Showing 10,741 - 10,760 results of 12,061 for search '"Adoption"', query time: 0.10s Refine Results
  1. 10741

    Development of the SPREAD framework to support the scaling of de-implementation strategies: a mixed-methods study by Gert P Westert, Rudolf B Kool, Simone A van Dulmen, Patrick P T Jeurissen, Danielle Kroon

    Published 2022-11-01
    “…The SPREAD framework includes determinants from four domains: (1) scaling plan, (2) external context, (3) de-implementation strategy and (4) adopters.Conclusions The SPREAD framework describes the determinants of the scaling of de-implementation strategies. …”
    Get full text
    Article
  2. 10742

    A Novel Artificial Bee Colony Algorithm for Structural Damage Detection by Yinghao Zhao, Quansheng Yan, Zheng Yang, Xiaolin Yu, Buyu Jia

    Published 2020-01-01
    “…Compared to the standard ABC algorithm, tabu search method and chaotic search method are adopted in the proposed algorithm to enhance the exploration and exploitation ability. …”
    Get full text
    Article
  3. 10743

    أثر تطبيق نظام ذکاء الأعمال على فاعلية اتخاذ القرارات فى المؤسسة العامة للتأمينات الاجتماعية : دراسة حالة... by روان محمد عبد الرحيم, Ghada Abdel Wahab

    Published 2021-06-01
    “…All departments of the institution adopt the business intelligencesystem except the women section and the warehouse department due to theweak infrastructure required by the availability of the system. …”
    Get full text
    Article
  4. 10744

    Unlocking Potential Score Insights of Sentimental Analysis with a Deep Learning Revolutionizes by Ibrahim R. Alzahrani

    Published 2025-02-01
    “…Therefore, AI-based approaches are increasingly being adopted for the effective classification of hate and offensive speech. …”
    Get full text
    Article
  5. 10745
  6. 10746

    Assessment of Organic Matter Influence on the Ecological Integrity of Poyang Lake Using O/E Model and Chemical–Biological Indices over the Past Two Decades by Jindong Wang, Wenjie Huang, Chenglian Feng, Hongyang Wang

    Published 2024-12-01
    “…The dual evaluation method of the O/E model and chemical–biological composite index adopted in this study integrates more than twenty years of long-time scale data; this method combined with long time scale data has not been studied before, and its advantage is that it can more objectively show the change in the ecological situation of Poyang Lake for many years. …”
    Get full text
    Article
  7. 10747

    Biomarker discovery and phytochemical interventions in Alzheimer's disease: A path to therapeutic advances by Mithila Debnath, Mahir Azmal, Rashid Taqui, Moshiul Alam Mishu, Ajit Ghosh

    Published 2025-02-01
    “…Purpose: The study aimed to adopt a new strategy to identify and characterize potential biomarkers and therapeutic phytochemicals for AD by integrating gene expression data and computational analysis. …”
    Get full text
    Article
  8. 10748

    Stability Analysis of “Support-Surrounding Rock” System for Fully Mechanized Longwall Mining in Steeply Dipping Coal Seams by Shenghu Luo, Tong Wang, Yongping Wu, Jingyu Huangfu

    Published 2022-01-01
    “…Finally, we found that overall stability can be achieved by adopting measures involving “sliding advancement of supports” and applying a “down-up” removal order. …”
    Get full text
    Article
  9. 10749

    Settlement Behavior of Soft Subgrade Reinforced by Geogrid-Encased Stone Column and Geocell-Embedded Sand Cushion: A Numerical Analysis by Jia-Jun Gao, Hui Xu, Jian-Wen Qian, Yi-Fan Gong, Liang-Tong Zhan, Ping Chen

    Published 2020-01-01
    “…The simulating settlement was in good agreement with the field monitoring data, indicating the reasonability of the designed model and adopted parameters. After that, the factors, geocell layer in sand cushion, encasement length around stone column, and standing time between embankment filling stages, were employed to study their influences on the subgrade settlement. …”
    Get full text
    Article
  10. 10750

    VSRDiff: Learning Inter-Frame Temporal Coherence in Diffusion Model for Video Super-Resolution by Linlin Liu, Lele Niu, Jun Tang, Yong Ding

    Published 2025-01-01
    “…In this paper, we introduce VSRDiff, a DM-based framework for VSR that emphasizes inter-frame temporal coherence and adopts a novel reconstruction perspective. Specifically, the Inter-Frame Aggregation Guidance (IFAG) module is developed to learn contextual inter-frame aggregation guidance, alleviating visual distortion caused by the randomness of diffusion models. …”
    Get full text
    Article
  11. 10751

    Main controlling factors of production and reasonable fracturing scale optimization of deep coalbed methane wells in Shenfu block, Ordos Basin by Lichun SUN, Jia LIU, Na LI, Xinze LI, Heng WEN

    Published 2025-01-01
    “…An integrated "geological reservoir, fracturing, and economic evaluation" approach was adopted, with economic benefits as the objective. …”
    Get full text
    Article
  12. 10752

    Disparities in Antenatal Care Visits between Urban and Rural Ethiopian Women by Senahara Korsa Wake, Abera Botore, Ahmed Mohammed, Kolato Gemede, Moyata Bariso, Urge Gerema

    Published 2023-01-01
    “…Negative binomial Poisson’s regression was adopted to analyze the data. Results. The majority of pregnant women (73.8%) attend at least one antenatal care. …”
    Get full text
    Article
  13. 10753

    Extensively Drug-Resistant (XDR) Enteric Fever in Children by Sana Ashraf, Mehtab Hussain, Asma Noreen, Falak Abro, Nadeem Noor, Ramla Rehman

    Published 2025-01-01
    “…Non-probability convenient sampling method was adopted. Venous blood (3-5 ml) was drawn and sent for confirmation of XDR enteric fever. …”
    Get full text
    Article
  14. 10754

    Evaluating the impact of adult education programs in Morocco: a quasi-experimental approach by Rachid Boukbech, Mariem Liouaeddine

    Published 2024-12-01
    “…Skill acquisition is measured through pretest and posttest evaluations using a questionnaire aligned with the National Agency for the Fight Against Illiteracy (ANLCA)-adopted curriculum. The survey occurred at the beginning and at the end of the program, providing sufficient time for skill development. …”
    Get full text
    Article
  15. 10755

    Manhaj Ithbat Salaf Scholars in Interacting with Characteristics of Khabariyyah According To The Explanation Of Imam Abu Al-Hasan Al-Ash`Ari by Mohd Saiba Yaacob, Syed Hadzrullathfi Syed Omar, Engku Ibrahim Engku Wok Zin

    Published 2023-11-01
    “…Referring specifically to the book of al-Ibanah and Maqalat al-Islamiyyin, Imam al-Ash`ari explained that Ithbat is a method that has been adopted by the Companions RA, Tabi`in and Ahl al-Hadith. …”
    Get full text
    Article
  16. 10756

    Cost-effectiveness analysis of deep brain stimulation for the treatment of alcohol use disorder and alcoholic liver disease by Oluwatofunmi A. Abiola, Collin M. Lehmann, Khaled Moussawi, Hawre Jalal

    Published 2025-03-01
    “…We used a time horizon of 1–2 years and adopted a societal perspective. Results: Our results show that for AUD patients in general, DBS is not cost-effective at any DBS success rate. …”
    Get full text
    Article
  17. 10757

    Pharmacological and structural insights into nanvuranlat, a selective LAT1 (SLC7A5) inhibitor, and its N-acetyl metabolite with implications for cancer therapy by Chunhuan Jin, Xinyu Zhou, Minhui Xu, Hiroki Okanishi, Ryuichi Ohgaki, Yoshikatsu Kanai

    Published 2025-01-01
    “…The U-shaped conformation adopted by nanvuranlat when bound to LAT1 likely contributes to its high affinity, selectivity, sustained inhibitory effect, and non-transportable nature observed in this study. …”
    Get full text
    Article
  18. 10758

    Impact Assessment of Grid-Connected Solar Photovoltaic Systems on Power Distribution Grid: A Case Study on a Highly Loaded Feeder in Ulaanbaatar Ger District by Turmandakh Bat-Orgil, Battuvshin Bayarkhuu, Bayasgalan Dugarjav, Insu Paek

    Published 2025-01-01
    “…Adopting and widely implementing solar photovoltaic (PV) systems are regarded as a promising solution to address energy crises by providing a sustainable and independent electricity supply while significantly reducing greenhouse gas emissions to combat climate change. …”
    Get full text
    Article
  19. 10759

    Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9 by Fei TANG, Ning GAN, Xianggui YANG, Jinyang WANG

    Published 2022-12-01
    “…The certificateless cryptosystem can solve the problems of certificate management and key escrow at the same time, but its security model always assumes that Type II adversary (named malicious KGC) will not launch public key replacement attacks.This security assumption has certain limitations in real-world applications.As an efficient identity-based cryptographic scheme, SM9 signature scheme adopts R-ate bilinear pairing which has good security and high computational efficiency.However, it requires KGC to generate and manage keys for users, so it has the problem of key escrow.In view of the above problems, a certificateless signature scheme against malicious KGC was constructed based on blockchain and SM9 signature algorithm.Based on the properties of decentralization and tamper-proof of blockchain, the proposed scheme used the smart contract to record part of the public key corresponding to the user’s secret value on the blockchain.Then, the verifier can revoke the smart contract to query the user’s public key during the signature verification stage.Therefore, the proposed scheme ensured the authenticity of the user’s public key.The user’s private key consisted of the partial private key generated by KGC and a secret randomly chosen by the user.The user required the partial private key generated by KGC to endorse his identity identifier when the user generates the private key for the first time.Subsequently, the private key can be independently updated by changing the secret and the corresponding partial public key.During this process, the identity remains unchanged, which provided a viable solution for key management in decentralized application scenarios.The blockchain relied on the consensus mechanism to ensure the consistency of the distributed data.Based on the traceability of the blockchain, the change log of user’s partial public key was stored in the blockchain, which can trace the source of malicious public key replacement attacks and thereby prevent malicious KGC from launching public key replacement attacks.According to the experimental simulation and security proof results, the total overhead of signature and verification of the proposed scheme is only 7.4ms.Compared with similar certificateless signature schemes, the proposed scheme can effectively resist public key replacement attacks and has higher computational efficiency.…”
    Get full text
    Article
  20. 10760

    Legal regulation of the police officers' powers of the Ukrainian SSR in the 1920s of the XX century by S. V. Vasyliev

    Published 2023-07-01
    “…At the same time, in the second half of the 1920s, legislative and by-law acts were adopted on the police officer exemption from performing tasks that were not typical for them.…”
    Get full text
    Article