Results 81 to 90 of about 349,669 (308)
Precision planter monitoring system based on mobile communication network
Abstract Sowing is an important link in agricultural production and the basis for ensuring high yields and bumper harvests. Agriculture requires precision plows with good performance and stable work. However, the seeding process is in a completely closed state, and the operator relies mainly on experience to judge the operating state and performance of
Bing Li, Jiyun Li
wiley +1 more source
ABSTRACT Tool use research has long made the distinction between tool using that is considered learned and flexible, and that which appears to be instinctive and stereotyped. However, animals with an inherited tool use specialisation can exhibit flexibility, while tool use that is spontaneously innovated can be limited in its expression and facilitated
Jennifer A. D. Colbourne +1 more
wiley +1 more source
Intent Arabic text categorisation based on different machine learning and term frequency
Abstract The complexity of Internet network configurations has made managing networks a complicated undertaking. Intent‐Based Networking (IBN) is a potential solution to this issue. In contrast to conventional networks, where a concrete description of the settings typically conveys a network administrator's goal kept on each device, an administrator's ...
Mohammad Fadhil Mahdi +1 more
wiley +1 more source
La minería de datos aporta una información invaluable que puede ser usada para mejorar los procesos en diversas áreas tales como la medicina, comercio, informática, entre otras.
Johnny Torres, Cristina L. Abad
doaj
A Scalable and Highly Configurable Cache-Aware Hybrid Flash Translation Layer
This paper presents a cache-aware configurable hybrid flash translation layer (FTL), named CACH-FTL. It was designed based on the observation that most state-of-the-art flash-specific cache systems above FTLs flush groups of pages belonging to the ...
Jalil Boukhobza +2 more
doaj +1 more source
An Eco‐Social Lens on Voice for Undervoiced and Unvoiced Stakeholders
ABSTRACT This conceptual paper argues it is important from an ecological–social (eco‐social) whole system point of view for businesses and policymakers to take the interests of and impacts on unvoiced and undervoiced [un(der)voiced] stakeholders into consideration for both strategic and justice reasons.
Sandra Waddock
wiley +1 more source
Design and implementation of geographic information system with mobile terminal and 5G network
Abstract Remote insurance mainly completes quotation, insurance application and payment through the PC terminal and mobile terminal, and the premium directly enters the insurance account. This article takes remote insurance as an example. First, it analyses the requirements of the remote insurance and insurance system, and then collects data from the ...
Huijun Xiao, Tangsen Huang, Ensong Jiang
wiley +1 more source
Defending Against Flush+Reload Attack With DRAM Cache by Bypassing Shared SRAM Cache
Cache side-channel attack is one of the critical security threats to modern computing systems. As a representative cache side-channel attack, Flush+Reload attack allows an attacker to steal confidential information (e.g., private encryption key) by ...
Minwoo Jang +3 more
doaj +1 more source
Barcoding of episodic memories in the hippocampus of a food-caching bird [PDF]
Selmaan N. Chettih +3 more
openalex +1 more source
From Ecosystem Threats to Balance Sheets: Biodiversity Risks Exposure and Corporate Cash Policies
ABSTRACT This study investigates how firms strategically respond to biodiversity risk by examining their cash holding decisions. Using firm‐level data from China, we find that firm‐level biodiversity risk exposure significantly increases corporate cash holdings.
Jing Hao +4 more
wiley +1 more source

