Suggested Topics within your search.
Suggested Topics within your search.
-
521
Optimized conductor selection and phase balancing in unbalanced distribution networks: Economic optimization via the vortex search algorithm
Published 2025-09-01“…Given the complexity of the model, a leader–follower methodology based on the vortex search algorithm (VSA) is employed to determine the conductor caliber and load phase configuration, in conjunction with the three-phase successive approximations power flow method to compute the objective function. …”
Get full text
Article -
522
A genome-wide metabolic QTL analysis in Europeans implicates two loci shaped by recent positive selection.
Published 2011-09-01“…Two of the three hit regions lie within haplotype blocks (at 2p13.1 and 10q24.2) that carry the genetic signature of strong, recent, positive selection in European populations. Genes NAT8 and PYROXD2, both with relatively uncharacterized functional roles, are good candidates for mediating the corresponding mQTL associations. …”
Get full text
Article -
523
Source-load coordinated optimal scheduling strategy considering solar thermal biomass utilization under integrated demand response incentives
Published 2024-11-01“…Secondly, on the load side, both price-based and substitution-based demand responses are introduced to improve the low-carbon performance of the IES through source-load coordinated optimization. Then, a liquid storage carbon capture system and a tiered carbon tax mechanism are introduced in the IES to enhance the system's low-carbon economic benefits, establishing an objective function to maximize the system's total revenue. …”
Get full text
Article -
524
-
525
Inversion of Leaf Chlorophyll Content in Different Growth Periods of Maize Based on Multi-Source Data from “Sky–Space–Ground”
Published 2025-02-01“…This study proposes an improved method based on multi-source data, combining the Sentinel-2A spectral response function (SRF) and computer algorithms, to overcome the limitations of traditional methods. …”
Get full text
Article -
526
Effect and mode of action of different doses and sources of zinc in weaning pigs using a meta-analytical and systematic review approach
Published 2024-12-01“…A total of 309 articles were identified from a literature research from 2001 to 2021; 85 were selected. Articles were divided in 3 datasets to evaluate: 1) the effects of ZnO doses (ZnO database); 2) the efficacy of ZnO on infection models (challenge database); 3) the effect of different Zn sources (special Zn database). …”
Get full text
Article -
527
Enterococcus faecalis strains derived from wild bird provide protection against Clostridium perfringens challenge in locally-sourced broilers
Published 2025-05-01“…IntroductionNecrotic enteritis (NE), caused by Clostridium perfringens, has seen a surge in chicken populations recently due to the ban on antibiotic growth promoters in feed.MethodsIn this research, screening and identification of probiotics with strong antagonistic ability against C. perfringens from 34 wild bird fecal isolates, followed by analysis of probiotic characteristics and carbon source metabolic activity. Strains exhibiting favorable antagonistic activity against C. perfringens were subsequently employed in vivo study to evaluate their protective efficacy against C. perfringens challenge in locally-sourced broilers.ResultsThe results showed that Enterococcus faecalis strains YL-EF25 and YL-EF32 were selected based on their ability to inhibit the growth and biofilm formation of C. perfringens. …”
Get full text
Article -
528
Pisum sativum L. as an alternative protein and starch source in Italian Mediterranean buffaloes’ feeding plan: in vitro evaluation of different varieties
Published 2025-12-01“…After multivariate cluster analysis, Ganster, Poisedon and Peps were selected for the second trial in function of highest organic and protein degradability. …”
Get full text
Article -
529
An optimization method of multiscale storage tank target detection introducing an attention mechanism
Published 2024-01-01“…As containers for chemical storage, storage tanks are potential sources of hazards. Conducting target detection for hazard risk analysis is essential. …”
Get full text
Article -
530
YOLOX-LS: Strong Gravitational Lenses Detection in the DECaLS with Deep Learning
Published 2025-01-01“…We apply the YOLOX algorithm as the basic framework and improve it by selecting the optimal optimizer, activation function, attention mechanism, and loss function. …”
Get full text
Article -
531
Multi-Person Fall Detection Using Data Assimilation Method With Kalman Filter
Published 2025-01-01“…Fall detection is an essential technology for ensuring the safety of elderly individuals, as falling accidents are critical and can cause significant functional damage in old age. …”
Get full text
Article -
532
cogsworth: A Gala of COSMIC Proportions Combining Binary Stellar Evolution and Galactic Dynamics
Published 2025-01-01“…Alternatively, several analytic models are available for galactic potentials and star formation histories. cogsworth can also transform the intrinsic simulated population into an observed population using dust maps, bolometric correction functions, and survey selection functions. We provide a detailed explanation of the functionality of cogsworth and demonstrate its capabilities through a series of use cases: (1) we predict the spatial distribution of compact objects and runaways in both dwarf and Milky Way–like galaxies; (2) using a star cluster from a hydrodynamical simulation, we show how supernovae can change the orbits of stars in several ways; and (3) we predict the separation of disrupted binary stellar companions on the sky and create a synthetic Gaia color–magnitude diagram. …”
Get full text
Article -
533
Review of Fault Detection and Diagnosis Methods in Power Plants: Algorithms, Architectures, and Trends
Published 2025-06-01“…Key findings are summarized in a comparative matrix, highlighting trends, gaps, and inconsistencies across publication sources. This review identifies critical research gaps—including the underuse of hybrid models, lack of benchmark datasets, and limited integration between detection and control layers—and offers concrete recommendations for future research. …”
Get full text
Article -
534
Detection of Elementary White Mucosal Lesions by an AI System: A Pilot Study
Published 2024-11-01Get full text
Article -
535
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
536
Securing Electric Vehicle Performance: Machine Learning-Driven Fault Detection and Classification
Published 2024-01-01“…In addition, the superiority of the proposed fault detection and classification approaches using ML tools was assessed by comparing the detection and classification efficiency through some statistical performance parameter comparisons among the classifiers.…”
Get full text
Article -
537
Optimization of Protein Extraction from Sunflower Meal Using Taguchi Design and Regression Modeling for Human Nutrition Applications
Published 2025-07-01“…Safety analyses confirmed the absence of detectable aflatoxins and very low PAH levels. These results support the use of sunflower protein concentrate as a sustainable, nutritionally valuable, and safe ingredient for functional food applications. …”
Get full text
Article -
538
Research on monthly runoff prediction model considering secondary decomposition of multiple fitness functions and deep learning
Published 2025-12-01“…In addition, to improve the precision of sequence decomposition, 12 distinct fitness functions are selected as objective functions for optimizing the parameters of both decomposition algorithms. …”
Get full text
Article -
539
Automated identification of soil functional components based on NanoSIMS data
Published 2024-12-01“…The tool is provided as an open-source software toolbox (NanoT). In addition, a two-step unsupervised segmentation method was developed to identify soil functional components based on NanoSIMS analyses. …”
Get full text
Article -
540
A study on pollen characteristics of bisexual and functionally male flowers in pomegranate
Published 2025-04-01“…Although the functionally male flowers could accept pollen and the pollen on the stigma surface could germinate, only a few pollens could germinate with pollen tube successfully growing into the pistil. …”
Get full text
Article