-
1701
Effect of Nb0.5 and Mo0.75 addition on in-vitro corrosion and wear resistance of high-speed laser metal deposited Al0.3CrFeCoNi high-entropy alloy coatings
Published 2025-03-01“…This was due to the slower progression of deeper corrosion attacks in unmelted particles, which minimized the micro-galvanic effects associated with the eutectic structures within these particles. …”
Get full text
Article -
1702
A Quantitative Risk Evaluation Model for Network Security Based on Body Temperature
Published 2016-01-01“…And the mechanism of increased antibody concentration, which is made up of activating mature detector and cloning memory detector, is mainly used to assess network risk caused by various species of attacks. Based on these reasons, this paper not only established the equation of antibody concentration increase factor but also put forward the antibody concentration quantitative calculation model. …”
Get full text
Article -
1703
Integrated Pest Management of Wireworms in Potatoes: Use of Tolerant Varieties to Implement Damage Prevention
Published 2024-12-01“…Both sets of trials showed that some 4x-breeding clones were tolerant to wireworm attacks. The percentages of tubers damaged (any symptom) or with at least one ordinary/large hole was up to five times lower than in the commercial varieties. …”
Get full text
Article -
1704
STUDI POLA INTERAKSI PERILAKU JANGKRIK (Gryllus bimaculatus ) JANTAN DAN BETINA
Published 2020-05-01“…The results showed that the behavior that is often performed by crickets is sounding, eating, climbing, mating and attacking other crickets. Crickets perform sounding behavior to attract the attention of female crickets, show their existence and to defend their territory and food sources. crickets also often climb, to escape from the container because crickets want to live freely. …”
Get full text
Article -
1705
Decision Support Model for Design of High-Performance Concrete Mixtures Using Two-Phase AHP-TOPSIS Approach
Published 2019-01-01“…The present research is attempted to provide MCDM framework to rank the concrete mix guidelines for any given environment such as concrete under sulphate and chloride attack and for evolving the performance-based concrete mix design techniques. …”
Get full text
Article -
1706
The Collaborative Search by Tag-Based User Profile in Social Media
Published 2014-01-01“…Facing such a tremendous volume of data, it is a big challenge to assist the users to find their desired data. To attack this critical problem, we propose the collaborative search approach in this paper. …”
Get full text
Article -
1707
Vali@mPEG‐TK‐COS: A Dual‐Function Nano‐Pesticide for Fungicidal Action and Plant Immune Modulation
Published 2024-12-01“…Vali@mPEG‐TK‐COS exhibits ROS‐responsive behaviour, releasing Vali and COS in response to plant ROS bursts, exhibiting dual capabilities in pathogen control and plant immunity induction during pathogenic attacks. Plant disease experiments confirmed the superior efficacy of Vali@mPEG‐TK‐COS against Rhizoctonia solani, surpassing the control effects of Vali or COS alone. …”
Get full text
Article -
1708
A Three-Dimensional Anisotropic Diffusion Equation-Based Video Recognition Model for Classroom Concentration Evaluation in English Language Teaching
Published 2021-01-01“…Experiments show that the method has excellent performance and can effectively discriminate the live nature of faces in images and resist forged face attacks. Based on the above face detection and expression recognition algorithms, the classroom concentration analysis system based on expression recognition is designed to achieve real-time acquisition and processing of classroom images, complete student classroom attendance records using face detection and face recognition methods, and analyze students’ concentration from the face integrity and facial expression of students facing the blackboard by combining face detection and expression recognition to visualize and display students’ classroom data for teachers, students, and parents with more data support and help.…”
Get full text
Article -
1709
Aerodynamic Performance of a Passive Pitching Model on Bionic Flapping Wing Micro Air Vehicles
Published 2019-01-01“…However, FWMAVs with mechanisms to limit the angle of attack (α) artificially by active force cannot meet specific requirements. …”
Get full text
Article -
1710
EPPTA: Efficient partially observable reinforcement learning agent for penetration testing applications
Published 2025-01-01“…Abstract In recent years, penetration testing (pen‐testing) has emerged as a crucial process for evaluating the security level of network infrastructures by simulating real‐world cyber‐attacks. Automating pen‐testing through reinforcement learning (RL) facilitates more frequent assessments, minimizes human effort, and enhances scalability. …”
Get full text
Article -
1711
Early and long-term performance evaluation of low NaOH concentrated waste HBP-GGBS based alkali activated composites
Published 2025-03-01“…Durability evaluations revealed resistance to sulfate attack and carbonation, emphasizing the long-term stability of the material under aggressive environmental conditions. …”
Get full text
Article -
1712
Face-work in North American Presidential Debates: A Corpus-based Multi-theoretical Approach
Published 2024-07-01“…Supported by results from Pearson’s Chi-square test, the combination of these theories was shown to be possible. The recurrence of attack-defense pairings integrating strategies from both theories also pointed to their necessary combination. …”
Get full text
Article -
1713
Cellular Debris in the Anterior Vitreous in Silent Eyes of Behçet Patients as a Clue of Asymptomatic Ocular Involvement
Published 2013-01-01“…None of the eyes with disc hyperflourescence on initial examination developed uveitis attacks in their followup. In Kaplan-Meier survival analysis there was a significant difference between the groups (group A 20.6% and group B 4.2%) by means of ocular involvement during their followup (log-rank = 6.85, ). …”
Get full text
Article -
1714
Quantum algorithms for enhanced educational technologies
Published 2025-01-01“…Also, quantum cryptography provides reliable security and prevention against future attacks on cyber security hence providing safe means of transferring educational data. …”
Get full text
Article -
1715
From Palestine to Turtle Island
Published 2024-12-01“…The destruction of food systems in Palestine is part of a broader attack on land sovereignty, reflecting similar patterns of colonial land theft and environmental devastation in North America. …”
Get full text
Article -
1716
Photoperiod effects on the growth stages of fall armyworm Spodoptera frugiperda (Lepidoptera: Noctuidae) under laboratory conditions
Published 2024-12-01“… Spodoptera frugiperda, commonly known as the fall armyworm, is a pest that attacks maize plants in Indonesia. Light is one of the crucial factors in the development of S. frugiperda. …”
Get full text
Article -
1717
FWA-SVM Network Intrusion Identification Technology for Network Security
Published 2025-01-01“…The effectiveness of traditional network intrusion is limited in the face of complex network attacks and constantly increasing data volume. Support vector machine has attracted much attention for its excellent classification ability, but it faces challenges in feature selection and parameter optimization when dealing with large-scale high-dimensional data. …”
Get full text
Article -
1718
Deep learning-based prediction of autoimmune diseases
Published 2025-02-01“…Abstract Autoimmune Diseases are a complex group of diseases caused by the immune system mistakenly attacking body tissues. Their etiology involves multiple factors such as genetics, environmental factors, and abnormalities in immune cells, making prediction and treatment challenging. …”
Get full text
Article -
1719
Implementation assessment of the national program for the prevention and control of cerebro-vascular diseases in Cienfuegos. Period 2000-2004.
Published 2005-04-01“…An increment of favorable evolution in patients with brain attack and subarachnoid hemorrhage was notified, it did not happened with intracerebral hemorrhage. …”
Get full text
Article -
1720
Implementation and optimisation of intelligent police systems based on artificial intelligence
Published 2024-06-01“…Modern video surveillance systems can help counter terrorist attacks by tracking and identifying people and suspicious objects. …”
Get full text
Article