-
2601
Urine tenofovir adherence testing: Perspectives of recently diagnosed South African adolescents and young adults with HIV accessing care via mobile HIV clinics.
Published 2025-01-01“…Transcripts were analyzed using Dedoose, with an iterative thematic approach.<h4>Results</h4>Transcripts from 8 IDI participants and 8 FGD participants were included in the analysis. …”
Get full text
Article -
2602
A Clone Selection Based Real-Valued Negative Selection Algorithm
Published 2018-01-01“…Afterwards, the algorithm changes the limited range to continue the iteration until the non-self space coverage rate meets expectations. …”
Get full text
Article -
2603
Interviews with multimedia comics creators—how Hannah Berry, Lance Dann and Tom McNally use audio drama to move their work into new areas of storytelling
Published 2024-11-01“…McNally’s comics anthology was accompanied originally by songs available to download on an accompanying website, including the first iteration of his audio drama. This interview took place 30th October 2017, at Cartoon County, a monthly discussion group where a comic creator talks about their work in front of an audience of their peers in Brighton and Hove, East Sussex.In the second interview, former Comics Laureate Hannah Berry and audio producer Lance Dann discuss their work together on The Rez, a multimedia storytelling project which exists as a podcast, an app, a website and a comic. …”
Get full text
Article -
2604
Two-Echelon Location-Routing Problem with Time Windows and Transportation Resource Sharing
Published 2021-01-01“…A self-adaptive mechanism of flight parameters is introduced and adopted during the iterative process to balance the evolution of particles and improve the efficiency of the two-stage hybrid algorithm. …”
Get full text
Article -
2605
Assessment Model for Interregional Electricity Price Difference and Cross-Regional Electricity Trading Volume Considering Carbon Cost
Published 2024-12-01“…In assessing interval price differences, the model updates the intra-region power generation structure based on unit revenue rates, and contrasts the price differences before and after these structural iterations. Taking the cross-regional electricity trading between two interconnected areas as an example, the results of the computational simulations demonstrate that the proposed model effectively evaluates the dynamic price differences between regions and cross-regional electricity trading volumes. …”
Get full text
Article -
2606
A bird's eye view of the mental health systems in India
Published 2023-12-01“…However, this process necessitates periodic iterations to serve as critical indicators guiding the national mental health agenda, including policies, programs, and their impact evaluation.…”
Get full text
Article -
2607
Fast Flexible Direct Power Flow for Unbalanced and Balanced Distribution Systems
Published 2022-01-01“…The usage of a single matrix in the power flow solution and advanced direct techniques decreases the number of iterations and CPU execution time when MATLAB programming is executed. …”
Get full text
Article -
2608
Spherical sustainability in construction and demolition: How aligned are policies, goals, regulations, markets, and stakeholder mindsets?
Published 2025-03-01“…It was achieved through an iterative process that integrates the Parsimonious Spherical Fuzzy Analytical Hierarchy Process (P-SF-AHP), Circular Life Cycle Sustainability Assessment (C-LCSA), and pre- and post-statistical analyses. …”
Get full text
Article -
2609
Ice volume and thickness of all Scandinavian glaciers and ice caps
Published 2024-01-01“…Starting from surface observations, we invert for ice thickness by iteratively running an innovative ice dynamics model on a distributed grid and updating bed topography until modelled and observed glacier dynamics as represented by their rate of surface elevation change (dh/dt) fields align. …”
Get full text
Article -
2610
Geoelectric Evaluation of Groundwater Potential: A Case Study of Sabongida-Ora and Environs, Southern Nigeria
Published 2013-05-01“…The data was interpreted using conventional partial curve matching and computer aided iteration techniques. Seven hybrid curve types were deduced viz: KHAHQH, KHKHA, KHAKQQ, QQHKH, HKHAA, QHKHA, and KQHKQ. …”
Get full text
Article -
2611
Binary program taint analysis optimization method based on function summary
Published 2023-04-01“…Taint analysis is a popular software analysis method, which has been widely used in the field of information security.Most of the existing binary program dynamic taint analysis frameworks use instruction-level instrumentation analysis methods, which usually generate huge performance overhead and reduce the program execution efficiency by several times or even dozens of times.This limits taint analysis technology’s wide usage in complex malicious samples and commercial software analysis.An optimization method of taint analysis based on function summary was proposed, to improve the efficiency of taint analysis, reduce the performance loss caused by instruction-level instrumentation analysis, and make taint analysis to be more widely used in software analysis.The taint analysis method based on function summary used function taint propagation rules instead of instruction taint propagation rules to reduce the number of data stream propagation analysis and effectively improve the efficiency of taint analysis.For function summary, the definition of function summary was proposed.And the summary generation algorithms of different function structures were studied.Inside the function, a path-sensitive analysis method was designed for acyclic structures.For cyclic structures, a finite iteration method was designed.Moreover, the two analysis methods were combined to solve the function summary generation of mixed structure functions.Based on this research, a general taint analysis framework called FSTaint was designed and implemented, consisting of a function summary generation module, a data flow recording module, and a taint analysis module.The efficiency of FSTaint was evaluated in the analysis of real APT malicious samples, where the taint analysis efficiency of FSTaint was found to be 7.75 times that of libdft, and the analysis efficiency was higher.In terms of accuracy, FSTaint has more accurate and complete propagation rules than libdft.…”
Get full text
Article -
2612
New hash function based on C-MD structure and chaotic neural network
Published 2023-06-01“…In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile, SHA-3 has a complex internal structure and low implementation efficiency.To address these issues, a keyed hash function was designed and implemented based on chaotic neural network and C-MD structure.The approach involved improving the Merkle-Damgard structure by proposing the chaotic neural network Merkle-Damgard (C-MD) structure.This structure can be used to design a hash function that can withstand attacks such as the middle attack, multiple collision attack, and second pre-image attack for long information.Besides, the chaotic neural network was used as the compression function to increase the complexity of the hash function and improve its collision resistance, while also enabling it to output multiple lengths.Moreover, a plaintext preprocessor was designed, which used the coupled image lattice to generate chaos sequence related to the length of the plaintext to fill the plaintext, thus enhancing the ability of the hash function to resist length expansion attacks.Simulation results demonstrate that the proposed hash function performs faster than SHA-2, SHA-3 and the same type of chaotic hash function proposed by Teh et al.It can resist second pre-image attack, multi-collision attack and differential attack, while also exhibiting better collision resistance and mapping uniformity.In addition, the proposed Hash function can output Hash values of different lengths, making it suitable for use in digital signature, key generation, Hash-based message authentication code, deterministic random bit generator, and other application fields.…”
Get full text
Article -
2613
Rehabilitation Guidelines for Use Following a Periacetabular Osteotomy (PAO): A North American Based Delphi Consensus
Published 2022-10-01“…Panelists were presented with 11 questions pertaining to rehabilitation guidelines following a PAO. Three iterative survey rounds were presented to the panelists based on responses to these questions. …”
Get full text
Article -
2614
Quantification of external disturbance forces in sliding microwire
Published 2025-01-01“…The effect of the nonlinearity of surface forces is counted by iterating the initial difference of forces for which the numerically predicted contact force matches the experimental one. …”
Get full text
Article -
2615
A Study of an IT-Assisted Higher Education Model Based on Distributed Hardware-Assisted Tracking Intervention
Published 2022-01-01“…The proposed novel policy iterative algorithm is used to learn the optimal control protocol and achieve optimal consistency control. …”
Get full text
Article -
2616
TDOA-based WSN localization with hybrid covariance matrix adaptive evolutionary strategy and gradient descent distance techniques
Published 2025-01-01“…The hybrid approach utilizes the robust search capabilities of CMA-ES for initial location estimation, thereafter employing GDD to iteratively decrease the mean squared error (MSE) between estimated and real node locations. …”
Get full text
Article -
2617
Development of an overarching framework for anticipating and assessing adverse and other unintended consequences of public health interventions (CONSEQUENT): a best-fit framework s...
Published 2024-05-01“…We, therefore, used a multipronged, evidence-based approach to develop a framework to support researchers and decision-makers in anticipating and assessing AUCs of PH interventions.Methods We employed the ‘best-fit’ synthesis approach, starting with an a priori framework and iteratively revising this based on systematically identified evidence. …”
Get full text
Article -
2618
Guidelines for Patient-Centered Documentation in the Era of Open Notes: Qualitative Study
Published 2025-01-01“…To generate themes, we used an iterative coding process. First-order codes were grouped into second-order themes based on the commonality of meanings. …”
Get full text
Article -
2619
Stability Analysis of Batch Offline Action-Dependent Heuristic Dynamic Programming Using Deep Neural Networks
Published 2025-01-01“…In this paper, the theoretical stability of batch offline action-dependent heuristic dynamic programming (BOADHDP) is analyzed for deep neural network (NN) approximators for both the action value function and controller which are iteratively improved using collected experiences from the environment. …”
Get full text
Article -
2620
Reliable Disparity Estimation Using Multiocular Vision with Adjustable Baseline
Published 2024-12-01“…Afterwards, the disparity map for the subsequent images with an extended baseline is estimated within a short optimized interval, minimizing the probability of matching errors and further error propagation. This process is iterated until the disparity map for the images with the longest baseline is obtained. …”
Get full text
Article