Suggested Topics within your search.
Suggested Topics within your search.
-
1181
Mechanistic insights into phosphorus transformation mediated by Arthrobacter and Sordariomycetes under long-term high-volume swine manure application in a wheat-rice rotation syste...
Published 2025-05-01“…And the soil treated with the prolonged high- volume swine manure application was selected to isolate and identify specific microorganisms, which were subsequently inoculated into soil previously treated with long-term NPK fertilizer (F) and swine manure application (M) for indoor cultivation and functional characterization verification.ResultsThe sustained high input of swine manure markedly enhanced soil P activity and microbial P content (P < 0.05), specifically extracting P-associated microorganisms, namely Arthrobacter sp. …”
Get full text
Article -
1182
Numerical Analysis of Transient Burn Injury Grading Through Coupled Heat Transfer and Damage Integral Modeling
Published 2025-02-01“…Under the working conditions selected in this paper, the heat source mainly affects the epidermis and dermis directly below, and has less influence on the area above, which is in convective heat transfer. …”
Get full text
Article -
1183
Revealing connectivity patterns of deep brain stimulation efficacy in Parkinson’s disease
Published 2024-12-01“…The high-density source space EEG was acquired and analyzed in 43 PD subjects in DBS on and DBS off stimulation states (off medication) during a cognitive-motor task. …”
Get full text
Article -
1184
-
1185
-
1186
Spatial Distribution Characteristics and Co-occurrence Risk of Rainstorms and High Tide Levels in Guangzhou
Published 2025-04-01Get full text
Article -
1187
Pre-design optimization of the manipulation system with hydraulic drive for mobile transport-technological machine
Published 2017-03-01“…In the article has developed an optimization mathematical model and methodology of selection of optimal parameters of manipulation of systems of transport and technological machines, which allows to increase their service performance and competitiveness. …”
Get full text
Article -
1188
-
1189
-
1190
Blended clustering energy efficient routing and PUF based authentication in IoT enabled smart agriculture systems
Published 2025-07-01“…The suggested architecture combines a new Blended Clustering Energy Efficient Routing (BCEER) protocol with an authentication mechanism based on Physical Unclonable Functions (PUFs) to respond to the main issues in resource-limited, sensor-oriented settings. …”
Get full text
Article -
1191
HRT-Net: A Cell-free Cooperative Sensing Method Based on Attention-weighted Hierarchical Network
Published 2025-08-01“…HRT-Net is designed to enhance multi-station collaborative sensing problems for Dual-Functional Radar-Communication (DFRC) systems, offering accurate and resource-efficient target location estimation. …”
Get full text
Article -
1192
-
1193
-
1194
Estimation of Groundwater Recharge from Rainfall for Arid Coastal Plain of Ninh Thuan Province, Vietnam
Published 2022-02-01“…Those parameters required for soil moisture transfer are derived from the soil-water characteristic curve functions. Element sizes and time steps used in the modelling have been selected based on a detailed analysis of numerical simulation errors. …”
Get full text
Article -
1195
Signal Processing in Passive Radar Systems Using 5G: A Simulation Study
Published 2024-12-01“…The calculation of the cross-ambiguity function of the passive radar using the 5G signal was carried out by computer simulation.Results. …”
Get full text
Article -
1196
Observation on prefrontal cortex activation in patients with Parkinson’s disease: a fNIRS study
Published 2025-04-01Get full text
Article -
1197
ON THE ISSUE OF ASSESSING THE ECOLOGICAL STATE OF VARIOUS WATERCOURCES IN THE CONDITIONS OF ANTHROPOGENIC PRESSURE
Published 2021-04-01Article -
1198
-
1199
-
1200
Survey on key technologies for protective DNS service
Published 2024-10-01“…The protective DNS (PDNS) service leverages the existing DNS protocol and architecture to detect and mitigate threats by analyzing DNS queries, thereby protecting users against potential security threads at the source. …”
Get full text
Article