Showing 101 - 120 results of 2,295 for search '(( resources detection function ) OR (( source OR sources) selection function ))', query time: 0.36s Refine Results
  1. 101

    PFW-YOLO Lightweight Helmet Detection Algorithm by Yue Hong, Hao Wang, Shuo Guo

    Published 2025-01-01
    “…However, due to the limited arithmetic and storage resources of edge-end devices, and the traditional detection algorithms have problems such as the number of parameters and large computational volume, the detection algorithms are difficult to be deployed practically. …”
    Get full text
    Article
  2. 102

    Source-load coordinated optimal scheduling strategy considering solar thermal biomass utilization under integrated demand response incentives by ZHANG Yewei, WEN Zhong, WANG Can, NI Zhi, YAN Wenwen, HU Chuanbao

    Published 2024-11-01
    “…Secondly, on the load side, both price-based and substitution-based demand responses are introduced to improve the low-carbon performance of the IES through source-load coordinated optimization. Then, a liquid storage carbon capture system and a tiered carbon tax mechanism are introduced in the IES to enhance the system's low-carbon economic benefits, establishing an objective function to maximize the system's total revenue. …”
    Get full text
    Article
  3. 103

    Effect and mode of action of different doses and sources of zinc in weaning pigs using a meta-analytical and systematic review approach by Diana Luise, Clara Negrini, Federico Correa, Paolo Trevisi

    Published 2024-12-01
    “…A total of 309 articles were identified from a literature research from 2001 to 2021; 85 were selected. Articles were divided in 3 datasets to evaluate: 1) the effects of ZnO doses (ZnO database); 2) the efficacy of ZnO on infection models (challenge database); 3) the effect of different Zn sources (special Zn database). …”
    Get full text
    Article
  4. 104

    Enterococcus faecalis strains derived from wild bird provide protection against Clostridium perfringens challenge in locally-sourced broilers by Gerui Zhang, Ainul Zahra, Tianrui Yang, Qiyu Guo, Yan Sun, Yuhang Zhang, Yupeng Gao, Yuxi Zhang, Mingyue Wang, Jingshuo Gong, Haibin Huang, Zhannan Wang, Chunfeng Wang, Yanlong Jiang

    Published 2025-05-01
    “…IntroductionNecrotic enteritis (NE), caused by Clostridium perfringens, has seen a surge in chicken populations recently due to the ban on antibiotic growth promoters in feed.MethodsIn this research, screening and identification of probiotics with strong antagonistic ability against C. perfringens from 34 wild bird fecal isolates, followed by analysis of probiotic characteristics and carbon source metabolic activity. Strains exhibiting favorable antagonistic activity against C. perfringens were subsequently employed in vivo study to evaluate their protective efficacy against C. perfringens challenge in locally-sourced broilers.ResultsThe results showed that Enterococcus faecalis strains YL-EF25 and YL-EF32 were selected based on their ability to inhibit the growth and biofilm formation of C. perfringens. …”
    Get full text
    Article
  5. 105

    Pisum sativum L. as an alternative protein and starch source in Italian Mediterranean buffaloes’ feeding plan: in vitro evaluation of different varieties by Alessandro Vastolo, Roberta Matera, Giulia Passarelli, Serena Calabrò, Matteo Santinello, Gianluca Neglia, Monica Isabella Cutrignelli

    Published 2025-12-01
    “…After multivariate cluster analysis, Ganster, Poisedon and Peps were selected for the second trial in function of highest organic and protein degradability. …”
    Get full text
    Article
  6. 106

    Inversion of Leaf Chlorophyll Content in Different Growth Periods of Maize Based on Multi-Source Data from “Sky–Space–Ground” by Wu Nile, Su Rina, Na Mula, Cha Ersi, Yulong Bao, Jiquan Zhang, Zhijun Tong, Xingpeng Liu, Chunli Zhao

    Published 2025-02-01
    “…This study proposes an improved method based on multi-source data, combining the Sentinel-2A spectral response function (SRF) and computer algorithms, to overcome the limitations of traditional methods. …”
    Get full text
    Article
  7. 107
  8. 108

    Walkability Evaluation of Historical and Cultural Districts Based on Multi-Source Data: A Case Study of the Former Russian Concession in Hankou by Haoran She, Jing Sun, Yuchen Zeng, Wenyu Tu, Guang Ao, Wei Shang

    Published 2025-05-01
    “…Second, based on multi-source data, a comprehensive evaluation was conducted using spatial syntax, semantic segmentation, and GIS spatial analysis. …”
    Get full text
    Article
  9. 109
  10. 110

    Identification of swine- specific microbial genetic markers using competitive DNA hybridization by FAN Lihua, MO Hongfei, ZHANG Xiaofeng, SHUAI Jiangbing, CHEN Qing

    Published 2017-03-01
    “…The putative protein transcript of each sequence was analyzed based on the similarity of gene sequences by using BLASTX with the GenBank non-redundant database,and their biochemical functions were therefrom predicted.Sequence analyses of five hundred randomly selected clones from the libraries obtained by three rounds of metagenomic GFE revealed that this subset contained a total of 384 non-redundant sequences and most sequences (87%) ranged from 400 bp to 600 bp in size. …”
    Get full text
    Article
  11. 111

    Design and analysis of intelligent service chain system for network security resource pool by Zenan WANG, Jiahao LI, Chaohong TAN, Dechang PI

    Published 2022-08-01
    “…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
    Get full text
    Article
  12. 112
  13. 113

    Highly effective ionic liquids for biodiesel production from waste vegetable oils by Fathy A. Yassin, Fathy Y. El Kady, Hoda S. Ahmed, Latifa K. Mohamed, Seham A. Shaban, Ahmed K. Elfadaly

    Published 2015-03-01
    “…As conventional energy sources deplete, the need for developing alternative energy resources which are environment friendly becomes more imperative. …”
    Get full text
    Article
  14. 114

    Near-source wastewater surveillance of SARS-CoV-2, norovirus, influenza virus and RSV across five different sites in the UK. by Jay C Bullen, Mina Mohaghegh, Fatima Tahir, Charlotte Hammer, Jacob Sims, Frederico Myers, Lucas Eisinger, Ali Reza Kasmati, Claire F Trant

    Published 2025-01-01
    “…To address this, we conducted wastewater surveillance at five sites for SARS-CoV-2 and two sites for norovirus GI, norovirus GII, influenza A virus, influenza B virus, and human respiratory syncytial virus (RSV A and RSV B). Sites were selected for contrasting functions: an office, charity centre, museum, university, and care home. …”
    Get full text
    Article
  15. 115

    Molecular signature of selective microRNAs in Cyprinus carpio (Linnaeus 1758):a computational approach by Soumendu Ghosh, Manojit Bhattacharya, Avijit Kar, Basanta Kumar Das, Bidhan Chandra Patra

    Published 2019-03-01
    “…Using web based tools total 10 selected miRNAs belongs to 10 different families were illustrated and functionally categorized in Cyprinus carpio. …”
    Get full text
    Article
  16. 116
  17. 117
  18. 118

    Development and validation of microwave-assisted extraction for phenolic compound profiling in diverse oyster mushrooms (Pleurotus spp.) sourced from various geographical regions by M Umar Harun, Miguel Palma, Widiastuti Setyaningsih

    Published 2025-04-01
    “…This study aimed to develop and validate a microwave-assisted extraction (MAE) method for profiling phenolic compounds in a diverse selection of oyster mushrooms (Pleurotus spp.) sourced from multiple geographical regions. …”
    Get full text
    Article
  19. 119
  20. 120

    Continuous-Variable Quantum Key Distribution Protocol Based on Post-Selection by Hao YU, Bao FENG, Zichun PAN, Wenhe ZHUO, Zhenwei LI

    Published 2019-07-01
    “…In the paper, we present a CVQKD protocol based on post-selection method, which need not any extra single photon source. …”
    Get full text
    Article