Suggested Topics within your search.
Suggested Topics within your search.
-
241
-
242
Open-Source vs. Commercial Photogrammetry: Comparing Accuracy and Efficiency of OpenDroneMap and Agisoft Metashape
Published 2025-06-01“…OpenDroneMap (ODM), open-source software, offers similar functionalities to popular commercial options, enabling the generation of point clouds, DEMs, and mesh models using advanced algorithms like Multi-View Stereo (MVS) and Poisson surface reconstruction. …”
Get full text
Article -
243
Bias‐Independent True Random Number Generator Circuit using Memristor Noise Signals as Entropy Source
Published 2025-06-01“…Finally, the performance of the designed TRNG circuit is evaluated using autocorrelation functions and National Institute of Standards and Technology tests, confirming its capability to produce random number bitstreams.…”
Get full text
Article -
244
Varying Activity and the Burst Properties of FRB 20240114A Probed with GMRT Down to 300 MHz
Published 2024-01-01“…All of the bursts we detect are faint (<10 Jy ms) and thus probe the lower end of the energy distribution. …”
Get full text
Article -
245
Potential Source Regions and Transportation Pathways of Reactive Gases at a Regional Background Site in Northwestern China
Published 2021-01-01“…Wind rose, cluster analysis, potential source contribution function (PSCF), and concentration-weighted trajectory (CWT) methods were adopted for identifying the transport pathways and potential source regions of these atmosphere components at Akedala. …”
Get full text
Article -
246
Signatures of positive selection for local adaptation of African native cattle populations: A review
Published 2023-07-01“…Although there are no functional genomics studies, recent advancements in genotyping and sequencing technologies have identified and annotated limited functional genes and causal variants associated with unique adaptive and economical traits of African cattle populations. …”
Get full text
Article -
247
Business awareness in the management of a modern organisation regarding the usage of selected information technologies
Published 2024-12-01“…Implications for theory and practice The article presents not only aspects related to the functioning of a modern organization but also the possibilities of using selected IT solutions in this aspect. …”
Get full text
Article -
248
Environmental Risk Assessment of Wuhan Qingshan Industrial Park Based on Multi-Source Data Fusion and FAHP
Published 2025-01-01“…The fuzzy analytic hierarchy process (FAHP) is employed to assign weights through expert judgment, and fuzzy membership functions are used to determine risk levels across selected sub-regions. …”
Get full text
Article -
249
A Deep Variational Approach to Multiterminal Joint Source-Channel Coding Based on Information Bottleneck Principle
Published 2025-01-01“…To that end, tractable objective functions are developed, together with the pertinent learning architectures, generalizing the concepts of Variational Auto-Encoders and (Distributed) Deep Variational Information Bottleneck for (remote) source coding to the context of distributed joint source-channel coding. …”
Get full text
Article -
250
Investigation of the chemical composition of cell cultures of DIOSCOREA CAUCASICA in connection with the production of BAS sources with cardioprotective potential
Published 2022-02-01“…Dioscorea Caucasica is a source of various biologically active substances (BAS), e.g. saponins and polyphenols, which are known for their anti-atherosclerotic action. …”
Get full text
Article -
251
Algorithms for Automatic Detection and Location of Infrasound Events in the PSDL System
Published 2024-12-01“…An algorithm for detecting infrasound signals by calculating the cross-correlation function between records of individual sensors in a array is described. …”
Get full text
Article -
252
Code vulnerability detection method based on graph neural network
Published 2021-06-01“…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
Get full text
Article -
253
Detection, Parameter Estimation and Direction Finding of Periodic Pulse Signals
Published 2025-07-01“…Simple-to-implement algorithms for detecting periodic pulse signals, evaluating their parameters, and direction finding of the source have been developed. …”
Get full text
Article -
254
RpiBeh offers a versatile open source solution for rodent behavior tracking and closed loop interventions
Published 2025-08-01“…Existing commercial systems are costly and inflexible for customization, while current open-source tools are often lack of real-time functionality and suffer from steep learning curve. …”
Get full text
Article -
255
-
256
Scientific rationale of ingredients choice for functional fish pastes
Published 2021-04-01Get full text
Article -
257
Assessment of the capacity of health facilities in preventing and managing non-communicable diseases in selected regions of Somaliland
Published 2025-05-01“…The survey focused on assessing the capacity of selected hospitals in detecting and managing NCDs by collecting data on the availability of health workers, equipment, screening and management services, medications, and laboratory tests. …”
Get full text
Article -
258
Advances in preparation and application of coal-based functional nanomaterials
Published 2025-07-01“…However, traditional coal utilization as a primary carbon emission source fundamentally conflicts with the “dual-carbon” strategic goals. …”
Get full text
Article -
259
A Self-Adaptive Particle Swarm Optimization Based Multiple Source Localization Algorithm in Binary Sensor Networks
Published 2015-08-01“…Then the maximum likelihood estimator is employed to establish the objective function which is used to estimate the location of sources. …”
Get full text
Article -
260
Dynamic Risk Assessment System for Power System Based on Multi-source Information of the Ubiquitous Power Internet of Things
Published 2019-12-01“…Finally, based on the architecture, the corresponding software system is designed. The data source, data platform and main function modules of the system are also described. …”
Get full text
Article