Suggested Topics within your search.
Suggested Topics within your search.
-
921
Exploration of crop germplasm resources knowledge mining in Chinese ancient books: a route toward sustainable agriculture
Published 2025-04-01“…Using the local chronicles of Jiangsu Province, China (1251–1947) as the data source, we constructed a spatio-temporal ontology of rice species according to the writing paradigm of descriptive texts on rice, intelligently extracted the features of rice with entity word lists and rule templates, and compared them with existing rice germplasm resources to analyze the similarities and differences. …”
Get full text
Article -
922
Genetic Basis and Simulated Breeding Strategies for Enhancing Soybean Seed Protein Content Across Multiple Environments
Published 2025-07-01“…Soybeans are a primary source of plant-based protein, with seeds containing approximately 40% protein—a key quality trait. …”
Get full text
Article -
923
The therapeutic validity and effectiveness of physiotherapeutic exercise following total hip arthroplasty for osteoarthritis: A systematic review.
Published 2018-01-01“…<h4>Objective</h4>To assess the therapeutic validity and effectiveness of physiotherapeutic exercise interventions following total hip arthroplasty (THA) for osteoarthritis.<h4>Data sources</h4>The databases Embase, MEDLINE, Cochrane Library, CINAHL and AMED were searched from inception up to February 2017.…”
Get full text
Article -
924
The impact of dyadic interventions on psycho-social outcomes for stroke patients and their caregivers: a systematic review and meta-analysis
Published 2025-05-01“…AimsTo describe the details of dyadic interventions and summarize the current evidence on supporting dyadic interventions for psycho-social outcomes of stroke patients and their caregivers.DesignA systematic review and meta-analysis based on PRISMA guidelines.Data sourcesFive English databases (PubMed, Web of Science, CINAHL, Embase and Cochrane Library) were searched to identify eligible studies published from the inception to October 15, 2024.MethodsTwo reviewers independently screened the literature in accordance with the selection criteria. …”
Get full text
Article -
925
An Optimization Algorithm for Forward-Scatter Radar Network Node Deployment Based on BFGS and Improved NSGA-II
Published 2025-04-01“…A multi-objective optimization model was subsequently established with the objective functions of minimizing node cost and maximizing spatial detection area. …”
Get full text
Article -
926
Cryopreservation and culture strategies for testicular tissue and cells in small and large animals
Published 2025-07-01“…Spermatogenic cells from cryopreserved testicular tissue can be cultured in vitro and resume their functions after thawing, contributing to the preservation of fertility and genetic resources in both small and large animals. …”
Get full text
Article -
927
-
928
Identification method of roof rock interface based on response characteristics of drilling parameters
Published 2025-02-01Get full text
Article -
929
SWIPT-Enabled Cooperative Wireless IoT Networks With Friendly Jammer and Eavesdropper: Outage and Intercept Probability Analysis
Published 2023-01-01“…In this context, a low-complexity, sub-optimal, but efficient relay selection method is proposed. More specifically, the relay is selected to convey information such that it has the best channel to the source. …”
Get full text
Article -
930
A thorough assessment of 10-MDP primers in modern dental adhesive systems
Published 2024-09-01“…We focus on its chemistry, interactions with tooth substrates, interactions with zirconium and other metals, adhesive’s longevity, clinical applications, and potential drawbacks. Sources: Our sources are the Internet, such as Google Scholar and PubMed. …”
Get full text
Article -
931
Unified Weak Lensing Constraints on the Evolution of the Mass–X-Ray Luminosity Relation for Galaxy Clusters
Published 2025-01-01“…We also analyzed the impact of the selection function on calibration, finding that its full modeling is essential.…”
Get full text
Article -
932
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
933
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
934
Research on a traffic flow statistical algorithm based on YBOVDT and SAM2
Published 2025-05-01“…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
Get full text
Article -
935
Labour Productivity in Medical Institutions as an Object of Scientific Analysis
Published 2021-04-01“…The authors analyzed sources of home and foreign literature, normative documents for the period 2010–2019 dealing with this problem and practices of public health system functioning. …”
Get full text
Article -
936
Introduction to ORC–VCC Systems: A Review
Published 2025-01-01“…The key innovation lies in the development of an advanced coupling mechanism that seamlessly connects the ORC and VCC, enabling more efficient utilization of low-grade heat sources. By optimizing working fluid selection and implementing a shared shaft connection between the ORC turbine and VCC compressor, the system achieves dual functionality—simultaneous electricity generation and cooling—with higher efficiency than conventional methods. …”
Get full text
Article -
937
The importance of quantitative EGG for patients in a vegetative state in benzodiazepine test interpretation
Published 2017-11-01“…Using the multiparameter method of EEG analysis with a complex study of coherent interband links with topographic mapping and localization of equivalent dipole sources of individual EEG components, characteristic signs of changes in intercentral neuronal connections at different stages of a vegetative state were obtained, features of structural and functional interrelations for patients in a vegetative state in benzodiazepine test interpretation of which identification can represent and interest for the output prediction and selection of adequate therapy.…”
Get full text
Article -
938
Manufacturing Consent for the 2018 Elections in Venezuela and Colombia
Published 2018-12-01“…Furthermore, by conducting a series of 27 interviews with journalists covering the two countries, it finds evidence to support Herman and Chomsky’s theories about the pre-selection of journalists and how ownership and management, sources and flak influence the output of media. …”
Get full text
Article -
939
Study of Complex Impedance Dispersion Model for Two-Phase Laminar Flow
Published 2023-12-01Get full text
Article -
940
Design of the Field Protection and Signal Priority at Intersection System for Autonomous-rail Rapid Transit
Published 2022-06-01“…It provides auxiliary driving information for the driver through automation equipment, realizes the functions of route protection, virtual section occupied/unoccupied detection, signal control, entering/leaving station detection, platform door linkage control, berth status detection and management in deport and so on, which improves system security and reduces driver working intensity. …”
Get full text
Article