Search alternatives:
efficient » efficiency (Expand Search)
Showing 4,441 - 4,460 results of 6,237 for search 'complex (reflection OR (selection OR detection)) efficient', query time: 0.23s Refine Results
  1. 4441

    Characteristics and prediction methods of coal spontaneous combustion for deep coal mining in the Ximeng mining area by Li MA, Wenbo GAO, Longlong TUO, Pengyu ZHANG, Zhou ZHENG, Ruizhi GUO

    Published 2025-02-01
    “…Objective The mining of deep coal seams in the Ximeng mining area within the Ordos Basin is subjected to complex environmental conditions like high in-situ stress, large water inflow, and severe air leakage, which lead to the encountered with elevated risks and difficult prediction of coal spontaneous combustion and posing challenges in predicting spontaneous combustion. …”
    Get full text
    Article
  2. 4442

    Mechanisms of Low Temperature Thickening of Different Materials for Deepwater Water-Based Drilling Fluids by Zhongyi Wang, Jinsheng Sun, Kaihe Lv, Xianbin Huang, Zhenhang Yuan, Yang Zhang

    Published 2024-12-01
    “…As a coarse dispersion system, water-based drilling fluid has a complex composition of dispersed phase and dispersing medium. …”
    Get full text
    Article
  3. 4443

    A Copula-based Method for River Ecological Flow Quantification and Algal Bloom Risk Assessment in the Hanjiang River by NONG Xi-zhi, LAI Cheng, JING Zheng, YE Ye

    Published 2025-05-01
    “…It provides an efficient tool for analyzing ecological flow during a single algal bloom outbreak.(2) The multi-scenario conditional probability analysis demonstrates that risk probabilities of algal density differed significantly across different flow ranges, offering refined flow thresholds for reservoir operations and bloom prevention.(3) In complex hydro-ecological systems, it is necessary to integrate multi-factor models like Copula to avoid risk underestimation. …”
    Get full text
    Article
  4. 4444

    Reveal genomic insights into cotton domestication and improvement using gene level functional haplotype-based GWAS by Guoan Qi, Yiqian Li, Wanying Zhang, Zegang Han, Jinwen Chen, Ziqian Zhang, Lisha Xuan, Rui Chen, Lei Fang, Yan Hu, Tianzhen Zhang

    Published 2025-05-01
    “…Abstract Genome-wide association studies (GWAS) are widely used to detect associations between genetic variants and phenotypes. …”
    Get full text
    Article
  5. 4445

    Relational model of public-private partnership in railway transport by N. F. Sirina, V. P. Pershin

    Published 2020-11-01
    “…The results obtained are integrated into the software complex for innovative development of facilities and are tuned for transformation, effective use of the potential of partners, investors, performers and industry enterprises.…”
    Get full text
    Article
  6. 4446
  7. 4447

    Experimental study on purification of low concentration coalbed methane by hydrate method under amino acid system by Tian ZHAO, Yongliang XU, Lanyun WANG, Zecheng LYU, Xingwang HUO

    Published 2025-06-01
    “…Among them, when the pressure was 6 MPa, the separation and purification of CH4+N2 in the 0.3 wt% leucine + 1 mol% 1,3−dioxolane complex system was the best, with a CH4 volume fraction of 56.46% and a recovery of 64.2%. …”
    Get full text
    Article
  8. 4448

    Advancements in SELEX Technology for Aptamers and Emerging Applications in Therapeutics and Drug Delivery by Liangjie Feng, Yu Sun, Wenshen Jia, Yang Yu, Chang Liu, Jing Yang, Yunxia Luan, Jin Chen, Fengchao Wang

    Published 2025-06-01
    “…Nucleic acid aptamers, selected through the Systematic Evolution of Ligands by Exponential Enrichment (SELEX), are short nucleic acid sequences that exhibit high affinity and specificity towards diverse targets. …”
    Get full text
    Article
  9. 4449

    Numerical Simulation of Multi-Cluster Fracture Propagation in Marine Natural Gas Hydrate Reservoirs by Lisha Liao, Youkeren An, Jinshan Wang, Yiqun Zhang, Lerui Liu, Meihua Chen, Yiming Gao, Jiayi Han

    Published 2025-06-01
    “…Natural gas hydrates (NGHs) are promising energy resources, although their marine exploitation is limited by low reservoir permeability and hydrate decomposition efficiency. Multi-cluster fracturing technology can enhance reservoir permeability, yet complex properties of hydrate sediments render the prediction of fracture behavior challenging. …”
    Get full text
    Article
  10. 4450

    Dimerization of ADAR1 modulates site-specificity of RNA editing by Allegra Mboukou, Vinod Rajendra, Serafina Messmer, Therese C. Mandl, Marjorie Catala, Carine Tisné, Michael F. Jantsch, Pierre Barraud

    Published 2024-11-01
    “…Notably, dimerization disruption did not abrogate ADAR1 editing activity but intricately affected editing efficiency at selected sites. This suggests a complex role for dimerization in the selection of editing sites by ADARs, and makes dimerization a potential target for modulating ADAR1 editing activity.…”
    Get full text
    Article
  11. 4451

    Impact of ISTA and FISTA iterative optimization algorithms on electrical impedance tomography image reconstruction by Nguyen Diep Quoc Tuan, Huynh Hoang Nhut, Ven Huynh Thanh, Cao Dinh Minh Quan, Tran Anh Tu, Tran Trung Nghia

    Published 2025-03-01
    “…Iterative algorithms are widely employed to address complex inverse problems. However, current iterative methods have notable limitations, such as the arbitrary and subjective selection of initial parameters, lengthy computational times due to numerous iterations, and the generation of reconstructions that suffer from shape blurring and a lack of higher-order detail. …”
    Get full text
    Article
  12. 4452

    Beyond the nuclear border: single-cell analysis of in situ sequenced human brain tissue using cellular features by Janssen M. Kotah, Thomas Rust, Hilmar R. J. van Weering, Janneke Bosma, Amber L. Woudstra, Susanne M. Kooistra, Bart J. L. Eggen

    Published 2025-07-01
    “…A key challenge in ISS data analysis is optimizing transcript allocation while minimizing misallocation, particularly in the morphologically complex central nervous system (CNS). We compared geospatial methods using nuclear and expanded nuclear boundaries for segmentation and transcript allocation. …”
    Get full text
    Article
  13. 4453
  14. 4454

    Parcel Segmentation Method Combined YOLOV5s and Segment Anything Model Using Remote Sensing Image by Xiaoqin Wu, Dacheng Wang, Caihong Ma, Yi Zeng, Yongze Lv, Xianmiao Huang, Jiandong Wang

    Published 2025-07-01
    “…The improved YOLOv5s module integrates Efficient Channel Attention (ECA) and BiFPN to boost feature extraction and small-object recognition, while Soft-NMS is used to reduce missed detections. …”
    Get full text
    Article
  15. 4455

    Analyzing customer churn behavior using datamining approach: hybrid support vector machine and logistic regression in retail chain by Mohammad Barzegar, Aliakbar Hasani

    Published 2024-12-01
    “…Customer churn is one of the challenges of business management in today's complex competitive environment. For this purpose, the organization must have an efficient system to detect and analyze the factors influencing customer churn. …”
    Get full text
    Article
  16. 4456

    BTCP: Binary Temporal Convolutional Network-Based Data Prefetcher for Low Inference Latency and Storage Overhead by Chang Ho Ryu, Tae Hee Han

    Published 2025-01-01
    “…Machine learning (ML)-based data prefetchers have demonstrated superior address prediction performance compared with traditional rule-based prefetchers by learning complex patterns to hide long-latency memory access. …”
    Get full text
    Article
  17. 4457

    Connotation and practice of the integration of academic field based on Bourdieu’s theory——taking the cultivation of cyberspace security talents as an example by Qian ZHOU, Haiping HUANG, Le WANG, Yanchun ZHANG, Fu XIAO

    Published 2023-08-01
    “…The deployment of network security has become a crucial strategy for the development of modern nations, with skilled professionals serving as the core driving force behind cybersecurity efforts.Cultivating cybersecurity talents and fostering team building are essential for China's talent reserves and strategic capital accumulation.With economic globalization, 0-day vulnerabilities have constantly emerged in information systems, attack chains have become increasingly complex, threat targets were difficult to detect, and hidden viruses varied over time.Talents trained by traditional universities for network security were unable to adapt to innovative production and practical activities in the new fields, as it was confined to their training structure system.In order to break through the shackles of the internal administrative structure and traditional curriculum system of universities, and ease the contradiction between the uncertainty of cyberspace security situation and the standardization of talent cultivation, the talent cultivation models based on Bourdieu's theory were studied, the fusion meaning of cultural capital in the academic field was analyzed and three practical standards were put forward in terms of teaching content, cultivation model and teaching opportunity of cyberspace security talents in combination with the actual cases of the “Fang class”.In terms of education content, standards and open knowledge systems were established to meet the differentiated needs of students.The mentorship approach was employed to construct habitus, fostering students’ ability to adapt flexibly to problems by adopting different cognitive thinking modes.Favorable teaching opportunities were utilized by tutors in various roles to promote efficient integration of individuals and fields, helping students establish a valuable and stable mindset.By leveraging Bourdieu's theory to explore the integration path of academic fields, it has leveraged the advantages of independently cultivating high-quality talents, vigorously promoting technological innovation and the healthy ecological development of the industry.…”
    Get full text
    Article
  18. 4458

    A Review of Optimization Methods for Pipeline Monitoring Systems: Applications and Challenges for CO<sub>2</sub> Transport by Teke Xu, Sergey Martynov, Haroun Mahgerefteh

    Published 2025-07-01
    “…The impacts of the physical properties of CO<sub>2</sub> and complex designs and operation scenarios of CO<sub>2</sub> transport on the pipeline monitoring systems design are discussed. …”
    Get full text
    Article
  19. 4459

    Implementation of SLAM-Based Online Mapping and Autonomous Trajectory Execution in Software and Hardware on the Research Platform Nimbulus-e by Thomas Schmitz, Marcel Mayer, Theo Nonnenmacher, Matthias Schmitz

    Published 2025-08-01
    “…The implementation is validated through both full vehicle simulations using an ADAMS Car—MATLAB co-simulation and a scaled physical prototype, demonstrating the effectiveness of the system in navigating complex environments. This work contributes to the field of autonomous systems by demonstrating the potential of combining advanced sensor technologies with innovative control algorithms to achieve reliable and efficient navigation. …”
    Get full text
    Article
  20. 4460

    A Sleep Sensor Made with Electret Condenser Microphones by Teru Kamogashira, Tatsuya Yamasoba, Shu Kikuta, Kenji Kondo

    Published 2025-05-01
    “…This customized configuration allows the ECM to detect subtle changes in airflow associated with breathing patterns, enabling the monitoring of respiratory activity with minimal invasiveness and complexity. …”
    Get full text
    Article