Suggested Topics within your search.
Suggested Topics within your search.
-
1601
A metabolic profiling approach to characterize and discriminate plant-based beverages and milk
Published 2025-06-01“…ABSTRACT: The rising demand for nondairy and nonanimal protein sources has increased plant-based beverages (PBB) consumption. …”
Get full text
Article -
1602
Provenance-Finding of Dust Storms Using AVHRR Sensor Images of NOAA Satellite (Case Study: Southwest of Iran)
Published 2016-03-01“…Dust pollution of this area drawn to the south of Khuzestan. 4- Conclusion In general, using 24 AVHRR images and the use of detection techniques, a total 62 points were identified as the source of dust production. …”
Get full text
Article -
1603
Do domain-specific protein language models outperform general models on immunology-related tasks?
Published 2024-06-01“…Overall, our analyzes reveal the promising potential of PLMs in modeling protein function while providing insights into their information-handling capabilities. …”
Get full text
Article -
1604
PAMFPN: Position-Aware Multi-Kernel Feature Pyramid Network with Adaptive Sparse Attention for Robust Object Detection in Remote Sensing Imagery
Published 2025-06-01“…Firstly, we design a position-interactive context module (PICM) that incorporates distance-aware sparse attention and dynamic positional encoding. It selectively focuses computation on sparse targets through a decay function that suppresses background noise while enhancing spatial correlations of critical regions. …”
Get full text
Article -
1605
Weibull-Type Incubation Period and Time of Exposure Using <i>γ</i>-Divergence
Published 2025-03-01“…Accurately determining the exposure time to an infectious pathogen, together with the corresponding incubation period, is vital for identifying infection sources and implementing targeted public health interventions. …”
Get full text
Article -
1606
-
1607
Investigation of TsGAN-based multimodal image fusion to augment image pre-processing abilities
Published 2025-07-01“…The TSGAN framework generates a unified texture map that captures essential gradient preservation into the generator’s loss function, the model successfully retains critical information about texture from the input source images. …”
Get full text
Article -
1608
Modelling and Forecasting Energy Efficiency Impact on the Human Health
Published 2022-06-01“…In the study framework, the VOSviewer 1.6.18 tools allowed the detection of six clusters of research streams: renewable resources, sustainable development, public, energy policy, energy efficiency, and solar energy. …”
Get full text
Article -
1609
Preliminary Design of a GNSS Interference Mapping CubeSat Mission: JamSail
Published 2024-10-01“…First, a flexible, low-cost GNSS interference detection payload capable of characterising and geolocating the sources of radio interference regarding the E1/L1 and E5a/L5 bands will be demonstrated on a global scale. …”
Get full text
Article -
1610
Double-moment normalization of hail size number distributions over Switzerland
Published 2024-12-01“…These results highlight the invariance of the normalized distribution and the adaptability of the method to different data sources.</p>…”
Get full text
Article -
1611
THEORY AND PRACTICE OF ASSESSING THE LEVEL OF INSTABILITY OF THE EXTERNAL ENVIRONMENT OF THE ENTERPRISE IN A HYBRID WAR
Published 2022-03-01“…The article proposes a methodological approach to comprehensive assessment of the level of instability of environmental factors of enterprises, which, unlike others, involves the detection of instability in terms of seven components (socio-demographic, economic, technological, environmental, political, legal, ethical) on four criteria: complexity, interdependence, variability and uncertainty of factors, which makes it possible to determine their sources and nature, and thus form an effective response of the enterprise to change. …”
Get full text
Article -
1612
Machine learning models for clinical and structural knee osteoarthritis prediction: Recent advancements and future directions
Published 2025-09-01“…These evolving strategies underscore the growing potential of ML to improve the detection of early OA, individualized risk stratification, and personalized interventions in OA clinical care.…”
Get full text
Article -
1613
Global path planning algorithm for mining vehicles integrating simplified visibility graph and A* algorithm
Published 2024-10-01“…The visual tangent points were sequentially stored in the OPEN list as nodes, and nodes were selected for the CLOSED list based on the A* algorithm's evaluation function to ensure the shortest path. …”
Get full text
Article -
1614
An ultra low frequency spike timing dependent plasticity based approach for reducing alcohol drinking
Published 2024-12-01“…Unfortunately, existing pharmacological and behavioral therapies for AUD are associated with poor success rates, with approximately 40% of individuals relapsing within three years of treatment. …”
Get full text
Article -
1615
Bacterial communities associated with ambrosia beetles: current knowledge and existing gaps
Published 2025-04-01“…Ambrosia beetles (Curculionidae: Scolytinae and Platypodinae) are wood-boring insects studied as examples of fungus-insect symbiosis and for their success as invasive species. While most research on their microbiota has focused on fungal associates, their bacterial communities remain largely understudied. …”
Get full text
Article -
1616
Phosphodiesterase 10A as a Therapeutic Target in Neuropsychopharmacology: A Review
Published 2025-05-01“…Some researchers also believe that PDE10A inhibitors improve cognitive functions. Despite the promising results of preclinical studies, clinical trials of PDE10A inhibitors have not been successful. …”
Get full text
Article -
1617
FXYD2 marks and regulates maturity of β cells via ion channel-mediated signal transduction
Published 2025-06-01“…These results suggest that FXYD2 marks and regulates human β cell maturation via channel-sensing signal transduction and that it can be used as a selection marker for functional heterogeneity of stem cell derived human islet organoids.…”
Get full text
Article -
1618
A Comparison of Feminist Term Translation Practices in Academic Journals of Gender and Women’s Studies in Turkiye
Published 2022-12-01“…Feminist term translation brings both linguistic and pragmatic sides of translation together and turns the act of translation into a function-driven process rather than a solely form-based transfer. …”
Get full text
Article -
1619
The methodology of translating the metonymic images of the Resurrection in the Holy Qur’an according to Larson’s theory, the translation of Makarim Al-Shirazi and Hussain Ansaryan...
Published 2022-03-01“…His semantic translation is a faithful translation into the source language and a reliable way to translate texts, especially religious texts. …”
Get full text
Article -
1620
Dynamic and efficient vehicular cloud management scheme with privacy protection
Published 2022-12-01“…The vehicular cloud (VC) formed by vehicles is used for localization processing and consumption of traffic sensing data to achieve timely intelligent traffic management.The vehicle cloud is highly dynamic, self-organizing and timely, in which the identity and location privacy of vehicle users need to be protected as this poses challenges to the vehicular cloud management.A dynamic and self-organizing vehicle cloud management scheme based on the asymmetric group key agreement protocol was designed, where the vehicle cloud is automatically formed through the self-organized group key agreement of vehicles.The group key was used to control the provision and access of vehicle cloud services, and the dynamic management of the vehicle cloud was implemented through group key update.The scheme used traceable one-time pseudonym technology to achieve anonymous authentication and conditional privacy protection of vehicle users, and the group key agreement stage only included one bilinear pair operation to achieve high efficiency.In addition, the key negotiation and update process used lightweight signatures, supporting batch verification, to achieve efficient message source authentication and integrity authentication.Then the security and efficiency of vehicle cloud communications in the self-organizing environment can be ensured.The dynamic key update mechanism of the key agreement protocol realized the dynamic joining or exiting of vehicles in the vehicle cloud, adapting to the dynamic characteristics of the vehicle cloud.Under the random oracle model and the difficult assumption of the inverse computational Diffie Hellman (ICDH) problem, it was proved that the asymmetric group key agreement scheme satisfied the selective-plaintext security.The security analysis shows that the scheme can protect the identity and location privacy of vehicle users, realize the legal tracking of malicious vehicles, and ensure the confidentiality, integrity and anti-counterfeiting of communications, as well as the forward security of vehicle cloud dynamic management.The performance comparison analysis shows that this scheme has certain advantages in communication and computing efficiency under the condition of the same function and security level.…”
Get full text
Article