Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functions » function (Expand Search)
resourcessssss » resourcesssssss (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
functions » function (Expand Search)
resourcessssss » resourcesssssss (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
-
861
Integrating Food Preference Profiling, Behavior Change Strategies, and Machine Learning for Cardiovascular Disease Prevention in a Personalized Nutrition Digital Health Interventio...
Published 2025-08-01“…Intervention functions were designed using the Behavior Change Wheel, and behavior change techniques were selected for the DHI features. …”
Get full text
Article -
862
Generation of Spatial Structure of Urban Parks Based on Spatial Analysis of Agent-Based Models
Published 2025-03-01“…By adjusting model parameters, the foraging paths of slime molds in the designed site are simulated, and their spatial function distribution is analyzed. The simulation environment is based on multi-source data analysis and involves setting particle growth points, food locations, and environmental obstacles. …”
Get full text
Article -
863
An Optimization Algorithm for Forward-Scatter Radar Network Node Deployment Based on BFGS and Improved NSGA-II
Published 2025-04-01“…A multi-objective optimization model was subsequently established with the objective functions of minimizing node cost and maximizing spatial detection area. …”
Get full text
Article -
864
Cryopreservation and culture strategies for testicular tissue and cells in small and large animals
Published 2025-07-01“…Spermatogenic cells from cryopreserved testicular tissue can be cultured in vitro and resume their functions after thawing, contributing to the preservation of fertility and genetic resources in both small and large animals. …”
Get full text
Article -
865
-
866
Identification method of roof rock interface based on response characteristics of drilling parameters
Published 2025-02-01Get full text
Article -
867
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
868
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
869
Research on a traffic flow statistical algorithm based on YBOVDT and SAM2
Published 2025-05-01“…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
Get full text
Article -
870
Study of Complex Impedance Dispersion Model for Two-Phase Laminar Flow
Published 2023-12-01Get full text
Article -
871
Design of the Field Protection and Signal Priority at Intersection System for Autonomous-rail Rapid Transit
Published 2022-06-01“…It provides auxiliary driving information for the driver through automation equipment, realizes the functions of route protection, virtual section occupied/unoccupied detection, signal control, entering/leaving station detection, platform door linkage control, berth status detection and management in deport and so on, which improves system security and reduces driver working intensity. …”
Get full text
Article -
872
The On-Chip D-LMS Filter Design Method of Wireless Sensor Node Based on FPGA
Published 2020-01-01“…In the real-time position technology of underground shallow source, the signal denoising performance of wireless sensor nodes directly determines the location speed and accuracy of underground burst point. …”
Get full text
Article -
873
Battery Energy Storage System Placement And Sizing In Distribution Networks
Published 2024-01-01“…The methodology is applicable to BESS which implement the functions of ensuring the reliability of power supply to consumers (use of BESS as a backup or emergency source of power supply), as well as the function of regulating voltage levels in the electrical network (regulating reactive power by the BESS inverter).…”
Get full text
Article -
874
Manufacturing Consent for the 2018 Elections in Venezuela and Colombia
Published 2018-12-01“…Furthermore, by conducting a series of 27 interviews with journalists covering the two countries, it finds evidence to support Herman and Chomsky’s theories about the pre-selection of journalists and how ownership and management, sources and flak influence the output of media. …”
Get full text
Article -
875
Vocal constraints on song amplitude in star finches Bathilda ruficauda
Published 2025-07-01“…This suggests that the frequency-amplitude correlation is a more general phenomenon in bird vocalisations, independent of the overall source amplitude of a species. While the evolution of birdsong is often viewed as constrained by neural costs and body size, or selective pressures from predators and social aggression, our results emphasise the importance of understanding phonetic features as well. …”
Get full text
Article -
876
Thermal analysis and multi-objective optimization of equal-area microfluidic cooling systems
Published 2025-09-01“…Four distinct microchannel designs were selected to explore how variations in structure impact thermal management efficiency. …”
Get full text
Article -
877
When, where, and how prey pair antipredator behaviors to natural and anthropogenic mortality risks
Published 2025-07-01“…We used hidden Markov models to determine whether each covariate impacted the probability of transitioning between behavioral states and selection functions to determine whether deer spatially avoided each covariate. …”
Get full text
Article -
878
Quantifying degradation in animal acoustic signals with the R package baRulho
Published 2025-03-01“…Abstract Animal acoustic signals are shaped by selection to convey information based on their tempo, intensity, and frequency. …”
Get full text
Article -
879
Apple leaf disease severity grading based on deep learning and the DRL-Watershed algorithm
Published 2025-08-01Get full text
Article -
880
Rapid Simulation of Floods by Considering the Spatial and Temporal Characteristics of Inundation
Published 2025-06-01Get full text
Article