Results 91 to 100 of about 8,000 (250)

An Improved Bat Algorithm with Grey Wolf Optimizer for Solving Continuous Optimization Problems [PDF]

open access: yesJournal of Advances in Computer Engineering and Technology, 2020
Metaheuristic algorithms are used to solve NP-hard optimization problems. These algorithms have two main components, i.e. exploration and exploitation, and try to strike a balance between exploration and exploitation to achieve the best possible near ...
narges jafari   +1 more
doaj  

Explainable artificial intelligence (XAI)‐powered design framework for lightweight strain‐hardening ultra‐high‐performance composites (SH‐UHPC)

open access: yesStructural Concrete, EarlyView.
Abstract Lightweight strain‐hardening ultra‐high‐performance concrete composite (SH‐UHPC) is an outstanding alternative for engineering applications and infrastructure thanks to its outstanding strength, toughness, ductility, and low density. The integration of artificial intelligence (AI)‐based modeling strategies into engineering problems can ...
Metin Katlav, Kazim Turk
wiley   +1 more source

Suitable habitat of Himalayan wolf in Upper Mustang, Annapurna Conservation Area, Nepal

open access: yesWildlife Biology, EarlyView.
Decades ago, the Himalayan wolf Canis lupus chanco, a genetically distinct sub‐species of the gray wolf Canis lupus, faced persecution by local communities in the Nepalese Himalayas. Recently, wolf populations have returned and recolonized, sparking concerns about conflicts over livestock depredation, and emphasizing the urgent need for comprehensive ...
Deu Bahadur Rana   +5 more
wiley   +1 more source

Dietary shift of the common leopard Panthera pardus in and around Bani Wildlife Sanctuary, western Himalayas: implications for conservation and human–wildlife conflict

open access: yesWildlife Biology, EarlyView.
Understanding the dietary patterns of apex predator like the common leopard Panthera pardus is essential for evaluating their ecological role, particularly in landscapes where human–wildlife conflict is prevalent. In this context, this study investigates the seasonal diet composition of the common leopard in and around the Bani Wildlife Sanctuary, a ...
Iyaz Quyoom   +3 more
wiley   +1 more source

DNA metabarcoding reveals wolf dietary patterns in the northern Alps and Jura Mountains

open access: yesWildlife Biology, EarlyView.
Understanding predator–prey interactions is crucial for wildlife management and human–wildlife coexistence, particularly in multi‐use landscapes such as western Europe. As wolves Canis lupus recolonize their former habitats, knowledge of their diet is essential for conservation, management and public acceptance.
Florin Kunz   +6 more
wiley   +1 more source

Comparative Trends of Sociality Among Terrestrial Carnivores: A Multivariate Analysis 陆生食肉动物社会性的比较趋势:一项多变量分析

open access: yesWildlife Letters, EarlyView.
In this study we analyze the role of phylogeny, environment, and community structure on sociality. Using structural equation modeling (SEM) we aim to quantify the direct and indirect impacts of variables on behaviors including social grouping, reproduction, and space use among Carnivora species.
Jessica Ward   +3 more
wiley   +1 more source

Identifying Causes of Reproductive Failure in Zoo‐Housed Bush Dogs (Speothos venaticus) to Improve Ex Situ Management

open access: yesZoo Biology, EarlyView.
We distributed a survey to global institutions housing bush dogs (Speothos venaticus) to collect data on factors which may affect litter survival. Information from the Zoological Information Management System (ZIMS) and studbook records supplemented this dataset. We found that within northern temperate regions, the number of pups reared to the age of 1
Alice S. Clark   +4 more
wiley   +1 more source

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy