Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
42381
FlowMFD: Characterisation and classification of tor traffic using MFD chromatographic features and spatial–temporal modelling
Published 2023-07-01“…Then MFD chromatographic features (MFDCF) are designed to represent the pattern. Those features integrate multiple low‐dimensional TSFs into a single plane and retain most pattern information. …”
Get full text
Article -
42382
Highly Efficient Dual-Band Rectifier Based on Symmetric Impedance Control Network
Published 2025-01-01“…The proposed rectifier is designed and fabricated with a compact size of <inline-formula> <tex-math notation="LaTeX">$28.9\times 38.9$ </tex-math></inline-formula> mm2. …”
Get full text
Article -
42383
Analysis of Debris Flow Reduction Effect of Check Dam Types considering the Mountain Stream Shape: A Case Study of 2016 Debris Flow Hazard in Ulleung-do Island, South Korea
Published 2021-01-01“…Hence, the installation of check dams designed to reflect the area’s local conditions is required to avoid further damage. …”
Get full text
Article -
42384
Electronic invoice public verification scheme based on SM2 coalition signature algorithm
Published 2022-04-01“…In order to solve the current problems of electronic invoices, such as anti-counterfeiting, privacy leakage and low verification efficiency, an electronic invoice public verification architecture based on the national signature algorithm was proposed.Electronic invoice documents have complex data sources, sensitive user information on the ticket surface, frequent data flow and other characteristics as well as the demand for efficient public verification.Based on these motivations, the e-invoice generation and verification protocol was designed.Besides, a signature code generation scheme for invoice anti-counterfeiting was proposed based on certificate-free joint signature.Then multiple data verification and signatures of the invoicing party and the taxation authority can be realized.All kinds of invoice holders can not only verify the authenticity and data integrity of electronic invoices, but also publicly check the authenticity and data integrity of electronic invoices.The integration of data encryption algorithms protects user privacy data in electronic invoices, and at the same time can fulfill the requirements for authenticity or status verification under various invoice application scenarios.The checking party only needs to verify one signature to confirm the authenticity of the electronic invoice signed by both parties.Scyther security simulation tools were used to analyze the security of the proposed solution, which can verify the integrity and authenticity of the data source and check the confidentiality of the privacy data under various types of attacks.Compared with a typical overseas e-invoice checking scheme and a similar digital signature-based e-invoice checking scheme, the proposed scheme has obvious advantages in terms of checking efficiency and invoice file size.…”
Get full text
Article -
42385
Research ethics in social science research during health pandemics: what can we learn from COVID-19 experiences?
Published 2025-01-01“…The research involved interviews and workshops with University College London (UCL) academics, professional staff and graduate students and encompassed those involved in reviewing ethics applications, researchers dealing with ethics in projects that continued despite disruptions caused by COVID-19, and successful research projects specifically designed to study the effects of COVID-19 in various contexts. …”
Get full text
Article -
42386
Tourism and Erotic Imaginaries in Wartime Paris: French and Germans during the Occupation, 1940-1944
Published 2018-05-01“…War, however, can produce its own tourism, as was true of German soldiers in occupied Paris during the Second World War. A specially designated unit of the Wehrmacht arranged tours for thousands of its young soldiers, many of whom had never before left their native towns and villages. …”
Get full text
Article -
42387
DNCCLA: Discrete New Caledonian Crow Learning Algorithm for Solving Traveling Salesman Problem
Published 2024-01-01“…Bioinspired optimization algorithms like the New Caledonian crow learning algorithm (NCCLA) are primarily designed to address continuous problems. As most real-world problems are discrete, some operators have been proposed to convert continuous algorithms into discrete ones to address these problems. …”
Get full text
Article -
42388
L1 Adaptive Fault-Tolerant Attitude Tracking Control of UAV Systems Subject to Faults and Input Saturation
Published 2024-01-01“…Second, a L1 neural network adaptive fault-tolerant controller is designed to deal with uncertainties, where radial basis function neural networks (RBFNNs) are applied to approximate the nonlinear function in the system model. …”
Get full text
Article -
42389
Security protection method based on mimic defense and Paillier encryption for smart IoT terminals
Published 2024-12-01“…Then, a secure blind signature with Paillier encryption (SBSPE) algorithm was designed in this architecture to safeguard the data and privacy of the edge-area smart terminals throughout the data processing lifecycle of edge-area smart terminals. …”
Get full text
Article -
42390
-
42391
Sugar Profile, Mineral Content, and Rheological and Thermal Properties of an Isomerized Sweet Potato Starch Syrup
Published 2013-01-01“…Further and more detailed studies should be designed to further enhance the fructose content of the syrup and observe its stability beyond 70 days. …”
Get full text
Article -
42392
Learning-based page replacement scheme for efficient I/O processing
Published 2025-02-01“…In this paper, we introduce a Learning-based Page Replacement (LPR) scheme designed for efficient I/O processing. We propose a model that learns the memory reference patterns of a given algorithm, enabling real-time determination of the optimal replacement policy. …”
Get full text
Article -
42393
Wpływ nowożytnego antropocentryzmu na relację człowieka do przyrody. Część pierwsza
Published 2011-03-01“…God-Creator was replaced by man-designer. A new type of anthropocentrism appeared, which tried to find the answer to the fundamental questions in the human being himself. …”
Get full text
Article -
42394
Do orthodontists consider endodontic complications in their orthodontic management of teeth with a history of dental trauma? A vignette survey
Published 2025-01-01“…Method A mixed methods vignette survey was designed, piloted, and distributed online to UK registered specialist orthodontists. …”
Get full text
Article -
42395
Relationship between Musculoskeletal Disorders and Level of Stress among Homemakers in Gujarat State: An Observational Study
Published 2024-12-01“…Materials and Methods: After the ethical clearance, for data collection a designed Google Forms was spread across the Gujarat state through E-mail and social media platforms. …”
Get full text
Article -
42396
What is the difference between thus and thusly?
Published 2018-06-01“…Most of the prescriptive usage guides treat thusly critically and describe it as “best-avoided” and replaced by thus or they even designate it as a “non-word” (Lukač and Tieken-Boon van Ostade forthcoming).To find out what the acceptability ratings for the word are currently, together with Ingrid Tieken-Boon van Ostade, I conducted an online survey made available between July and September 2015, in which we asked the participants to rate the word on a six-fold acceptability scale (informal speech, formal speech, informal writing, formal writing, netspeak, and unacceptable under any circumstances).In this paper, with the survey findings as my starting point, I aim to establish whether a current change in progress correlates with higher acceptability ratings among younger speakers. …”
Get full text
Article -
42397
The PIT: SToPP Trial—A Feasibility Randomised Controlled Trial of Home-Based Physiotherapy for People with Parkinson's Disease Using Video-Based Measures to Preserve Assessor Blind...
Published 2012-01-01“…We advocate a fully powered trial, designed to minimise dropouts and preserve assessor blinding, to evaluate this intervention.…”
Get full text
Article -
42398
Everyday activity strategies perceived by people with advanced cancer: a qualitative explorative study
Published 2025-01-01“…Methods The qualitative study was designed with an explorative approach. Data from 28 people with advanced cancer was drawn from a trial including qualitative interviews to elicit participants’ perceptions about managing their everyday activities. …”
Get full text
Article -
42399
Multi-Objective Dynamic Path Planning with Multi-Agent Deep Reinforcement Learning
Published 2024-12-01“…Finally, based on the OpenAI Gym platform, environments such as simple multi-objective environment and complex multi-objective environment were designed to analyze the rationality and effectiveness of the multi-objective dynamic path planning through minimum cost and collision risk assessments. …”
Get full text
Article -
42400
Confirmation bias in law enforcement and how debiasing interventions and mitigation strategies might help rebuild public trust: A thematic review
Published 2025-01-01“…This review shows the need for thorough research to validate the effectiveness of strategies designed to mitigate confirmation biases in law enforcement. …”
Get full text
Article