-
3401
UAV LiDAR expands the understanding of forest tree diversity
Published 2025-06-01“…Our study suggests that using high-resolution UAV LiDAR data, combined with diversity indices based on importance values, can enhance biodiversity assessment and inform forest management strategies aimed at promoting structural complexity and supporting tree diversity.…”
Get full text
Article -
3402
On the temperature dependence of oceanic export efficiency
Published 2016-05-01“…Abstract Quantifying the fraction of primary production exported from the euphotic layer (termed the export efficiency ef) is a complicated matter. …”
Get full text
Article -
3403
Building structures thermal calculation
Published 2021-10-01“…The results obtained can be used in thermal calculations of elements of complex layered structures made of composite materials in wind power, mechanical engineering, aircraft, shipbuilding, instrumentation, etc.…”
Get full text
Article -
3404
Belt Mount Sets from the Shekshovo Medieval Burial Ground in the Suzdal Opolie
Published 2024-08-01“…The objects originate mainly from the upper plowed layer. Most of them are related with destroyed burials, carried out by cremation rite: on the surface or in shallow pits. …”
Get full text
Article -
3405
Improving the durability of road construction machines based on improved repair of friction knots
Published 2019-09-01“…The methods used in practice for hardening cast irons are of little use in the conditions of repair production due to the complexity of technological processes and equipment. …”
Get full text
Article -
3406
Cognitive routing optimization protocol based on multiple channels in wireless sensor networks
Published 2020-04-01“…A cognitive routing and optimization protocol based on multiple channels with a cross-layer design is proposed to study joint optimal cognitive routing with maximizing network throughput and network lifetime. …”
Get full text
Article -
3407
IEEE 802.1x-based user identity-embedded IPv6 address generation scheme
Published 2019-12-01“…Embedding extensible user identities into IPv6 addresses not only provides the possibility of tracing the user identity and finely controlling the user behavior,but also helps to improve the security,auditability and credibility of the Internet.Current schemes that embed user identity within IPv6 address are hard to deploy in practice due to the complexity of DHCPv6 client development or the complicated management of temporary address.Considering the sequential logic between identity authentication and address allocation,a IEEE 802.1x-based user identity-embedded IPv6 address generation scheme was proposed.By conducting identity authentication using layer-2 mechanisms and then assigning IPv6 addresses,this scheme decoupled the process of identity authentication and address allocation,and avoided the limitation of developing new extended DHCPv6 clients for each operating system and maintaining temporary address leases on DHCPv6 servers,which was more deployable.…”
Get full text
Article -
3408
MCKite: A Multi-Producer Multicast Scheme in Named Data Networking
Published 2015-12-01“…Named data networking(NDN)-a future internet architecture replacing hosts with named data as the core objects in the network layer and natively supports single producer- multi consumer multicast application pattern. …”
Get full text
Article -
3409
IEEE 802.1x-based user identity-embedded IPv6 address generation scheme
Published 2019-12-01“…Embedding extensible user identities into IPv6 addresses not only provides the possibility of tracing the user identity and finely controlling the user behavior,but also helps to improve the security,auditability and credibility of the Internet.Current schemes that embed user identity within IPv6 address are hard to deploy in practice due to the complexity of DHCPv6 client development or the complicated management of temporary address.Considering the sequential logic between identity authentication and address allocation,a IEEE 802.1x-based user identity-embedded IPv6 address generation scheme was proposed.By conducting identity authentication using layer-2 mechanisms and then assigning IPv6 addresses,this scheme decoupled the process of identity authentication and address allocation,and avoided the limitation of developing new extended DHCPv6 clients for each operating system and maintaining temporary address leases on DHCPv6 servers,which was more deployable.…”
Get full text
Article -
3410
Unmanned aerial vehicle enabled communication technologies and applications for Internet of things
Published 2019-12-01“…The Internet of things (IoT) is designed to provide the wide coverage and the massive connectivity service for“things” node,and the collected “things” data can provide support for the intelligent decision-making at the application layer.However,due to the fixed deployment of the access point of the “things” node,the topology of the IoT network is not flexible,consequently making it difficult to dynamically cover the IoT node or regions with high mobility.In addition,the current IoT communication technology suffers from the remote blind area,which makes it impossible for a large number of “things” node to connect to establish the “network” in some geologically-complexed regions.UAV has high mobility,low cost and flexible deployment,which is suitable to solve the above issues.Studying the communication technology of UAV assisted IoT,help the IoT to extend the existing network coverage,enhance the flexibility of the IoT topology and provide more diverse IoT service.…”
Get full text
Article -
3411
Session topic mining for interactive text based on conversational content
Published 2016-09-01“…Traditional theme mining model generally digs out the document theme from the interactive text only.In order to explore the session topic and improve the universality of mining model,a kind of interactive text session topic generation model based on the content of the dialogue was put forward.Firstly,by analyzing the characteristics of interactive text and based on the concept of topic tree,a dialog spanning tree was defined with a five-layer structure.Based on this and LDA,the model of session topic generation(ST-LDA)was built.At last,Gibbs sampling method was adopted to deduce the ST-LDA and obtaining session topic and its distribution probability.The results show that the ST-LDA model can dig out a session topic effectively from the interactive text.Besides,the results can reduce the complexity of the classification algorithm and can be back to the theme—participants association.It also has a good universality.…”
Get full text
Article -
3412
Effects of pullet housing on bone development in aviary-housed Dekalb White hens
Published 2024-12-01“…We investigated how early access to elevated structures varying in complexity and height would affect bone quality and subsequent keel bone fractures in a layer multitiered aviary. …”
Get full text
Article -
3413
Structures and Luminescent Sensing Properties of Terbium Metal–Organic Frameworks with Methyl-Decorated Phenanthroline Ligand
Published 2024-11-01“…Its layer-to-layer packing leaves narrow channels running across these windows, with 18% as a total solvent-accessible volume in the coordination structure. …”
Get full text
Article -
3414
Gas Chromatography of Environmentally Active Aromatic Amines in Industrial Dyes Effluents and Human Blood Serum
Published 2024-04-01“…GC separation was from column DB-5 (30m x 0.32mm) with the 0.25 µm layer thickness, 90 ˚C column temperature for 3 min, followed via heating rate 10 to 200 ˚C followed by hold of temperature for 7 min. …”
Get full text
Article -
3415
Detection and Manipulation of Interaction Between Magnetic DyPc2 Molecules and Superconducting Pb(111) Surface
Published 2025-05-01“…Abstract Lanthanide double‐decker phthalocyanine (LnPc2) complexes are highly coveted for their prospective uses in ultrahigh‐density data storage and quantum computing. …”
Get full text
Article -
3416
Leveraging multi-source data and teleconnection indices for enhanced runoff prediction using coupled deep learning models
Published 2025-04-01“…The Yalong River Basin, characterized by complex hydrological processes and diverse climatic influences, serves as the case study for model validation. …”
Get full text
Article -
3417
Research into the effects of seawater velocity variation on migration imaging in deep-water geology
Published 2016-07-01“…And finally a deep water layered medium model containing variable seawater velocity, a syncline wedge shape model and a complex seafloor velocity model are constructed. …”
Get full text
Article -
3418
Nucleoporin 153 deficiency in adult neural stem cells defines a pathological protein-network signature and defective neurogenesis in a mouse model of AD
Published 2024-09-01“…Conclusions Our data suggest that the positive effect of Nup153 on neurogenesis is based on a complex regulatory network orchestrated by Nup153 and that this protein is a valuable disease target.…”
Get full text
Article -
3419
De novo variant in GUCY2D gene causing atypical cone-rod dystrophy in a consanguineous family and literature review
Published 2025-07-01“…CONCLUSION: The de novo variant causing atypical autosomal dominant CRD is identified in a Chinese consanguineous family and this variant passes through this family in an autosomal dominant mode of inheritance, revealing the complex diversity and unpredictability of the inheritance mode for common single-gene genetic disease.…”
Get full text
Article -
3420
LINGUISTIC FEATURES OF BUSINESS ENGLISH DISCOURSE THESAURUS
Published 2021-06-01“…Despite the differences in content and variety of genres, business discourse in general is characterized by a number of common features, in particular: brevity, compactness of presentation, economical use of language; standard arrangement of material, often mandatory to use the inherent clichés of this style; extensive use of terminology, nomenclature names, the presence of a special layer of vocabulary and phraseology, the introduction of complex words and abbreviations. …”
Get full text
Article