Suggested Topics within your search.
Suggested Topics within your search.
- Economic conditions 31
- Economics 28
- Economic development 27
- Economic policy 24
- Economic aspects 19
- Politics and government 11
- Social conditions 10
- Management 8
- Social aspects 8
- Economic assistance 6
- History 6
- Medical economics 6
- Women 6
- Agriculture 5
- Economic history 5
- Globalization 5
- Political aspects 5
- economics 4
- Agriculture and state 3
- Colonial influence 3
- Commercial statistics 3
- Community development 3
- Economic development projects 3
- Finance 3
- Foreign economic relations 3
- Government policy 3
- Income distribution 3
- Information technology 3
- International economic relations 3
- Natural resources 3
-
24881
The relationship between health literacy and COVID-19 prevention behaviors among people living with HIV
Published 2025-02-01“…Multiple linear regression indicated that HL had a significant association with age (P = 0.002), education (P = 0.046), and economic status (p < 0.001) and explained 32% of the variance of HL. …”
Get full text
Article -
24882
Connotation and practice of the integration of academic field based on Bourdieu’s theory——taking the cultivation of cyberspace security talents as an example
Published 2023-08-01“…The deployment of network security has become a crucial strategy for the development of modern nations, with skilled professionals serving as the core driving force behind cybersecurity efforts.Cultivating cybersecurity talents and fostering team building are essential for China's talent reserves and strategic capital accumulation.With economic globalization, 0-day vulnerabilities have constantly emerged in information systems, attack chains have become increasingly complex, threat targets were difficult to detect, and hidden viruses varied over time.Talents trained by traditional universities for network security were unable to adapt to innovative production and practical activities in the new fields, as it was confined to their training structure system.In order to break through the shackles of the internal administrative structure and traditional curriculum system of universities, and ease the contradiction between the uncertainty of cyberspace security situation and the standardization of talent cultivation, the talent cultivation models based on Bourdieu's theory were studied, the fusion meaning of cultural capital in the academic field was analyzed and three practical standards were put forward in terms of teaching content, cultivation model and teaching opportunity of cyberspace security talents in combination with the actual cases of the “Fang class”.In terms of education content, standards and open knowledge systems were established to meet the differentiated needs of students.The mentorship approach was employed to construct habitus, fostering students’ ability to adapt flexibly to problems by adopting different cognitive thinking modes.Favorable teaching opportunities were utilized by tutors in various roles to promote efficient integration of individuals and fields, helping students establish a valuable and stable mindset.By leveraging Bourdieu's theory to explore the integration path of academic fields, it has leveraged the advantages of independently cultivating high-quality talents, vigorously promoting technological innovation and the healthy ecological development of the industry.…”
Get full text
Article -
24883
Detection of multidrug resistant Vibrio parahaemolyticus and anti-Vibrio Streptomyces sp. MUM 178J
Published 2023-10-01“…These foodborne pathogens can cause disease in marine animals, resulting in lowered production rates and substantial economic losses. V. parahaemolyticus is transmitted from these marine animals in aquaculture to humans via raw or undercooked seafood, resulting in gastroenteritis outbreaks. …”
Get full text
Article -
24884
Variability of morphometrical characteristics of needles at a clonal plantation of plus trees of scots pine (Pinus sylvestris L.)
Published 2017-04-01“…This problem is related to the risk of inbreeding depression of the seed progeny of plus trees, which do not have any defense mechanism against self-pollination. Economically, the Scots pine is one of the most important wood species. …”
Get full text
Article -
24885
The 2019 Social Protests in Latin America: Global Context and Ecuadorian Case-Study
Published 2020-11-01“…The author stresses that although socio-economic explanations of the global protest phenomenon that focus on such issues as the growth of inequality and social polarization, are correct, they are insufficient for a comprehensive understanding of the new and complex phenomenon. …”
Get full text
Article -
24886
Enhanced energy management in smart microgrids using hybrid optimization and demand response strategies
Published 2025-03-01Get full text
Article -
24887
Analysis of Iranian health workforce emigration based on a system dynamics approach: a study protocol
Published 2024-12-01“…Results It seems that the SD model developed in this study can highlight the interconnectedness of various factors that influence health worker emigration, including demographic changes, economic conditions, and characteristics of healthcare systems. …”
Get full text
Article -
24888
Cost-Benefit analysis for energy efficiency of existing hotel building
Published 2025-01-01“…Furthermore, from cost-benefit analysis resulted the economic internal rate of return (EIRR) 13,61%, payback period in 5,52 years. …”
Get full text
Article -
24889
Online medical privacy protection strategy under information value-added mechanism
Published 2022-12-01“…China’s economic level and people’s living standards have developed rapidly in recent years, and the medical level and medical technology have made breakthroughs continuously.With the promotion and deepening of“Internet Plus” to business model innovation in various fields, the development of “Internet Plus” medical has been rapidly developed.Due to the continuous development of data processing technologies such as machine learning and data mining, the risk of users’ personal medical data disclosure in the process of online medical treatment has also attracted the attention of researchers.Considering the deductibility of information, the discount mechanism was adopted to describe the change of user’s private information value in different stages of the game.Combined with the current research status in the field of online medical privacy protection motivation, how to mobilize the enthusiasm of both players from the level of privacy protection motivation was explored with game analysis.In view of the game characteristics of users’ strong willingness to continually use the online medical platform and intermittently provide privacy, the repeated game method was adopted to better describe the game process between users and the online medical platform.The tendency change law of the players on both sides of the game was obtained.Moreover, the Nash equilibrium of the game model was analyzed under different model parameters and the change trend of the game strategy of both sides with the progress of the game stage.When the parameters were met 2(c<sub>p</sub>-c<sub>n</sub>)≥l<sub>p</sub>(p<sub>n</sub>-p<sub>p</sub>), the user started to choose from “agree to share private data” to “refuse to share private data”.The above conclusion was verified by simulation experiments.Based on the above conclusions, from the perspective of online medical platform and users, policy suggestions on how to realize privacy protection from the level of privacy protection motivation in the process of online medical treatment were given.…”
Get full text
Article -
24890
Anti-Impact Performance Enhancement of Two-Way Spanning Slab through the Implementation of Steel Trussed Bars
Published 2024-01-01“…However, there is a noticeable gap in research concerning the strengthening of slabs through shear reinforcement, particularly through economical, easily fabricated, and efficient systems such as fabricated trussed bars. …”
Get full text
Article -
24891
Application Future-studie in development of urban tourism of structural analysis and scenario writing (Case study: khoy city)
Published 2023-09-01“…Here, urban tourism - as a significant parts of the tourism industry - has a special place in improving the economic and cultural development of cities and has turned into one of the most important, exchange yielding, and income creating industries. …”
Get full text
Article -
24892
Strategy of container migration and honeypot deployment based on signal game in cloud environment
Published 2022-06-01“…Multi-tenant coexistence and resource sharing in the SaaS cloud pose serious security risks.On the one hand, soft isolation of logical namespaces is easy to be bypassed or broken.On the other hand, it is easy to be subjected to co-resident attacks due to sharing of the host operating system and underlying physical resources.Therefore it poses a serious threat to data availability, integrity and confidentiality in the container cloud.Given the problem that SaaS cloud services are vulnerable to container escape and side-channel equivalent resident attack, network deception technology increases the uncertainty of the cloud environment and reduces the effectiveness of attack by hiding the business function and characteristic attributes of the executor.Aiming at the security threat caused by the co-resident attack, combining dynamic migration and virtual honeypot security technology, the economical and reasonable network deception method was studied.Specifically, a container migration and honeypot deployment strategy based on the signal game was proposed.According to the security threat analysis, container migration and honeypot were used as defense methods.The former improved the undetectability of the system based on the idea of moving to target defense, while the latter confused attackers by placing decoy containers or providing false services.Furthermore, since network reconnaissance was the pre-step of the network attack chain, the attack and defense process was modeled as a two-person signal game with incomplete information.The sender chose to release a signal according to his type, and the receiver could only obtain the signal released by the sender but could not determine the type.Then, a game tree was constructed for the complete but imperfect information dynamic game, and the costs and benefits of different strategy combinations were set.The optimal deception strategy was determined by equilibrium analysis of attack-defense model.Experimental results show that the proposed strategy can effectively improve system security.Besides, it can also reduce container migration frequency and defense cost.…”
Get full text
Article -
24893
The Semantics of the Absurd: On German ‘Hermetic’ Poetry and Political Commitment after 1945
Published 2023-08-01“…Was everything within it corrupt? While the frenetic economic activity of the ‘Wirtschaftswunder’ side-stepped a mainstream confrontation with the horrors of the recent past, intellectuals and artists radically interrogated the reasons for the disaster. …”
Get full text
Article -
24894
L’utilisation de pesticides fait-elle partie des stratégies d’adaptation au changement climatique ? Analyse exploratoire dans le Fossé rhénan (France-Allemagne)
Published 2021-12-01“…While the consequences of climate change are becoming more and more visible and it is not possible anymore to avoid them, pesticides use in agriculture is subject to a profound call into question due to environmental, economic and sanitary reasons. Agriculture is thus confronted with a double challenge: adapting to climate change and evolving towards less dependence on pesticides. …”
Get full text
Article -
24895
Estuarine dispersal of an invasive Holarctic predator (Esox lucius) confirmed in North America.
Published 2024-01-01“…This finding represents the first known documentation of estuary use and dispersal by Northern Pike in North America, exacerbating conservation concerns for already depressed populations of culturally and economically important species such as salmonids. To reconstruct the migratory pathway of individual Northern Pike captured at locations known to be recently invaded, we analyzed the strontium isotope composition (87Sr/86Sr) in otoliths. …”
Get full text
Article -
24896
Le bassin minier du Nord-Pas-De-Calais pris dans les rets de l’aménagisme généralisé
Published 2020-06-01“…As a state consulting architect, having worked on files related to the mining basin, I wish to bring my personal testimony and my own conviction here: the repair of the mining basin must be done by contributing to a wider repair at the territorial scale, in the same way that every improvement at the territorial scale contributes to those of the mining basin’s various geographical, economic, material and social entities.…”
Get full text
Article -
24897
VETOZIM MULTI - AN INNOVATIVE SOLUTION FOR THE POULTRY INDUSTRY
Published 2024-12-01“…The presence of thermostable enzymes in the composition of the Vetozym Multi preparation allows it to be used in the production of compound feeds with advanced heat treatment at a conditioning and granulation temperature of up to +90 °C, which will contribute to a more complete breakdown and assimilation of raw material components, in particular carbohydrates, proteins and fiber. Calculation of economic indicators shows that the drug Vetozym Multi not only provides balanced nutrition for poultry, but also allows you to reduce the cost of feed due to more efficient use of less expensive components.…”
Get full text
Article -
24898
Trends in diabetes mellitus and related costs among hospital admissions in Switzerland, 2012–2020
Published 2025-01-01“…Conclusion DM represents an increasing health and economic burden in Switzerland.…”
Get full text
Article -
24899
A P2P Electricity-Carbon Trading Mechanism for Distributed Prosumers Based on Carbon Emission Flow Model
Published 2024-12-01Get full text
Article -
24900