Showing 2,201 - 2,220 results of 2,392 for search '(source OR sources) utilization efficiency', query time: 0.19s Refine Results
  1. 2201

    The Response Characteristics of One <i>Saccharomyces cerevisiae</i> Strain Under Continuous Passage in Artificial Culture Medium by Tengyu Ma, Hongguang Zhu, Jiajia Yin, Yu Tian, Wenjing Yan, Haixin Sun

    Published 2025-07-01
    “…It thrived in a pH range of 4–5.5 and efficiently utilized various carbon and nitrogen sources; (2) After serial subculturing, the strain’s ethanol production capacity and fermentation rate partially declined and then stabilized, while maintaining strong tolerance to high ethanol concentrations and hyperosmotic stress; (3) Transcriptomic analysis revealed significant differential expression of genes related to lipid metabolism, amino acid metabolism, and other pathways under high-glucose stress following continuous subculturing. …”
    Get full text
    Article
  2. 2202

    Advanced Microgrid Systems: Bridging the Gap Between Renewable Energy Integration, Stability, and Scalable Deployment - A Review by Bashiru Olalekan Ariyo, Lambe Mutalub Adesina, Olalekan Ogunbiyi

    Published 2025-01-01
    “…Microgrids (MGs) are emerging as pivotal solutions for addressing the growing global demand for reliable, decentralized energy systems, particularly given the variability of renewable energy sources (RESs) and integration challenges. This study critically reviews advancements in MG modeling, control dynamics, and optimization strategies, with a specific focus on dual-mode operations encompassing grid-connected and islanded systems. …”
    Get full text
    Article
  3. 2203

    Real Time Fractional Robust Adaptive Scheme for Frequency Regulation in Double Area Hybrid Power System With Renewables by Ahmed Ragab, Dalia Allam, Ahmed F. Zobaa, Hazem Ali Attia

    Published 2025-01-01
    “…To validate the superiority of the proposed controller, five challenging scenarios have been considered, encompassing load fluctuations, integration of renewable energy sources, changes in system parameters and time delay attacks. …”
    Get full text
    Article
  4. 2204

    Comprehensive optimization of active and reactive power scheduling in smart microgrids by accounting for line transmission losses using genetic algorithm by F.Z. Zahraoui, H.E. Chakir, M. Et-taoussi, H Ouadi

    Published 2025-06-01
    “…Smart microgrids face increasingly complex challenges in providing optimal power flow due to the integration of intermittent renewable energy sources, reactive power demand, and transmission line losses. …”
    Get full text
    Article
  5. 2205

    Viability Study of SYCL as a Unified Programming Model for Heterogeneous Systems Based on GPUs in Bioinformatics by Manuel Costanzo

    Published 2024-10-01
    “…This standard facilitates the development of portable applications that can efficiently leverage the capabilities of different hardware devices, such as NVIDIA, Intel, and AMD GPUs, without needing significant modifications to the source code. …”
    Get full text
    Article
  6. 2206

    Realizing the promise of machine learning in precision oncology: expert perspectives on opportunities and challenges by Vasileios Nittas, Kelly E. Ormond, Effy Vayena, Alessandro Blasimme

    Published 2025-02-01
    “…Our participants emphasized obstacles related to molecular data access, clinical utility, and guidelines. The availability of reliable and well-curated data to train and validate machine learning algorithms and integrate multiple data sources were described as constraints yet necessary for future clinical implementation. …”
    Get full text
    Article
  7. 2207

    Solar‐Powered Hierarchical Microenvironments with Authigenic Multi‐Field Synergies for Simultaneous Extraction of Freshwater and Cesium by Liuyan Zhu, Lin Zhu, Ting Shi, Ke Zhao, Wenwen He, Lu Han, Zeying Jin, Jialin Kang, Shanfu Sun, Ningning Cao, Zhen Yu

    Published 2025-07-01
    “…Abstract The escalating global resource and environmental crisis has intensified the urgent demand for efficiently extracting freshwater and critical metals from contaminated water sources, particularly nuclear‐contaminated seawater. …”
    Get full text
    Article
  8. 2208

    Smart forecasting: Enhancing virtual power plant performance with analytical frameworks by Maja Celeska Krstevska, Petar Krstevski, Mare Srbinovska, Vesna Andova, Aleksandra Krkoleva Mateska

    Published 2025-06-01
    “…These forecasts can be utilized to optimize energy scheduling, demand response, and improve the grid integration of renewable energy sources, ultimately leading to more efficient and sustainable energy systems.…”
    Get full text
    Article
  9. 2209

    AI-powered segmentation of bifid mandibular canals using CBCT by Ismail Gumussoy, Kardelen Demirezer, Suayip Burak Duman, Emre Haylaz, Ibrahim Sevki Bayrakdar, Ozer Celik, Ali Zakir Syed

    Published 2025-06-01
    “…These DICOM files were then imported into the 3D Slicer® open-source software, where bifid canals and mandibular canals were annotated. …”
    Get full text
    Article
  10. 2210

    Transgenic poplar for resistance against pest and pathogen attack in forests: an overview by Swati Sharan, Amrita Chakraborty, Amit Roy, Indrakant K. Singh, Archana Singh, Archana Singh

    Published 2024-12-01
    “…These plants provide wood, which can be utilized as raw resources for the paper industry and as a potential source of biofuel. …”
    Get full text
    Article
  11. 2211

    Application of Supervised Learning Methods and Information Gain Methods in the Determination of Asbestos–Cement Roofs’ Deterioration State by Manuel Saba, David Valdelamar Martínez, Leydy K. Torres Gil, Gabriel E. Chanchí Golondrino, Manuel A. Ospina Alarcón

    Published 2024-09-01
    “…Additionally, the random forest model demonstrated strong performance across various band groups, further validating its utility. Utilizing the open-source software Weka (version 3.8.6), this study adeptly executed relevance evaluation and model implementation, providing a practical and scalable solution for material characterization, especially in regions where resources for spectral and hyperspectral image analysis are limited. …”
    Get full text
    Article
  12. 2212

    Application of VGG16 in Automated Detection of Bone Fractures in X-Ray Images by Resky Adhyaksa, Bedy Purnama

    Published 2025-02-01
    “…The training and testing phases utilized an 80:20 split of the data, employing binary cross-entropy as the loss function and the Adam optimizer for efficient weight updates. …”
    Get full text
    Article
  13. 2213

    KIDNAPPING AND NIGERIA’S INTERNATIONAL IMAGE: A CRITICAL ANALYSIS OF THE FOURTH REPUBLIC by ADIGWE AUSTEEN NDUBUISI, ADEBOWALE OLUWATOSIN AYOMIDE

    Published 2025-05-01
    “…The study employs the Constructivist theory as its theoretical framework and utilizes a qualitative research approach, sourcing data from academic journals, policy studies, media publications, and government comments. …”
    Get full text
    Article
  14. 2214

    The impact of machine learning applications in agricultural supply chain: a topic modeling-based review by Abderahman Rejeb, Karim Rejeb, Abdo Hassoun

    Published 2025-05-01
    “…The current study employs latent Dirichlet allocation (LDA)-based topic modeling to examine 1114 publications regarding ML applications in agriculture, sourced from the Scopus database. The analysis indicates notable expansion in ML studies, featuring leading publications across various interdisciplinary fields. …”
    Get full text
    Article
  15. 2215

    Malicious traffic prediction model for ResNet based on Maple-IDS dataset. by Qingfeng Li, Boyu Wang, Xueyan Wen, Yuao Chen

    Published 2025-01-01
    “…Our data collections are sourced from a variety of operating systems and middleware platforms, ensuring broad applicability and relevance. …”
    Get full text
    Article
  16. 2216

    Effect of thin capitalization, intellectual capital and independent commisioners on effective tax rate by Upita Sari, Sekar Mayangsari

    Published 2025-03-01
    “…Methods – A quantitative approach was utilized, employing an explanatory research strategy and purposive sampling technique. …”
    Get full text
    Article
  17. 2217

    Sustainable Lipase Immobilization: Chokeberry and Apple Waste as Carriers by Karina Jasińska, Maksym Nowosad, Aleksander Perzyna, Andrzej Bielacki, Stanisław Dziwiński, Bartłomiej Zieniuk, Agata Fabiszewska

    Published 2024-12-01
    “…The findings highlight the potential of utilizing fruit pomaces not only as a source of bioactive compounds but also in enhancing enzyme stability for industrial applications.…”
    Get full text
    Article
  18. 2218

    Investigations on the unique design of heat pipe-assisted thermal management system with novel Chaudhari-Padalkar-Funde number and heat transfer correlations by Akshay B. Padalkar, Mangesh B. Chaudhari, Adinath M. Funde

    Published 2025-09-01
    “…The demand for a clean energy storage source in the automobile industry is being fulfilled effectively by the use of electric vehicles (EVs). …”
    Get full text
    Article
  19. 2219

    Wellcounter: Automated high‐throughput phenotyping for aquatic microinvertebrates by Claus‐Peter Stelzer, Dominique Groffman

    Published 2025-05-01
    “…However, acquiring large quantities of high‐quality image data and processing them efficiently often remain a bottleneck. Here, we introduce the Wellcounter, an advanced platform designed for the automated high‐throughput phenotyping of aquatic microinvertebrates (100–2000 μm), utilizing common multiwell plates to facilitate large‐scale ecological experiments. …”
    Get full text
    Article
  20. 2220

    Augmenting cybersecurity through attention based stacked autoencoder with optimization algorithm for detection and mitigation of attacks on IoT assisted networks by Kashi Sai Prasad, E. Laxmi Lydia, M. V. Rajesh, K. Radhika, Janjhyam Venkata Naga Ramesh, N. Neelima, Srinivasa Rao Pokuri

    Published 2024-12-01
    “…To manage the developing intricacy of cyberattacks, it is critical to have an effectual intrusion detection system (IDS), which can monitor computer sources and create data on suspicious or abnormal actions. …”
    Get full text
    Article