Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
35281
mbctools: A User-Friendly Metabarcoding and Cross-Platform Pipeline for Analyzing Multiple Amplicon Sequencing Data across a Large Diversity of Organisms
Published 2024-12-01“…We developed a python package called mbctools, designed to offer a cross-platform tool for processing amplicon data from various organisms in the context of metabarcoding studies. …”
Get full text
Article -
35282
Use of virtual reality to remotely train healthcare professionals in paediatric emergency tracheostomy skills: protocol for a multi-centre, non-inferiority educational intervention...
Published 2025-01-01“…Education programmes designed and supported by the National Tracheostomy Safety Project are effective, but resources are not available to educate the workforce at scale. …”
Get full text
Article -
35283
Towards equitable carbon responsibility: Integrating trade-related emissions and carbon sinks in urban decarbonization
Published 2025-03-01“…Accurately allocating carbon mitigation responsibility (CMR) is essential for designing effective and equitable climate policies. …”
Get full text
Article -
35284
The Most Important Measures in Reducing Infection Control in the Anesthesia Work Environment: An Evidence-Based Study
Published 2024-11-01“…Then, the guidelines for infection control in the anesthesia work environment were designed based on the evidence-based method (Stettler model). …”
Get full text
Article -
35285
Network and Dataset for Multiscale Remote Sensing Image Change Detection
Published 2025-01-01“…A global multiscale feature fusion module is designed to achieve global multiscale feature fusion and obtain multiscale high-level semantic change features. …”
Get full text
Article -
35286
Elder Companion Overview
Published 2004-02-01“… The Elder Companion training program is designed to train persons interested in becoming employed by local service providers as sitter/companions for the elderly. …”
Get full text
Article -
35287
The Effect of Magnetization on the Production Process of Soft Magnetic Composite Stators of Axial Flux Motors
Published 2025-01-01“…Two axial flux motors with identical designs are devolved, with the only variation being in the preparation of the SMC stators. …”
Get full text
Article -
35288
Une « banlieue créative » dans le Grand Paris ?
Published 2014-01-01“…It is a completely original version of the concept of a creative city, set in a deprived suburb. Indeed, its designers liken social fringe to creativity and in doing so they question the place that these poorer districts could hold within a cultural and creative economy in the future. …”
Get full text
Article -
35289
Achieving efficient dynamic cryptographic access control in cloud storage
Published 2011-01-01“…To keep the data in the cloud confidential against unauthorized parties,a cryptographic access control solution called hybrid cloud re-encryption(HCRE) based on attribute-based encryption(ABE) was introduced.HCRE designed a secret sharing scheme to delegate the task of ABE re-encryption to the cloud service provider(CSP),which alleviates the administering burdens on the data owner.Experiments show that HCRE can handle dynamic access policies in a more ef-ficient way.Additionally,HCRE does not reveal extra information of the plaintext to the CSP,thus it does no harm to the data confidentiality.…”
Get full text
Article -
35290
A Class of Sextic Trigonometric Bézier Curve with Two Shape Parameters
Published 2021-01-01“…Shape control parameters can provide an opportunity to modify the shape of curve as designer desired. Some open and closed curves are also part of this study.…”
Get full text
Article -
35291
Research and implementation of network transmission situation awareness
Published 2010-01-01“…The advanced ideas of situation awareness were introduced to network transmission and NTSA(network transmission situation awareness) model was established based on spatial traffic clustering.Around the key technologies of the model,situation factors were selected according to information gain and mutual information;a high-dimensional data stream clustering algorithm for transmission pattern partition as well as a topology importance analysis method of network element based on graph theory were proposed;furthermore,a NTSA prototype system was designed and imple-mented.The experiment results on real datasets demonstrate the efficiency,effectiveness and scalability.…”
Get full text
Article -
35292
4-H Exploring Citizenship, Unit V: My Community
Published 2018-10-01“… The "My Community" project is an educational initiative designed to deepen understanding and involvement in one's local community. …”
Get full text
Article -
35293
Research on resource monitoring and billing mechanisms of application engine in cloud computing environment
Published 2012-09-01“…A comprehensive study on the billing methods of existing cloud computing platforms was made.Then,AppScale,an open sourced scalable and typical PaaS software,as the foundation platform of our target resource monitoring and billing mechanisms was chose.Appscale’s structure,its components and how they worked together was analyzed.CloudMB,which enhanced AppScale by supporting process level resource monitoring and multi-user oriented billing function with flexible billing policies was designed and implemented.Finally,experiment verified that CloudMB is effective and its occupation of CPU time is lower than 3%.…”
Get full text
Article -
35294
Lightweight and secure search scheme for medical data sharing
Published 2024-11-01“…To balance the availability and security of medical data, a lightweight and secure search scheme was designed. The proposed search algorithm involved only two pairings and one multiplication operation, allowing for low consumption and security requirements when executing searches using smart contract. …”
Get full text
Article -
35295
The deviant syntax of headlinese and its role in the pragmatics of headlines
Published 2018-06-01“…Such an extension of the syntactic possibilities of English is designed to fit the pragmatic purpose of headlines, i.e. heighten the relevance of the newspaper article to the reader.…”
Get full text
Article -
35296
Florida Solid and Hazardous Waste Regulation Handbook: Introduction
Published 2004-01-01“… Current solid and hazardous waste law is a maze of statutes, regulations, and potential liabilities. This handbook is designed to act as your guide and as a first step in helping you recognize which agricultural and household activities may involve solid and hazardous wastes. …”
Get full text
Article -
35297
Pharmacokinetic Interactions between Cardiovascular Medicines and Plant Products
Published 2019-01-01“…This review highlights the pharmacokinetic clinically relevant interactions between major conventional cardiovascular medicines and plant products with an emphasis on their putative mechanisms, drawbacks of herbal products use, and the perspectives for further well-designed studies.…”
Get full text
Article -
35298
TCCL:secure and efficient development of desktop cloud structure
Published 2017-10-01“…A secure and efficient development of desktop cloud structure:TCCL (transparent computing-based cloud),which was designed under the guidance of transparent computing,was proposed.TCCL applied the method,separating calculation and storage,loading in a block streaming way which was proposed in the transparent computing theory,to the cloud desktop system,and deployed the defense module of security threats under the cloud VM (virtual machine).As a result,the TCCL could improve the security level on the cloud VMs’ system files and data files,and could optimize the cloud virtual machines' storage efficiency.…”
Get full text
Article -
35299
Phantom Writing
Published 2024-09-01“…Building upon this, I propose ‘phantom writing’ or ‘phantasmography’ as a situated, multidisciplinary and multisensory approach aimed at understanding and designing contemporary places, landscapes and environments, acknowledging and mediating the agency of diverse phantoms and phantasms.…”
Get full text
Article -
35300
Conformance Testing on RRM Cell Reselection Procedure Based on TTCN-3
Published 2013-04-01“…In order to verify the protocol conformance of radio resource management(RRM)cell reselection in TD-LTE system,a new testing method was designed by implementing testing and test control notation version 3 (TTCN-3)abstract test suit.Furthermore,the test suit was operated on the TTworkbench developed by German Testing Tech.The graphical presentation format(GFT)and test report to check the protocol conformance of cell reselection were generated.The scheme has been successfully applied in the project development of TTCN extended testing set instrument(RRM part)in TD-LTE system.…”
Get full text
Article