Showing 10,061 - 10,080 results of 12,061 for search '"Adoption"', query time: 0.12s Refine Results
  1. 10061

    Evaluation of respiratory muscle strength in individuals having Down syndrome by Fernanda Roseane Furlan, Dayla Sgariboldi, Patrícia Brigatto, Eli Maria Pazzianotto- Forti

    Published 2015-04-01
    “…After, comparison tests were used for two independent samples (Student’s t and Mann-Whitney tests), adopting a significance level of 5%. When comparing both groups, we can find a significant difference in MIP (p= 0.0011) and MEP (p= 0.0002), and lower RMS values were obtained in the group of individuals with DS. …”
    Get full text
    Article
  2. 10062

    Feature Extraction of Music Signal Based on Adaptive Wave Equation Inversion by Tianzhuo Gong, Sibing Sun

    Published 2021-01-01
    “…In this paper, adaptive wave equation inversion is used. This method adopts the idea of penalty function and introduces the Wiener filter to establish a dual objective function for the phase difference that appears in the inversion. …”
    Get full text
    Article
  3. 10063

    Coupling Coordination and Prediction Research of Tourism Industry Development and Ecological Environment in China by Yun Yang, Rong Wang, Junlan Tan

    Published 2021-01-01
    “…Coordinated development of the two systems will take a long time, and active economic policies need to be adopted to promote their coordinated development.…”
    Get full text
    Article
  4. 10064

    Multilingualism as a Principle of the EU Court of Justice by K. Kh. Rekosh

    Published 2014-12-01
    “…Comparison of legal solutions to the problems of multilingualism in different states with a variety of languages, law and order, or in international organizations, lays basis of "comparative linguistic law" Now in the doctrine of law of the European Union neither the linguistic law, nor the comparative linguistic law do not exist, but to provide cooperation in the field of justice and mutual recognition of judicial decisions on the basis of the principle of multilingualism, the EU has adopted the Directive on the right to interpretation and translation in the framework of criminal proceedings.…”
    Get full text
    Article
  5. 10065

    Investigation on Deicing Property of Steel Wool Fiber-Reinforced Asphalt Mixture by Induction Heating by Fa Yang, Kehong Li, Rui Xiong, Bowen Guan, Hua Zhao

    Published 2020-01-01
    “…In order to effectively solve the traffic safety problem caused by snow and ice covering the pavement in winter, steel wool fibers with different length and content were adopted in asphalt mixture to investigate its deicing performance. …”
    Get full text
    Article
  6. 10066

    Novel fingerprint key generation method based on the trimmed mean of feature distance by Zhongtian JIA, Qinglong QIN, Li MA, Lizhi PENG

    Published 2023-10-01
    “…In recent years, biometrics has become widely adopted in access control systems, effectively resolving the challenges associated with password management in identity authentication.However, traditional biometric-based authentication methods often lead to the loss or leakage of users’ biometric data, compromising the reliability of biometric authentication.In the literature, two primary technical approaches have been proposed to address these issues.The first approach involves processing the extracted biometric data in a way that the authentication information used in the final stage or stored in the database does not contain the original biometric data.The second approach entails writing the biometric data onto a smart card and utilizing the smart card to generate the private key for public key cryptography.To address the challenge of constructing the private key of a public key cryptosystem based on fingerprint data without relying on a smart card, a detailed study was conducted on the stable feature points and stable feature distances of fingerprints.This study involved the extraction and analysis of fingerprint minutiae.Calculation methods were presented for sets of stable feature points, sets of equidistant stable feature points, sets of key feature points, and sets of truncated means.Based on the feature distance truncated mean, an original fingerprint key generation algorithm and key update strategy were proposed.This scheme enables the reconstruction of the fingerprint key through re-collecting fingerprints, without the need for direct storage of the key.The revocation and update of the fingerprint key were achieved through a salted hash function, which solved the problem of converting ambiguous fingerprint data into precise key data.Experiments prove that the probability of successfully reconstructing the fingerprint key by re-collecting fingerprints ten times is 0.7354, and the probability of reconstructing the fingerprint key by re-collecting fingerprints sixty times is 98.06%.…”
    Get full text
    Article
  7. 10067

    CONVENTIONAL AND SUSTAINABLE BUILDINGS: A COMPARATIVE BENEFIT AND COST ANALYSIS by Abimbola WINDAPO, Mayibongwe MACHAKA

    Published 2018-06-01
    “…The rationale for the examination is the general belief among stakeholders that although there is an increasing need to provide sustainable and affordable buildings for both housing and commercial purposes, buildings procured using sustainable construction initiatives are significantly more expensive than those constructed through conventional construction approach. The study adopted a quantitative research approach using semi-structured questionnaires involving a combination of both open and close-ended questions, in eliciting objective and subjective benefit and cost information on sustainable and conventional buildings from purposively selected construction industry stakeholders in South Africa. …”
    Get full text
    Article
  8. 10068

    Resource-based view theory and its applications in supply chain management: A systematic literature review by Robert Agwot Komakech, Thomas Ogoro Ombati, Reuben Wambua Kikwatha, Michael Githii Wainaina

    Published 2025-01-01
    “…Despite extensive utilization in strategic management, the direct application of RBV in SCM has been less explored, particularly in understanding how specific internal resources enhance SCM capabilities and outcomes. The review adopts a systematic approach, analyzing 97 peer-reviewed articles from diverse journals. …”
    Get full text
    Article
  9. 10069

    Subtractive and Additive Technologies in Fixed Dental Restoration: A Systematic Review by Rafal Kareem Rasheed, Nidhal Sahib Mansoor, Nihad Hasan Mohammed, Syed Saad B Qasim

    Published 2023-12-01
    “… Today, computers and digital devices are an indispensable part of our daily lives, and dentistry is no exception. Dentistry has adopted a number of digital technologies, including CAD/CAM (computer-aided design and manufacturing) systems. …”
    Get full text
    Article
  10. 10070

    Multiobjective Optimization of Composite Material Seat Plate for Mortar Based on the Hybrid Surrogate Model by Fengfeng Wang, Chundong Xu, Lei Li

    Published 2024-01-01
    “…First, a fiber continuity model based on dropout sequence is adopted to solve the problems existing in the design of inherent continuity classes for composite layered fibers. …”
    Get full text
    Article
  11. 10071

    Using Continuum-Discontinuum Element Method to Model the Foliation-Affected Fracturing in Rock Brazilian Test by Qunlei Zhang, Zihan Zhi, Chun Feng, Ruixia Li, Jinchao Yue, Junyu Cong

    Published 2021-01-01
    “…In splitting simulation, a strengthening scheme should be adopted to overcome this influence. As a result, the rock sample generates the sliding and compression-shear fracture. …”
    Get full text
    Article
  12. 10072

    The Importance of Exercise and General Mental Health on Prediction of Property-Damage-Only Accidents among Taxi Drivers in Tehran: A Study Using ANFIS-PSO and Regression Models by Ehsan Abbasi, Mansour Hadji Hosseinlou

    Published 2019-01-01
    “…Consequently, the policy makers should simply adopt some interventions to encourage the taxi drivers to perform daily exercise that not only improves their wellbeing but also reduces the risk of PDO accidents.…”
    Get full text
    Article
  13. 10073

    Armed aggression of the Russian Federation against Ukraine as a threat to the collective security system by A. V. Voitsikhovkyi, O. S. Bakumov

    Published 2023-03-01
    “…At the same time, the role of the UN should not be minimized, as the documents adopted by it are important for improving the collective security system and the international mechanism for bringing the aggressor state to justice. …”
    Get full text
    Article
  14. 10074

    The Kinetic Model of the Peel Brittleness of Stored Cucumis Melons Based on Visible/Near-Infrared Spectroscopy by Defang Xu, Huamin Zhao, Shujuan Zhang, Chengji Li, Fei Zhao

    Published 2020-01-01
    “…SG was confirmed to be the best pretreatment by comparing the PLS models established with 4 pretreatment methods, and the differences of the prediction set determination coefficient and root-mean-square were 0.818 and 23.755, respectively. CARS and SPA were adopted to extract the feature wavelengths and establish the peel brittleness of PLS prediction model. …”
    Get full text
    Article
  15. 10075

    OPTIMAL CONDITIONS FOR EXTRACTION PHENOLIC COMPOUNDS AND FLAVONOIDS FROM MILLET BRAN AND STUDYING SOME OF THEIR BIOLOGICAL ACTIVITY by Mariem M. A.AL-Abas, Jassem. M. Nasser

    Published 2025-01-01
    “…Therefore, this treatment was adopted in conducting the free radical scavenging test, at different concentrations (0.125, 0.250, 0.500, 0.750, 0.800) mg/ml, as RSA were (24.68, 40.18, 67.56, 81.98, 89.55%), respectively, compared to ascorbic acid at the same concentrations, which were (40.14, 57.34, 73.46, 89.93, 99.55%). …”
    Get full text
    Article
  16. 10076

    Parenting styles and externalizing problem behaviors of preschoolers: mediation through self-control abilities and emotional management skills by Zhang WenLi, Xu Tiemei, Li Shuangqi, Yu Qun, Zhu Jingbo, Sun Sijie

    Published 2025-02-01
    “…Here, teachers and parents of 799 preschoolers from China were surveyed.ResultsThe findings of this investigation are 3-fold: (1) a significant association exists between the parenting styles adopted by parents and externalizing problem behaviors observed among preschoolers; (2) self-control abilities and emotional management skills independently mediate the associations between parenting styles and children's externalizing problem behaviors, highlighting their roles as mediators; and (3) sequential mediation of self-control abilities and emotional management skills elucidates a pathway through which parenting styles impact preschoolers' externalizing problem behaviors.DiscussionThis study clarified the relationship between parenting styles, externalizing problem behaviors of preschoolers, self-control abilities, and emotional management skills to provide a theoretical basis for solving the externalizing problem behaviors of preschoolers.…”
    Get full text
    Article
  17. 10077

    Multi-user collaborative access control scheme in cloud storage by li SHIJiao, he HUANGChuan, Jing WANG, yu QINKuang, Kai HE

    Published 2016-01-01
    “…In MCA-F scheme, hierarchical encryption is adopted,a part of decrypting computation is transferred to a cloud server to decrease the computational cost on users when decrypting.In allusion to the simultaneous write-data access control of multiple users, a method is designed to manage semi-stored modified data submitted by menders. …”
    Get full text
    Article
  18. 10078

    Hardware Design for Cascade-Structure, Dual-Stage, Current-Limiting, Solid-State DC Circuit Breaker by Can Ding, Yinbo Ji, Zhao Yuan

    Published 2025-01-01
    “…For the power supply system of the hardware part, a capacitor-powered method is adopted for safety and efficiency, with a capacitor switch serially connected to the capacitor power supply for high-precision control of the power supply. …”
    Get full text
    Article
  19. 10079

    Hierarchical proxy consensus optimization for IoV based on blockchain and trust value by Baoqin ZHAI, Jian WANG, Lei HAN, Jiqiang LIU, Jiahao HE, Tianhao LIU

    Published 2022-06-01
    “…With the rapid development of Internet of vehicles, 5G and artificial intelligence technologies, intelligent transportation has become the development trend of transportation technology.As a vehicle-vehicle and vehicle-road information interaction platform, the Internet of vehicles is the basic support platform for intelligent traffic information sharing and processing.At the same time, the security of Internet of vehicles has attracted much attention, especially data security which may cause user privacy leakage.The blockchain technology has become a solution, but it still faces new challenges in efficiency, security and other aspects.With the increase of vehicle nodes and information, how to efficiently achieve information consensus in high-speed vehicle moving environment has become a key problem.Then a bottom-up RSU (road side unit) chain consensus protocol was proposed based on blockchain and trust value.Several typical consensus structures were compared, and bottom-up two-layer consensus structure was adopted according to the actual scenarios of the Internet of vehicles.Moreover, a group leader node election algorithm was proposed which is based on node participation, work completion and message value.The system security was ensured by assigning trust value to each vehicle.Following the consensus structure and algorithm work mentioned above, the specific process of the protocol was comprehensively described, which was divided into six steps: region division, group leader node selection, local consensus, leader primary node selection, global consensus, and intra-domain broadcast.Then the experiments were analyzed from four aspects: security, communication complexity, consensus algorithm delay and fault tolerance rate.Experiments showed that, compared with other schemes, the proposed protocol can effectively reduce communication complexity and shorten consensus delay under the condition of resisting conspiracy attack, witch attack and other attacks.On the premise of security, the protocol improves fault tolerance rate and enables more nodes to participate in information sharing to satisfy the requirements of Internet of vehicles scenarios.…”
    Get full text
    Article
  20. 10080

    Economic Feasibility of On-Grid Photovoltaic Solar Power Plants at Private Universities in Indonesia by Rijal Asnawi, Antariksa, Sukir Maryanto and Aminudin Afandhi

    Published 2024-12-01
    “…Campus 2 of the National Institute of Technology (ITN) Malang shows its commitment to utilizing solar energy by adopting a 500 kWp photovoltaic solar power plant (PV), making it the largest in Indonesia for a private university. …”
    Get full text
    Article