-
1001
State of the art in remote sensing monitoring of carbon dynamics in African tropical forests
Published 2025-03-01“…Future developments in remote sensing should examine how multi-sensor integration of high-resolution data from instruments such as Planet, Tandem-X, SPOT and improved AI methods can refine forest composition, carbon storage and function maps, enhance large-scale monitoring of tree height and biomass dynamics, and improve forest degradation and deforestation detection down to tree level. …”
Get full text
Article -
1002
An Emergency Response Framework Design and Performance Analysis for Ship Fire Incidents in Waterway Tunnels
Published 2025-07-01“…The framework is mapped into a Petri net model encompassing three key stages: detection and early warning, emergency response actions, and recovery. …”
Get full text
Article -
1003
Optimization of multi-element geochemical anomaly recognition in the Takht-e Soleyman area of northwestern Iran using swarm-intelligence support vector machine
Published 2025-03-01“…Mineral exploration is becoming increasingly challenging because the depths at which undiscovered mineral deposits can be found are progressively increasing under barren cover. Therefore, detecting metal resources under barren cover is a significant step for industrial progress. …”
Get full text
Article -
1004
Species-level enumeration of low-concentration lactic acid bacteria in breast milk
Published 2025-12-01Get full text
Article -
1005
Near-infrared spectroscopy of the cerebellum in motor activation tasks
Published 2025-07-01“…Protocol 1 consisted of 5 optodes (4 sources and 1 detector, 4 recording channels) spaced 3 cm apart and comprising single-tipped LED light sources in conjunction with single-tipped fiber-optic detectors. …”
Get full text
Article -
1006
New Rotation Periods from the Kepler Bonus Background Light Curves
Published 2025-01-01“…However, due to Kepler’s large 4″ pixels, many of its light curves are at high risk of contamination from background sources. The new Kepler Bonus Background light curves are deblended using a point-spread function algorithm, providing light curves of over 400,000 new background sources in addition to over 200,000 reanalyzed Kepler prime targets. …”
Get full text
Article -
1007
A new fluorescent probe based on BODIPY for testing NO2 released from propellants
Published 2025-03-01Get full text
Article -
1008
-
1009
The 4–400 GHz Survey for the 32 Class II Disks in the Taurus Molecular Cloud
Published 2025-01-01“…We have compiled the ∼4–400 GHz broad spectra of 32 Class II protoplanetary disks (PPDs) in the Taurus-Auriga region, which represents the brightest one-third of sources detected in the submillimeter band in this region. …”
Get full text
Article -
1010
REVISITING THE ORGANIZATION OF A CLINICAL (MEDICAL) PSYCHOLOGIST WORK AT THE FIRST STAGE OF MEDICAL REHABILITATION IN THE CONDITIONS OF THE INTENSIVE CARE UNIT (ICU) BY THE EXAMPLE...
Published 2025-03-01“…There is currently a pressing need to devise a way of neurophycological diagnostics of higher mental functions which would allow to detect cognitive impairment in patients in the ICU during the first stages of medical rehabilitation taking into account working hours constraints.…”
Get full text
Article -
1011
In situ, modeled, and earth observation monitoring of surface water availability in West African rangelands
Published 2025-06-01“…The 12 locations can function as sentinel ponds to monitor local water availability. …”
Get full text
Article -
1012
In Vitro Inhibition of Enzymes and Antioxidant and Chemical Fingerprinting Characteristics of <i>Azara serrata</i> Ruiz & Pav. Fruits, an Endemic Plant of the Valdivian Forest of C...
Published 2024-09-01“…The results show that these neglected endemic small berries can be a source of healthy phytochemicals. These Chilean berries can be used as functional food and their extracts are candidates for use as functional ingredients in naturally healthy products.…”
Get full text
Article -
1013
Study on the effect of environmental humidity on the thermal decomposition characteristics of PVC outer sheath of high-voltage cables
Published 2025-08-01“…Thermal decomposition experiments were conducted across ten humidity gradients, ranging from 10 to 100%, using a specially designed experimental platform that included heating, temperature and humidity control, and gas detection. Set a heat source of 200℃ to simulate the early fault state of high-voltage cables before a fire occurs. …”
Get full text
Article -
1014
Cryopreservation and culture strategies for testicular tissue and cells in small and large animals
Published 2025-07-01“…Spermatogenic cells from cryopreserved testicular tissue can be cultured in vitro and resume their functions after thawing, contributing to the preservation of fertility and genetic resources in both small and large animals. …”
Get full text
Article -
1015
-
1016
Identification method of roof rock interface based on response characteristics of drilling parameters
Published 2025-02-01Get full text
Article -
1017
Enabling beam-scanning antenna technologies for terahertz wireless systems: A review
Published 2025-03-01“…While producing a scannable highly-directive antenna beam proves to be indispensable in the period of microwaves, the significance of such functionality is more critical in the THz era, considering that THz waves have more intractable challenges such as the severity of free-space propagation losses, the susceptibility to atmospheric environments, and the unavailability of efficient signal sources. …”
Get full text
Article -
1018
Biodegradation of S-Triazine Herbicides Under Saline Conditions by <i>Paenarthrobacter ureafaciens</i> PC, a New Halotolerant Bacterial Isolate: Insights into Both the Degradative...
Published 2025-03-01“…Furthermore, the biodegradation pathways of prometryne (the target compound) by this strain were proposed based on the detection of possible degradation intermediates and genome sequencing analysis. …”
Get full text
Article -
1019
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
1020
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article