Suggested Topics within your search.
Suggested Topics within your search.
-
381
A powerful molecular marker to detect mutations at sorghum LOW GERMINATION STIMULANT 1
Published 2025-03-01“…The LGS1 marker is useful for both detecting sources of lgs1 and introgressing Striga resistance into new genetic backgrounds.…”
Get full text
Article -
382
Specific detection of tartaric acid chiral isomers based on centrosymmetric terahertz metamaterial sensors
Published 2025-01-01“…Traditional detection methods, such as fluorescence detection, have problems such as destructive and non-specific characters. …”
Get full text
Article -
383
The Relevance of Osteoscintigraphy Technique in Early Detection of Bone Metastatic Lesions: a Systematic Review
Published 2023-06-01“…OSG is an effective and informative technique for early detection of bone metastases, allowing to assess the functional state of the tumor and its surrounding tissues, even before the appearance of structural disorders visible by other diagnostic methods. …”
Get full text
Article -
384
Sex‐Specific Ultraviolet Radiation Tolerance Across Drosophila
Published 2025-02-01“…Adaptation and genetic innovation arise in the genome from a variety of sources. Functional genomics requires both genetic discoveries and empirical testing to observe adaptation between lineages. …”
Get full text
Article -
385
High-throughput method for improving rice AGB estimation based on UAV multi-source remote sensing image feature fusion and ensemble learning
Published 2025-04-01“…The relationships between AGB and the selected features were then analyzed using multiple fitting functions. …”
Get full text
Article -
386
Morphological and functional characteristics of Trichinella sp. larvae in bears and badgers in the Kirov Region
Published 2022-03-01“…For postmortem diagnosis of trichinellosis in the obtained bears and badgers, we can use trichinelloscopy and peptolysis methods which are aimed at detecting infection sources and preventing zoonosis in humans.…”
Get full text
Article -
387
Host selection is not a universal driver of phyllosphere community assembly among ecologically similar native New Zealand plant species
Published 2025-01-01“…Abstract Background A growing body of evidence demonstrates that host-associated microbial communities of plant leaf surfaces (i.e. the phyllosphere) can influence host functional traits. However, it remains unclear whether host selection is a universal driver of phyllosphere community assembly. …”
Get full text
Article -
388
Solvent-free valorization of sugarcane bagasse fibers into nitrogen-doped microporous carbons: Efficient contenders for selective carbon dioxide capture
Published 2025-02-01“…Melamine and KOH were used as a nitrogen-doping source and an activator, respectively. The specimen (SBF-BC-KM0.5), prepared with optimized melamine loading, possessed efficient textural features, including a specific surface area (SSA) of 1138 m² g⁻¹ , a micropore volume of 0.396 cm³ g⁻¹ , high concentration of ultra-micropores (<0.6 nm) (89 %) and high content of pyrrolic-N functionality (35 %). …”
Get full text
Article -
389
Methods of Additive Manufacturing for Dental Co-Cr Alloys: Systematic Review
Published 2022-11-01“…Qualities of additive aspects of production such component design flexibility, part complexity, light- weighting, component consolidation, and functional design are generating specific interest in the additive fabrication of metal for use in automotive, marine, oil & gas, and aerospace industries during powder bed fusion, each layer of the powder bed is only partially fused employing a laser or electron beam as an energy source, the recent and most promising additive manufacturing technologies utilized to produce intricate, low-volume, tiny metallic parts. …”
Get full text
Article -
390
C3-methylation of imidazopyridines via C(sp2)-H activation using magnetic Cu-MOF, and DMSO as solvent and Methyl source
Published 2025-08-01“…This approach offers an efficient and reliable method for the methylation of imidazopyridines, showcasing excellent compatibility with various functional groups, high site selectivity, and outstanding product yields. …”
Get full text
Article -
391
Acoustic Emission as a Method for Analyzing Changes and Detecting Damage in Composite Materials During Loading
Published 2021-08-01“…The signal obtained from the sensor was then further processed and used to draw up diagrams of the AE hits, amplitude, root mean square of the AE source signal (RMS) and duration in the function of time. …”
Get full text
Article -
392
Brain tumor detection through image fusion using whale optimization and edge preserving filter
Published 2025-03-01Get full text
Article -
393
Detection of Greenhouse and Typical Rural Buildings with Efficient Weighted YOLOv8 in Hebei Province, China
Published 2025-05-01“…However, in rural and mountainous areas, the resolution and accessibility of remote sensing satellite images from a single source are poor, making it difficult to detect greenhouses and rural buildings effectively and automatically. …”
Get full text
Article -
394
LMGD: Log-Metric Combined Microservice Anomaly Detection Through Graph-Based Deep Learning
Published 2024-01-01“…Therefore, there is an urgent need for fast and accurate anomaly detection capabilities. However, the existing microservice anomaly detection methods do not pay attention to the multi-source data of the microservice system and thus have low accuracy. …”
Get full text
Article -
395
Evaluation of a coastal acoustic buoy for cetacean detections, bearing accuracy and exclusion zone monitoring
Published 2022-11-01“…Field trials indicated maximum detection ranges from 4–7.3 km depending on source and ambient noise levels. …”
Get full text
Article -
396
CSW-YOLO: A traffic sign small target detection algorithm based on YOLOv8.
Published 2025-01-01“…First, the bottleneck of the C2f module in the original yolov8 network is replaced with the residual Faster-Block module in FasterNet, and then the new channel mixer convolution GLU (CGLU) in TransNeXt is combined with it to construct the C2f-faster-CGLU module, reducing the number of model parameters and computational load; Secondly, the SPPF module is combined with the large separable kernel attention (LSKA) to construct the SPPF-LSKA module, which greatly enhances the feature extraction ability of the model; Then, by adding a small target detection layer, the accuracy of small target detection such as traffic signs is greatly improved; Finally, the Inner-IoU and MPDIoU loss functions are integrated to construct WISE-Inner-MPDIoU, which replaces the original CIoU loss function, thereby improving the calculation accuracy. …”
Get full text
Article -
397
Securing Wireless Communications with Energy Harvesting and Multi-antenna Diversity
Published 2025-04-01“…Analytical expressions for the Signal-to-Noise Ratios (SNRs) at both the destination D and the eavesdropper E are derived, along with the Probability Density Function (PDF) and Cumulative Distribution Function (CDF) of these SNRs under block Rayleigh fading conditions. …”
Get full text
Article -
398
VRU-YOLO: A Small Object Detection Algorithm for Vulnerable Road Users in Complex Scenes
Published 2025-01-01“…Accurate detection of vulnerable road users (VRUs) is critical for enhancing traffic safety and advancing autonomous driving systems. …”
Get full text
Article -
399
AC-YOLO: A lightweight ship detection model for SAR images based on YOLO11.
Published 2025-01-01“…However, existing SAR ship detection algorithms encounter two major challenges: limited detection accuracy and high computational cost, primarily due to the wide range of target scales, indistinct contour features, and complex background interference. …”
Get full text
Article -
400
A secure and energy-efficient routing using coupled ensemble selection approach and optimal type-2 fuzzy logic in WSN
Published 2025-01-01“…Abstract Wireless sensor networks (WSNs) are imperative to a huge range of packages, along with environmental monitoring, healthcare structures, army surveillance, and smart infrastructure, however they’re faced with numerous demanding situations that impede their functionality, including confined strength sources, routing inefficiencies, security vulnerabilities, excessive latency, and the important requirement to keep Quality of Service (QoS). …”
Get full text
Article