Suggested Topics within your search.
Suggested Topics within your search.
- methods 24
- Moral and ethical aspects 13
- Research 12
- Management 11
- Study and teaching 11
- English language 9
- Social service 9
- Leadership 7
- Methodology 7
- Economic development 6
- Education 6
- Mass media 6
- Nursing 6
- Practice 6
- History 5
- Law 5
- Machine-shop practice 5
- Social sciences 5
- nursing 5
- Abdomen 4
- Anatomy 4
- Business communication 4
- Chest 4
- Community development 4
- Design 4
- Dissection 4
- English 4
- Extremities (Anatomy) 4
- Human anatomy 4
- Information technology 4
-
34081
Analysis of Production Function in Layer Chicken Business in Soppeng District
Published 2025-01-01“…The study showed tshat the use of inputs of seedlings, labor, cage area, farmer experience, Newcastle Disease (ND) vaccine, concentrate feed, and ground corn feed had a significant effect on egg production of laying hens in Soppeng Regency, while the variable Avian Influenza (AI) vaccine and, bran feed did not have a significant effect on egg production of laying hens in Soppeng Regency. So the practical implication of this research is that layer breeders in Soppeng Regency can increase egg production by focusing on the use of quality seeds, efficient labor, optimal utilization of cage area, increasing the experience and knowledge of farmers, as well as, the use of Newcastle Disease (ND) vaccine, concentrate feed and ground corn feed, while the use of Avian Influenza (AI) vaccine and bran feed should be re-evaluated because it does not have a significant impact on production. …”
Get full text
Article -
34082
Schoolscaping in a Multilingual Area: An Example of a Hungarian College in Western Ukraine
Published 2024-12-01“…The research can be further expanded with the help of the aforementioned qualitative approach of schoolscaping in other Transcarpathian Hungarian educational institutions to get a deeper insight into the applied multilingual practices in a war-torn country.…”
Get full text
Article -
34083
Hybrid quantum neural networks show strongly reduced need for free parameters in entity matching
Published 2025-02-01“…Furthermore, we also show that a model trained on a quantum simulator is portable and thus transferable to a real quantum computer. From a practical perspective and as long as quantum hardware is a scarce resource, experiments, e.g. addressing performance, can profit from producing good initial configurations for quantum neural networks via a simulator, thus only leaving the fine-tuning to quantum computations.…”
Get full text
Article -
34084
-
34085
Modern State and civil society: promising directions and forms of interaction in the field of public administration
Published 2023-10-01“…The promising directions of interaction between the modern State and civil society, which are divided into separate forms, include interaction of the State with members of diasporas through various institutions and practices, interaction of the State with civil society institutions formed by higher education students, interaction of the State with civil society in the field of environmental security of the State.…”
Get full text
Article -
34086
Moving beyond pain: the relationship between physical activity and physical self-concept among young women with endometriosis
Published 2025-01-01“…Women were also asked to answer to questions about their PA habits. The type of PA practiced was then assigned to 1 of the 3 following groups: relaxing activities (n = 14), activities without necessary interactions with other participants (n = 58), and activities including necessary interactions with other participants (n = 46).ResultsWomen under 30 years old participating in a regular PA (more than once a week) (n = 137) had a significantly higher physical self-concept than women not participating in a regular PA (n = 61) (p < 0.05). …”
Get full text
Article -
34087
The European Union Cybersecurity Policy: Operationalization of the Resilience Concept
Published 2020-11-01“…Using a discourse analysis approach the authors examine the genesis of the resilience discourse and the logic of its development in the EU cybersecurity policy, reveal nuances of how this category is interpreted in official documents as well as point out difficulties regarding practical application of this category.The authors trace a gradual evolution of the EU approach towards cybersecurity from the well-established definitions of cyberspace to the ecosystem terms and concepts, which are particularly relevant to the resilience-based concept of cybersecurity. …”
Get full text
Article -
34088
Re-Structuring Evaluation Findings into Useful Knowledge
Published 2017-09-01“… Background: A long research stream has shown that when knowledge is more structured it is more likely to be effective in practical application. Building on that research, the authors applied Integrative Proposition Analysis to visualize, integrate, and assess the quality and usefulness of knowledge gained from the NMAC (formerly National Minority AIDS Council) Strong Communities evaluation. …”
Get full text
Article -
34089
An Investigation Towards Resampling Techniques and Classification Algorithms on CM1 NASA PROMISE Dataset for Software Defect Prediction
Published 2024-10-01“…Software defect prediction is a practical approach to improving the quality and efficiency of software testing processes. …”
Get full text
Article -
34090
TRANSFORMATION OF THE GENDER DICHOTOMY OF SPIRIT AND BODY IN POSTMODERN PHILOSOPHY AND CULTURE
Published 2018-12-01“…Originality of this research lies in the expose of the specific transformation features of the dichotomy "spirit-body" as a philosophic opposition closely connected with postmodernism and realized in the practices of mass culture. This research is reflectedof the idea of the absoluteness and invariabilityof this duality as thebasicdichotomy of the classical philosophy in its correlation with cultural logic of the postmodernity at the end of the 20 – the beginning of the 21st centuries. …”
Get full text
Article -
34091
Java deserialization gadget chain discovery method based on hybrid analysis
Published 2022-04-01“…Java deserialization vulnerabilities have become a common threat to Java application security nowadays.Finding out the gadget chain determines whether this type of vulnerability can be exploited.Due to the large code space of Java applications and dependent libraries and the polymorphism of Java itself, manual analysis of Java deserialization gadget chains consumes a lot of time and effort and it is highly dependent on the experienced knowledge.Therefore, it is crucial to study how to efficiently and accurately automate the discovery of gadget chains.Java deserialization gadget chain discovery method based on hybrid analysis was proposed.Call graph based on the variable declaration type was constructed, and then the deserialization entry functions that may reach the dangerous functions were screened using the call graph analysis.The screened entry functions were used as the entry point of the hybrid information flow analysis.The hybrid information flow analysis was carried out for both pointer and tainted variables.The tainted objects created implicitly were marked.The tainted information and the pointer information were propagated simultaneously to construct the hybrid information flow graph.The reachability of external taint data propagation to the dangerous function was judged based on the hybrid information flow graph.The corresponding deserialization gadget chain was constructed according to the taint propagation path.The hybrid analysis took into account the efficiency of call graph analysis and the accuracy of hybrid information flow analysis.The corresponding static analysis tool, namely GadgetSearch, was implemented based on the proposed hybrid analysis method.In the experimental evaluation, GadgetSearch had lower false positive and lower false negative than the existing tool GadgetInspector on four datasets of Ysoserial, Marshalsec, Jackson historical CVE, and XStream historical CVE.Additionally, GadgetSearch also found multiple undisclosed gadget chains.The experimental results show that the proposed method can efficiently and accurately discover the Java deserialization gadget chain in multiple practical Java applications.…”
Get full text
Article -
34092
SENTENCE STRUCTURE AND PUNCTUATION IN ADVERTISEMENT SLOGANS
Published 2021-12-01“…The analysis of theoretical references gives a review of sentence structures and punctuation marks in advertisement slogans. The practical linguistic analysis was performed, 100 advertisement slogans were gathered on the internet from several different sources. …”
Get full text
Article -
34093
Influenza forecasting in human populations: a scoping review.
Published 2014-01-01“…This review suggests need for use of good practices in influenza forecasting (e.g., sensitivity analysis); direct comparisons of diverse approaches; assessment of model calibration; integration of subjective expert input; operational research in pilot, real-world applications; and improved mutual understanding among modelers and public health officials.…”
Get full text
Article -
34094
Blockchain-based cross-data center anonymous and verifiable identity authentication scheme
Published 2024-04-01“…The blockchain technology has emerged as a potential solution, offering exceptional characteristics such as a distributed nature, tamper-proof properties, traceability, and the ability to achieve multi-party consensus. In practical application scenarios, it is essential to not only protect the privacy of user identities but also to effectively regulate anonymous identities. …”
Get full text
Article -
34095
The Problem of Methodological Fixation of Analytical Jurisprudence
Published 2024-10-01“…Based on this, it is concluded that initially in analytical jurisprudence it was not strict conceptual analysis that prevailed, but conceptual logic, which made it possible to develop legal teaching in a practical way and only later gave rise to linguistic studies of law. …”
Get full text
Article -
34096
DynamicVLN: Incorporating Dynamics into Vision-and-Language Navigation Scenarios
Published 2025-01-01“…Our approach establishes a benchmark for developing agents capable of functioning in real-world, dynamic environments and extending beyond the limitations of static VLN tasks to more practical and versatile applications.…”
Get full text
Article -
34097
Socio-Adaptive Dimension of Students’ Personal Space
Published 2019-05-01“….; however, only a few pieces of research practically view the modal content of students' spatial organization within the limits of their social and adaptive security. …”
Article -
34098
SELECTION OF EQUIPMENTFOR PROCESSING ANCIENT GRAINS
Published 2024-12-01“…Its variations in terms of practical application were indicated. A peeler design with an improved scheme for installing a sieve basket was developed. …”
Get full text
Article -
34099
On understanding of proof in English and American law
Published 2018-11-01“…And even those of these subordinate concepts, which correspond to criminal cases and include the strongest requirements, do not require truth or absolute certainty of the conclusion, agreeing only on absence of reasonable doubt that by nature is subjective and practically never avoid some dependence on rhetorical influence. …”
Get full text
Article -
34100
MODERN TECHNOLOGIES OF WINE PRODUCTION IN THE CONTEXT OF GLOBAL WARMING AND ORGANIC APPROACH IN VINEYARD
Published 2024-05-01“…The article is of practical importance for Ukrainian winemaking, as global warming can provide the country with additional regions and terroirs. …”
Get full text
Article