Suggested Topics within your search.
Suggested Topics within your search.
-
61
Systematic investigation of photon strength functions with monochromatic γ-ray beams
Published 2025-01-01“…Following the main objective of the IAEA Coordinated Research Project on Photonuclear Data and Photon Strength Functions (Code F41032; Duration 2016-2019), new measurements of photoneutron and photofission cross sections in the Giant Dipole Resonance energy region have been performed at the laser Compton-scattering γ-ray source of the NewSUBARU synchrotron radiation facility. …”
Get full text
Article -
62
Design and analysis of intelligent service chain system for network security resource pool
Published 2022-08-01“…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
Get full text
Article -
63
Near-source wastewater surveillance of SARS-CoV-2, norovirus, influenza virus and RSV across five different sites in the UK.
Published 2025-01-01“…The key findings are (1) near-source wastewater detections were linked to local events (staff sickness, enhanced cleaning, changing populations); (2) wastewater detections decreased in the order norovirus GII > norovirus GI > SARS-CoV-2 ≈ influenza A ≈ RSV A > influenza B ≈ RSV B; (3) correlation between near-source wastewater data and national surveillance data increases as a function of catchment size and viral prevalence (examples include the SARS-CoV-2 BA.4/BA.5 variant peak at a museum and wastewater tracking the winter norovirus season); (4) strong weekday periodicity in near-source wastewater SARS-CoV-2 detections, with the correlation against COVID-19 case numbers increasing when modelling variable lag times between faecal shedding onset and clinical diagnosis (R2 = 0.45 increases to 0.84-0.86); (5) a log-linear relationship between the frequency of wastewater SARS-CoV-2 detection and log(catchment size⋅viral prevalence) (R2 = 0.6914-0.9066). …”
Get full text
Article -
64
-
65
Toward Compliance and Transparency in Raw Material Sourcing With Blockchain and Edge AI
Published 2025-01-01“…This low-power device enables real-time detection of shipment anomalies such as tampering or unauthorized access, even in offline and resource-limited environments. …”
Get full text
Article -
66
Spin-dependent edge detection and imaging enabled by optical circularly polarised states
Published 2025-04-01“…By harnessing the chiral selectivity of the C-points, a high-CD PCS imager can provide two sets of optical transfer functions (OTFs) to facilitate both edge detection and bright-field imaging. …”
Get full text
Article -
67
Improved UAV Target Detection Model for RT-DETR
Published 2025-01-01“…Furthermore, the Focaler-MPDIoU loss function has been developed to address the challenge of suboptimal localization accuracy for hard-to-detect targets and diminutive targets. …”
Get full text
Article -
68
-
69
Recent Technological Advancements for Identifying and Exploiting Novel Sources of Pest and Disease Resistance for Peanut Improvement
Published 2024-12-01“…Recent technological advancements have revolutionized the identification of novel resistance sources and the development of resistant peanut cultivars. …”
Get full text
Article -
70
Analytical method for determining coordinates of the radiation source in a homogeneous medium
Published 2015-12-01“…The problem is reduced to finding the minimum of a nonlinear function of five variables. This function is the sum of the squares of the differences of the calculated and the actual time of the wave front passing through the sensor for each of the sensors. …”
Get full text
Article -
71
Development and validation of microwave-assisted extraction for phenolic compound profiling in diverse oyster mushrooms (Pleurotus spp.) sourced from various geographical regions
Published 2025-04-01“…This study aimed to develop and validate a microwave-assisted extraction (MAE) method for profiling phenolic compounds in a diverse selection of oyster mushrooms (Pleurotus spp.) sourced from multiple geographical regions. …”
Get full text
Article -
72
A Survey on the Functionalities of Data Catalog Tools
Published 2025-01-01“…Currently, there is no generally accepted definition or interpretation regarding the required functionality of data catalog tools. This has not only led to a wide range of so-called data catalog tools but has also made it difficult for practitioners to gain an overview in order to make a targeted selection of a tool. …”
Get full text
Article -
73
-
74
Analysis of physicochemical, functional, and antioxidant properties of four different Indian seaweed species
Published 2024-12-01“…Thus, the selected four marine seaweeds act as a good source of functional components and can be utilized for the development of functional food products such as bread, biscuits, cookies, tea, snacks, soups and beverages.…”
Get full text
Article -
75
-
76
Weak-Lensing Shear-Selected Galaxy Clusters from the Hyper Suprime-Cam Subaru Strategic Program: I. Cluster Catalog, Selection Function and Mass--Observable Relation
Published 2025-01-01“…We use semi-analytical injection simulations to derive the selection function and the mass--observable relation of our sample. …”
Get full text
Article -
77
-
78
-
79
Testing source elevation versus genotype as predictors of sugar pine performance in a post‐fire restoration planting
Published 2024-10-01“…Abstract Climate change is motivating a reassessment of how seeds are selected for reforestation, as rapid environmental change can lead to local maladaptation in trees. …”
Get full text
Article -
80
Aptamer-Functionalized Gold Nanoparticle Assay for Rapid Visual Detection of Norovirus in Stool Samples
Published 2025-06-01“…Detection relies on MgCl<sub>2</sub>-induced changes in the color and absorbance of these aptamer-functionalized AuNPs. …”
Get full text
Article