Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
43081
Understanding Logical-Shift Error Propagation in Quanvolutional Neural Networks
Published 2024-01-01“…We characterize the error propagation in the quantum circuit implementing a single convolution and then in various designs of the same QNN, varying the dataset and the network depth. …”
Get full text
Article -
43082
To assess dietary habits and associated risk factors among medical students in North Delhi: A major health concern
Published 2024-12-01“…Methods: A cross-sectional study using the complete enumeration sampling method was conducted on medical students of North Delhi Municipal Corporation Medical College and Hindu Rao Hospital. A pre-designed pre-tested semi-structured questionnaire was used to collect student data. …”
Get full text
Article -
43083
Key Technology Research on the Rapid-Molding In-Closed Retaining-Wall in Filling Mining
Published 2022-01-01“…Through theoretical analysis and engineering analogy, the overall structure and size of the mold bag were designed. Through the experiment of high-water bleeding rate and slurry expansion, it was determined that the best water-cement ratio was 0.85 : 1, and the best additive content was 25 kg/m3. …”
Get full text
Article -
43084
A privacy budget adaptive optimization scheme for federated computing power Internet of things
Published 2024-12-01“…Federated computing power Internet of things (IoT) is designed to deeply integrate computing power with IoT resources, facilitating the efficient utilization of vast and ubiquitously dispersed IoT data and heterogeneous resources through federated learning. …”
Get full text
Article -
43085
Developing an evaluation approach for the in-depth review of a new undergraduate medical programme as a complex system.
Published 2024-01-01“…<h4>Discussion</h4>In the process of designing and using the 'six-step process' to evaluate a complex medical programme important lessons were learnt: starting the process with complexity theory at the forefront; being as inclusive as possible in data collection; also applying complexity theory to the evaluation of smaller programme components as 'mini-complex systems'; and managing one's inevitable insider bias.…”
Get full text
Article -
43086
Does Vitamin D Level Affect the Radiographic Severity of Osteoarthritis Knee and its Functional Status?
Published 2023-07-01“…Further research with larger sample sizes and longitudinal designs is necessary to establish a comprehensive understanding of the relationship between Vitamin D levels and knee OA severity.…”
Get full text
Article -
43087
Development and laboratory evaluation of a novel IoT-based electric-driven metering system for high precision garlic planter.
Published 2025-01-01“…The developed EDMS and GSMCS are technical manuals for developing and designing monitoring systems capable of precisely measuring and identifying the rates of qualifying and missing garlic seed measurements.…”
Get full text
Article -
43088
A metamodern model for managing stakeholder relationships in non-profit organisations
Published 2022-10-01“…This entails adopting a micro-perspective by regularly identifying current strategic issues, mapping the stakeholders involved and linking them to these issues, and designing focused communication strategies to manage stakeholder relationships. …”
Get full text
Article -
43089
Exploring the inequalities experienced by health and care workforce and their bases - A scoping review protocol.
Published 2024-01-01“…All types of published study designs in English language will be included if they discuss any inequality experienced by any category of health and care workers. …”
Get full text
Article -
43090
Dynamic Conjugate Gradient Unfolding for Symbol Detection in Time-Varying Massive MIMO
Published 2024-01-01“…Secondly, we introduce an adaptation of PrLcgNet referred to as Dynamic Conjugate Gradient Network (DyCoGNet), specifically designed for time-varying environments. DyCoGNet leverages self-supervised learning with Forward Error Correction (FEC), enabling autonomous adaptation without the need for explicit labeled data. …”
Get full text
Article -
43091
App-Based Volleyball Scoreboard Performance Evaluation
Published 2024-09-01“…This research aims to develop and evaluate an application-based volleyball scoreboard game device designed to facilitate the process of recording and managing scores in real time. …”
Get full text
Article -
43092
Knowledge, Attitude, and Practice of Community towards an Onchocerciasis Elimination Program from South West Ethiopia
Published 2022-01-01“…As a result, the study was designed to look into the community’s knowledge, attitude, and practice about the onchocerciasis elimination campaign. …”
Get full text
Article -
43093
Estimating the Torsional Capacity of Reinforced Concrete Beams Using ANFIS Models
Published 2024-09-01“…Designing or appraising framed concrete buildings exposed to high eccentric loads requires precise reinforced concrete (𝑅𝐶) torsional strength estimates. …”
Get full text
Article -
43094
Intrinsic assurance: a systematic approach towards extensible cybersecurity
Published 2023-02-01“…At present, the mainstream cyber security systems are laid out in an alienated style, where security functions are separated from business processes, and security products are isolated from each other.It is difficult to effectively cope with increasingly complicated cyber threats in this architecture.Therefore, it is imperative to move security inward for more resilient and secure network infrastructures.Business scenarios of the cybersecurity sector can be categorized into four perspectives: organization, vendor, regulatory and threat, each of which has different business objectives.Starting from the commonness and individuality of the four perspectives, the needs of this sector was systematically summarized and then the goal of building an extensible cybersecurity capability ecosystem was recognized.As the key to this goal, the intrinsic assurance methodology was proposed.Intrinsic assurance capabilities referred to the abilities of ICT components to natively support security functions such as monitoring, protection and traceability.But intrinsic assurance is not the ultimate security implementation itself, which is a key difference from the existing “endogenous security” or “designed-in security” methodologies.Intrinsic assurance emphasizes the inherent security enabling endowment of network components, whether by activating an innate gift or by encapsulating a given one, both of which logically exhibit autoimmunity from an external viewpoint.One advantage of such a component is the cohesion of business and security, which leads to transparent security posture awareness, customized security policies, and close-fitting security protection.It also simplifies the overall engineering architecture and reduces management complexity through encapsulation of multiple functions into a singleton.Additionally, the Intrinsic Assurance Support Capability Framework was put forward, which summarized and enumerated the security capabilities that conformed to the intrinsic assurance concept.This framework classified the security capabilities into five categories, namely collection, cognition, execution, syndication and resilience respectively, together with their sub-types and underlying ICT technologies.Based on this framework, the enhanced implementations of typical security business scenarios was further introduced in light of intrinsic assurance.…”
Get full text
Article -
43095
Seasonal Influenza Vaccination Uptake Among Australian Healthcare Professionals: An Archetype for Success
Published 2025-01-01“…Method: A cross-sectional survey was designed and distributed to an Australian HCP sample consisting of practicing nurses, midwives, pharmacists, and medical practitioners. …”
Get full text
Article -
43096
Structural Changes in Thin Keratoconic Corneas Following Crosslinking with Hypotonic Riboflavin: Findings on In Vivo Confocal Microscopy
Published 2021-07-01“…This case series was a preliminary feasibility study that might necessitate conducting a well-designed controlled study.…”
Get full text
Article -
43097
The Adsorption of Copper, Lead Metal Ions, and Methylene Blue Dye from Aqueous Solution by Pure and Treated Fennel Seeds
Published 2022-01-01“…Pure fennel seeds were labelled as PFS; nitric and sulphuric acid-treated seeds were designated as NAFS and SAFS, respectively. The adsorbents were characterised by SEM, EDX, FTIR, XRD, and BET. …”
Get full text
Article -
43098
Quand des pesticides empoisonnent la recherche, la réglementation et la démocratie :
Published 2021-05-01“…Never in the history of science has been published such a detailed account of the attacks and perfidious manipulations of an agribusiness giant to destroy the reputation and life of one of the most published scientists on its flagship product : Bayer-Monsanto's Roundup, the world's best-selling pesticide and a glyphosate-based herbicide used on GMOs designed to absorb it without dying, a key to agro-industrial concentration. …”
Get full text
Article -
43099
Adapting a style based generative adversarial network to create images depicting cleft lip deformity
Published 2025-01-01“…We have built a deep learning-based cleft lip generator called CleftGAN designed to produce an almost unlimited number of high-fidelity facsimiles of cleft lip facial images with wide variation. …”
Get full text
Article -
43100
MSCD-YOLO: A Lightweight Dense Pedestrian Detection Model with Finer-Grained Feature Information Interaction
Published 2025-01-01“…In our model, the light-weight backbone network MobileViT is used to reduce the number of parameters while efficiently extracting both local and global features; the SCNeck neck network is designed to fuse the extracted features without losing information; and the DEHead detection head is utilized for multi-scale feature fusion to detect the targets. …”
Get full text
Article