Showing 27,381 - 27,400 results of 35,372 for search '"Maine"', query time: 0.15s Refine Results
  1. 27381

    Variability of mitochondrial DNA D-loop sequences in Zabaikalskaya horse breed by L. A. Khrabrova, N. V. Blohina, B. Z. Bazaron, T. N. Khamiruev

    Published 2021-09-01
    “…The sequenced fragment of the D-loop from nucleotide position 15471 to 16000 contained 17 polymorphic sites, mainly represented by the A→G, G→A and T→C transitions. …”
    Get full text
    Article
  2. 27382

    POLICY IMPLEMENTATION TO ACCELERATE STUNTING REDUCTION: A QUALITATIVE STUDY by Demsa Simbolon, Tonny Cortis Maigoda, Meriwati, Solha Efrida, Yunita, Heny Widiastuti

    Published 2024-12-01
    “…Village government support and good social conditions are supporting factors, while lack of communication between the village government and the community and minimal budget support are the main obstacles.   Conclusion: Communication issues, resource limitations, bureaucratic complexity, and inadequate supervision are the inhibiting factors. …”
    Get full text
    Article
  3. 27383

    Problem of Description of the Characteristic Features of Discrimination in the Labor Sphere by A. V. Kychko

    Published 2020-12-01
    “…However, discrimination is still one of the main problems in the labor sphere. The article is focused on studying the problem of discrimination in the labor sphere. …”
    Get full text
    Article
  4. 27384

    Preparation and Application of Mesoporous Nanotitania Photocatalysts Using Different Templates and pH Media by S. M. Abdel-Azim, A. K. Aboul-Gheit, S. M. Ahmed, D. S. El-Desouki, M. S. A. Abdel-Mottaleb

    Published 2014-01-01
    “…Nevertheless, at the low pH (acidic) range, the CTAB templated catalyst gave the highest surface area (86.7 cm3/g), which is mainly assigned to acquiring the highest photocatalytic degradation of naphthalene (97% after 4 h irradiation time).…”
    Get full text
    Article
  5. 27385

    Research on evolution and security risk of Metaverse by Hailong WANG, Yangchun LI, Yuxiao LI

    Published 2022-04-01
    “…Recently, the Metaverse boom has swept the world.To improve the voice in the future digital field, major countries and well-known enterprises have accelerated arrangement of this emerging industry.However, there is no unified definition and ultimate form description of Metaverse.It is urgent to understand the essential characteristics, evolution trend and security risks of Metaverse scientifically, which can promote the high-quality development of China’s electronic information industry and ensure the cyberspace security.With literature research and related information analysis, the definition of Metaverse was put forward based on the core concepts such as technology and application iteration, economic and business model and the role of social relations.Additionally, the development and evolution of Metaverse were divided into four stages (data creation, digital bionics, virtual mirror and virtual-real symbiosis) according to the evolution degree of space category, space-time dimension, key technology and virtual real interaction.And the characteristics and corresponding forms of each stage were expounded.Then it analyzed the main reasons for the popularity of the Metaverse from the perspectives of innovative application demand, virtual life transformation, commercial value driving and political power driving.Focusing on the problems of challenging the national governance system, impacting the mainstream ideology, manipulating the capital market, causing potential social problems and misleading the layout of technology industry, it analyzed the multiple security risks and threats brought by the Metaverse wave from perspectives including politics, culture, economy, society and technology.It is suggested that the Metaverse is still in the stage of concept improvement and product exploration now.China should rationally grasp the development opportunities of the Metaverse based on the current situation of the electronic information industry, prepare for risks in advance, build a digital governance supervision system, stimulate industrial innovation and open development, consolidate the support of network information security, and create a healthy and orderly international environment.…”
    Get full text
    Article
  6. 27386

    Association between Kihon check list score and geriatric depression among older adults from ORANGE registry. by Yu Kume, Seongryu Bae, Sangyoon Lee, Hyuma Makizako, Yuriko Matsuzaki-Kihara, Ichiro Miyano, Hunkyung Kim, Hiroyuki Shimada, Hidetaka Ota

    Published 2021-01-01
    “…In this nationwide study, we mainly focused on the Kihon checklist (KCL) as certificated necessity of long-term care for Japanese older adults and investigated whether the KCL score was associated with geriatric depression. …”
    Get full text
    Article
  7. 27387

    Defense mechanism of SDN application layer against DDoS attack based on API call management by Yang WANG, Guangming TANG, Shuo WANG, Jiang CHU

    Published 2022-04-01
    “…Due to thelack of strict access control, identity authentication and abnormal call detection, attackers may develop malicious applications easily and then it leads to theabuse of the northbound interface API (application programming interface) accordingly.There are mainly two patterns of DDoS (distributed denial-of-service) attacks against application layer.1) malicious App bypass the security review of the northbound interface and make a large number of calls to some API in a short time, thus causing the controller to crash and paralyzing the whole network; 2) attackers take a legitimate SDN (software defined network) application as the target and make a large number of short-time calls to the specific API needed by the application, which makes the legitimate App unable to call the API normally.Compared with the first pattern, the second one is more subtle.Therefore, it’s necessary to distinguish whether the App is malicious or not, effectively clean the App running on the attacked controller, and redistribute the controller to the legitimate App.Based on the in-depth analysis of the development trend of the current northbound interface, the possible DDoS attack patterns were simulated and practiced.Then a DDoS defense mechanism for SDN application layer was proposed.This mechanism added an App management layer between SDN application layer and control layer.Through reputation management, initial review, mapping allocation, anomaly detection and identification migration of the App, the malicious App attack on SDN can be predicted and resisted.The proposal focused on pre-examination of malicious App before attacks occur, so as to avoid attacks.If the attack has already happened, the operation of cleaning and separating the legitimate App from the malicious App is triggered.Theoretical and experimental results show that the proposed mechanism can effectively avoid DDoS attacks in SDN application layer, and the algorithm runs efficiently.…”
    Get full text
    Article
  8. 27388

    Multimodal sentiment analysis based on multi-layer feature fusion and multi-task learning by Yujian Cai, Xingguang Li, Yingyu Zhang, Jinsong Li, Fazheng Zhu, Lin Rao

    Published 2025-01-01
    “…Abstract Multimodal sentiment analysis (MSA) aims to use a variety of sensors to obtain and process information to predict the intensity and polarity of human emotions. The main challenges faced by current multi-modal sentiment analysis include: how the model extracts emotional information in a single modality and realizes the complementary transmission of multimodal information; how to output relatively stable predictions even when the sentiment embodied in a single modality is inconsistent with the multi-modal label; how can the model ensure high accuracy when a single modal information is incomplete or the feature extraction performance not good. …”
    Get full text
    Article
  9. 27389

    Legal status of public control entities over the activities of the National Police in Ukraine by V. A. Doroshenko

    Published 2023-10-01
    “…In the process of public control, the implementation of social tasks directly related to the protection and realisation of the rights and freedoms of citizens, as well as satisfaction and harmonisation of social needs and interests of the population is monitored. The main forms and subjects of public control are defined. …”
    Get full text
    Article
  10. 27390

    Unlocking genetic diversity for low-input systems in a changing climate through participatory characterization and GWAS of lentil landraces by Elisa Lorenzetti, Mercy Wairimu Macharia, Svenja Mager, Matteo Dell’Acqua, Stefano Carlesi, Paolo Bàrberi

    Published 2024-12-01
    “…Abstract Lentils are a vital staple crop in a world seeking sustainable and secure food, but their cultivation face a threat due to yield instability, mainly arising from a lack of genetic diversity in breeding programmes. …”
    Get full text
    Article
  11. 27391

    Blasting Vibration Generated by Breaking-Blasting Large Barriers with EBBLB by Wang Zhen-xiong, Gu Wen-bin, Liang Ting, Liu Jian-qing, Xu Jing-lin, Liu Xin

    Published 2016-01-01
    “…By monitoring vibration at measuring points at different distances from blasting center, time history curve of vibrating velocity can be obtained; it can be drawn that blasting seismic waves are generated mainly from the explosion of the precharge. Furthermore, different approaches have been adopted to fit relationship between particle peak velocity (PPV) and distance from blasting center, comparative analysis of which provides the most appropriate relation expression to predict attenuation of PPV of vibration with distance from blasting center. …”
    Get full text
    Article
  12. 27392

    Concurrent Validation and Reference Values of Gluteus Medius Clinical Test by Amanda S S Teixeira, Paula L Silva, Sabrina P Cintra, Fernanda Viegas, Luciana D Mendonça, Natália F N Bittencourt

    Published 2021-04-01
    “…# Context The hip abductor muscles, mainly the gluteus medius, are responsible for controlling hip adduction in a closed kinetic chain. …”
    Get full text
    Article
  13. 27393

    A Review of Sulfate Removal from Water Using Polymeric Membranes by Jamal Al Mehrate, Sadek Shaban, Amr Henni

    Published 2025-01-01
    “…This review found that studies in the literature dealt mainly with sulfate concentrations below 2000 mg/L, indicating a need to address higher concentrations in future studies.…”
    Get full text
    Article
  14. 27394

    Predictive value of the angiogenic test (sFlt / PIGF ratio) in hypertensive disorders of pregnancy. Perinatal results in Cienfuegos by Vivian Rosa Vázquez Martínez, Cristóbal Jorge Torres González, Greter Torres Vázquez

    Published 2020-08-01
    “…<p><strong>Background</strong>: Preeclampsia is the main cause of morbidity, mortality, maternal and perinatal disability, making its diagnosis and prevention important.…”
    Get full text
    Article
  15. 27395

    Side Effects of Steroidal And Non-Steroidal Anti-Inflammatory Drugs on The Oral Cavity. by Shayma Ghazi, Khalid Yasin Rasul, Aras Khidhir Hamad, Aso Abdulkhaliq Khidhir, Lozan Khalil Ahmed

    Published 2024-03-01
    “… Background and objectives: The steroidal and Non-Steroidal Anti-Inflammatory drugs (NSAIDs) are widely used classes of medications for their anti-Inflammatory and analgesic effects and are associated with the risk of many oral side effects and which might be presented with variable degrees of severity. The main objective of this research was to identify oral side effects that could be associated with using Steroidal or NSAIDs. …”
    Get full text
    Article
  16. 27396

    Ecological monitoring of landscape technogenic neoplasms by Daria A. Dostovalova, Alexander Z. Glukhov, Nikolay S. Podgorodetsky, Sergey P. Zhukov

    Published 2024-12-01
    “…Rock dumps cause some damage to the environment due to the withdrawal of agricultural land from use, emissions of gorenje products, dust particles, flushing of pollutants, soil salinization, erosion of slopes. The main optimal measure to reduce the impact of rock dumps on the environment for Donbass is the biological reclamation of their surface. …”
    Get full text
    Article
  17. 27397

    The Prospects for Wind Energy Development in the Republic of Belarus by Y. S. Petrusha, N. A. Papkova

    Published 2019-04-01
    “…The use of wind turbines to create wind energy is one of the main alternatives to the traditional technologies of power generation. …”
    Get full text
    Article
  18. 27398

    Deep learning models for detection of explosive ordnance using autonomous robotic systems: trade-off between accuracy and real-time processing speed by Vadym Mishchuk, Herman Fesenko, Vyacheslav Kharchenko

    Published 2024-11-01
    “…The following results were obtained. 1) The results of a comparative analysis of YOLOv8 and RT-DETR models for EO detection in the context of speed-accuracy trade-offs. 2) Recommendations for EO detection model configurations aimed at improving the efficiency of autonomous demining robotic systems, including optimal camera parameter selection. 3) Methods for improving EO detection model performance to increase its accuracy in complex environments, including synthetic data generation and confidence threshold tuning. Conclusions. The main contribution of this study is the results of a detailed evaluation of the YOLOv8 and RT-DETR models for real-time EO detection, helping to find trade-offs between the speed and accuracy of each model and emphasizing the need for special datasets and algorithm optimization to improve the reliability of EO detection in autonomous systems.…”
    Get full text
    Article
  19. 27399

    Footprints of the Future: Cleaner and Faster Transportation with Shared E-Scooter Operational Models by Ömer Kaya

    Published 2025-01-01
    “…To this end, a four-step scientific and strategic solution approach is developed: (i) the identification and detailed explanation of 5 main and 24 sub-criteria, (ii) the weighting of criteria through the Analytical Hierarchical Process (AHP), Multi-Influencing Factor (MIF), and Best–Worst Method (BWM) in order to increase the sensitivity and robustness of the study, (iii) obtaining a suitability map for the solution of implementation, site selection, and service areas problems of operational models, and (iv) assigning shared e-scooter stations and analyzing their performance levels with COmplex PRoportional ASsessment (COPRAS). …”
    Get full text
    Article
  20. 27400

    What Can Urban Gardening Really Do About Gentrification? A Case-Study of Three San Francisco Community Gardens by Guillaume Marche

    Published 2015-12-01
    “…Traditionally working-class, ethnic- and racial-minority areas are thus regarded nowadays as a new frontier of middle- to upper-middle-class, mainly white residential expansion. Organized and informal garden projects are interventions in public spaces that improve the quality of residents’ lives and hence raise the question whether they heighten the gentrifying transformation of such neighborhoods, or whether they may support inhabitants’ resistance to being pushed out. …”
    Get full text
    Article