-
901
Estimating fish stock biomass using a Bayesian state-space model: accounting for catchability change due to technological progress
Published 2024-12-01“…This model allows for the flexible integration of the timing and functional form of the uptake of technological innovations that are assumed to influence catchability. …”
Get full text
Article -
902
Finding RB/Rpi-blb1/Rpi-sto1-like sequences in conventionally bred potato varieties
Published 2018-09-01“…At the same time there is a high probability of finding geno types with the Rpi-sto1 gene (functional homologues of Rpi-blb1) among conventionally bred varieties because for about 40 years S. stoloniferum has been used in breeding as a source of the Rysto and Ry-fsto genes of the extreme resistance to the most important viral pathogen PVY. …”
Get full text
Article -
903
-
904
-
905
Genetic diversity in wild species and cultivars of strawberry for the <i>FanAAMT</i> gene controlling fruit flavor volatiles
Published 2021-07-01“…‘Karmen’, ‘Ostara’, ‘Samson’, ‘Symphony’, ‘Troubadour’ and ‘Vima Tarda’, in which the functional allele of the FanAAMT gene was found. In the remaining studied strawberry genotypes the marker FanAAMT was not detected, which presumably indicates that the FanAAMT gene is absent. cells (R9.4.1).…”
Get full text
Article -
906
Construction and Completion of the Knowledge Graph for Cow Estrus with the Association Rule Mining
Published 2025-05-01“…Additionally, we employed an enhanced Iforest-OCSVM anomaly detection model to assess the performance of the association rules in detecting abnormal estrus. …”
Get full text
Article -
907
-
908
Soil pollution and remediation: emerging challenges and innovations
Published 2025-04-01“…These pollutants pose severe risks to environmental health and agricultural productivity by altering soil functionality and contaminant mobility. This perspective summarizes innovative monitoring and remediation technologies, including advanced sensors and bioremediation strategies, that enable real-time detection and effective management of soil pollutants. …”
Get full text
Article -
909
Research on lightweight weed recognition algorithm based on improved YOLOv8
Published 2025-01-01“…Different scale features are used to improve the performance of target detection. Finally, the MPDIoU loss function is replaced to enhance the convergence and stability of the model. …”
Get full text
Article -
910
Survey on Backdoor Attacks on Deep Learning: Current Trends, Categorization, Applications, Research Challenges, and Future Prospects
Published 2025-01-01“…Such attacks are usually referred to as Trojan or backdoor attacks and are very stealthy and hard to detect. In this paper, we highlight the complete attack surface that can be exploited to inject hidden malicious functionality (backdoors) in machine learning models. …”
Get full text
Article -
911
Induced Acidic chitinase Expression and Scab-Resistant in Wheat Under Field Condition
Published 2012-09-01Get full text
Article -
912
-
913
LIFE CYCLE ASSESSMENT IN HEALTHCARE SYSTEM OPTIMIZATION. INTRODUCTION
Published 2015-03-01“…Various factors and parameters that may influence effectiveness of different sectors in healthcare system are detected. Performance optimization of detected parameters could lead to better system functioning, higher patient safety, economic sustainability and reduce resources consumption.…”
Get full text
Article -
914
Distribution, behavior and diet of the Asiatic black bear in human modified landscapes
Published 2024-11-01“…Elevation, precipitation, village density, and PA size did not substantially influence occupancy. Black bear detection probability became 100 % only above 14 km survey effort, indicating its overall rarity, and bears were much more easily detected during and after rainfall. …”
Get full text
Article -
915
-
916
Optimizing Trade-Offs in Reliability, Security, and Freshness for Integrated Communication, Sensing, and Over-the-Air Computing
Published 2025-01-01“…Specifically, considering statistical CSI, the target detection and AirComp aggregation errors are derived, and the upper bound of the security information age violation probability is obtained using stochastic network calculus and moment generating function theory. …”
Get full text
Article -
917
-
918
Optimised Neural Network Model for Wind Turbine DFIG Converter Fault Diagnosis
Published 2025-06-01“…VMD’s robustness stems from its ability to decompose a signal into intrinsic mode functions (IMFs) with well-defined centre frequencies and bandwidths. …”
Get full text
Article -
919
The influence of shot noise on the performance of phase singularity-based refractometric sensors
Published 2025-06-01“…This raises a natural question: What happens with the sensitivity and resolution of such a sensor when it operates close to a zero of the response function, where the detected signal may be greatly influenced by various noise sources? …”
Get full text
Article -
920
Research on Personnel Image Segmentation Based on MobileNetV2 H-Swish CBAM PSPNet in Search and Rescue Scenarios
Published 2024-11-01“…In post-disaster search and rescue scenarios, the accurate image segmentation of individuals is essential for efficient resource allocation and effective rescue operations. …”
Get full text
Article