-
821
Design of Smart Plant Electrical Signal Monitoring System for Indoor Farming
Published 2025-01-01“…Calibration for this system needs a function generator. The calibration result is analyzed using statistical methods such as MAPE. …”
Get full text
Article -
822
The Effect of Processing of Hempseed on Protein Recovery and Emulsification Properties
Published 2021-01-01Get full text
Article -
823
-
824
Research on Buckwheat Weed Recognition in Multispectral UAV Images Based on MSU-Net
Published 2025-07-01“…The neuron death caused by the original ReLU activation function may lead to misidentification, so it was replaced by the Swish function to improve the adaptability to complex inputs. …”
Get full text
Article -
825
Towards an RFI Mitigation Algorithm in Synthetic Aperture Interferometer Radiometry: Application to the SMOS Space Mission
Published 2025-01-01“…The second step employs a modified version of the previous algorithm, incorporating a dynamic, source-specific search to detect and correct residual interferences. …”
Get full text
Article -
826
Assessment of the nutritional constituents of Elaeis Guineensis Jacq exudates from different States of Nigeria
Published 2013-07-01“…The concentration of potassium was high in all the samples irrespective of their sources. The exudates could be classified as a rich source of nutrients that are needed in man, as some of the nutrients act as sources of energy, body builders, components of body organs and tissues, coenzymes and play notable roles in biochemical functions and deficiency diseases. …”
Get full text
Article -
827
Integrated metabolomic and transcriptomic analyses of flavonoid accumulation in different cultivars of Platostoma palustre
Published 2024-12-01“…Abstract Background Platostoma palustre is a kind of plant resource with medicinal and food value, which has been differentiated into many different varieties after a long period of breeding. …”
Get full text
Article -
828
Mineral identification in thin sections using a lightweight and attention mechanism
Published 2025-04-01“…Mineral identification is foundational to geological survey research, mineral resource exploration, and mining engineering. Considering the diversity of mineral types and the challenge of achieving high recognition accuracy for similar features, this study introduces a mineral detection method based on YOLOv8-SBI. …”
Get full text
Article -
829
Advances in key technologies for the management, restoration, development, and utilization of coal mining subsidence areas
Published 2025-07-01“…BackgroundCoal mining subsidence areas, formed by the exploitation of coal resources, have emerged as severe challenges to the construction of ecological civilization and the sustainable development of the social economy in China. …”
Get full text
Article -
830
An Observational Study on Pre-natal Diagnosis of Congenital Talipes Equinovarus
Published 2025-07-01“…Future research should assess long-term functional outcomes and optimize pre-natal screening protocols, particularly in resource-limited settings, to ensure comprehensive CTEV management.…”
Get full text
Article -
831
Green Chemistry Method for Analyzing Bisphenol A in Milk
Published 2025-01-01“…., its ability to mimic hormone functions). Studies have reported that BPA can leach into various food sources, including milk, a dietary staple for infants. …”
Get full text
Article -
832
Assessment of the nutritional constituents of Elaeis Guineensis Jacq exudates from different States of Nigeria
Published 2013-07-01“…The concentration of potassium was high in all the samples irrespective of their sources. The exudates could be classified as a rich source of nutrients that are needed in man, as some of the nutrients act as sources of energy, body builders, components of body organs and tissues, coenzymes and play notable roles in biochemical functions and deficiency diseases. …”
Get full text
Article -
833
Characteristics of Land Use Change and Evaluation of Ecological Sensitivity in Chongqing
Published 2024-12-01Get full text
Article -
834
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
835
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
836
LncRNA H19 Promotes Gastric Cancer Metastasis via miR-148-3p/SOX-12 Axis
Published 2024-01-01Get full text
Article -
837
Fine-grained access control method for private data in android system
Published 2019-03-01“…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
Get full text
Article -
838
Comparing soil microbial diversity in smallholder plantain backyard gardens and main farms in Western and Central Africa
Published 2025-08-01“…Beneficial genera such as Bacillus, Streptomyces, Bradyrhizobium, and Paenibacillus were also detected. Functional predictions based on COG and KEGG databases indicated notable differences in microbial functional potential between the two settings. …”
Get full text
Article -
839
An atypical presentation of autoimmune hepatitis with delayed menarche in a Nigerian adolescent: a case report
Published 2025-01-01“…It emphasizes the need for increased awareness and better diagnostic resources to improve early detection and management of autoimmune hepatitis in sub-Saharan Africa. …”
Get full text
Article -
840
Proteinuria Ratio and Related Factors İn Type 2 DM Patients: A Hospital-Based Study in Somalia
Published 2025-02-01“…Understanding these factors is crucial for early detection and intervention to prevent kidney damage in this population. …”
Get full text
Article