Showing 1,361 - 1,380 results of 2,992 for search '(( sources selection functions ) OR (( resource OR source) detection function ))', query time: 0.29s Refine Results
  1. 1361

    Genetic diversity in wild species and cultivars of strawberry for the <i>FanAAMT</i> gene controlling fruit flavor volatiles by A. S. Lyzhin, I. V. Luk’yanchuk

    Published 2021-07-01
    “…‘Karmen’, ‘Ostara’, ‘Samson’, ‘Symphony’, ‘Troubadour’ and ‘Vima Tarda’, in which the functional allele of the FanAAMT gene was found. In the remaining studied strawberry genotypes the marker FanAAMT was not detected, which presumably indicates that the FanAAMT gene is absent. cells (R9.4.1).…”
    Get full text
    Article
  2. 1362

    SIMPLE: Simple Intensity Map Producer for Line Emission by Maja Lujan Niemeyer, José Luis Bernal, Eiichiro Komatsu

    Published 2023-01-01
    “…After applying a selection function to distinguish between detected and undetected galaxies, the code generates an intensity map, which can be modified with anisotropic smoothing, noise, a mask, and sky subtraction, and it calculates the power spectrum multipoles. …”
    Get full text
    Article
  3. 1363

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  4. 1364

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  5. 1365

    Life-threatening bleeding with intussusception due to gastrointestinal stromal tumor: a case report by Min Sung Kim, In Teak Woo, Young Min Jo, Jin Hyung Lee, Byung Sam Park

    Published 2019-10-01
    “…Abstract Background Massive intraluminal bleeding requires urgent intervention and management. However, the source of bleeding on the small intestine is difficult to determine. …”
    Get full text
    Article
  6. 1366

    Precision medicine in premature ovarian insufficiency: a focus on the precision therapeutic strategies for mesenchymal stem cells by Rou Wang, Fengyuan Liu, Qiuyue Liao, Jiachen Wu, Lingjuan Wang, Kezhen Li

    Published 2025-07-01
    “…Key issues include the selection of appropriate MSCs sources, the optimization of culture conditions, and the determination of optimal transplantation protocols (encompassing dosage, administration route, and timing), all of which pose significant barriers to clinical translation of MSCs. …”
    Get full text
    Article
  7. 1367

    Renal Biopsy Pathological Tissue Segmentation: A Comprehensive Review and Experimental Analysis by Yan Liu, Taiping Wang, Xinxin He, Wei Wang, Qiang He, Juan Jin

    Published 2025-01-01
    “…This study provides a novel technical framework for precise renal pathological tissue segmentation and lays the foundation for future lesion detection and intelligent diagnostic applications.…”
    Get full text
    Article
  8. 1368
  9. 1369

    Research on a traffic flow statistical algorithm based on YBOVDT and SAM2 by Yuanyuan Wang, Zheng Ding, Jiange Liu, Kexiao Wu, Md Sharid Kayes Dipu, Tingmei Ma, Yonghao Ma, Haiyan Zhang

    Published 2025-05-01
    “…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
    Get full text
    Article
  10. 1370

    Effect of Perfluorane on Electric Pulse-Modified Red Blood Cell Membranes by V. V. Moroz, Ye. K. Kozlova, M. S. Bogushevich, P. Yu. Alekseyeva, A. M. Chernysh

    Published 2005-06-01
    “…As a plasma substitute clinical medicine uses perfluorane that is an antishock, antiischemic, and cardioprotective agent having a function of transferring O2 and CO2. The authors have investigated the interaction of perfluorane particles with human erythrocytic membranes. …”
    Get full text
    Article
  11. 1371

    Baseline levels of microplastics in agricultural soils obscure the effects of additional microplastics from recycled fertilizers by Collin J. Weber, Dominika Kundel, Andreas Fliessbach, Else K. Bünemann, Moritz Bigalke

    Published 2025-07-01
    “…Whilst it was observed from the fluxes that digestate can be a substantial source of microplastics to soils, the comparatively short time of application and the high background at our investigated sites leads to a obscured effect where digestate inputs serve a limited function.…”
    Get full text
    Article
  12. 1372

    Unveiling smart contract vulnerabilities: Toward profiling smart contract vulnerabilities using enhanced genetic algorithm and generating benchmark dataset by Sepideh HajiHosseinKhani, Arash Habibi Lashkari, Ali Mizani Oskui

    Published 2025-06-01
    “…This dataset consists of 111,897 Solidity source code samples, ensuring the practical validation of the proposed approach. …”
    Get full text
    Article
  13. 1373

    FAM3C Regulates Glioma Cell Proliferation, Invasion, Apoptosis, and Epithelial Mesenchymal Transition via the Notch Pathway by Xiaochao Xia, Zihao Wang, Lvmeng Song, Yinchuan Cheng, Ping Xiong, Shun Li

    Published 2024-12-01
    “…Methods We utilized open‐source bioinformatics tools and platforms to analyze the transcriptional expression levels, prognosis, and correlation with clinical variables of FAM3C in gliomas, and subsequently, to hypothesize its potential molecular functions and possibly associated signaling pathways. …”
    Get full text
    Article
  14. 1374

    Impulse Shaping Method Based on Bayesian Deconvolution by JIA Tonghui, LIU Yi, WANG Ming, MA Yingjie, WANG Bo

    Published 2025-04-01
    “…The initial step of this method entailed expressing the measured pulse signal as the convolution of the current impulse pulse signal and the detection system response function. Then, the measured signal was expressed in the continuous time domain and decomposed into the form of an impulse signal and a double exponential kernel convolution by derivation. …”
    Get full text
    Article
  15. 1375

    Synovial cesys in children: clinical features, diagnostics, treatment (analytical review of the literature and own observation) by V.S. Konoplitskyi, Yu. Ye. Korobko, B.L. Pavlenko, H.M. Rudenko, O.A. Korobko, S.V. Klymenko

    Published 2025-06-01
    “…Thus, according to literature sources, the frequency of pathology in patients under 20 years of age reaches 10% in the population and less than 2% in children under 10 years of age. …”
    Get full text
    Article
  16. 1376

    Fine-grained access control method for private data in android system by Gang Liu, Guofang Zhang, Quan Wang, Shaomin Ji, Lizhi Zhang

    Published 2019-03-01
    “…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
    Get full text
    Article
  17. 1377

    Optimization of Adversarial Reprogramming for Transfer Learning on Closed Box Models by Alexander Bott, Moritz Siems, Alexander Puchta, Jurgen Fleischer

    Published 2025-01-01
    “…While it has been shown that this concept can work well in image classification, and a further modification has been developed to classify time series features, this work focuses primarily on the remaining key challenges such as the selection and comparison of appropriate loss functions, the optimisation of hyperparameters using Bayesian methods, and data labelling in the absence of ground truth. …”
    Get full text
    Article
  18. 1378

    Recreational Thematic Dominants in News TV Discourse by M. A. Gladko

    Published 2022-11-01
    “…The key tasks of the research are to identify the repertoire of thematic dominants of recreation, their functional characteristics, the specifics of participation in the construction of the news text, as well as a description of the recreation scale.Methodology and sources. …”
    Get full text
    Article
  19. 1379

    Assessment of Serum Vitamin D Levels and Evaluation of Knowledge, Attitude, and Practices of Vitamin D Deficiency among Emergency Health-care Workers at a Tertiary Care Center in N... by Sakshi Yadav, Prakash Ranjan Mishra, R. Rajalekshmi, Bharath Gopinath, Praveen Aggarwal, Akshaya Ramaswami, Paulina, Mohit Sharma

    Published 2024-01-01
    “…While most participants were aware of the active form of vitamin D, its sources and critical functions, knowledge about non-skeletal manifestations and measurable forms of vitamin D deficiency was limited. …”
    Get full text
    Article
  20. 1380

    Evaluation of the coupling coordination effect of Hefei Rail transit station area based on supply and demand matching. by Wangyang Gui, Mengnan Cheng, Tong Zhang, Yifei Guo, Bin Xu

    Published 2025-01-01
    “…The coupling of supply and demand in the rail transit station area is an important driving force for ensuring the balanced development between the traffic functions and the place performance of the rail transit station area. …”
    Get full text
    Article