-
401
Simulation and Comparative Study of Interaction Between Ray and Medium in Borehole Based on FLUKA Software
Published 2025-04-01“…Representative benchmark models encompassing gamma-ray transport, neutron transport, and gamma-neutron coupled transport processes were developed in both FLUKA and MCNP. Key logging data, including gamma energy spectra, formation density, and porosity, were obtained to assess FLUKA’s performance in low-energy radiation transport simulations. …”
Get full text
Article -
402
An Integrated Spatial-Spectral Denoising Framework for Robust Electrically Evoked Compound Action Potential Enhancement and Auditory Parameter Estimation
Published 2025-06-01“…In the second stage, the denoised matrix is vectorized and further processed using a log-spectral amplitude (LSA) Wiener filter for spectral domain denoising. …”
Get full text
Article -
403
-
404
Time‐specific encrypted range query with minimum leakage disclosure
Published 2021-01-01Get full text
Article -
405
-
406
Analysis of Shell Egg Pasteurization Using Computational Fluid Dynamics
Published 2025-01-01“…In the present work, the thermal pasteurization process of shell eggs was studied through Computational Fluid Dynamics. …”
Get full text
Article -
407
A Novel Approach to Speed Up Hampel Filter for Outlier Detection
Published 2025-05-01“…The proposed variant significantly lowers processing time and resource consumption, making it especially suitable for large-scale and real-time data processing while preserving robust outlier detection performance.…”
Get full text
Article -
408
-
409
Survey on cyber deception
Published 2017-12-01“…The asymmetric situation of network attacks and defenses is one of the key issues of current network security.Cyber deception was a revolutionary technology introduced by defenders to alter the asymmetric situation.By thwarting an attacker's cognitive processes,defenders can mislead attackers,hence causing them to take specific actions that aid network security defenses.In this way,defenders can log attackers'behavior and method,increase cost for the attackers to launch a successful attack,as well as reduce the probability of an attacker's success.Cyber deception formally and classify cyber deception into four classes was defined.Then,the cyber deceptions’development was divided into three stages,and each stage’s character was decided.Next,a hierarchical model to describe the existing work was proposed.At last,the countermeasures in cyber deception and the development trends in this field was discussed.…”
Get full text
Article -
410
Evaluation of the Feasibility of Transfusing Leukocyte Depletion Filter–Processed Intraoperative Cell Salvage Blood in Metastatic Spine Tumor Surgery: Protocol for a Non–Randomized...
Published 2025-01-01“…The Kaplan-Meier curve and a log-rank test will be used to study overall survival. …”
Get full text
Article -
411
Investigating the Potential of L(+)-Lactic Acid as a Green Inhibitor and Eradicator of a Dual-Species <i>Campylobacter</i> spp. Biofilm Formed on Food Processing Model Surfaces
Published 2024-10-01“…Results revealed that LA inhibited mixed-culture biofilm formation by more than 2 logs (>99%) on both surfaces when this was applied at its highest tested concentration (4096 μg/mL; 0.34% <i>v</i>/<i>v</i>). …”
Get full text
Article -
412
Inactivation of Salmonella and avian pathogens on hatchery eggs using gas phase hydroxyl-radical process vs formaldehyde fumigation: Efficacy, hatching performance and grow-out of...
Published 2025-05-01“…The HR treatment could eliminate Enterococcus faecium, Escherichia coli (>5 log CFU/egg reduction) although HRS was required to inactivate Pseudomonas aeruginosa (>5 log CFU/egg reduction) and reduce Aspergillus niger spores (3.08±2.25 log CFU reduction). …”
Get full text
Article -
413
Synthesis algorithm of low sensitivity non‐separable N‐D finite impulse response filters configured of fast orthogonal 1‐D rotation structures implemented in field programmable gat...
Published 2022-06-01“…The proposed synthesis algorithm was used to design and optimise the structure of the Laplacian of Gaussian (LoG) 3‐D filter. The obtained filter was implemented in FPGA IC and its parameters, sensitivity, processing time and signal‐to‐quantisation noise ratio, were simulated and measured. …”
Get full text
Article -
414
Microbiological Analysis of Wild Lowbush Blueberries Harvested in Nova Scotia, Canada for the Fresh Produce Market
Published 2024-11-01“…Mean counts were < 2.5 log<sub>10</sub> CFU/g for both SH and GH berries, but significantly higher (<i>p</i> < 0.05) on MH berries (3.6 log<sub>10</sub> CFU/g). …”
Get full text
Article -
415
Document coordination patterns
Published 2025-07-01“…Documents circulating within an organization can easily collect information about their workflow in the form of logs with minimal effort. By applying process mining techniques, it is possible to extract the actual processes they follow. …”
Get full text
Article -
416
Second Language Students' Revision During Translating Medical and Literary Texts: A Psycholinguistics Perspective
Published 2023-04-01“…Introduction. Cognitive processes have been extensively examined in the literature of translation studies to identify what goes on in students’ minds when they translate from one language into another. …”
Get full text
Article -
417
Evaluation of parenting interventions for those with additional health and social care needs during pregnancy: THRIVE a multi-arm RCT with embedded economic and process components
Published 2025-05-01“…Costs were adjusted using generalised linear models with gamma family and log link to account for covariates and skew distribution of cost. …”
Get full text
Article -
418
Quantitative evaluation of tight gas reservoir classification based on analytic hierarchy process: A case study of Penglaizhen Formation gas reservoir in Xinchang Gas Field
Published 2024-06-01“…Utilizing geophysical data, logging interpretation, and geological fundamentals as criterion indices, the study constructs a judgment matrix to establish a quantitative evaluation model. …”
Get full text
Article -
419
Concrete Bridge Crack Detection Using Unmanned Aerial Vehicles and Image Segmentation
Published 2025-06-01“…In contrast, UAV-based remote sensing, combined with advanced image processing, offers a more efficient and accurate solution. …”
Get full text
Article -
420
Use of innovative technologies to extend the shelf life of dairy products
Published 2025-06-01“…A comparative analysis of non-thermal methods revealed that high-pressure processing (600 MPa, 15 minutes) and pulsed electric fields (35 kV/cm, 1,000 Hz) were the most effective in inactivating microorganisms, reducing their overall count by 4.2 and 3.8 log CFU/cm³, respectively. …”
Get full text
Article