Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
40401
Defending against social engineering attacks: A security pattern‐based analysis framework
Published 2023-07-01“…Specifically, we systematically ‘attack’ each step of social engineering attacks to prevent, mitigate, or eliminate them, resulting in 62 countermeasures. We have designed a set of social engineering security patterns that encapsulate relevant security knowledge to provide practical assistance in the defence analysis of social engineering attacks. …”
Get full text
Article -
40402
“Dissociating Form and Meaning in Bilingual Creative Writing and Creative Translation Workshops”
Published 2012-03-01“…To this end, our theoretical foundations (Bettelheim and Lafforgue’s approach to fairy-tales as an indirect mode of expression) are only partially presented, and students are provided with bare plots to be filled with their own fictions or meaning. These ‘plots’ are designed to allow a creative engagement with the dynamics inherent in language, between intimacy and anonymity, familiarity and otherness, and thus to explore questions of identity. …”
Get full text
Article -
40403
Empowering Non-Specialist English Teachers: Self-Efficacy Enhancement Through Classroom English Proficiency and Collaborative Support
Published 2024-12-01“…However, non-specialist teachers often lack the pedagogical training necessary for effective English instruction, which often negatively impacts their self-efficacy. This study was designed to examine the effects of a professional development workshop, aimed at improving “classroom English” proficiency, on these teachers’ self-efficacy. …”
Get full text
Article -
40404
Prevalence of anemia in Somalia: A systematic review and meta-analysis of 3988 participants
Published 2024-12-01“…Cross-sectional study designs had more incidence of anemia 39.8% (95% CI: 29.0–51.7) than retrospective studies 29.2% (95% CI: 17.0–45.3) in this review. …”
Get full text
Article -
40405
Invariant Representation Learning in Multimedia Recommendation with Modality Alignment and Model Fusion
Published 2025-01-01“…To overcome these challenges, we propose a framework called M<sup>3</sup>-InvRL, designed to enhance recommendation system performance through common and modality-specific representation learning, invariant learning, and model merging. …”
Get full text
Article -
40406
Knowledge, attitudes, and practices toward COVID-19 and its prevention among medical and dental students in an educational institution in Telangana
Published 2024-04-01“…Knowledge gaps were discovered in the areas of COVID-19 transmission through blood, World Health Organization (WHO)-designated variants of concern, disinfectant usage, and mandatory vaccination. …”
Get full text
Article -
40407
Efficient and fully simulated oblivious transfer protocol on elliptic curve
Published 2023-02-01“…Oblivious transfer protocol, an important technology in secure multi-party computation, is the research hotspot on network and information security.Based on the bilinear pairs and the difficult problems on elliptic curves, an efficient 1-out-of-N oblivious transfer protocol in the semi-honest model and in the standard malicious model were proposed respectively.The protocol in semi-honest model was designed.It only needed two rounds of interaction.The receiver needed two times of bilinear pair arithmetic and one time of multi point arithmetic, and the sender needed n times of multi point arithmetic and n times of modular exponentiation.The security of the protocol was based on the discrete logarithm problem on elliptic curves.A zero-knowledge proof protocol and the oblivious transfer protocol in the standard malicious model were proposed respectively.The oblivious transfer protocol only needed four rounds of interaction.The receiver needed three times of bilinear pair arithmetic and three times of multi point arithmetic, and the sender needed n+1 times of multi point arithmetic and n+1 times of modular exponentiation.Besides, it can resist malicious behaviors of the party.The results show that the average running time of the protocol in the semi-honest model and in the standard malicious model were 0.787 9 s and 1.205 6 s respectively, which can further demonstrate the efficiency of the protocol.…”
Get full text
Article -
40408
Treatment of tumour tissue with radio‐frequency hyperthermia (using antibody‐carrying nanoparticles)
Published 2021-10-01“…Abstract Intelligent inorganic nanoparticles were designed and produced for use in imaging and annihilating tumour cells by radio‐frequency (RF) hyperthermia. …”
Get full text
Article -
40409
Maritime Pilots’ Risky Operational Behavior Analysis Based on Structural Equation Model
Published 2021-01-01“…In this paper, a maritime pilots’ risky behaviour related factors questionnaire is designed to identify and quantify the factors of maritime pilots’ risky operational behaviour. …”
Get full text
Article -
40410
Reviews and locate the access of citizens in Shirvan city To medical treatment
Published 2020-09-01“…Then using Arc GIS software, after completing the data gathering steps, preparing information layers, classifying and evaluating the layers, and weighing and overlapping the information layers were designed to prioritize the lands of the city of Shirvan for the establishment of clinics. …”
Get full text
Article -
40411
The economy of digital contact in the conditions of geomarkets transformation
Published 2023-12-01“…The purpose of the study is to systematise the scientific problems of digital contact economies and to generalise the implementation of world practices while designing approaches. The target of these approaches is development of subjects economic relations according to the assessment of differentiation of geospatial information transformational processes on the geomarkets of the country. …”
Get full text
Article -
40412
Perception of commercial advertising by generations Y and Z
Published 2024-11-01“…The data set of the study is represented by data from a survey of 308 respondents conducted in February 2023 and designed us ing the semantic differential method. Our findings show statistically significant differences in the perception by generations Y and Z of the colour temperature of a commercial, the dynamism and volume of the music, and friendliness of the actors. …”
Get full text
Article -
40413
Well Interference Analysis of Shale Gas Wells Based on Embedded Discrete Fracture Model
Published 2022-01-01“…Second, different cases are designed to characterize different types and degrees of well interference in shale gas reservoirs. …”
Get full text
Article -
40414
Understanding the edge crack phenomenon in ceramic laminates
Published 2015-09-01“…This approach states that a crack is originated when both stress and energy criteria are fulfilled simultaneously. Several designs with different residual stresses and a given thickness in the compressive layers have been computed. …”
Get full text
Article -
40415
Optimization of Music Feature Recognition System for Internet of Things Environment Based on Dynamic Time Regularization Algorithm
Published 2021-01-01“…Because of the difficulty of music feature recognition due to the complex and varied music theory knowledge influenced by music specialization, we designed a music feature recognition system based on Internet of Things (IoT) technology. …”
Get full text
Article -
40416
Cooperative content downloading scheme based on D2D multicast communications
Published 2020-11-01“…Aiming at the content downloading scenario in the network such as cellular network and vehicular network,a cooperative content downloading scheme based on device-to-device multicast communications was proposed to improve the content downloading performance.Such a scheme took advantage of the proximity feature of the content requesters and groups them into disjoint clusters.Firstly,the base station delivered the entire content to a cluster,and each content requester in a cluster downloaded a proportion of the entire content.Then,the content requesters took turns sharing their downloaded content with other content requesters in the same cluster.In this way,the additional resource consumption of content sharing in a cluster was shared by the content requesters in the cluster together.During this process,a pricing-based approach was proposed to motivate these content requesters to cooperate with each other.Such an approach only required the base station to maintain a content downloading price.Based on this,the joint issue of user clustering,link scheduling and power allocation was studied to minimize the total cost of content requesters.To obtain a superior solution with reductive complexity,a joint optimization algorithm was designed based on the coalition formation game.Numerical results show that compared with the traditional non-cooperative scheme,the total cost of content requesters was reduced by 37.15%.Under different numbers of content requesters and cellular users,the proposed scheme is both superior to other benchmark schemes.…”
Get full text
Article -
40417
Protecting fisheries resources and marine ecosystem from climate change: Solutions and legal constraints
Published 2025-01-01“…The present study is designed to analyse the impacts of climate change on fish and their interdependent ecosystems, but also impacts upon the laws and policies relevant to their exploitation and conservation. …”
Get full text
Article -
40418
Therapeutic Benefit of Dillenia indica in Diabetes and Its Associated Complications
Published 2019-01-01“…In spite of its wide use in the Northeast region of India as traditional medicine, there is only one clinical study where the antidiabetic potential of the fruit powder has been shown. Further well-designed animal and human studies are needed to confirm the role of Dillenia indica in diabetes and its associated complications.…”
Get full text
Article -
40419
Synergistic Effects of SDS and H2O2 Combinations on Tracheal Scaffold Development: An In Vitro Study Using Goat Trachea
Published 2024-01-01“…In the development of tissue-engineered tracheal scaffolds, in vitro studies play a crucial role in allowing researchers to evaluate the efficacy and safety of scaffold designs and fabrication techniques before progressing to in vivo or clinical trials. …”
Get full text
Article -
40420
Gambling in Connecticut adolescents: Prevalence, socio-demographic characteristics, trauma exposure, suicidality, and other risk behaviors.
Published 2025-01-01“…The findings highlight the need for further investigation of specific factors like social support that help with designing and implementing tailored interventions.…”
Get full text
Article