Suggested Topics within your search.
Suggested Topics within your search.
- Domestic relations 4
- Information technology 2
- Internet in public administration 2
- Public administration 2
- Children 1
- Citizen participation 1
- Context (Linguistics) 1
- Cultural property 1
- Derecho de familia 1
- Domestic relations courts 1
- Historic preservation 1
- Intangible property 1
- Legal status, laws, etc 1
- Mass media 1
- Methodology 1
- Museums and community 1
- Objectivity 1
- Perspective (Linguistics) 1
- Protection 1
- Psychological aspects 1
- Psychology 1
- Research 1
- Semantics 1
- Subjectivity (Linguistics) 1
-
10741
Development of the SPREAD framework to support the scaling of de-implementation strategies: a mixed-methods study
Published 2022-11-01“…The SPREAD framework includes determinants from four domains: (1) scaling plan, (2) external context, (3) de-implementation strategy and (4) adopters.Conclusions The SPREAD framework describes the determinants of the scaling of de-implementation strategies. …”
Get full text
Article -
10742
A Novel Artificial Bee Colony Algorithm for Structural Damage Detection
Published 2020-01-01“…Compared to the standard ABC algorithm, tabu search method and chaotic search method are adopted in the proposed algorithm to enhance the exploration and exploitation ability. …”
Get full text
Article -
10743
أثر تطبيق نظام ذکاء الأعمال على فاعلية اتخاذ القرارات فى المؤسسة العامة للتأمينات الاجتماعية : دراسة حالة...
Published 2021-06-01“…All departments of the institution adopt the business intelligencesystem except the women section and the warehouse department due to theweak infrastructure required by the availability of the system. …”
Get full text
Article -
10744
Unlocking Potential Score Insights of Sentimental Analysis with a Deep Learning Revolutionizes
Published 2025-02-01“…Therefore, AI-based approaches are increasingly being adopted for the effective classification of hate and offensive speech. …”
Get full text
Article -
10745
Safety and Efficacy of Peroral Endoscopic Shorter Myotomy versus Longer Myotomy for Patients with Achalasia: A Systematic Review and Meta-analysis
Published 2022-01-01“…Fixed- or random-effect models were adopted for the analysis according to the heterogeneity. …”
Get full text
Article -
10746
Assessment of Organic Matter Influence on the Ecological Integrity of Poyang Lake Using O/E Model and Chemical–Biological Indices over the Past Two Decades
Published 2024-12-01“…The dual evaluation method of the O/E model and chemical–biological composite index adopted in this study integrates more than twenty years of long-time scale data; this method combined with long time scale data has not been studied before, and its advantage is that it can more objectively show the change in the ecological situation of Poyang Lake for many years. …”
Get full text
Article -
10747
Biomarker discovery and phytochemical interventions in Alzheimer's disease: A path to therapeutic advances
Published 2025-02-01“…Purpose: The study aimed to adopt a new strategy to identify and characterize potential biomarkers and therapeutic phytochemicals for AD by integrating gene expression data and computational analysis. …”
Get full text
Article -
10748
Stability Analysis of “Support-Surrounding Rock” System for Fully Mechanized Longwall Mining in Steeply Dipping Coal Seams
Published 2022-01-01“…Finally, we found that overall stability can be achieved by adopting measures involving “sliding advancement of supports” and applying a “down-up” removal order. …”
Get full text
Article -
10749
Settlement Behavior of Soft Subgrade Reinforced by Geogrid-Encased Stone Column and Geocell-Embedded Sand Cushion: A Numerical Analysis
Published 2020-01-01“…The simulating settlement was in good agreement with the field monitoring data, indicating the reasonability of the designed model and adopted parameters. After that, the factors, geocell layer in sand cushion, encasement length around stone column, and standing time between embankment filling stages, were employed to study their influences on the subgrade settlement. …”
Get full text
Article -
10750
VSRDiff: Learning Inter-Frame Temporal Coherence in Diffusion Model for Video Super-Resolution
Published 2025-01-01“…In this paper, we introduce VSRDiff, a DM-based framework for VSR that emphasizes inter-frame temporal coherence and adopts a novel reconstruction perspective. Specifically, the Inter-Frame Aggregation Guidance (IFAG) module is developed to learn contextual inter-frame aggregation guidance, alleviating visual distortion caused by the randomness of diffusion models. …”
Get full text
Article -
10751
Main controlling factors of production and reasonable fracturing scale optimization of deep coalbed methane wells in Shenfu block, Ordos Basin
Published 2025-01-01“…An integrated "geological reservoir, fracturing, and economic evaluation" approach was adopted, with economic benefits as the objective. …”
Get full text
Article -
10752
Disparities in Antenatal Care Visits between Urban and Rural Ethiopian Women
Published 2023-01-01“…Negative binomial Poisson’s regression was adopted to analyze the data. Results. The majority of pregnant women (73.8%) attend at least one antenatal care. …”
Get full text
Article -
10753
Extensively Drug-Resistant (XDR) Enteric Fever in Children
Published 2025-01-01“…Non-probability convenient sampling method was adopted. Venous blood (3-5 ml) was drawn and sent for confirmation of XDR enteric fever. …”
Get full text
Article -
10754
Evaluating the impact of adult education programs in Morocco: a quasi-experimental approach
Published 2024-12-01“…Skill acquisition is measured through pretest and posttest evaluations using a questionnaire aligned with the National Agency for the Fight Against Illiteracy (ANLCA)-adopted curriculum. The survey occurred at the beginning and at the end of the program, providing sufficient time for skill development. …”
Get full text
Article -
10755
Manhaj Ithbat Salaf Scholars in Interacting with Characteristics of Khabariyyah According To The Explanation Of Imam Abu Al-Hasan Al-Ash`Ari
Published 2023-11-01“…Referring specifically to the book of al-Ibanah and Maqalat al-Islamiyyin, Imam al-Ash`ari explained that Ithbat is a method that has been adopted by the Companions RA, Tabi`in and Ahl al-Hadith. …”
Get full text
Article -
10756
Cost-effectiveness analysis of deep brain stimulation for the treatment of alcohol use disorder and alcoholic liver disease
Published 2025-03-01“…We used a time horizon of 1–2 years and adopted a societal perspective. Results: Our results show that for AUD patients in general, DBS is not cost-effective at any DBS success rate. …”
Get full text
Article -
10757
Pharmacological and structural insights into nanvuranlat, a selective LAT1 (SLC7A5) inhibitor, and its N-acetyl metabolite with implications for cancer therapy
Published 2025-01-01“…The U-shaped conformation adopted by nanvuranlat when bound to LAT1 likely contributes to its high affinity, selectivity, sustained inhibitory effect, and non-transportable nature observed in this study. …”
Get full text
Article -
10758
Impact Assessment of Grid-Connected Solar Photovoltaic Systems on Power Distribution Grid: A Case Study on a Highly Loaded Feeder in Ulaanbaatar Ger District
Published 2025-01-01“…Adopting and widely implementing solar photovoltaic (PV) systems are regarded as a promising solution to address energy crises by providing a sustainable and independent electricity supply while significantly reducing greenhouse gas emissions to combat climate change. …”
Get full text
Article -
10759
Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9
Published 2022-12-01“…The certificateless cryptosystem can solve the problems of certificate management and key escrow at the same time, but its security model always assumes that Type II adversary (named malicious KGC) will not launch public key replacement attacks.This security assumption has certain limitations in real-world applications.As an efficient identity-based cryptographic scheme, SM9 signature scheme adopts R-ate bilinear pairing which has good security and high computational efficiency.However, it requires KGC to generate and manage keys for users, so it has the problem of key escrow.In view of the above problems, a certificateless signature scheme against malicious KGC was constructed based on blockchain and SM9 signature algorithm.Based on the properties of decentralization and tamper-proof of blockchain, the proposed scheme used the smart contract to record part of the public key corresponding to the user’s secret value on the blockchain.Then, the verifier can revoke the smart contract to query the user’s public key during the signature verification stage.Therefore, the proposed scheme ensured the authenticity of the user’s public key.The user’s private key consisted of the partial private key generated by KGC and a secret randomly chosen by the user.The user required the partial private key generated by KGC to endorse his identity identifier when the user generates the private key for the first time.Subsequently, the private key can be independently updated by changing the secret and the corresponding partial public key.During this process, the identity remains unchanged, which provided a viable solution for key management in decentralized application scenarios.The blockchain relied on the consensus mechanism to ensure the consistency of the distributed data.Based on the traceability of the blockchain, the change log of user’s partial public key was stored in the blockchain, which can trace the source of malicious public key replacement attacks and thereby prevent malicious KGC from launching public key replacement attacks.According to the experimental simulation and security proof results, the total overhead of signature and verification of the proposed scheme is only 7.4ms.Compared with similar certificateless signature schemes, the proposed scheme can effectively resist public key replacement attacks and has higher computational efficiency.…”
Get full text
Article -
10760
Legal regulation of the police officers' powers of the Ukrainian SSR in the 1920s of the XX century
Published 2023-07-01“…At the same time, in the second half of the 1920s, legislative and by-law acts were adopted on the police officer exemption from performing tasks that were not typical for them.…”
Get full text
Article