Search alternatives:
source » sources (Expand Search)
resourcesss » resourcessss (Expand Search)
resource » resources (Expand Search)
source » sources (Expand Search)
resourcesss » resourcessss (Expand Search)
resource » resources (Expand Search)
-
521
-
522
Expression characteristics and functional identification of PpD2 gene in peach (Prunus persica)
Published 2025-06-01Get full text
Article -
523
A Trade‐Off Between Leaf Carbon Economics and Plant Size Among Mangrove Species in Dongzhaigang, China
Published 2024-11-01Get full text
Article -
524
SOFTWARE COMPONENT DEVELOPMENT FOR PARALLEL GATEWAYS DETECTION AND QUALITY ASSESSMENT IN BPMN MODELS USING FUZZY LOGIC
Published 2025-07-01“…This features are evaluated using “soft” modeling rules based on fuzzy membership functions. Additionally, an activation function with the 0.5 threshold is used to generate binary quality indicators and calculate an integral quality assessment measure. …”
Get full text
Article -
525
-
526
-
527
-
528
A High‐Quality Reference Genome and Comparative Genomics of the Widely Farmed Banded Cricket (Gryllodes sigillatus) Identifies Selective Breeding Targets
Published 2025-03-01“…The high‐quality G. sigillatus genome assembly plus accompanying comparative genomic analyses serve as foundational resources for both applied and basic research on insect farming and behavioural biology, enabling researchers to pinpoint trait‐associated genetic variants, unravel functional pathways governing those phenotypes, and accelerate selective breeding efforts to increase the efficacy of large‐scale insect farming operations.…”
Get full text
Article -
529
-
530
-
531
Deception mechanisms of FDA‒AWACS against passive monopulse angle measurements
Published 2024-11-01Get full text
Article -
532
Unveiling the placental bacterial microbiota: implications for maternal and infant health
Published 2025-03-01Get full text
Article -
533
Design of a Non-Destructive Seed Counting Instrument for Rapeseed Pods Based on Transmission Imaging
Published 2024-12-01“…Human–machine interaction software based on PyQt5 was developed, integrating functions such as communication between upper and lower machines, image acquisition, storage, and processing. …”
Get full text
Article -
534
Intelligent Firefighting Technology for Drone Swarms with Multi-Sensor Integrated Path Planning: YOLOv8 Algorithm-Driven Fire Source Identification and Precision Deployment Strateg...
Published 2025-05-01“…This study aims to improve the accuracy of fire source detection, the efficiency of path planning, and the precision of firefighting operations in drone swarms during fire emergencies. …”
Get full text
Article -
535
Hybrid Deep Neural Network Optimization with Particle Swarm and Grey Wolf Algorithms for Sunburst Attack Detection
Published 2025-03-01“…The strength of DNNs is derived from their ability to model complex functions and to improve detection engines through deeper architecture. …”
Get full text
Article -
536
-
537
Computational Temporal Ghost Imaging Using Intensity-Only Detection Over a Single Optical Fiber
Published 2018-01-01“…We propose a method of computational temporal ghost imaging over a single optical fiber using simple optical intensity detection instead of coherent detection. The transfer function of a temporal ghost imaging system over a single optical fiber is derived, which is a function of the total fiber dispersion and the power density spectrum of the light source. …”
Get full text
Article -
538
Function over form: The benefits of aspen as surrogate brood‐rearing habitat for greater sage‐grouse
Published 2024-12-01Get full text
Article -
539
A fuzzy track-to-track association algorithm with dynamic time warping for trajectory-level vehicle detection
Published 2025-03-01“…Multi-source track-to-track association (TTTA), which identifies trajectories from multiple sensors or data sources of the same dynamic vehicle, is an important data fusion technique widely applied to vehicle detection in the fields of road, marine, and aviation transportation. …”
Get full text
Article -
540
Vulnerability detection using BERT based LLM model with transparency obligation practice towards trustworthy AI
Published 2024-12-01“…The result shows higher accuracy of 91.8 % for the vulnerability detection and model explainability outcome is highly influenced by “vulnerable”, “function”, ''mysql_tmpdir_list'', “strmov” tokens using both SHAP and LIME framework. …”
Get full text
Article