|
|
|
Jiapeng Zhang, Sha Zhao, Qingfeng Miao, Liang Feng, Zhaonan Chi, Zhen Li and Weiping Li
In order to achieve water conservation and salt control in saline irrigation areas and improve the soil ecological environment of farmland in irrigation areas, this study carried out a field trial in 2020?2021 on edible sunflowers planted in saline subsu...
ver más
|
|
|
|
|
|
|
Yin Tang, Lizhuo Zhang, Dan Huang, Sha Yang and Yingchun Kuang
In view of the current problems of complex models and insufficient data processing in ultra-short-term prediction of photovoltaic power generation, this paper proposes a photovoltaic power ultra-short-term prediction model named HPO-KNN-SRU, based on a S...
ver más
|
|
|
|
|
|
|
Zhiyuan Yang, Jiayi Xu, Junlin Li, Lirong He, Hongwei Xu, Xinrong Guo, Sha Xue and Yang Cao
The ecological niche gradient is an important determinant of microbial community structure. In this paper, we studied variation in rhizosphere bacterial diversity and community composition along an ecological niche gradient. We used the high-throughput s...
ver más
|
|
|
|
|
|
|
Shuhan Xu, Feng Wang, Yuling Ding, Wenchao Liu, Yiyu Lan, Qingqing Jia, Peng Sun and Zhimin Sha
Rice?duckweed coculturing as an advanced technique has proven effective for weed control. However, the complex environmental interactions underlying its effectiveness remain unclear. In this study, a controlled pot experiment was conducted to isolate the...
ver más
|
|
|
|
|
|
|
Yaqi Song, Dianming Wu, Peter Dörsch, Lanting Yue, Lingling Deng, Chengsong Liao, Zhimin Sha, Wenxu Dong and Yuanchun Yu
Soil nitrite (NO2-) is an important reactive intermediate in many nitrogen transformation processes, but it is unstable under acidic conditions and may be lost as gaseous N. The canonical extraction method of soil NO2- using a potassium chloride (KCl) so...
ver más
|
|
|
|
|
|
|
Hasan Hashim, Ahmad Reda Alzighaibi, Amaal Farag Elessawy, Ibrahim Gad, Hatem Abdul-Kader and Asmaa Elsaid
A zero-confirmation transaction is a transaction that has not yet been confirmed on the blockchain and is not yet part of the blockchain. The network propagates zero-confirmation transactions quickly, but they are not secured against double-spending atta...
ver más
|
|
|
|
|
|
|
Argyrios Sideris and Minas Dasygenis
Information is transmitted between multiple insecure routing hops in text, image, video, and audio. Thus, this multi-hop digital data transfer makes secure transmission with confidentiality and integrity imperative. This protection of the transmitted dat...
ver más
|
|
|
|
|
|
|
Ibrahim Shawky Farahat, Waleed Aladrousy, Mohamed Elhoseny, Samir Elmougy and Ahmed Elsaid Tolba
The Internet of Medical Things (IoMT) uses wireless networks to help patients to communicate with healthcare professionals. Therefore, IoMT devices suffer from a lack of security controls, just like many Internet of Things (IoT) gadgets. Thus, in this pa...
ver más
|
|
|
|
|
|
|
Argyrios Sideris, Theodora Sanida and Minas Dasygenis
Hash functions are an essential mechanism in today?s world of information security. It is common practice to utilize them for storing and verifying passwords, developing pseudo-random sequences, and deriving keys for various applications, including milit...
ver más
|
|
|
|
|
|
|
Chaoyue Li, Huan Yang, Sha Liu, Shiyu Feng, Lei Xu and Zhiling Wang
In this study, a ground-based washing inerting (GBWI) method was proposed, and the application of GBWI in the field of fire prevention and explosion suppression of unmanned aerial vehicle (UAV) fuel tanks was studied using a volume of fluid (VOF) two-pha...
ver más
|
|
|
|