-
981
Unlocking the Potential of <i>Lacticaseibacillus rhamnosus</i> 73 as a Ripening Agent in Semi-Hard Cheese After Freeze-Drying and a Six-Month Storage Period
Published 2025-07-01“…Neither the freeze-drying process nor the storage conditions negatively affected its viability, as L73 maintained its initially high levels (>10 log cfu mL<sup>−1</sup>) throughout the storage period. …”
Get full text
Article -
982
A Novel Variable-Order Threshold Serial Belief Propagation-Based Decoding Algorithm for LT Codes
Published 2025-01-01“…However, the conventional log-likelihood ratio BP (LLR-BP) decoder exhibits inherent limitations in additive white Gaussian noise (AWGN) channels. …”
Get full text
Article -
983
The Distribution of Dissolved Copper and Natural Organic Ligands in Tropical Coastal Waters Under Seasonal Variation
Published 2025-02-01“…The natural organic copper(II)-binding ligands (CuL) and their conditional stability constants (log <i>K</i>′) were determined by using the competitive ligand exchange–adsorptive cathodic stripping voltammetry method (CLE–AdCSV) in our samples. …”
Get full text
Article -
984
Biogenic Functionalized ZnO/CuO Nanocomposite Sensor for Potentiometric Determination of Pseudoephedrine-HCl in Pure and Commercial Products
Published 2024-10-01“…It was estimated that the regression equation was represented by the EmV = (-58.143) log [PSD] + 526.71. With the proposed sensors, pseudoephedrine hydrochloride could be effectively determined in pure and commercial product forms. …”
Get full text
Article -
985
A software pipeline for systematizing machine learning of speech data
Published 2025-07-01“…The reproducibility and replicability of experimental findings is an essential element of the scientific process. The machine-learning community has a long-established practice of sharing data sets so that researchers can report the performance of their models on the same data. …”
Get full text
Article -
986
Rock fracture type recognition based on deep feature learning of microseismic signals
Published 2025-03-01“…These signals were then processed to construct a microseismic signal aggregation (MSA) spectrogram, which integrated time-frequency spectrograms, log-Mel spectrograms, and Mel-frequency cepstral coefficients. …”
Get full text
Article -
987
Serum metabolite levels identify incipient metastatic progression of rectal cancer
Published 2025-04-01“…Abstract Background The cellular metabolism undergoes reprogramming during the metastatic process. We hypothesised that serum metabolites at the time of primary tumour diagnosis might identify rectal cancer patients prone to metastatic progression. …”
Get full text
Article -
988
Strength and Microscopic Damage Mechanism of Yellow Sandstone with Holes under Freezing and Thawing
Published 2020-01-01“…The damage equation of the yellow sandstone with pores under the freezing and thawing is a log-power function nonlinear change law and presents a good correlation.…”
Get full text
Article -
989
Geostatistics and Artificial Intelligence Applications for Spatial Evaluation of Bearing Capacity after Dynamic Compaction
Published 2022-01-01“…This study uses the data obtained from a total of 42 borehole logs with an average depth of 17 m and testing depth intervals of 1.5 m after dynamic compaction and 26 SPT-N log data before dynamic compaction. …”
Get full text
Article -
990
Geomechanical modeling and wellbore stability analysis for studying the shale rock failure
Published 2025-03-01“…In this study, the model was applied to two specific wells (ZB-A and ZB-B) to perform a wellbore stability assessment utilizing available well log data, which includes parameters such as bit size (BS), caliber (CAL), shear sonic logs (DTS), compressional sonic logs (DTC), and gamma ray (GR) logs. …”
Get full text
Article -
991
Optimization of Disinfection of Raw Wheat Sprout by Combination of Ultrasonic and Citric Acid Using Response Surface Methodology (RSM)
Published 2025-01-01“…The combined US–CA treatment significantly reduced microbial loads, achieving reductions of 4.92, 2.58, and 1.26 log CFU/g for coliforms, molds and yeasts, and total microbial count, respectively. …”
Get full text
Article -
992
Analysis of convergence trends and driving factors of environmental efficiency of pig farming in China
Published 2025-02-01“…In addition, improving the quality of the labor force can help the environmental efficiency of pig farming converge to a high-level club.DiscussionWe propose suggestions aimed at enhancing the efficiency of pig farming, promoting the scale processes of pig farming, and strengthening regional cooperation.…”
Get full text
Article -
993
Laboratory studies of the impact of a roller sorting machine on potato tubers
Published 2021-02-01“…In order to determine the place of the greatest force impact of the working bodies of the sorting machines on the potato tuber and to carry out subsequent measures to eliminate negative effects in the design of these machines, laboratory studies were carried out using the "The TuberLog Electronic Potato" software tool. The article provides the results of comparative studies of the force impact of the sorting surface on the electronic potato tuber at various values of the forward speed of movement and interaction time of the working surface of roller-type machine for sorting potato tubers. …”
Get full text
Article -
994
Dietary caffeine and its negative link to serum Klotho concentrations: evidence from the National Health and Nutrition Examination Survey
Published 2024-12-01“…Additional studies are required to verify these results and investigate the underlying biological processes involved.…”
Get full text
Article -
995
A Predictive Approach for Enhancing Accuracy in Remote Robotic Surgery Using Informer Model
Published 2025-05-01“…The method integrates the optimization problem into the Informer model by embedding constraints such as energy efficiency, smoothness, and robustness into its training process using a differentiable optimization layer. …”
Get full text
Article -
996
EMVAS: end-to-end multimodal emotion visualization analysis system
Published 2025-07-01“…For feature extraction, facial landmark detection and action unit analysis capture fine-grained visual cues; Mel-frequency cepstral coefficients, log-scaled fundamental frequency, and Constant-Q transform extract detailed audio features; and a Transformer-based encoder processes textual data for contextual emotion analysis. …”
Get full text
Article -
997
Design and analysis of intelligent service chain system for network security resource pool
Published 2022-08-01“…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
Get full text
Article -
998
New Mellin-Based Estimation and GoF Criteria for the Beta-Weibull Model
Published 2025-02-01“…In this paper, we propose a new estimation method based on log-cumulant (LC) expressions for the beta-Weibull (BW) distribution, an important beta-G model. …”
Get full text
Article -
999
Predictive Framework for Sustainable Engineering through Machine Learning and Cross-Sector Collaboration
Published 2025-01-01“…Harvested public data was normalized, encoded, and pre-processed class balances using SMOTE. An Extra Trees Classifier was trained to perform binary classification of project success deemed as primary indicators, evaluating performance through accuracy, precision, recall, F1 score, log loss, and MSE. …”
Get full text
Article -
1000
LOSS OF HETEROZYGOSITY IN THE BRCA1 AND BRCA2 LOCUS IN BREAST CANCER
Published 2020-07-01“…The 5-year non-metastatic survival rates were 75 % and 100 % in patients with LOH in the BRCA1 and BRCA2 genes, respectively (log-rank test: p=0.003 and p=0.05, respectively).Conclusion. …”
Get full text
Article