Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
38681
Vulnerability assessment and zoning of developed and susceptible contaminated karstic (Case study: Ravenscar watershed)
Published 2023-03-01“…The method of work is that after the necessary processing, using the OWA method and applying weights obtained through the ANP model, the zoning is done After designing the zoning map, using the satellite imagery of 2007 and2015, the development of human development areas in the developed karstic areas has been evaluated The results of this study indicate that most of the studied basin, especially in northern and western areas of the basin, are highly and relatively developed in the class, The calculation of the area of man-made areas suggests that in2007, about 2.6 km of occupied areas of man-made industrial zones have been occupied which, according to the growing population, increased to 3.8 km in2015, human-made areas have been extracted in developed artisanal areas…”
Get full text
Article -
38682
Regularities of the metallurgical industry restructuring process: Content, safety and regulation
Published 2023-06-01“…The objectives of the article are to generalize the theory and methods that characterize the essence of the designated industry restructuring regularities, the main directions of their safe implementation and regulation. …”
Get full text
Article -
38683
Non-oscillatory central schemes for the Saint-Venant system
Published 2025-02-01“…Both of these steps are designed to preserve the C-property, which ensures the exact preservation of the quiescent flow solution. …”
Get full text
Article -
38684
Simplified Process Model Discovery Based on Role-Oriented Genetic Mining
Published 2014-01-01“…The new role complexity metric of process models is designed from role cohesion and coupling, and applied to discover roles in process models. …”
Get full text
Article -
38685
DEVELOPMENT OF A PROJECT BASED ONLINE LEARNING MODEL TO IMPROVE THE SKILLS AND ABILITIES OF ACTORS FOR STUDENTS
Published 2023-07-01“…There are six syntaxes of the Project Based Online Learning model: online product planning, designing online product planning, preparing online creation schedules, monitoring online project activity and development, testing work online, and evaluating online learning experiences. …”
Get full text
Article -
38686
Active-probing based distributed malware master detection system
Published 2013-08-01“…Active Spear active probing system was designed and implemented based on the approach. The system employs distributed architecture and IP used in the scanning is dynamic. …”
Get full text
Article -
38687
Beyond polarity: How ESG sentiment influences idiosyncratic volatility in the Turkish stock market
Published 2024-12-01“…Using FinBERT-ESG, a language model specifically designed for financial and ESG-related texts, we construct four novel indices: the Positive ESG Index (PESGIN), capturing positive ESG sentiment; the Negative ESG Index (NESGIN), representing adverse ESG sentiment; the Balanced Polarity Index (BPI), measuring the overall balance between positive and negative sentiment; and the Amplified Negative Polarity Index (ANPI), which emphasizes the intensity of negative sentiment. …”
Get full text
Article -
38688
Mining and utilization of network protocol’s stealth attack behavior
Published 2017-10-01“…The survivability,concealment and aggression of network protocol’s stealth attack behaviors were very strong,and they were not easy to be detected by the existing security measures.In order to compensate for the shortcomings of existing protocol analysis methods,starting from the instructions to implement the protocol program,the normal behavior instruction sequences of the protocol were captured by dynamic binary analysis.Then,the potential stealth attack behavior instruction sequences were mined by means of instruction clustering and feature distance computation.The mined stealth attack behavior instruction sequences were loaded into the general executing framework for inline assembly.Dynamic analysis was implemented on the self-developed virtual analysis platform HiddenDisc,and the security of stealth attack behaviors were evaluated.Excepting to mining analysis and targeted defensive the stealth attack behaviors,the stealth attack behaviors were also formally transformed by the self-designed stealth transformation method,by using the stealth attack behaviors after transformation,the virtual target machine were successfully attacked and were not detected.Experimental results show that,the mining of protocol stealth attack behaviors is accurate,the transformation and use of them to increase information offensive and defensive ability is also feasible.…”
Get full text
Article -
38689
Investigation of the Properties of High-Density Polyethylene Pipes used in Kurdistan for Piping System of Potable Water
Published 2022-01-01“…Mechanical properties through tensile tests have been investigated and valuable data were collected that could provide a guideline reference for the designers and end-users utilizing these pipes for water supply networks. …”
Get full text
Article -
38690
Analysis Technology of Tennis Sports Match Based on Data Mining and Image Feature Retrieval
Published 2020-01-01“…In addition, this paper designs a controlled experiment to verify the technical analysis effect of the tennis match and the performance of the model itself. …”
Get full text
Article -
38691
Répartition de la biodiversité en France métropolitaine : une synthèse des Atlas faunistiques
Published 2014-05-01“…In this study, seven published atlases covering 507 vertebrate species and 425 insect species were combined for analyses. Different indices designed to pinpoint biodiversity hotspots were calculated for each quadrat in a regular grid covering the whole country : species richness, rare species richness, relative rarity index and an index of contribution to the global biodiversity calculated with spatial optimisation software (Marxan). …”
Get full text
Article -
38692
Military Zones: A Remedy of Awakening Ankara from Urban Amnesia
Published 2021-11-01“…First, Ankara became the showcase of the newly established Turkish Republic and a new city center designed in isolation with the old one to represent the modernity of the Republic. …”
Get full text
Article -
38693
Mothers’ Knowledge and Noncompliance of Childhood Vaccination in Primary Health Care Centers at Mosul City
Published 2024-12-01“…Materials and Methods: A descriptive study was designed for a sample of 250 mothers attending primary health care centers between September 15, 2022, and December 20, 2022, for their children’s immunizations. …”
Get full text
Article -
38694
Provably secure quantum resistance two-server password-authenticated key exchange protocol
Published 2022-03-01“…Aiming at the problem that the lattice-based single-sever password-authenticated key exchange (PAKE) protocols are not resistant to server compromise attack, while the existing lattice-based multi-server PAKE protocols are inefficient and incompatible with two-server scenarios.The first lattice-based two-party smooth projective hash function (SPHF) was proposed by utilizing the learning with errors (LWE), which was indistinguishability under adaptive chosen-ciphertext attack(IND-CCA2) secure.The parameters of the based public key encryption (PKE) scheme were also identified.On this basis, pertinent two-server PAKE protocols from lattices were designed countering both passive and active attackers.The two quantum resistance protocols were able to achieve password-only settings and the expensive cryptographic primitives were not used, including signature/verification, fully homomorphic encryption and secret sharing.The utilization of zero knowledge proofs were avoided by the protocol under the passive attackers.In the standard model, rigorous security proofs were provided for the two proposed protocols.Experimental results show that the proposed SPHF and PAKE protocols exhibit higher execution efficiency.…”
Get full text
Article -
38695
Tactical measures set to improve the import substitution process in the field of Russian pharmaceuticals
Published 2023-06-01“…The assessment of the proposed tactical measures to improve the process of import substitution in the field of pharmaceuticals, which is designed to solve important social, economic and strategic tasks, has been carried out.…”
Get full text
Article -
38696
Maximizing the Benefits of Reclaimed Water for Irrigating the Landscape and Protecting the Environment
Published 2013-12-01“… Reclaimed water is water that has been treated in municipal wastewater facilities and is safe to use for designated purposes, including residential landscape irrigation. …”
Get full text
Article -
38697
Methods of Measuring ‘Soft Power’
Published 2020-11-01“…Much of scholarly attention is drawn to various indexes and ratings, designed to evaluate the ‘soft power’ of the leading actors of world politics. …”
Get full text
Article -
38698
Pytaxon: A Python software for resolving and correcting taxonomic names in biodiversity data
Published 2025-01-01“…The standardisation and correction of taxonomic names in large biodiversity databases remain persistent challenges for researchers, as errors in species names can compromise ecological analyses, land-use planning and conservation efforts, particularly when inaccurate data are shared on global biodiversity portals.We present pytaxon, a Python software designed to resolve and correct taxonomic names in biodiversity data by leveraging the Global Names Verifier (GNV) API and employing fuzzy matching techniques to suggest corrections for discrepancies and nomenclatural inconsistencies. …”
Get full text
Article -
38699
Measuring Travel Time Reliability for Urban Residents’ Commutes via the Integration of Information Entropy and Standard Deviation
Published 2024-01-01“…Nevertheless, existing measurement methods are not specifically designed for commuting scenarios, and their direct application to assess TTR for commuting may yield results incongruent with actual commuting conditions, as they overly rely on measures like mean and percentiles. …”
Get full text
Article -
38700
Managing Landscape Irrigation to Avoid Soil and Nutrient Losses
Published 2013-12-01“…This publication is designed to help UF/IFAS Extension county agents prepare materials to directly address nutrient losses from lawns and landscapes caused by inadequate irrigation management practices. …”
Get full text
Article