Showing 2,421 - 2,440 results of 5,905 for search 'Enfusion~', query time: 2.76s Refine Results
  1. 2421

    Phenogenetics of cortical granule dynamics during zebrafish oocyte-to-embryo transition by Priscila García-Castro, Isabella Giambó-Falian, Ingrid Carvacho, Ricardo Fuentes

    Published 2025-01-01
    “…Fertilization is a critical process in sexual reproduction that involves the fusion of a capacitated sperm with a mature oocyte to form a zygote. …”
    Get full text
    Article
  2. 2422

    Feasibility and safety of targeted focal microwave ablation of the index tumor in patients with low to intermediate risk prostate cancer: Results of the FOSTINE trial. by Nicolas Barry Delongchamps, Alexandre Schull, Julien Anract, Jean-Paul Abecassis, Marc Zerbib, Mathilde Sibony, Léa Jilet, Hendy Abdoul, Vincent Goffin, Michaël Peyromaure

    Published 2021-01-01
    “…<h4>Objective</h4>To assess the feasibility, safety and precision of organ-based tracking (OBT)-fusion targeted focal microwave ablation (FMA), in patients with low to intermediate risk prostate cancer.…”
    Get full text
    Article
  3. 2423

    Development of Binocular Vision by Muhammad Syauqie, Sri Handayani Mega Putri

    Published 2014-01-01
    “…<br />Keywords: binocular vision, development, fusion, stereopsis</p>…”
    Get full text
    Article
  4. 2424

    Coal Mine Gas Safety Evaluation Based on Adaptive Weighted Least Squares Support Vector Machine and Improved Dempster–Shafer Evidence Theory by Zhenming Sun, Dong Li

    Published 2020-01-01
    “…Moreover, the accuracy of D-S evidence theory based on enhanced fusion rules is improved compared to the D-S evidence theory in terms of the modified evidence sources and the original D-S evidence theory. …”
    Get full text
    Article
  5. 2425
  6. 2426

    Laser Beam Welding of AA5052, AA5083, and AA6061 Aluminum Alloys by A. El-Batahgy, M. Kutsuna

    Published 2009-01-01
    “…For alloys AA5052 and AA5083, softening of the fusion zone due to the loss of its work-hardened condition was much less in comparison with AA6061 alloy.…”
    Get full text
    Article
  7. 2427
  8. 2428

    Cell Secretion: Current Structural and Biochemical Insights by Saurabh Trikha, Elizabeth C. Lee, Aleksandar M. Jeremic

    Published 2010-01-01
    “…In regulated (calcium-dependent) secretion, membrane-bound secretory vesicles dock and transiently fuse with specialized, permanent, plasma membrane structures, called porosomes or fusion pores. Porosomes are supramolecular, cup-shaped lipoprotein structures at the cell plasma membrane that mediate and control the release of vesicle cargo to the outside of the cell. …”
    Get full text
    Article
  9. 2429

    Elliptic curve ElGamal encryption based location privacy-preserving scheme by Huibin LAI, Li XU, Yali ZENG, Rui ZHU

    Published 2020-06-01
    “…An elliptic curve ElGamal encryption based location privacy-preserving scheme was proposed to address the location privacy problem of secondary users in collaborative spectrum sensing.Firstly,secondary users encrypted the original sensing reports using the ElGamal public key techniques on the elliptic curve and sent them to the trusted property authority.Secondly,the trusted property authority partially decrypted and randomized sensing reports and then sent the randomized sensing reports to the fusion center.Thirdly,the fusion center finally decrypted and got the original sensing reports.Finally,security of the scheme was analyzed.According to the scheme,the encryption method of sensing reports was based on public key cryptography on elliptic curve.And the trusted property authority randomized encrypted sensing reports.Thus the location privacy of secondary users can be protected.Meanwhile,this scheme effectively reduces communication and storage cost,compared with other schemes.In addition,this scheme also has fault tolerant and dynamic mechanism,which increases the practicability and feasibility.…”
    Get full text
    Article
  10. 2430

    Bicervical Normal Uterus with Normal Vagina and Anteroposterior Disposition of the Double Cervix by José Morales-Roselló, Núria Peralta LLorens

    Published 2011-01-01
    “…A review of the theories concerning müllerian fusion is done, and implications of this case in relation with these theories are discussed. …”
    Get full text
    Article
  11. 2431

    Research on access schemes of SD-WAN multi-cloud aggregation platform by Jia NIU, Yongming YAN, Qiangen ZHAO, Jiajun MIN, Songyang QI

    Published 2022-02-01
    “…A detailed description of the current situation, application, demand analysis, basic functions and application scenarios of the multi-cloud aggregation platform were given, and the advantages of SD-WAN compared with the traditional private line multi-cloud access mode was discussed.The networking projects of multiple SD-WAN accessing multi-cloud aggregation platforms were analyzed, a multi-cloud access scheme combining SD-WAN and dedicated line to realize network link monitoring were proposed.The network quality monitoring function of SD-WAN access to multi-cloud and the monitoring function of SD-WAN on underlay dedicated line under the fusion networking was proposed.Based on the topology design of network architecture combining traditional private line to multi-cloud and segmentalized access mode of SD-WAN and traditional private line to multi-cloud, the application scenarios of hybrid network to multi-cloud was introduced and the value of SD-WAN to multi-cloud was reflected from the perspective of fusion network by combining advantages and disadvantages.…”
    Get full text
    Article
  12. 2432

    Machine Learning-Based Multitarget Tracking of Motion in Sports Video by Xueliang Zhang, Fu-Qiang Yang

    Published 2021-01-01
    “…The fusion algorithm uses the learning rate to update the background in real time and combines morphological processing to correct the foreground, which can effectively cope with the slow change of the background. …”
    Get full text
    Article
  13. 2433

    Research and application exploration of threat intelligence system of telecom operators by Haitao ZHANG, Yi JIANG, Shijie ZHU, Qi CHEN

    Published 2022-12-01
    “…With the increasing inequality of network attack and defense in the Internet era, threat intelligence has become one of the important tools to narrow this gap.Based on the analysis of the research status of threat intelligence at home and abroad, a set of construction methods of threat intelligence systems suitable for telecom operators were proposed, including six steps: intelligence planning, intelligence production, intelligence analysis, intelligence management, intelligence sharing and intelligence application.Meanwhile a set of multi-source intelligence fusion assessment mechanisms was presented, and the technologies and methods were systematically expounded involved in the four stages of intelligence aggregation analysis, intelligence reputation analysis, intelligence correlation analysis and intelligence aging analysis, so as to help the telecom operators build the ability of intelligence fusion analysis.At the same time, the principles of intelligence production and synchronous application were given for intrusion and loss intelligence, which provided a useful reference for telecom operators to apply threat intelligence technology to build a security protection system.…”
    Get full text
    Article
  14. 2434

    Scheduling framework based on reinforcement learning in online-offline colocated cloud environment by Ling MA, Qiliang FAN, Ting XU, Guanchen GUO, Shenglin ZHANG, Yongqian SUN, Yuzhi ZHANG

    Published 2023-06-01
    “…Some reinforcement learning-based scheduling algorithms for cloud computing platforms barely considered one scenario or ignored the resource constraints of jobs and treated all machines as the same type, which caused low resource utilization or insufficient scheduling efficiency.To address the scheduling problems in online-offline colocated cloud environment, a framework named JobFusion was proposed.Firstly, an efficient resource partitioning scheme was built in the cloud computing platform supporting virtualization technology by integrating the hierarchical clustering method with connectivity constraints.Secondly, a graph convolutional neural network was utilized to embed the attributes of elastic dimension with various constraints and the jobs with various numbers, to capture the critical path information of workflow.Finally, existing high-performance reinforcement learning methods were integrated for scheduling jobs.According to the results of evaluation experiments, JobFusion improves the resource utilization by 39.86% and reduces the average job completion time by up to 64.36% compared with baselines.…”
    Get full text
    Article
  15. 2435

    Blended Features Classification of Leaf-Based Cucumber Disease Using Image Processing Techniques by Jaweria Kainat, Syed Sajid Ullah, Fahd S. Alharithi, Roobaea Alroobaea, Saddam Hussain, Shah Nazir

    Published 2021-01-01
    “…Through a principal component analysis approach, serial feature fusion is employed to provide a feature score. Fused features can be classified through a support vector machine. …”
    Get full text
    Article
  16. 2436

    Posttraumatic Atlantoaxial Rotatory Dislocation in a Healthy Adult Patient: A Case Report and Review of the Literature by Giuseppe Maida, Eleonora Marcati, Silvio Sarubbo

    Published 2012-01-01
    “…Therefore, early diagnosis, immobilisation, and surgical fusion and arthrodesis were performed. After surgery, cervical pain and torticollis were resolved and the patient remained neurologically intact with a CT scan documentation of fusion at the 3-year followup.…”
    Get full text
    Article
  17. 2437

    Avian Paramyxovirus Serotype-1: A Review of Disease Distribution, Clinical Symptoms, and Laboratory Diagnostics by Nichole L. Hines, Cathy L. Miller

    Published 2012-01-01
    “…The genetic composition of the fusion gene cleavage site plays an important role in virulence. …”
    Get full text
    Article
  18. 2438
  19. 2439
  20. 2440