Suggested Topics within your search.
Suggested Topics within your search.
-
101
PFW-YOLO Lightweight Helmet Detection Algorithm
Published 2025-01-01“…However, due to the limited arithmetic and storage resources of edge-end devices, and the traditional detection algorithms have problems such as the number of parameters and large computational volume, the detection algorithms are difficult to be deployed practically. …”
Get full text
Article -
102
Source-load coordinated optimal scheduling strategy considering solar thermal biomass utilization under integrated demand response incentives
Published 2024-11-01“…Secondly, on the load side, both price-based and substitution-based demand responses are introduced to improve the low-carbon performance of the IES through source-load coordinated optimization. Then, a liquid storage carbon capture system and a tiered carbon tax mechanism are introduced in the IES to enhance the system's low-carbon economic benefits, establishing an objective function to maximize the system's total revenue. …”
Get full text
Article -
103
Effect and mode of action of different doses and sources of zinc in weaning pigs using a meta-analytical and systematic review approach
Published 2024-12-01“…A total of 309 articles were identified from a literature research from 2001 to 2021; 85 were selected. Articles were divided in 3 datasets to evaluate: 1) the effects of ZnO doses (ZnO database); 2) the efficacy of ZnO on infection models (challenge database); 3) the effect of different Zn sources (special Zn database). …”
Get full text
Article -
104
Enterococcus faecalis strains derived from wild bird provide protection against Clostridium perfringens challenge in locally-sourced broilers
Published 2025-05-01“…IntroductionNecrotic enteritis (NE), caused by Clostridium perfringens, has seen a surge in chicken populations recently due to the ban on antibiotic growth promoters in feed.MethodsIn this research, screening and identification of probiotics with strong antagonistic ability against C. perfringens from 34 wild bird fecal isolates, followed by analysis of probiotic characteristics and carbon source metabolic activity. Strains exhibiting favorable antagonistic activity against C. perfringens were subsequently employed in vivo study to evaluate their protective efficacy against C. perfringens challenge in locally-sourced broilers.ResultsThe results showed that Enterococcus faecalis strains YL-EF25 and YL-EF32 were selected based on their ability to inhibit the growth and biofilm formation of C. perfringens. …”
Get full text
Article -
105
Pisum sativum L. as an alternative protein and starch source in Italian Mediterranean buffaloes’ feeding plan: in vitro evaluation of different varieties
Published 2025-12-01“…After multivariate cluster analysis, Ganster, Poisedon and Peps were selected for the second trial in function of highest organic and protein degradability. …”
Get full text
Article -
106
Inversion of Leaf Chlorophyll Content in Different Growth Periods of Maize Based on Multi-Source Data from “Sky–Space–Ground”
Published 2025-02-01“…This study proposes an improved method based on multi-source data, combining the Sentinel-2A spectral response function (SRF) and computer algorithms, to overcome the limitations of traditional methods. …”
Get full text
Article -
107
-
108
Walkability Evaluation of Historical and Cultural Districts Based on Multi-Source Data: A Case Study of the Former Russian Concession in Hankou
Published 2025-05-01“…Second, based on multi-source data, a comprehensive evaluation was conducted using spatial syntax, semantic segmentation, and GIS spatial analysis. …”
Get full text
Article -
109
-
110
Identification of swine- specific microbial genetic markers using competitive DNA hybridization
Published 2017-03-01“…The putative protein transcript of each sequence was analyzed based on the similarity of gene sequences by using BLASTX with the GenBank non-redundant database,and their biochemical functions were therefrom predicted.Sequence analyses of five hundred randomly selected clones from the libraries obtained by three rounds of metagenomic GFE revealed that this subset contained a total of 384 non-redundant sequences and most sequences (87%) ranged from 400 bp to 600 bp in size. …”
Get full text
Article -
111
Design and analysis of intelligent service chain system for network security resource pool
Published 2022-08-01“…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
Get full text
Article -
112
Fermented Buffalo Milk with Conjugated Linoleic Acid-Producing Bacteria: Strain Selection and Functional Applications
Published 2025-05-01“…Buffalo milk is a rich source of precursor fatty acids for bioactive compounds and provides an optimal environment for bacterial growth. …”
Get full text
Article -
113
Highly effective ionic liquids for biodiesel production from waste vegetable oils
Published 2015-03-01“…As conventional energy sources deplete, the need for developing alternative energy resources which are environment friendly becomes more imperative. …”
Get full text
Article -
114
Near-source wastewater surveillance of SARS-CoV-2, norovirus, influenza virus and RSV across five different sites in the UK.
Published 2025-01-01“…To address this, we conducted wastewater surveillance at five sites for SARS-CoV-2 and two sites for norovirus GI, norovirus GII, influenza A virus, influenza B virus, and human respiratory syncytial virus (RSV A and RSV B). Sites were selected for contrasting functions: an office, charity centre, museum, university, and care home. …”
Get full text
Article -
115
Molecular signature of selective microRNAs in Cyprinus carpio (Linnaeus 1758):a computational approach
Published 2019-03-01“…Using web based tools total 10 selected miRNAs belongs to 10 different families were illustrated and functionally categorized in Cyprinus carpio. …”
Get full text
Article -
116
Weak-Lensing Shear-Selected Galaxy Clusters from the Hyper Suprime-Cam Subaru Strategic Program: I. Cluster Catalog, Selection Function and Mass--Observable Relation
Published 2025-01-01“…We adopt a conservative source galaxy selection to construct a sample of $129$ weak-lensing peaks with a signal-to-noise ratio above $4.7$. …”
Get full text
Article -
117
-
118
Development and validation of microwave-assisted extraction for phenolic compound profiling in diverse oyster mushrooms (Pleurotus spp.) sourced from various geographical regions
Published 2025-04-01“…This study aimed to develop and validate a microwave-assisted extraction (MAE) method for profiling phenolic compounds in a diverse selection of oyster mushrooms (Pleurotus spp.) sourced from multiple geographical regions. …”
Get full text
Article -
119
High-throughput method for improving rice AGB estimation based on UAV multi-source remote sensing image feature fusion and ensemble learning
Published 2025-04-01“…The relationships between AGB and the selected features were then analyzed using multiple fitting functions. …”
Get full text
Article -
120
Continuous-Variable Quantum Key Distribution Protocol Based on Post-Selection
Published 2019-07-01“…In the paper, we present a CVQKD protocol based on post-selection method, which need not any extra single photon source. …”
Get full text
Article