36 research outputs found
Database on nutritional composition of food fishes from India
This database is the first of its kind on
fish-food data in the country and is envisaged
to serve as a repository of all
such nutritional information on different
food-fish species. This would also serve
as a knowledgebase for different clientele
groups, including physicians, nutritionists,
planners and consumers to
increase the utility of fish as a health
food and in clinical nutrition as well. The
nutritional information generated could
also be helpful in prioritization of fish
species for aquaculture depending upon
their associated nutritional values
A DESIGN OF WSN BASED LOCKING SYSTEM
This paper studied and designed a smart lock based on STM32F4 and CC2530 wireless module and proposed the
overall design scheme of the system. By utilize the wireless transmission characteristics of ZigBee module, we can
make the STM32F4 as the main control chip, and CC2530 as the wireless transmission module to realize the
control of smart door lock. The smart lock consists of a smart lock device and a CC2530 wireless transmission
module. The structure of the intelligent lock device mainly includes the module of door lock control chip,
monitoring module, lock tongue drive module and power supply circuit. The intelligent lock device uses the
STM32F4 microcontroller as the door lock control chip, sends an unlock instruction to the CC2530 module A by
using the USART serial port, and then sends the received instruction to the CC2530 module B connected with the
smart lock by the CC2530 module A. Control the opening and closing of the smart lock device
Permeazione di vanillina ed acido ferulico in soluzione acquosa attraverso una membrana polimerica.
Utilizzando membrane dense si è voluto analizzare la possibilità di permeare soluzioni contenenti vanillina ed acido ferulico attraverso il processo di dialisi, con entrambe le soluzioni a valle e monte della membrana in fase liquida ed a contatto diretto con essa. Studiando i risultati ottenuti si vogliono valutare i vantaggi e gli svantaggi rispetto ai risultati di un processo di pervaporazione
PCB Defect Detection Algorithm Based on Improved YOLOv7
Achieving enhanced detection accuracy is a challenging task in the field of PCB defect detection. To address this problem, this study proposes a series of improvement methods based on PCB defect detection. First, a novel attention mechanism, referred to as BiFormer, is introduced. This mechanism uses dual-layer routing to achieve dynamic sparse attention, thereby reducing the amount of computation required. Second, an innovative upsampling operator called CARAFE is employed. This operator combines semantic and content information for upsampling, thereby making the upsampling process more comprehensive and efficient. Finally, a new loss function based on the MPDIoU metric, referred to as the LMPDIoU loss function, is adopted. This loss function effectively addresses unbalanced categories, small targets, and denseness problems, thereby further improving image detection performance. The experimental results reveal that the model achieves a significant improvement in mean Average Precision (mAP) with a score of 93.91%, 13.12 percentage points higher than that of the original model. In terms of recognition accuracy, the new model reached a score of 90.55%, representing an improvement of 8.74 percentage points. These results show that the introduction of the BiFormer attention mechanism, CARAFE upsampling operator, and LMPDIoU loss function effectively improves the accuracy and efficiency of PCB defect detection. Thus, the proposed methods provide valuable references for research in industrial inspection, laying the foundation for future research and applications
Green house environment monitor technology implementation based on android mobile platform
Research on Improved Consensus Algorithm for Proof of Stake Based on Comprehensive Integral Mechanism
The consensus mechanism is at the core of blockchain. Proof of Stake (PoS), as a consensus mechanism, significantly reduces resource consumption compared with Proof of Work (PoW). However, PoS still faces security issues, such as difficulty in obtaining accounting rights for active low-equity honest nodes, lack of active node block verification, coinage accumulation attacks, and unreasonable allocation of block rewards. Consequently, this study proposes an improved scheme based on PoS. First, an integral mechanism is introduced to enhance the total equity of active low-equity honest nodes and increase the probability of nodes obtaining accounting rights. Second, nonlinear functions are used for the coinage calculation to prevent malicious nodes from accumulating coinage and launching attacks. Finally, using a proportion of comprehensive points of nodes to distribute block rewards, nodes that actively participate in verification or voting within a specified time receive rewards, thereby mitigating the phenomenon of ″the rich getting richer″ and the wealth gap between nodes. The experimental results show that compared to other PoS-improved consensus mechanisms, the proposed mechanism offers more effective control of infinite growth in coinage. The frequency at which the active low-equity honest nodes received rewards and accounting rights increased by 3. 6 and 2. 6 times, respectively. This reduces the centralization trend of the system, enhances the opportunities for active low equity honest nodes to compete for accounting rights, and reduces the possibility of coinage attacks. Further validation of the feasibility and superiority of the scheme has promoted the healthy development of blockchain networks
Apport de la simulation au pilotage de la performance industrielle
Cet article traite du pilotage souple de la performance industrielle. Il décrit de manière synthétique le système de pilotage que nous avons mis au point et détaille l'une de ses spécificités : la boucle de pilotage virtuel. Le rôle de celle-ci consiste à évaluer, au moyen de la simulation, différents plans d'action et à sélectionner, grâce à la méthode multicritère Prométhée II, celui qu'il convient de mettre en œuvre. La boucle repose sur l'exploitation d'un modèle générique de simulation, facilement adaptable, si nécessaire, aux spécificités du système étudié
