get full text
    Article
  16. 1476

    ANALISIS STAKEHOLDERS DALAM PENGEMBANGAN PROGRAM DIKLAT DI BALAI DIKLAT APARATUR KEMENTERIAN KELAUTAN DAN PERIKANAN STAKEHOLDERS ANALYSIS IN DEVELOPMENT OF TRAINING PROGRAM ON TRAI... by Yudistira Adi Nugroho

    Published 2019-10-01
    “…Data retrieval is done by means of field research through interviews with several informants. The selection of informants is based on purposive sampling technique, namely the technique of selecting informants to get data sources based on people who are considered to know the best about what the researchers expect. …”
    Get full text
    Article
  17. 1477

    ANALISIS STAKEHOLDERS DALAM PENGEMBANGAN PROGRAM DIKLAT DI BALAI DIKLAT APARATUR KEMENTERIAN KELAUTAN DAN PERIKANAN STAKEHOLDERS ANALYSIS IN DEVELOPMENT OF TRAINING PROGRAM ON TRAI... by Yudistira Adi Nugroho

    Published 2019-10-01
    “…Data retrieval is done by means of field research through interviews with several informants. The selection of informants is based on purposive sampling technique, namely the technique of selecting informants to get data sources based on people who are considered to know the best about what the researchers expect. …”
    Get full text
    Article
  18. 1478

    Re-Infection Outcomes Following One- And Two-Stage Surgical Revision of Infected Knee Prosthesis: A Systematic Review and Meta-Analysis. by Setor K Kunutsor, Michael R Whitehouse, Erik Lenguerrand, Ashley W Blom, Andrew D Beswick, INFORM Team

    Published 2016-01-01
    “…<h4>Design</h4>Systematic review and meta-analysis.<h4>Data sources</h4>MEDLINE, EMBASE, Web of Science, Cochrane Library, reference lists of relevant studies to August 2015, and correspondence with investigators.…”
    Get full text
    Article
  19. 1479
  20. 1480

    Price transmission and market integration analysis of black gram (urad dal) across major Indian states by Sukhvir Singh, Amit Guleria, Parvender Sheoran, Pankaj Sood, Vishal Mahajan, Dharminder Kumar, Satbir Singh, Gurdeep Singh, Rajesh K. Rana

    Published 2025-05-01
    “…Various statistical tools, including CAGR, decomposition analysis, instability analysis, seasonal indices, correlation analysis, Johansen co-integration, Granger causality, Vector Error Correction Model (VECM), impulse response function, and variance decomposition, were used for data analysis.ResultsThe findings indicate that black gram production and price dynamics are influenced by multiple factors. …”
    Get full text
    Article