Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (127)
  • Open Access

    ARTICLE

    Toxic and Antifeedant Effects of Different Pesticidal Plant Extracts against Beet Armyworm (Spodoptera exigua)

    Muhammad Asad1, Rashad Rasool Khan2,*, Ahmed B. Aljuboory3, Muhammad Haroon U. Rashid4, Uttam Kumar5, Inzamam Ul Haq6, Aqsa Hafeez7, Ahmed Noureldeen8, Khadiga Alharbi9,*

    Phyton-International Journal of Experimental Botany, Vol.92, No.4, pp. 1161-1172, 2023, DOI:10.32604/phyton.2023.026513 - 06 January 2023

    Abstract The beet armyworm (BAW), Spodoptera exigua (Lepidoptera: Noctuidae) is a highly destructive pest of vegetables and field crops. Management of beet armyworm primarily relies on synthetic pesticides, which is threatening the beneficial community and environment. Most importantly, the BAW developed resistance to synthetic pesticides with making it difficult to manage. Therefore, alternative and environment-friendly pest management tactics are urgently required. The use of pesticidal plant extracts provides an effective way for a sustainable pest management program. To evaluate the use of pesticidal plant extracts against BAW, we selected six plant species (Lantana camara, Aloe vera, Azadirachta indica, Cymbopogon citratus, Nicotiana tabacum , and… More >

  • Open Access

    ARTICLE

    Short-Term Power Load Forecasting with Hybrid TPA-BiLSTM Prediction Model Based on CSSA

    Jiahao Wen, Zhijian Wang*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 749-765, 2023, DOI:10.32604/cmes.2023.023865 - 05 January 2023

    Abstract Since the existing prediction methods have encountered difficulties in processing the multiple influencing factors in short-term power load forecasting, we propose a bidirectional long short-term memory (BiLSTM) neural network model based on the temporal pattern attention (TPA) mechanism. Firstly, based on the grey relational analysis, datasets similar to forecast day are obtained. Secondly, the bidirectional LSTM layer models the data of the historical load, temperature, humidity, and date-type and extracts complex relationships between data from the hidden row vectors obtained by the BiLSTM network, so that the influencing factors (with different characteristics) can select relevant… More >

  • Open Access

    ARTICLE

    Shared Cache Based on Content Addressable Memory in a Multi-Core Architecture

    Allam Abumwais*, Mahmoud Obaid

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4951-4963, 2023, DOI:10.32604/cmc.2023.032822 - 28 December 2022

    Abstract Modern shared-memory multi-core processors typically have shared Level 2 (L2) or Level 3 (L3) caches. Cache bottlenecks and replacement strategies are the main problems of such architectures, where multiple cores try to access the shared cache simultaneously. The main problem in improving memory performance is the shared cache architecture and cache replacement. This paper documents the implementation of a Dual-Port Content Addressable Memory (DPCAM) and a modified Near-Far Access Replacement Algorithm (NFRA), which was previously proposed as a shared L2 cache layer in a multi-core processor. Standard Performance Evaluation Corporation (SPEC) Central Processing Unit (CPU)… More >

  • Open Access

    ARTICLE

    A Novel Approximate Message Passing Detection for Massive MIMO 5G System

    Nidhi Gour1, Rajneesh Pareek1, Karthikeyan Rajagopal2,3, Himanshu Sharma1, Mrim M. Alnfiai4, Mohammed A. AlZain4, Mehedi Masud5, Arun Kumar6,*

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2827-2835, 2023, DOI:10.32604/csse.2023.033341 - 21 December 2022

    Abstract Massive-Multiple Inputs and Multiple Outputs (M-MIMO) is considered as one of the standard techniques in improving the performance of Fifth Generation (5G) radio. 5G signal detection with low propagation delay and high throughput with minimum computational intricacy are some of the serious concerns in the deployment of 5G. The evaluation of 5G promises a high quality of service (QoS), a high data rate, low latency, and spectral efficiency, ensuring several applications that will improve the services in every sector. The existing detection techniques cannot be utilised in 5G and beyond 5G due to the high More >

  • Open Access

    ARTICLE

    Metabolites Composition of Bacillus subtilis HussainT-AMU Determined by LC-MS and Their Effect on Fusarium Dry Rot of Potato Seed Tuber

    Touseef Hussain1,*, Abrar A. Khan1, Heba I. Mohamed2,*

    Phyton-International Journal of Experimental Botany, Vol.92, No.3, pp. 783-799, 2023, DOI:10.32604/phyton.2022.026045 - 29 November 2022

    Abstract Fusarium dry rot is considered to be the most critical soilborne and postharvest disease that damages potato tubers worldwide when they are stored for a long time. This study was performed to demonstrate the effect of crude extract, culture filtrate, and cell suspension obtained from the bacterium Bacillus subtilis HussainT-AMU, on the net house and field. From oil-contaminated soil, through the serial dilution method, biosurfactant bacteria were isolated on nutrient agar medium. To isolate and screen the prospective biosurfactant strain, various biosurfactant screening methods were used. Standard protocols were carried out for morphological, molecular, and chemical… More >

  • Open Access

    ARTICLE

    Night Vision Object Tracking System Using Correlation Aware LSTM-Based Modified Yolo Algorithm

    R. Anandha Murugan1,*, B. Sathyabama2

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 353-368, 2023, DOI:10.32604/iasc.2023.032355 - 29 September 2022

    Abstract Improved picture quality is critical to the effectiveness of object recognition and tracking. The consistency of those photos is impacted by night-video systems because the contrast between high-profile items and different atmospheric conditions, such as mist, fog, dust etc. The pictures then shift in intensity, colour, polarity and consistency. A general challenge for computer vision analyses lies in the horrid appearance of night images in arbitrary illumination and ambient environments. In recent years, target recognition techniques focused on deep learning and machine learning have become standard algorithms for object detection with the exponential growth of… More >

  • Open Access

    REVIEW

    Drosophila melanogaster as an indispensable model to decipher the mode of action of neurotoxic compounds

    MONALISA MISHRA1,2,*, PUNYATOYA PANDA1, BEDANTA KUMAR BARIK1, AMRITA MONDAL1, MRUTUNJAYA PANDA1

    BIOCELL, Vol.47, No.1, pp. 51-69, 2023, DOI:10.32604/biocell.2022.023392 - 26 September 2022

    Abstract Exposure to some toxic compounds causes structural and behavioral anomalies associated with the neurons in the later stage of life. Those toxic compounds are termed as a neurotoxicant, which can be a physical factor, a toxin, an infection, radiation, or maybe a drug. The incongruities caused due to a neurotoxicant further depend on the toxicity of the compound. More importantly, the neurotoxicity of the compound is associated with the concentration and the time point of exposure. The neurodevelopmental defect appears depending on the toxicity of the compound. A neurodevelopmental defect may be associated with a More >

  • Open Access

    ARTICLE

    Paillier Cryptography Based Message Authentication Code for IoMT Security

    S. Siamala Devi1, Chandrakala Kuruba2, Yunyoung Nam3,*, Mohamed Abouhawwash4,5

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2209-2223, 2023, DOI:10.32604/csse.2023.025514 - 01 August 2022

    Abstract Health care visualization through Internet of Things (IoT) over wireless sensor network (WSN) becomes a current research attention due to medical sensor evolution of devices. The digital technology-based communication system is widely used in all application. Internet of medical thing (IoMT) assisted healthcare application ensures the continuous health monitoring of a patient and provides the early awareness of the one who is suffered without human participation. These smart medical devices may consume with limited resources and also the data generated by these devices are large in size. These IoMT based applications suffer from the issues… More >

  • Open Access

    ARTICLE

    Opportunistic Routing with Multi-Channel Cooperative Neighbour Discovery

    S. Sathish Kumar1,*, G. Ravi2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2367-2382, 2023, DOI:10.32604/iasc.2023.030054 - 19 July 2022

    Abstract Due to the scattered nature of the network, data transmission in a distributed Mobile Ad-hoc Network (MANET) consumes more energy resources (ER) than in a centralized network, resulting in a shorter network lifespan (NL). As a result, we build an Enhanced Opportunistic Routing (EORP) protocol architecture in order to address the issues raised before. This proposed routing protocol goal is to manage the routing cost by employing power, load, and delay to manage the routing energy consumption based on the flooding of control packets from the target node. According to the goal of the proposed… More >

  • Open Access

    ARTICLE

    La genèse systémique d’empreinte pour une maîtrise de l’observation de la Terre

    Mireille Fargette1 , Maud Loireau2, Najet Raouani3 , Thérèse Libourel4

    Revue Internationale de Géomatique, Vol.31, No.1, pp. 135-197, 2022, DOI:10.3166/RIG31.135-197

    Abstract Ce travail s’intéresse à l’observation, à la connaissance scientifique construite à partir de ce qui est perçu (Lien de Sens) d’un monde systémique complexe. La démarche conduit à proposer le concept d’empreinte dans le cadre scientifique interdisciplinaire « Système - Réalité - Monde perçu - Modèle », à le mettre à l’épreuve des données, puis à proposer la démarche d’ontologie systémique. Celle-ci permet de déployer le Lien de Forme du domaine systémique au monde perçu, d’analyser et décrire la part pertinente de la donnée et de montrer en quoi l’ensemble de ce travail essentiellement symbolique More >

Displaying 41-50 on page 5 of 127. Per Page