Search alternatives:
source » sources (Expand Search)
Showing 221 - 240 results of 2,089 for search 'source (selection OR detection) function', query time: 0.19s Refine Results
  1. 221

    Minerals function as signals to modulate microbial adaptation by Jianchao Zhang, Beibei Wang, Sumin Qu, Xiangyu Zhu, Yuebo Wang, Hui Henry Teng

    Published 2025-06-01
    “…These findings underscore the intricate interplay between minerals and microbes, challenging the conventional notion that minerals function solely as material sources for organism growth.…”
    Get full text
    Article
  2. 222

    Development of recipes for combined products with functional properties by O. A. Ogneva, N. S. Bezverkhaya

    Published 2021-04-01
    “…In accordance with the normative and technical documentation for functional food products the developed products can be classified as functional ones in terms of the content of the following functional sources: pectin, organic acids, minerals, and vitamins.…”
    Get full text
    Article
  3. 223
  4. 224
  5. 225

    Open-Source vs. Commercial Photogrammetry: Comparing Accuracy and Efficiency of OpenDroneMap and Agisoft Metashape by A. Kostrzewa, A. Płatek-Żak, P. Banat, Ł. Wilk

    Published 2025-06-01
    “…OpenDroneMap (ODM), open-source software, offers similar functionalities to popular commercial options, enabling the generation of point clouds, DEMs, and mesh models using advanced algorithms like Multi-View Stereo (MVS) and Poisson surface reconstruction. …”
    Get full text
    Article
  6. 226

    Bias‐Independent True Random Number Generator Circuit using Memristor Noise Signals as Entropy Source by Jinwoo Park, Hyunjoong Kim, Hyungjin Kim

    Published 2025-06-01
    “…Finally, the performance of the designed TRNG circuit is evaluated using autocorrelation functions and National Institute of Standards and Technology tests, confirming its capability to produce random number bitstreams.…”
    Get full text
    Article
  7. 227

    Varying Activity and the Burst Properties of FRB 20240114A Probed with GMRT Down to 300 MHz by Ajay Kumar, Yogesh Maan, Yash Bhusare

    Published 2024-01-01
    “…All of the bursts we detect are faint (<10 Jy ms) and thus probe the lower end of the energy distribution. …”
    Get full text
    Article
  8. 228
  9. 229

    Potential Source Regions and Transportation Pathways of Reactive Gases at a Regional Background Site in Northwestern China by Quanwei Zhao, Qing He, Lili Jin, Jianlin Wang

    Published 2021-01-01
    “…Wind rose, cluster analysis, potential source contribution function (PSCF), and concentration-weighted trajectory (CWT) methods were adopted for identifying the transport pathways and potential source regions of these atmosphere components at Akedala. …”
    Get full text
    Article
  10. 230

    Signatures of positive selection for local adaptation of African native cattle populations: A review by Wondossen AYALEW, Xiao-yun WU, Getinet Mekuriaw TAREKEGN, Min CHU, Chun-nian LIANG, Tesfaye SISAY TESSEMA, Ping YAN

    Published 2023-07-01
    “…Although there are no functional genomics studies, recent advancements in genotyping and sequencing technologies have identified and annotated limited functional genes and causal variants associated with unique adaptive and economical traits of African cattle populations. …”
    Get full text
    Article
  11. 231

    Business awareness in the management of a modern organisation regarding the usage of selected information technologies by Filip Rembisz, Piotr Zaskórski

    Published 2024-12-01
    “…Implications for theory and practice The article presents not only aspects related to the functioning of a modern organization but also the possibilities of using selected IT solutions in this aspect. …”
    Get full text
    Article
  12. 232

    Environmental Risk Assessment of Wuhan Qingshan Industrial Park Based on Multi-Source Data Fusion and FAHP by Yang Yangyi

    Published 2025-01-01
    “…The fuzzy analytic hierarchy process (FAHP) is employed to assign weights through expert judgment, and fuzzy membership functions are used to determine risk levels across selected sub-regions. …”
    Get full text
    Article
  13. 233

    A Deep Variational Approach to Multiterminal Joint Source-Channel Coding Based on Information Bottleneck Principle by Shayan Hassanpour, Matthias Hummert, Dirk Wubben, Armin Dekorsy

    Published 2025-01-01
    “…To that end, tractable objective functions are developed, together with the pertinent learning architectures, generalizing the concepts of Variational Auto-Encoders and (Distributed) Deep Variational Information Bottleneck for (remote) source coding to the context of distributed joint source-channel coding. …”
    Get full text
    Article
  14. 234

    Investigation of the chemical composition of cell cultures of DIOSCOREA CAUCASICA in connection with the production of BAS sources with cardioprotective potential by A. I. Loseva, V. I. Minina, A. V. Pozdnyakova, E. V. Ostapova

    Published 2022-02-01
    “…Dioscorea Caucasica is a source of various biologically active substances (BAS), e.g. saponins and polyphenols, which are known for their anti-atherosclerotic action. …”
    Get full text
    Article
  15. 235

    Algorithms for Automatic Detection and Location of Infrasound Events in the PSDL System by Asming Vladimir Ernestovich, Fedorov Andrey Viktorovich

    Published 2024-12-01
    “…An algorithm for detecting infrasound signals by calculating the cross-correlation function between records of individual sensors in a array is described. …”
    Get full text
    Article
  16. 236

    Code vulnerability detection method based on graph neural network by Hao CHEN, Ping YI

    Published 2021-06-01
    “…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
    Get full text
    Article
  17. 237

    Detection, Parameter Estimation and Direction Finding of Periodic Pulse Signals by V. B. Manelis, I. S. Faustov, V. A. Kozmin

    Published 2025-07-01
    “…Simple-to-implement algorithms for detecting periodic pulse signals, evaluating their parameters, and direction finding of the source have been developed. …”
    Get full text
    Article
  18. 238

    RpiBeh offers a versatile open source solution for rodent behavior tracking and closed loop interventions by Yiqi Sun, Jie Zhang, Qianyun Wang, Jianguang Ni

    Published 2025-08-01
    “…Existing commercial systems are costly and inflexible for customization, while current open-source tools are often lack of real-time functionality and suffer from steep learning curve. …”
    Get full text
    Article
  19. 239
  20. 240