Showing 38,681 - 38,700 results of 46,768 for search '"Design"', query time: 0.17s Refine Results
  1. 38681

    Vulnerability assessment and zoning of developed and susceptible contaminated karstic (Case study: Ravenscar watershed) by asadolah hejazi, zahra heidari

    Published 2023-03-01
    “…The method of work is that after the necessary processing, using the OWA method and applying weights obtained through the ANP model, the zoning is done After designing the zoning map, using the satellite imagery of 2007 and2015, the development of human development areas in the developed karstic areas has been evaluated The results of this study indicate that most of the studied basin, especially in northern and western areas of the basin, are highly and relatively developed in the class, The calculation of the area of man-made areas suggests that in2007, about 2.6 km of occupied areas of man-made industrial zones have been occupied which, according to the growing population, increased to 3.8 km in2015, human-made areas have been extracted in developed artisanal areas…”
    Get full text
    Article
  2. 38682

    Regularities of the metallurgical industry restructuring process: Content, safety and regulation by I. D. Matskulyak, V. I. Mysachenko, N. V. Sanin

    Published 2023-06-01
    “…The objectives of the article are to generalize the theory and methods that characterize the essence of the designated industry restructuring regularities, the main directions of their safe implementation and regulation. …”
    Get full text
    Article
  3. 38683

    Non-oscillatory central schemes for the Saint-Venant system by Rooholah Abedian

    Published 2025-02-01
    “…Both of these steps are designed to preserve the C-property, which ensures the exact preservation of the quiescent flow solution. …”
    Get full text
    Article
  4. 38684

    Simplified Process Model Discovery Based on Role-Oriented Genetic Mining by Weidong Zhao, Xi Liu, Weihui Dai

    Published 2014-01-01
    “…The new role complexity metric of process models is designed from role cohesion and coupling, and applied to discover roles in process models. …”
    Get full text
    Article
  5. 38685

    DEVELOPMENT OF A PROJECT BASED ONLINE LEARNING MODEL TO IMPROVE THE SKILLS AND ABILITIES OF ACTORS FOR STUDENTS by Welly Suryandoko

    Published 2023-07-01
    “…There are six syntaxes of the Project Based Online Learning model: online product planning, designing online product planning, preparing online creation schedules, monitoring online project activity and development, testing work online, and evaluating online learning experiences. …”
    Get full text
    Article
  6. 38686

    Active-probing based distributed malware master detection system by Cheng-xiang SI, Bo SUN, Wen-han YANG, Hui-lin ZHANG, Xiao-nan XUE

    Published 2013-08-01
    “…Active Spear active probing system was designed and implemented based on the approach. The system employs distributed architecture and IP used in the scanning is dynamic. …”
    Get full text
    Article
  7. 38687

    Beyond polarity: How ESG sentiment influences idiosyncratic volatility in the Turkish stock market by Alev Atak

    Published 2024-12-01
    “…Using FinBERT-ESG, a language model specifically designed for financial and ESG-related texts, we construct four novel indices: the Positive ESG Index (PESGIN), capturing positive ESG sentiment; the Negative ESG Index (NESGIN), representing adverse ESG sentiment; the Balanced Polarity Index (BPI), measuring the overall balance between positive and negative sentiment; and the Amplified Negative Polarity Index (ANPI), which emphasizes the intensity of negative sentiment. …”
    Get full text
    Article
  8. 38688

    Mining and utilization of network protocol’s stealth attack behavior by Yan-jing HU, Qing-qi PEI

    Published 2017-10-01
    “…The survivability,concealment and aggression of network protocol’s stealth attack behaviors were very strong,and they were not easy to be detected by the existing security measures.In order to compensate for the shortcomings of existing protocol analysis methods,starting from the instructions to implement the protocol program,the normal behavior instruction sequences of the protocol were captured by dynamic binary analysis.Then,the potential stealth attack behavior instruction sequences were mined by means of instruction clustering and feature distance computation.The mined stealth attack behavior instruction sequences were loaded into the general executing framework for inline assembly.Dynamic analysis was implemented on the self-developed virtual analysis platform HiddenDisc,and the security of stealth attack behaviors were evaluated.Excepting to mining analysis and targeted defensive the stealth attack behaviors,the stealth attack behaviors were also formally transformed by the self-designed stealth transformation method,by using the stealth attack behaviors after transformation,the virtual target machine were successfully attacked and were not detected.Experimental results show that,the mining of protocol stealth attack behaviors is accurate,the transformation and use of them to increase information offensive and defensive ability is also feasible.…”
    Get full text
    Article
  9. 38689

    Investigation of the Properties of High-Density Polyethylene Pipes used in Kurdistan for Piping System of Potable Water by Sarkawt Rostam Hassan

    Published 2022-01-01
    “…Mechanical properties through tensile tests have been investigated and valuable data were collected that could provide a guideline reference for the designers and end-users utilizing these pipes for water supply networks. …”
    Get full text
    Article
  10. 38690

    Analysis Technology of Tennis Sports Match Based on Data Mining and Image Feature Retrieval by Hong Huang, Risheng Deng

    Published 2020-01-01
    “…In addition, this paper designs a controlled experiment to verify the technical analysis effect of the tennis match and the performance of the model itself. …”
    Get full text
    Article
  11. 38691

    Répartition de la biodiversité en France métropolitaine : une synthèse des Atlas faunistiques by Isabelle Witté, Julien Touroult

    Published 2014-05-01
    “…In this study, seven published atlases covering 507 vertebrate species and 425 insect species were combined for analyses. Different indices designed to pinpoint biodiversity hotspots were calculated for each quadrat in a regular grid covering the whole country : species richness, rare species richness, relative rarity index and an index of contribution to the global biodiversity calculated with spatial optimisation software (Marxan). …”
    Get full text
    Article
  12. 38692

    Military Zones: A Remedy of Awakening Ankara from Urban Amnesia by Zelal Oztoprak, Nur Çağlar

    Published 2021-11-01
    “…First, Ankara became the showcase of the newly established Turkish Republic and a new city center designed in isolation with the old one to represent the modernity of the Republic. …”
    Get full text
    Article
  13. 38693

    Mothers’ Knowledge and Noncompliance of Childhood Vaccination in Primary Health Care Centers at Mosul City by Hana A. Alsaeed, Rayyan Ibrahim Khaleel, Hanaa Hussein Mukhlif

    Published 2024-12-01
    “…Materials and Methods: A descriptive study was designed for a sample of 250 mothers attending primary health care centers between September 15, 2022, and December 20, 2022, for their children’s immunizations. …”
    Get full text
    Article
  14. 38694

    Provably secure quantum resistance two-server password-authenticated key exchange protocol by Anqi YIN, Yuanbo GUO, Ding WANG, Tongzhou QU, Lin CHEN

    Published 2022-03-01
    “…Aiming at the problem that the lattice-based single-sever password-authenticated key exchange (PAKE) protocols are not resistant to server compromise attack, while the existing lattice-based multi-server PAKE protocols are inefficient and incompatible with two-server scenarios.The first lattice-based two-party smooth projective hash function (SPHF) was proposed by utilizing the learning with errors (LWE), which was indistinguishability under adaptive chosen-ciphertext attack(IND-CCA2) secure.The parameters of the based public key encryption (PKE) scheme were also identified.On this basis, pertinent two-server PAKE protocols from lattices were designed countering both passive and active attackers.The two quantum resistance protocols were able to achieve password-only settings and the expensive cryptographic primitives were not used, including signature/verification, fully homomorphic encryption and secret sharing.The utilization of zero knowledge proofs were avoided by the protocol under the passive attackers.In the standard model, rigorous security proofs were provided for the two proposed protocols.Experimental results show that the proposed SPHF and PAKE protocols exhibit higher execution efficiency.…”
    Get full text
    Article
  15. 38695

    Tactical measures set to improve the import substitution process in the field of Russian pharmaceuticals by L. V. Orlova, P. V. Zobov

    Published 2023-06-01
    “…The assessment of the proposed tactical measures to improve the process of import substitution in the field of pharmaceuticals, which is designed to solve important social, economic and strategic tasks, has been carried out.…”
    Get full text
    Article
  16. 38696

    Maximizing the Benefits of Reclaimed Water for Irrigating the Landscape and Protecting the Environment by George Hochmuth, Laurie Trenholm, Don Rainey, Esen Momol, Claire Lewis, Brian Niemann

    Published 2013-12-01
    “… Reclaimed water is water that has been treated in municipal wastewater facilities and is safe to use for designated purposes, including residential landscape irrigation. …”
    Get full text
    Article
  17. 38697

    Methods of Measuring ‘Soft Power’ by S. I. Belov

    Published 2020-11-01
    “…Much of scholarly attention is drawn to various indexes and ratings, designed to evaluate the ‘soft power’ of the leading actors of world politics. …”
    Get full text
    Article
  18. 38698

    Pytaxon: A Python software for resolving and correcting taxonomic names in biodiversity data by Marco Proença Neto, Marcos De Sousa

    Published 2025-01-01
    “…The standardisation and correction of taxonomic names in large biodiversity databases remain persistent challenges for researchers, as errors in species names can compromise ecological analyses, land-use planning and conservation efforts, particularly when inaccurate data are shared on global biodiversity portals.We present pytaxon, a Python software designed to resolve and correct taxonomic names in biodiversity data by leveraging the Global Names Verifier (GNV) API and employing fuzzy matching techniques to suggest corrections for discrepancies and nomenclatural inconsistencies. …”
    Get full text
    Article
  19. 38699

    Measuring Travel Time Reliability for Urban Residents’ Commutes via the Integration of Information Entropy and Standard Deviation by Junjun Zhan

    Published 2024-01-01
    “…Nevertheless, existing measurement methods are not specifically designed for commuting scenarios, and their direct application to assess TTR for commuting may yield results incongruent with actual commuting conditions, as they overly rely on measures like mean and percentiles. …”
    Get full text
    Article
  20. 38700

    Managing Landscape Irrigation to Avoid Soil and Nutrient Losses by George Hochmuth, Laurie Trenholm, Don Rainey, Esen Momol, Claire Lewis, Brian Niemann

    Published 2013-12-01
    “…This publication is designed to help UF/IFAS Extension county agents prepare materials to directly address nutrient losses from lawns and landscapes caused by inadequate irrigation management practices. …”
    Get full text
    Article