Showing 4,321 - 4,340 results of 124,197 for search '"Research"', query time: 0.19s Refine Results
  1. 4321
  2. 4322
  3. 4323
  4. 4324

    Perception of Female Managers in Port Enterprises: A Research in the South Marmara Ports by İlknur Tanrıverdi, Aslı Kavurmacı

    Published 2023-10-01
    “…Research results do not show any difference at the manager and officer levels. …”
    Get full text
    Article
  5. 4325

    Topic Analysis of the Literature Reveals the Research Structure: A Case Study in Periodontics by Carlo Galli, Maria Teresa Colangelo, Marco Meleti, Stefano Guizzardi, Elena Calciolari

    Published 2025-01-01
    “…Periodontics is a complex field characterized by a constantly growing body of research, which poses a challenge for researchers and stakeholders striving to stay abreast of the evolving literature. …”
    Get full text
    Article
  6. 4326
  7. 4327

    Bibliometric Analysis of Global Pediatric Research on Cow‘s Milk Protein Allergy by Lin X, Chen Y, Lin W

    Published 2025-01-01
    “…Current research emphasizes personalized therapy, probiotics, and gut microbiota in CMPA.Conclusion: Future research will focus on microbiota-related personalized treatments, promising effective clinical interventions.Keywords: Pediatric, Cow’s milk protein allergy, Bibliometric analysis, Gut microbiota…”
    Get full text
    Article
  8. 4328
  9. 4329
  10. 4330

    Research on adaptive control of self-moving temporary support based on fuzzy PID by MA Changqing, LI Feng, HUANG Yubo, MAO Junjie, LI Xuyang, WEI Xiangyu, MA Xiaoyang

    Published 2024-12-01
    “…During leveling, data from adjacent support hydraulic cylinders were selected for research and analysis. Results indicated that the synchronization error between adjacent hydraulic cylinders was generally controlled within ±5×10−15 m, showing significant precise improvement over traditional PID control method. …”
    Get full text
    Article
  11. 4331
  12. 4332
  13. 4333
  14. 4334

    Research on Optimization of Large-Scale Heterogeneous Combat Network Based on Graph Embedding by Xianzheng Meng, Changrong Xie, Hui Li, Guangjun Zeng, Kebin Chen

    Published 2025-01-01
    “…Currently, large-scale research on HCN suffers from significant time costs and poor convergence results. …”
    Get full text
    Article
  15. 4335

    Research on the Carbon Reduction Potential of the Life Cycle of Building Roofs Retrofit Designs by Dawei Mu, Wenjin Dai, Yixian Zhang, Yixu Shen, Zhi Luo, Shurui Fan

    Published 2025-01-01
    “…The study can as a guide for implementing carbon reduction measures in tropical island areas. Domestic research on rooftop greenhouses also focuses on technology, yield, and energy consumption, mostly for northern regions with cold winters, and less research on rooftop greenhouses applied to regions with hot summers and warm winters. …”
    Get full text
    Article
  16. 4336

    Research on network risk assessment based on attack graph of expected benefits-rate by Wenfu LIU, Jianmin PANG, Xin ZHOU, Nan LI, Feng YUE

    Published 2022-08-01
    “…As Internet applications and services become more and more extensive, the endless network attacks lead to great risks and challenges to the security of information systems.As a model-based network security risk analysis technology, attack graph is helpful to find the vulnerability between network nodes and the harm of being attacked.It has been proved to be an effective method to find and prevent network security risks.Attack graph is mainly divided into state-based attack graph and attribute-based attack graph.Due to the problem of state explosion in state-based attack graph, most researchers prefer the attribute-based attack graph for network risk assessment.In view of the existing researches on attribute-based attack graph, they excessively rely on the vulnerability of network nodes and the essential attributes of atomic attack.However, they ignore that rational attackers usually choose specific attack paths by maximizing attack benefits.Then, a network risk assessment framework and a quantification method of attack benefits-rate based on expected benefits-rate attack graph were proposed.The network risk assessment framework took the open vulnerability resource database, the new vulnerabilities found by the vulnerability mining system and the big data related to network attack and defense as the basic data source.The network risk assessment framework also took the open source big data platform as the analysis tool to mine and calculate the elements related to attack cost and attack benefit.Using the concepts of cost, benefit and benefit-rate in economics, the calculation model of expected benefit-rate of atomic attack was constructed.By constructing the attribute-based attack graph of the target network, the expected benefit-rate of atomic attack on the attack path was calculated, and the expected benefit-rate list of all possible attack paths was generated.Furthermore, taking the expected goal as the starting point, the search was carried out according to the specific optimization strategy (backtracking method, greedy algorithm, dynamic programming).And the complete attack path with the maximum benefit-rate was obtained, which provided the basis for network risk assessment.The simulation results show the effectiveness and rationality of the proposed expected benefit-rate attack graph network risk assessment method, which can provide support for discovering and preventing network security problems.…”
    Get full text
    Article
  17. 4337
  18. 4338

    Research on traffic identification and scheduling based on optical interconnection architecture in data center by Bingli GUO, Ning ZHAO, Zhiwen ZHU, Fan NING, Shanguo HUANG

    Published 2018-09-01
    “…In order to solve the data center link congestion problem,based on the characteristics of the flow distribution and flow types,a flow identification and scheduling scheme based on optical interconnect structure,named HCFD (host-controller flow detection),was proposed to identify the elephant flow which has a large impact on the network performance,and use the SDN controller to make forward strategy,and schedule the network traffic reasonably.The implementation of the scheme was to use the Netfilter framework in Linux kernel protocol on the host side to mark the flow that exceeds the threshold amount.Then,the classification model was used in the controller side to classify the marked flow.Finally,the appropriate forwarding strategy was developed based on the above results.With the advantage of the photoelectric network,mechanisms of flow depth fusion and switching could be realized.The scheme which integrates the advantage of the existing research results,was expected to identify elephant flow more accurately and comprehensively.It can effectively alleviate the network congestion,make full use of network bandwidth,reduce end-to-end delay and packet loss rate.…”
    Get full text
    Article
  19. 4339
  20. 4340

    Research on damage and degradation of coal-bearing sandstone under freeze-thaw cycles by Yiwen Mao, Ming Li, Peng Wu, Shuai Guo, Fuqiang Zhu

    Published 2025-01-01
    “…Additionally, the evolution equation of freeze-thaw damage factors was established with freezing temperature and number of freeze-thaw cycles as parameters, and the internal mechanism and physical characterization of freeze-thaw damage degradation of coal measure sandstone were revealed. This research provides a reference for the safety and stability evaluation and technology research and development of related rock engineering in cold areas.…”
    Get full text
    Article