Results 101 to 110 of about 81,533 (253)

Suitable habitat of Himalayan wolf in Upper Mustang, Annapurna Conservation Area, Nepal

open access: yesWildlife Biology, EarlyView.
Decades ago, the Himalayan wolf Canis lupus chanco, a genetically distinct sub‐species of the gray wolf Canis lupus, faced persecution by local communities in the Nepalese Himalayas. Recently, wolf populations have returned and recolonized, sparking concerns about conflicts over livestock depredation, and emphasizing the urgent need for comprehensive ...
Deu Bahadur Rana   +5 more
wiley   +1 more source

Research on Optimization of an Open-Bench Deep-Hole Blasting Parameter Using an Improved Gray Wolf Algorithm

open access: yesApplied Sciences
The blasting quality of open-pit mining can be enhanced and the production cost of stope reduced by establishing a mathematical model for step drilling and blasting costs based on stope consumption.
Li Zhao   +5 more
doaj   +1 more source

DNA metabarcoding reveals wolf dietary patterns in the northern Alps and Jura Mountains

open access: yesWildlife Biology, EarlyView.
Understanding predator–prey interactions is crucial for wildlife management and human–wildlife coexistence, particularly in multi‐use landscapes such as western Europe. As wolves Canis lupus recolonize their former habitats, knowledge of their diet is essential for conservation, management and public acceptance.
Florin Kunz   +6 more
wiley   +1 more source

New Hybrid Feature Selection Approaches Based on ANN and Novel Sparsity Norm

open access: yesJournal of Electrical and Computer Engineering
Feature selection is crucial for minimizing redundancy in information and addressing the limitations of traditional classification methods when dealing with large datasets and numerous features in many machine learning applications.
Khadijeh Nemati   +3 more
doaj   +1 more source

Block QPSK modulation codes with two levels of error protection [PDF]

open access: yes, 1994
A class of block QPSK modulation codes for unequal error protection (UEP) is presented. These codes are particularly suitable either for broadcast channels or for communication systems where parts of the information messages are more important than ...
Lin, Shu, Morelos-Zaragoza, Robert H
core   +1 more source

Pickin' up good vibrations: a systematic review of footfall detection and analysis in the realm of wildlife surveying

open access: yesWildlife Biology, EarlyView.
Exploration of new wildlife surveying methodologies that leverage advances in sensor technology and machine learning has led to tentative research into the application of seismology techniques. This, most commonly, involves the deployment of a footfall trap – a seismic sensor and data logger customised for wildlife footfall.
Benjamin J. Blackledge   +4 more
wiley   +1 more source

Parturition timing and the pre‐ and post‐partum behaviour of female moose assessed using animal‐borne video and movement‐based approaches

open access: yesWildlife Biology, EarlyView.
Limited information on moose calving behaviour, including parturition timing, cow‐calf interactions, and pre‐ and post‐partum movement patterns hinder our ability to define calving phenology and habitat use. GPS‐collars were deployed on 89 female moose over five years, including eight collars equipped with animal‐borne video and environmental data ...
Mikaela Borgeaud LeBlanc   +3 more
wiley   +1 more source

The Bent-Tube Nozzle Optimization of Force-Spinning With the Gray Wolf Algorithm. [PDF]

open access: yesFront Bioeng Biotechnol, 2021
Liu K, Li W, Ye P, Zhang Z, Ji Q, Wu Z.
europepmc   +1 more source

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy