Suggested Topics within your search.
Suggested Topics within your search.
- Law reports 53
- Sociolinguistics 6
- English language 5
- Social conditions 5
- History 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- Academic writing 3
- Criminal law 3
- Hospitality industry 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- MATHEMATICS / Mathematical Analysis 3
- Rhetoric 3
- Sociology 3
- Accounting 2
- Agriculture 2
- BUSINESS & ECONOMICS / General 2
- Civilization 2
- Colonial influence 2
- Communication 2
- Economic aspects 2
- Economic policy 2
- Examinations 2
- Installation 2
- Manners and customs 2
- Mathematical analysis 2
- Pharmacology 2
- Politics and government 2
- Public relations 2
-
30901
Nonmotor Symptoms in Patients with PARK2 Mutations
Published 2011-01-01“…None of the examined patients had RBD, and all except 1 patient exhibited an increase in the olfactory threshold. …”
Get full text
Article -
30902
Assessment of neutrophil-to-lymphocyte ratio, platelet-to-lymphocyte ratio, and mean platelet volume in patients with diabetic retinopathy
Published 2025-01-01“…We obtained blood samples from all individuals who participated in the study to investigate these parameters. …”
Get full text
Article -
30903
Construct validity of the simplified Chinese version of the instrument ‘Picture My Participation’
Published 2024-12-01“…Exploratory factor analysis (EFA) was performed using the principal component analysis (PCA) to analyse the resulting data.Results The EFA extracted five factors with eigenvalues greater than one and the cumulative contribution rate of factors accounted for 51.62% of the variance. All items had factor loadings above 0.50. The five subcomponents included: organised activities, social activities, taking care of others, family life activities and personal care and development activities.Conclusion The results of the factor analysis support the construct validity of the PMP-C (Simplified) attendance scale. …”
Get full text
Article -
30904
Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition
Published 2023-06-01“…Financial security, an important part of national security, is critical for the stable and healthy development of the economy.Digital image watermarking technology plays a crucial role in the field of financial information security, and the anti-screen watermarking algorithm has become a new research focus of digital image watermarking technology.The common way to achieve an invisible watermark in existing watermarking schemes is to modify the carrier image, which is not suitable for all types of images.To solve this problem, an end-to-end robust watermarking scheme based on deep learning was proposed.The algorithm achieved both visual quality and robustness of the watermark image.A random binary string served as the input of the encoder network in the proposed end-to-end network architecture.The encoder can generate the watermark information overlay, which can be attached to any carrier image after training.The ability to resist screen shooting noise was learned by the model through mathematical methods incorporated in the network to simulate the distortion generated during screen shooting.The visual quality of the watermark image was further improved by adding the image JND loss based on just perceptible difference.Moreover, an embedding hyperparameter was introduced in the training phase to balance the visual quality and robustness of the watermarked image adaptively.A watermark model suitable for different scenarios can be obtained by changing the size of the embedding hyperparameter.The visual quality and robustness performance of the proposed scheme and the current state-of-the-art algorithms were evaluated to verify the effectiveness of the proposed scheme.The results show that the watermark image generated by the proposed scheme has better visual quality and can accurately restore the embedded watermark information in robustness experiments under different distances, angles, lighting conditions, display devices, and shooting devices.…”
Get full text
Article -
30905
Measurement of Naval Ship Responses to Underwater Explosion Shock Loadings
Published 2003-01-01“…Test instruments were developed and tested on a drop shock machine to confirm availability in the actual shock tests with emphasis on shock resistance, remote control and reliability. All vital systems of the ships were confirmed to be capable of normal operational condition without significant damages during the explosion shot. …”
Get full text
Article -
30906
Kinematic and Dynamic Characteristics of the Free-Floating Space Manipulator with Free-Swinging Joint Failure
Published 2019-01-01“…It is significant to make clear all motion coupling relationships, which are defined as “kinematic coupling relationships” and “dynamic coupling relationships,” inside the system. …”
Get full text
Article -
30907
C-Reactive Protein in Peripheral Blood of Patients with Chronic and Aggressive Periodontitis, Gingivitis, and Gingival Recessions
Published 2015-01-01“…The aim of this study was to compare and evaluate the systemic levels of CRP in the peripheral blood samples of patients with chronic and aggressive periodontitis, gingivitis, and gingival recessions and compare them with periodontal clinical parameters. All patients (N=158) were examined prior to the initiation of periodontal treatment. …”
Get full text
Article -
30908
Electronic invoice public verification scheme based on SM2 coalition signature algorithm
Published 2022-04-01“…In order to solve the current problems of electronic invoices, such as anti-counterfeiting, privacy leakage and low verification efficiency, an electronic invoice public verification architecture based on the national signature algorithm was proposed.Electronic invoice documents have complex data sources, sensitive user information on the ticket surface, frequent data flow and other characteristics as well as the demand for efficient public verification.Based on these motivations, the e-invoice generation and verification protocol was designed.Besides, a signature code generation scheme for invoice anti-counterfeiting was proposed based on certificate-free joint signature.Then multiple data verification and signatures of the invoicing party and the taxation authority can be realized.All kinds of invoice holders can not only verify the authenticity and data integrity of electronic invoices, but also publicly check the authenticity and data integrity of electronic invoices.The integration of data encryption algorithms protects user privacy data in electronic invoices, and at the same time can fulfill the requirements for authenticity or status verification under various invoice application scenarios.The checking party only needs to verify one signature to confirm the authenticity of the electronic invoice signed by both parties.Scyther security simulation tools were used to analyze the security of the proposed solution, which can verify the integrity and authenticity of the data source and check the confidentiality of the privacy data under various types of attacks.Compared with a typical overseas e-invoice checking scheme and a similar digital signature-based e-invoice checking scheme, the proposed scheme has obvious advantages in terms of checking efficiency and invoice file size.…”
Get full text
Article -
30909
Social Well-Being of Higher School Teachers: Social Context and Measurement Criteria
Published 2023-05-01“…According to these results, most teachers get satisfaction from their work and, above all, work with students, but the frequent changes in the concepts of higher education and emergence of external threats negatively affect the state of social well-being. …”
Get full text
Article -
30910
Project Portfolio Resource Risk Assessment considering Project Interdependency by the Fuzzy Bayesian Network
Published 2020-01-01“…In this method, the project portfolio resource risk factors are first identified by taking project interdependency into consideration, and then the Bayesian network model is developed to analyze the risk level of the identified risk factors in which expert judgments and fuzzy set theory are integrated to determine the probabilities of all risk factors to deal with incomplete risk data and information. …”
Get full text
Article -
30911
ANALYSIS OF THE ALLELIC VARIATION OF THE VRN-1 AND PPD-1 GENES IN SIBERIAN EARLY AND MEDIUM EARLY VARIETIES OF SPRING WHEAT
Published 2015-01-01“…It showed the earliest ripening of all accessions examined. Within each haplotype, a considerable variability was found in growing duration, suggesting a strong influence of the “genetic background” on this trait. …”
Get full text
Article -
30912
Axial Uplift Behaviour of Belled Piers in Coarse-Grained Saline Soils
Published 2018-01-01“…The load-displacement curves are primarily softening, and the uplift bearing capacity for coarse-grained saline soils (CSS) in the crystalline state increases at larger thickness, higher than that in dissolved state. Failure planes all exhibit approximately linear change from bottom to up. …”
Get full text
Article -
30913
Effects of garlic and aspirin on some blood parameters of new zeland rabbits fed cholesterol rich ration
Get full text
Article -
30914
Identification of Bovine, Pig and Duck Meat Species in Mixtures and in Meat Products on the Basis of the mtDNA Cytochrome Oxidase Subunit I (COI) Gene Sequence
Published 2016-03-01“…The obtained results indicate the possibility of qualitative identification of the aforementioned meat species in all types of investigated food products. The maximum length of PCR products did not exceed 300 bp, which was supposed to favour the amplification of DNA from meat products which are usually thermally processed and/or exposed to high pressure. …”
Get full text
Article -
30915
Hyperreality, simulacra and simulations in virtual space as a phenomenon of «antisocial» theory by Jean Baudrillard
Published 2019-05-01“…For example, it has been revealed, that despite the life experience of respondents in the majority of fake Internet content, they all also largely feel comfortable in a virtual, potentially dangerous environment. …”
Get full text
Article -
30916
The Effectiveness of an Educational Intervention on Countering Disinformation Moderated by Intellectual Humility
Published 2025-01-01“…After filling in an initial survey, the experimental group received a 15-minute educational intervention on the role of social media for disinformation dissemination in complex digital information environments. One week later, all participants completed the second survey to assess perceived social media literacy and general conspiracy beliefs. …”
Get full text
Article -
30917
Drugs of Abuse Can Entrain Circadian Rhythms
Published 2007-01-01“…Given the diversity of zeitgebers, it is probably not surprising that genes capable of clock functions are located throughout almost all organs and tissues. Recent evidence suggests that drugs of abuse can directly entrain some circadian rhythms. …”
Get full text
Article -
30918
ONE OF THE WAYS OF PROCESSING AND ANALYSIS OF RESULTS OF THE PEDAGOGICAL EXPERIMENT
Published 2015-10-01“…Determined the observed value of goodness-of-fit Pearson that allows you to install, after comparing them with critical values that all of the investigated random variable subject to normal distribution law. …”
Get full text
Article -
30919
Geopolitical Risk and Stock Market Volatility in Emerging Economies: Evidence from GARCH-MIDAS Model
Published 2021-01-01“…As for predictive potential, GPRAct (geopolitical action index) has the best predictive power among all six types of GPR indices. Considering that GPR is usually unanticipated, these findings shed light on the role of the GPR factors in explaining and forecasting the volatility of China’s market returns.…”
Get full text
Article -
30920
The Facial Approximation of the Skull Attributed to Jan Žižka (ca. AD 1360–1424)
Published 2024-12-01“…The final face was the result of the cross-referencing of all data and the completion of the structure respected the iconography attributed to Jan Žižka.…”
Get full text
Article