|
|
|
Zhou Fang, Xiaoyong Wang, Liang Zhang and Bo Jiang
Currently, deep learning is extensively utilized for ship target detection; however, achieving accurate and real-time detection of multi-scale targets remains a significant challenge. Considering the diverse scenes, varied scales, and complex backgrounds...
ver más
|
|
|
|
|
|
|
Bingyu Zhang, Yingtang Wei, Ronghua Liu, Shunzhen Tian and Kai Wei
The calibration and validation of hydrological model simulation performance and model applicability evaluation in Gansu Province is the foundation of the application of the flash flood early warning and forecasting platform in Gansu Province. It is diffi...
ver más
|
|
|
|
|
|
|
Manal Rajeh AlShalaan and Suliman Mohamed Fati
To address a business need, most organizations allow employees to use their own devices to enhance productivity and job satisfaction. For this purpose, the Bring Your Own Device (BYOD) policy provides controllable access for employees to organize data th...
ver más
|
|
|
|
|
|
|
Jaciele O. Dantas, Sócrates C. H. Cavalcanti, Ana Paula A. Araújo, Jefferson E. Silva, Thaysnara B. Brito, Valfran S. Andrade, Heloisa S. S. Pinheiro, Swamy R. S. A. Tavares, Arie F. Blank and Leandro Bacci
Leaf-cutting ants are important pests of agricultural and forest crops. Currently, few insecticides are registered for the control of these insects. Natural bioactive molecules can serve as models for the synthesis of new insecticidal compounds. Such ant...
ver más
|
|
|
|
|
|
|
Hanan A. Marzouk, Mohammed A. Arab, Mohy S. Fattouh and Asmaa S. Hamouda
Each year, billions of tons of agricultural waste are generated globally. Egypt, being an agriculturally centered nation, faces significant challenges in disposing of this waste and coping with self-germinating plants that negatively impact agriculture. ...
ver más
|
|
|
|
|
|
|
Yarajarla Nagasree, Chiramdasu Rupa, Ponugumati Akshitha, Gautam Srivastava, Thippa Reddy Gadekallu and Kuruva Lakshmanna
Privacy preservation of image data has been a top priority for many applications. The rapid growth of technology has increased the possibility of creating fake images using social media as a platform. However, many people, including researchers, rely on ...
ver más
|
|
|
|
|
|
|
Farid Lalem, Abdelkader Laouid, Mostefa Kara, Mohammed Al-Khalidi and Amna Eleyan
Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove...
ver más
|
|
|
|
|
|
|
Jagadhesan Boopal, Lekshmy Sathee, Ramesh Ramasamy, Rakesh Pandey and Viswanathan Chinnusamy
Understanding the component traits determining salt stress tolerance is a major breeding target in wheat. The lack of genetic resources suited to salt-affected regions and the complexity of the traits involved impede progress in breeding salt-tolerant wh...
ver más
|
|
|
|
|
|
|
Yiannis Michailidis
The purpose of this study was to systematically review the literature on the effect of exercise programs on the Repeated Sprint Ability (RSA) performance of soccer players. PubMed, Scopus and Google Scholar databases were searched for original research a...
ver más
|
|
|
|
|
|
|
Emmanuel A. Adeniyi, Peace Busola Falola, Mashael S. Maashi, Mohammed Aljebreen and Salil Bharany
With the explosion of connected devices linked to one another, the amount of transmitted data grows day by day, posing new problems in terms of information security, such as unauthorized access to users? credentials and sensitive information. Therefore, ...
ver más
|
|
|
|