Search alternatives:
resource » source (Expand Search)
Showing 461 - 480 results of 993 for search 'Resource detection function', query time: 0.15s Refine Results
  1. 461

    Efficient analysis of drug interactions in liver injury: a retrospective study leveraging natural language processing and machine learning by Junlong Ma, Heng Chen, Ji Sun, Juanjuan Huang, Gefei He, Guoping Yang

    Published 2024-12-01
    “…Electronic medical records contain comprehensive clinical information and have gained increasing attention as a potential resource for DDI detection. However, a substantial portion of adverse drug reaction (ADR) information is hidden in unstructured narrative text, which has yet to be efficiently harnessed, thereby introducing bias into the research. …”
    Get full text
    Article
  2. 462

    Lactylation: From Homeostasis to Pathological Implications and Therapeutic Strategies by Xi Chen, Yixiao Yuan, Fan Zhou, Lihua Li, Jun Pu, Yong Zeng, Xiulin Jiang

    Published 2025-06-01
    “…Moreover, we discuss advanced detection technologies and potential therapeutic interventions targeting lactylation pathways. …”
    Get full text
    Article
  3. 463
  4. 464
  5. 465

    An Observational Study on Pre-natal Diagnosis of Congenital Talipes Equinovarus by Gaurav Vatsa, Saurabh Suman, Siddharth Kumar Singh

    Published 2025-07-01
    “…Future research should assess long-term functional outcomes and optimize pre-natal screening protocols, particularly in resource-limited settings, to ensure comprehensive CTEV management.…”
    Get full text
    Article
  6. 466

    Early Fault-Tolerant Quantum Algorithms in Practice: Application to Ground-State Energy Estimation by Oriel Kiss, Utkarsh Azad, Borja Requena, Alessandro Roggero, David Wakeham, Juan Miguel Arrazola

    Published 2025-04-01
    “…Additionally, we provide quantitative resource estimates, demonstrating a constant factor improvement in the number of samples required to detect a specified change in CDF. …”
    Get full text
    Article
  7. 467

    Distribution, behavior and diet of the Asiatic black bear in human modified landscapes by Hadi Fahimi, Mahmood Soofi, Nahid Ahmadi, Ali T. Qashqaei, Hamidreza Heidari, Haaken Bungum, Bent Rech, Jonas Trepel, Matthias Waltert

    Published 2024-11-01
    “…Elevation, precipitation, village density, and PA size did not substantially influence occupancy. Black bear detection probability became 100 % only above 14 km survey effort, indicating its overall rarity, and bears were much more easily detected during and after rainfall. …”
    Get full text
    Article
  8. 468

    Advances in key technologies for the management, restoration, development, and utilization of coal mining subsidence areas by Zhuanghan MENG, Yutao WANG, Yanzhe TIAN

    Published 2025-07-01
    “…BackgroundCoal mining subsidence areas, formed by the exploitation of coal resources, have emerged as severe challenges to the construction of ecological civilization and the sustainable development of the social economy in China. …”
    Get full text
    Article
  9. 469

    Leveraging Blockchain Technology With Enhanced MDSVA for Robust Meteorological Sensor Data Validation by Md Abdullah Al Mamun, Mei Li, Bijon Kumar Pramanik, Faisal Hussain, A. Z. M. Shakilur Rahman

    Published 2025-01-01
    “…Our enhanced MDSVA introduces a sophisticated five-component validation function that simultaneously addresses drift and noise compensation, environmental adaptation, periodic variations, dynamic thresholds, and transient adjustments. …”
    Get full text
    Article
  10. 470

    LeafDPN: An Improved DPN Model for the Identification of Bacterial Blight in Soybean in Natural Environments by Rui Cong, Ying Xu, Hao Su, Jiaying Zhou, Yuxi Hu, Dawei Xin, Qingshan Chen, Rongsheng Zhu, Shuang Song

    Published 2024-12-01
    “…<i>glycinea</i>, is one of the most devastating diseases in soybean with significant yield losses ranging from 4% to 40%. The timely detection of BBS is the foundation for disease control. …”
    Get full text
    Article
  11. 471

    Adaptive conflict resolution for IoT transactions: A reinforcement learning-based hybrid validation protocol by Mohammad A. Al Khaldy, Ahmad Nabot, Ahmad al-Qerem, Issam Jebreen, Abdulbasit A. Darem, Asma A. Alhashmi, Mohammad Alauthman, Amjad Aldweesh

    Published 2025-07-01
    “…The RL-based mechanism continuously adapts decision-making by learning from system states, prioritizing transactions, and dynamically resolving conflicts using a reward function that accounts for key performance parameters, including the number of conflicting transactions, cost of aborting transactions, temporal validity constraints, and system resource utilization. …”
    Get full text
    Article
  12. 472

    Assessing chronic obstructive pulmonary disease risk based on exhalation and cough sounds by Geyi Wen, Chenshuo Wang, Wei Zhao, Jinliang Meng, Yanyan Xu, Ruiqi Wang, Zijing Zeng

    Published 2025-07-01
    “…Following this, each individual completed pulmonary function tests and participated in questionnaire surveys. …”
    Get full text
    Article
  13. 473
  14. 474
  15. 475
  16. 476

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  17. 477

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  18. 478

    Where there’s smoke there is fire: Türkiye and the international illegal wildlife trade by Özgün Emre Can

    Published 2025-06-01
    “…By guiding policymakers, conservationists, and authorities, the study fosters international cooperation, optimal resource use, and endangered species protection. International wildlife trafficking can occur when detection and law enforcement measures fail in both the countries of origin and destination, and, where relevant, in transit countries, showing the necessity for governments worldwide to make the international illegal wildlife trade a priority.…”
    Get full text
    Article
  19. 479

    Renal Biopsy Pathological Tissue Segmentation: A Comprehensive Review and Experimental Analysis by Yan Liu, Taiping Wang, Xinxin He, Wei Wang, Qiang He, Juan Jin

    Published 2025-01-01
    “…This study provides a novel technical framework for precise renal pathological tissue segmentation and lays the foundation for future lesion detection and intelligent diagnostic applications.…”
    Get full text
    Article
  20. 480

    Research on a traffic flow statistical algorithm based on YBOVDT and SAM2 by Yuanyuan Wang, Zheng Ding, Jiange Liu, Kexiao Wu, Md Sharid Kayes Dipu, Tingmei Ma, Yonghao Ma, Haiyan Zhang

    Published 2025-05-01
    “…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
    Get full text
    Article