-
141
Fair Energy Trading in Blockchain-Inspired Smart Grid: Technological Barriers and Future Trends in the Age of Electric Vehicles
Published 2024-10-01“…As EVs become more prevalent, they introduce additional complexity to the SG landscape, with EVs not only consuming energy, but also potentially supplying it back to the grid through vehicle-to-grid (V2G) technologies. …”
Get full text
Article -
142
Risk Assessment and Management Strategy of Coastal Erosion in the Red River Delta, Vietnam
Published 2025-06-01“…In Vietnam’s Red River Delta (RRD), the dynamic interplay between erosion and accretion presents a highly complex challenge, necessitating effective risk assessment and management to safeguard communities and resources. …”
Get full text
Article -
143
GAB-YOLO: a lightweight deep learning model for real-time detection of abnormal behaviors in juvenile greater amberjack fish
Published 2025-05-01“…As a key species for sashimi, Greater Amberjack faces significant potential in aquaculture but is also vulnerable to temperature fluctuations, particularly during its juvenile stage, which can lead to abnormal behaviors. …”
Get full text
Article -
144
Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF
Published 2022-06-01“…Objectives: In the face of the complex and changing network security environment, how to fight against Advanced Persistent Threat (APT) attacks has become an urgent problem for the entire security community. …”
Get full text
Article -
145
Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF
Published 2022-06-01“…Objectives: In the face of the complex and changing network security environment, how to fight against Advanced Persistent Threat (APT) attacks has become an urgent problem for the entire security community. …”
Get full text
Article -
146
Does discontinuous Mesoscale Convective System produce stronger precipitation?
Published 2025-06-01“…The findings provide critical insights for improving flood early-warning systems and optimizing agricultural water management in monsoon-vulnerable regions, directly supporting climate adaptation strategies and sustainable development goals.…”
Get full text
Article -
147
Assessment of pan coefficient performance: A comparative study of empirical and model-driven approaches using a hill-climbing-based alternating model tree and MOORA
Published 2025-12-01“…Overall, the outcomes revealed that the primary model (BF-AMT) outperformed all the data-driven and empirical models in terms of optimal metrics (RMSE=0.0143, Vulnerability=6.3260, and MOORA=0), followed by BF-Elastic net (RMSE=0.7891, Vulnerability=28.1081, and MOORA=0.073) and BF-Bi-LSTM (RMSE=0.0169, Vulnerability=64.8649, and MOORA=0.128), respectively. …”
Get full text
Article -
148
Performance Analysis of Blockchain Consensus Algorithm in Unmanned Aerial Vehicle Ad Hoc Networks
Published 2025-04-01“…However, wireless communication links between UAV nodes are vulnerable to electromagnetic interference and competition due to limited spectrum resources. …”
Get full text
Article -
149
Microbial Interactions in Nature: The Impact of Gram-Negative Bacilli on the Hyphal Growth of <i>Candida albicans</i>
Published 2025-03-01“…Achieving a comprehensive understanding of these complex relationships is paramount for informing effective clinical management strategies for infectious diseases, and the accurate identification of fungal–bacterial co-infections holds substantial implications for optimizing clinical treatment paradigms, especially in vulnerable immunocompromised hosts.…”
Get full text
Article -
150
Partial immunity of two-photon correlation against wavefront distortion for spatially entangled photons
Published 2025-03-01“…However, such high-dimensional states are vulnerable to disruption by complex disordered media, presenting significant challenges in practical applications. …”
Get full text
Article -
151
Legal Challenges of Marine Insurance Laws in the Use of Unmanned Ships
Published 2025-03-01“…Despite these benefits, the adoption of unmanned ships is fraught with numerous challenges. These encompass vulnerabilities to cyber-attacks, software malfunctions, ambiguity in legal frameworks, inadequate emergency response mechanisms, communication hurdles in remote maritime environments such as polar regions, security threats, operational incongruities with traditional vessels, and critically, complexities associated with insuring these ships under existing legal regimes. …”
Get full text
Article -
152
Keeping silent or running away. The voices of Vietnamese women survivors of Intimate Partner Violence
Published 2021-01-01“…The women strategized within a complex set of structural constrains like poverty, cultures of honor, social stigma, and traditional gender roles. …”
Get full text
Article -
153
Reflections of adolescent motherhood on infant and young child feeding practices: the case of Uganda
Published 2025-01-01“…Targeted interventions and education programs should be implemented to promote optimal complementary feeding practices among mothers in Uganda.…”
Get full text
Article -
154
The Impact of Physiological and Psychological Fatigue on Work Efficiency: A Case Study of Parcel Sorting Work
Published 2024-09-01“…The demanding nature of parcel sorting work, which is characterized by intense and prolonged repetitive tasks, makes individuals particularly vulnerable to the effects of fatigue. Fatigue is a complex condition that encompasses both physiological and psychological exhaustion. …”
Get full text
Article -
155
Experimental analysis on residual ultimate bearing capacity of thin plate with internal explosion dent damage under biaxial compression
Published 2025-04-01“…The use of biaxial compression is highly relevant, as it replicates the complex stress states experienced by ship hulls in actual sea conditions. …”
Get full text
Article -
156
Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing
Published 2025-07-01“…In contrast, private verification restricts the auditing capability to the data owner, providing better privacy protection but often resulting in higher verification costs and operational complexity due to limited local resources. Moreover, most existing PDP schemes are based on classical number-theoretic assumptions, making them vulnerable to quantum attacks. …”
Get full text
Article -
157
Development and evaluation of a soft pneumatic muscle for elbow joint rehabilitation
Published 2024-10-01“…Elbow joint rehabilitation presents a formidable challenge, underscored by the joint’s complex biomechanics and high vulnerability to injuries and degenerative conditions. …”
Get full text
Article -
158
New Technological Revolution and Energy Requirements
Published 2018-12-01“…The current structure of the national fuel and energy complex is vulnerable to the large-scale electrification of transport and decarbonization of world energy. …”
Get full text
Article -
159
Recognition, management, and transport of sick cardiac children
Published 2025-05-01“…Due to the centralization of specialized cardiology, cardiac surgery, and intensive care services in various regions worldwide, critically ill cardiac children frequently require stabilization and safe transport to tertiary centers for further management whether in terms of diagnosis or further intervention. Ensuring optimal stabilization before transport is critical, as these patients have complex circulatory physiology and are particularly vulnerable to physiological disruptions during transport, including acceleration-deceleration forces and ventilation changes. …”
Get full text
Article -
160
Sparse Feature-Weighted Double Laplacian Rank Constraint Non-Negative Matrix Factorization for Image Clustering
Published 2024-11-01“…Additionally, many NMF variants face challenges when dealing with complex data distributions and are vulnerable to noise and outliers. …”
Get full text
Article