-
521
Cross-Domain Communication Method Based on Load Balancing for SDNs
Published 2025-02-01“…Therefore, the multi-domain control plane needs to consider more network resource states during the path selection, such as link weights, load saturation, and resource occupancy rates, in order to select the optimal paths to maximize the satisfaction of data plane requirements while maintaining network load balance. …”
Get full text
Article -
522
A Wind Power Density Forecasting Model Based on RF-DBO-VMD Feature Selection and BiGRU Optimized by the Attention Mechanism
Published 2025-02-01“…This paper proposes a novel WPD forecasting model based on RF-DBO-VMD feature selection and BiGRU optimized by an attention mechanism. …”
Get full text
Article -
523
Implementation and Effectiveness of community-based resources to increase cervical cancer screening uptake among women living in sub-Saharan Africa: A protocol for systematic revie...
Published 2019-08-01“… # Methods We will systematically search selected databases and websites from 1980 to date for published and grey literature including citation and reference list tracking, on studies with a community focus carried out in sub-Saharan Africa, without language restrictions. …”
Get full text
Article -
524
Acoustic Emission as a Method for Analyzing Changes and Detecting Damage in Composite Materials During Loading
Published 2021-08-01“…The signal obtained from the sensor was then further processed and used to draw up diagrams of the AE hits, amplitude, root mean square of the AE source signal (RMS) and duration in the function of time. …”
Get full text
Article -
525
-
526
Detection of Greenhouse and Typical Rural Buildings with Efficient Weighted YOLOv8 in Hebei Province, China
Published 2025-05-01“…However, in rural and mountainous areas, the resolution and accessibility of remote sensing satellite images from a single source are poor, making it difficult to detect greenhouses and rural buildings effectively and automatically. …”
Get full text
Article -
527
LMGD: Log-Metric Combined Microservice Anomaly Detection Through Graph-Based Deep Learning
Published 2024-01-01“…Therefore, there is an urgent need for fast and accurate anomaly detection capabilities. However, the existing microservice anomaly detection methods do not pay attention to the multi-source data of the microservice system and thus have low accuracy. …”
Get full text
Article -
528
Evaluation of a coastal acoustic buoy for cetacean detections, bearing accuracy and exclusion zone monitoring
Published 2022-11-01“…Field trials indicated maximum detection ranges from 4–7.3 km depending on source and ambient noise levels. …”
Get full text
Article -
529
AC-YOLO: A lightweight ship detection model for SAR images based on YOLO11.
Published 2025-01-01“…However, existing SAR ship detection algorithms encounter two major challenges: limited detection accuracy and high computational cost, primarily due to the wide range of target scales, indistinct contour features, and complex background interference. …”
Get full text
Article -
530
Evaluating machine learning-based intrusion detection systems with explainable AI: enhancing transparency and interpretability
Published 2025-05-01“…Machine Learning (ML)-based Intrusion Detection Systems (IDS) are integral to securing modern IoT networks but often suffer from a lack of transparency, functioning as “black boxes” with opaque decision-making processes. …”
Get full text
Article -
531
A High‐Quality Reference Genome and Comparative Genomics of the Widely Farmed Banded Cricket (Gryllodes sigillatus) Identifies Selective Breeding Targets
Published 2025-03-01“…The high‐quality G. sigillatus genome assembly plus accompanying comparative genomic analyses serve as foundational resources for both applied and basic research on insect farming and behavioural biology, enabling researchers to pinpoint trait‐associated genetic variants, unravel functional pathways governing those phenotypes, and accelerate selective breeding efforts to increase the efficacy of large‐scale insect farming operations.…”
Get full text
Article -
532
Deception mechanisms of FDA‒AWACS against passive monopulse angle measurements
Published 2024-11-01Get full text
Article -
533
Multimodal imaging analysis and structure-function correlation in patients exposed to pentosan polysulfate sodium
Published 2025-07-01“…Purpose: To study the anatomic and functional retinal changes in patients exposed to pentosan polysulfate (PPS) using multimodal imaging and mesopic microperimetry. …”
Get full text
Article -
534
Expression characteristics and functional identification of PpD2 gene in peach (Prunus persica)
Published 2025-06-01Get full text
Article -
535
-
536
Studying grain color diversity in the barley collection of VIR
Published 2022-10-01Get full text
Article -
537
Source Process Estimation for the 2024 Mw 7.1 Hyuganada, Japan, Earthquake and Forward Modeling Using N‐net Ocean Bottom Seismometer Data
Published 2025-05-01“…The N‐net seafloor seismograms of the mainshock with a frequency of ∼0.05 Hz recorded east of the source area were reproduced for several stations using the empirical Green's function approach based on the estimated source process data.…”
Get full text
Article -
538
-
539
Advancements in Nanostructured Functional Constituent Materials for Gas Sensing Applications: A Comprehensive Review
Published 2025-02-01“…By providing a comprehensive and up-to-date analysis, this review serves as a valuable resource for researchers and engineers, offering insights that can drive the next generation of high-performance, reliable, and selective gas sensors.…”
Get full text
Article -
540
Dynamic scheduling method of service function chain executors based on the mimic defense architecture
Published 2022-04-01“…Faced with the problem that static and lagging traditional defense technologies cannot effectively deal with new network attacks, according to the theory of mimetic security defense, a defense architecture of mimic service function chain (MSFC) based on the data forwarding level was proposed, and an execution dynamic scheduling method based on the decision feedback was further proposed.The method took the abnormal executor information fed back by the decision maker, the heterogeneity of executors and the actual load of the system as the scheduling influencing factors, so that the scheduling method can be adjusted adaptively according to the actual changes of the network.In addition, the scheduling method used decision feedback to adjust the scheduling time, so as to achieve the best balance between system cost and security, and reduce the resource overhead of the system.Simulation results showed that the scheduling method can select a set of highly heterogeneous actuators that better meet the current network requirements on the basis of balancing the system cost and security, so as to improve the security and reliability of the system.…”
Get full text
Article