Results 1 to 10 of about 1,007,595 (330)

Mapping low-latitude stellar substructure with SEGUE photometry [PDF]

open access: bronze, 2008
Encircling the Milky Way at low latitudes, the Low Latitude Stream is a large stellar structure, the origin of which is as yet unknown. As part of the SEGUE survey, several photometric scans have been obtained that cross the Galactic plane, spread over a
Andrew E. Dolphin   +7 more
core   +2 more sources

A Framework for Continuous Authentication Based on Touch Dynamics Biometrics for Mobile Banking Applications

open access: yesSensors, 2021
As smart devices have become commonly used to access internet banking applications, these devices constitute appealing targets for fraudsters. Impersonation attacks are an essential concern for internet banking providers.
Priscila Morais Argôlo Bonfim Estrela   +4 more
doaj   +1 more source

Construction and Optimization of the Ecological Security Pattern of Xishuangbanna Based on Fragmentation Index

open access: yesRedai dili, 2022
Tropical forests are considered the most abundant source of biodiversity in the terrestrial ecosystem and the key to international biodiversity conservation.
Shen Run   +4 more
doaj   +1 more source

Role of the subtropical westerly jet wave train in the eastward-moving heavy rainfall event over southern China in winter: A case study

open access: yesFrontiers in Earth Science, 2023
Under the wintertime background of westerly flows, heavy rainfall often occurs first over southwestern China and then spreads eastward downstream to southeastern China, causing serious impact on a large scope of southern China.
Juyue Yin   +8 more
doaj   +1 more source

DCIDS—Distributed Container IDS

open access: yesApplied Sciences, 2023
Intrusion Detection Systems (IDS) still prevail as an important line of defense in modern computing environments. Cloud environment characteristics such as resource sharing, extensive connectivity, and agility in deploying new applications pose security ...
Savio Levy Rocha   +4 more
doaj   +1 more source

Securing Instant Messages With Hardware-Based Cryptography and Authentication in Browser Extension

open access: yesIEEE Access, 2020
Instant Messaging (IM) provides near-real-time communication between users, which has shown to be a valuable tool for internal communication in companies and for general-purpose interaction among people. IM systems and supporting protocols, however, must
Gabriel Arquelau Pimenta Rodrigues   +6 more
doaj   +1 more source

Using particle swarm optimization to improve visibility-aerosol optical depth retrieval method

open access: yesnpj Climate and Atmospheric Science, 2021
In view of the lack of long-term AOD (Aerosol Optical Depth) data, PSO (Particle Swarm Optimization) algorithm is introduced and joint used with NLSM (the nonlinear least square method) to improve visibility-AOD retrieval method, which is referred to as ...
Jian Wu   +6 more
doaj   +1 more source

Genome-wide analysis of OSCA gene family members in Vigna radiata and their involvement in the osmotic response

open access: yesBMC Plant Biology, 2021
Background Mung bean (Vigna radiata) is a warm-season legume crop and belongs to the papilionoid subfamily of the Fabaceae family. China is the leading producer of mung bean in the world.
Lili Yin   +5 more
doaj   +1 more source

A blue carbon pilot project: Lessons learned

open access: yesCarbon Management, 2022
Here we describe a pilot wetland carbon project located 30 km west of New Orleans where measurements were taken in 2013 and 2018, and applied to a carbon offset methodology published by the American Carbon Registry (ACR).
Sarah K. Mack   +5 more
doaj   +1 more source

Wasteland rehabilitation in rural landscape: a design project in the Verona plain

open access: yesRi-vista: Ricerche per la Progettazione del Paesaggio, 2018
This contribution presents a design exploration for the rehabilitation of a dumpsite in the mu-nicipality of Isola Rizza, Verona (Italy). In the Verona plain, a former district of brick production left in its wake a cluster of water basins and ...
Andrea Bortolotti, Marco Ranzato
doaj   +1 more source

Home - About - Disclaimer - Privacy