Live and Dead Knot Segmentation in X-ray Computed Tomography: A Comparative Study of Modern Networks
Reliable segmentation of live and dead knots in X-ray computed tomography images is crucial for automated wood grading and sawing yield optimisation in the timber industry. Segmentation in wet-state X...
Rapid decision-making during exotic animal disease outbreaks necessitates the early characterisation of transmission dynamics; however, in practice, a strategic balance between accuracy and speed is r...
The COVID-19 pandemic had devastating consequences for long-term care facilities (LTCFs), particularly in Quebec where mortality rates were especially high during the early waves. Although the psychol...
Cucumber (Cucumis sativusL.) is widely valued for its nutritional and nutraceutical attributes; however, its postharvest quality and proximate composition under varying agronomic practices in tropical...
Introduction The Hepatitis B third dose (HepB3) vaccination is essential in preventing chronic infections, liver failure, and cancer. Despite progress, global coverage remains uneven, especially in lo...
Since the discovery of graphene, two-dimensional nanosheets have attracted attention for their unique shapes and properties. The simplest production method is the top-down approach, in which layered m...
Aims This study aimed to evaluate the effects of integrated nutrient management (INM) strategies involving reduced recommended fertilizer doses (RDF) and different micronutrient application methods on...
This study examines barriers to adopting AI-enabled human resource management (AI-HR) in Zanzibar’s public and private sectors, focusing on how adoption dynamics in resource-constrained, mandatory set...
Background Social media use is pervasive among university students, but the cognitive pathways through which it may influence depressive mood are not well understood, particularly in low‑resource sett...
Federated learning has emerged as the dominant paradigm for privacy-preserving intrusion detection across distributed networks, yet its vulnerability to adversarial manipulation of the training proces...
SinoXiv