Search alternatives:
resource » source (Expand Search)
resources » sources (Expand Search)
Showing 1,001 - 1,020 results of 2,295 for search '(( sources selection functions\ ) OR (( resource OR resources) detection function\ ))', query time: 0.28s Refine Results
  1. 1001

    Estimating fish stock biomass using a Bayesian state-space model: accounting for catchability change due to technological progress by Makoto Nishimoto, Yoshinori Aoki, Naoto Matsubara, Paul Hamer, Yuichi Tsuda

    Published 2024-12-01
    “…The assessment of trends in fish stocks using long-term time-series data is important for effective fisheries resource management. Despite technological advancements in recent decades, the resulting increase in fisheries catch potential with applied effort is often not adequately considered in stock assessments. …”
    Get full text
    Article
  2. 1002

    FORECASTING THE GROUNDWATER LEVEL OF CEMENT RAW MATERIALS DEPOSIT BASED ON DYNAMIC NEIGHBORHOOD MODELS by I. A. Sedykh

    Published 2018-09-01
    “…After the parametric identification on the teaching data selection, the mathematical model is checked on the test sample.Discussion and Conclusions. …”
    Get full text
    Article
  3. 1003
  4. 1004
  5. 1005
  6. 1006
  7. 1007

    Speech etiquette situation of apology in classes of Russian as a foreign language (on the example of Asya Petrova's story «Sorry, Fool») by Zhanna K. Gaponova, Anastasiya A. Serogodskaya

    Published 2023-08-01
    “…Since reading as a kind of speech activity is connected with the cognitive function of the language, the proper selection of texts in the classes of Russian as a foreign language contributes to the application of the factual information contained in them in practice, as well as increasing linguocountryological competence of students. …”
    Get full text
    Article
  8. 1008

    Comparative Analysis Research Methods of Political Discourse by Ya. Yu. Demkina

    Published 2021-06-01
    “…The use of discourse analysis to study political discourse reveals the functions of discourse, for example, manipulative, selective and combined functions related to political goals. …”
    Get full text
    Article
  9. 1009

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  10. 1010

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  11. 1011

    Contaminants in the Urban Environment: Dioxins by Yun-Ya Yang, Gurpal S. Toor

    Published 2015-08-01
    “…Long-term exposure to dioxins can harm immune system, nervous system, endocrine system, and reproductive functions. This 7-page fact sheet discusses the sources, emission trends, and impacts of dioxins as well as the ways to minimize exposure to dioxins. …”
    Get full text
    Article
  12. 1012

    Contaminants in the Urban Environment: Dioxins by Yun-Ya Yang, Gurpal S. Toor

    Published 2015-08-01
    “…Long-term exposure to dioxins can harm immune system, nervous system, endocrine system, and reproductive functions. This 7-page fact sheet discusses the sources, emission trends, and impacts of dioxins as well as the ways to minimize exposure to dioxins. …”
    Get full text
    Article
  13. 1013

    Effect of Knowledge Sharing on Success of IT Outsourcing by فرج‌اله رهنورد, جلیل خاوندکار

    Published 2009-02-01
    “…By outsourcing, organizations can focus on core functions, decrease their operational costs and technology risk, and to use external sources to achieve the organizational objectives. …”
    Get full text
    Article
  14. 1014
  15. 1015

    Adverse effects of immunosuppressive therapy after kidney transplant by S. V. Popov, R. G. Guseinov, K. V. Sivak, V. V. Perepelitsa, I. O. Schmidt, N. S. Bunenkov, T. A. Lelyavina

    Published 2025-03-01
    “…This paper reviews the sources and generality of knowledge regarding the adverse effects of immunosuppressive therapy, which play an important role in the full functioning of a transplant. …”
    Get full text
    Article
  16. 1016
  17. 1017

    Devices and tasks involved in the objective assessment of standing dynamic balancing - A systematic literature review. by Bálint Petró, Alexandra Papachatzopoulou, Rita M Kiss

    Published 2017-01-01
    “…<h4>Study selection</h4>Studies had to use a dynamic balancing device and a task described in detail. …”
    Get full text
    Article
  18. 1018

    The reliability of witness memories: a review of the factors influencing accuracy in the forensic context by João Miguel Alves Ferreira, Sergii Tukaiev

    Published 2025-06-01
    “… Witness memory plays a crucial role in many judicial processes, often being considered one of the main sources of evidence in criminal investigations. However, the reliability of memories reported by witnesses has been widely debated in the scientific literature [1][2][5]. …”
    Get full text
    Article
  19. 1019

    Assessment in education: Current trends, problems and contradictions (review of scientific publications) by I. B. Shmigirilova, A. S. Rvanova, O. V. Grigorenko

    Published 2021-06-01
    “…The scientific papers of the last thirty years, revealing the issues of the education process assessment, have been used in the research. Sources were selected through the methods of descriptive and bibliometric analysis. …”
    Get full text
    Article
  20. 1020

    The role of internal auditors in preventing financial fraud in the Republic of Serbia by Jeremić Nebojša, Jakovljević Nemanja

    Published 2023-01-01
    “…The findings and recommendations presented in the paper can serve as a valuable resource for policymakers, regulatory bodies and organizations seeking to strengthen their financial fraud defense mechanisms and their internal audit function.…”
    Get full text
    Article