-
801
Optimization of multi-element geochemical anomaly recognition in the Takht-e Soleyman area of northwestern Iran using swarm-intelligence support vector machine
Published 2025-03-01“…Mineral exploration is becoming increasingly challenging because the depths at which undiscovered mineral deposits can be found are progressively increasing under barren cover. Therefore, detecting metal resources under barren cover is a significant step for industrial progress. …”
Get full text
Article -
802
A Systematic Search for Candidate Supermassive Black Hole Binaries Using Periodic Mid-infrared Light Curves of Active Galactic Nuclei
Published 2024-01-01“…Analyzing a parent sample of 48,932 objects selected from about half a million AGNs, we have identified 28 candidate periodic AGNs with periods ranging from 1268 to 2437 days (in the observer frame), by fitting their WISE light curves with sinusoidal functions. However, our mock simulation of the parent sample indicates that stochastic variability can actually produce a similar number of periodic sources, underscoring the difficulty in robustly identifying real periodic signals with WISE light curves, given their current sampling. …”
Get full text
Article -
803
-
804
Bioactive matters based on natural product for cardiovascular diseases
Published 2024-12-01Get full text
Article -
805
Cryopreservation and culture strategies for testicular tissue and cells in small and large animals
Published 2025-07-01“…Spermatogenic cells from cryopreserved testicular tissue can be cultured in vitro and resume their functions after thawing, contributing to the preservation of fertility and genetic resources in both small and large animals. …”
Get full text
Article -
806
-
807
Identification method of roof rock interface based on response characteristics of drilling parameters
Published 2025-02-01Get full text
Article -
808
Pyruvate formate lyase regulates fermentation metabolism and virulence of Streptococcus suis
Published 2025-12-01Get full text
Article -
809
Does tinnitus and emotional distress influence central auditory processing? A comparison of acute and chronic tinnitus in normal-hearing individuals.
Published 2025-01-01“…<h4>Design</h4>This study compared the auditory afferent and efferent functions of normal-hearing patients with acute tinnitus, chronic tinnitus, and control group using gap detection test, the Mandarin Hearing in Noise Test (MHINT), and contralateral suppression of transient evoked otoacoustic emissions (TEOAEs).…”
Get full text
Article -
810
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
811
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
812
Research on a traffic flow statistical algorithm based on YBOVDT and SAM2
Published 2025-05-01“…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
Get full text
Article -
813
Melatonin: A Novel Indolamine in Oral Health and Disease
Published 2012-01-01“…Recent studies, by Claustrat et al. (2005), detected few extrapineal sources of melatonin like retina, gastrointestinal tract, and salivary glands. …”
Get full text
Article -
814
Study of Complex Impedance Dispersion Model for Two-Phase Laminar Flow
Published 2023-12-01Get full text
Article -
815
Design of the Field Protection and Signal Priority at Intersection System for Autonomous-rail Rapid Transit
Published 2022-06-01“…It provides auxiliary driving information for the driver through automation equipment, realizes the functions of route protection, virtual section occupied/unoccupied detection, signal control, entering/leaving station detection, platform door linkage control, berth status detection and management in deport and so on, which improves system security and reduces driver working intensity. …”
Get full text
Article -
816
Investigating the AGN-neutrino connection with public IceCube data
Published 2025-01-01“…We present the first application of a newly developed hierarchical Bayesian analysis framework for the detection of point-like sources of high-energy neutrinos. …”
Get full text
Article -
817
Sigma Delta Modulation Controller and Associated Cybersecurity Issues with Battery Energy Storage Integrated with PV-Based Microgrid
Published 2024-12-01“…Battery energy storage systems (BESSs) play a crucial role in integrating renewable energy sources into microgrids. However, robust BESS controllers are needed to carry out this function properly. …”
Get full text
Article -
818
The role of vitamin K in the pathology of newborns and infants (literature review)
Published 2024-10-01“…PIVKA II is used as a functional marker for the detection of vitamin K deficiency. …”
Get full text
Article -
819
21 Balmer Jump Street: The Nebular Continuum at High Redshift and Implications for the Bright Galaxy Problem, UV Continuum Slopes, and Early Stellar Populations
Published 2025-07-01“…First, we provide a theoretical background, showing how different stellar populations (SPS models, initial mass functions (IMFs), and stellar temperatures) and nebular conditions impact observed galaxy spectra. …”
Get full text
Article -
820
Apple leaf disease severity grading based on deep learning and the DRL-Watershed algorithm
Published 2025-08-01Get full text
Article