Suggested Topics within your search.
Suggested Topics within your search.
- Research 58
- Methodology 29
- Social sciences 10
- Study and teaching 10
- Mass media 8
- Education 7
- English language 7
- Evaluation research (Social action programs) 7
- Moral and ethical aspects 7
- Psychological aspects 7
- Psychology 7
- Report writing 7
- methods 7
- research 7
- Dissertations, Academic 6
- History 6
- Sociology 6
- Consumers 5
- Evaluation 5
- Management 5
- Research--Methodology 5
- Sex role 5
- Social conditions 5
- Academic writing 4
- Conversation analysis 4
- Information technology 4
- Qualitative research 4
- Rhetoric 4
- Social aspects 4
- Technological innovations 4
-
4321
Editions and Publications of Shams-e Tabriz’s Divan: A Critical Review of Research
Published 2018-04-01Get full text
Article -
4322
A decision‐making tool for navigating extracellular vesicle research and product development
Published 2024-12-01Subjects: Get full text
Article -
4323
Position Analysis and Research of Reachable Workspace of 3-CRS/SP Parallel Mechanism
Published 2017-01-01Get full text
Article -
4324
Perception of Female Managers in Port Enterprises: A Research in the South Marmara Ports
Published 2023-10-01“…Research results do not show any difference at the manager and officer levels. …”
Get full text
Article -
4325
Topic Analysis of the Literature Reveals the Research Structure: A Case Study in Periodontics
Published 2025-01-01“…Periodontics is a complex field characterized by a constantly growing body of research, which poses a challenge for researchers and stakeholders striving to stay abreast of the evolving literature. …”
Get full text
Article -
4326
Research on cloud-based traffic adaptive command and control method for mobile botnet
Published 2014-11-01Get full text
Article -
4327
Bibliometric Analysis of Global Pediatric Research on Cow‘s Milk Protein Allergy
Published 2025-01-01“…Current research emphasizes personalized therapy, probiotics, and gut microbiota in CMPA.Conclusion: Future research will focus on microbiota-related personalized treatments, promising effective clinical interventions.Keywords: Pediatric, Cow’s milk protein allergy, Bibliometric analysis, Gut microbiota…”
Get full text
Article -
4328
RESEARCH ON ELASTIC-RING ISOLATOR’S DAMPING BASED ON PIEZOELECTRIC SHUNT DAMPING TECHNIQUE
Published 2015-01-01Get full text
Article -
4329
Research on location privacy protection of mobile terminals for maritime monitoring sensor networks
Published 2021-12-01Get full text
Article -
4330
Research on adaptive control of self-moving temporary support based on fuzzy PID
Published 2024-12-01“…During leveling, data from adjacent support hydraulic cylinders were selected for research and analysis. Results indicated that the synchronization error between adjacent hydraulic cylinders was generally controlled within ±5×10−15 m, showing significant precise improvement over traditional PID control method. …”
Get full text
Article -
4331
Research and Field Trial of Uplink Coordinated Multipoint Processing in TD-LTE Network
Published 2013-05-01Get full text
Article -
4332
Experimental and numerical research on jet dynamics of cavitation bubble near dual particles
Published 2025-01-01Get full text
Article -
4333
Global Trends in Conservation Agriculture and Climate Change Research: A Bibliometric Analysis
Published 2025-01-01“…Using data from the Scopus and Web of Science databases, the research encompassed 650 articles published between 1995 and 2022. …”
Get full text
Article -
4334
Research on Optimization of Large-Scale Heterogeneous Combat Network Based on Graph Embedding
Published 2025-01-01“…Currently, large-scale research on HCN suffers from significant time costs and poor convergence results. …”
Get full text
Article -
4335
Research on the Carbon Reduction Potential of the Life Cycle of Building Roofs Retrofit Designs
Published 2025-01-01“…The study can as a guide for implementing carbon reduction measures in tropical island areas. Domestic research on rooftop greenhouses also focuses on technology, yield, and energy consumption, mostly for northern regions with cold winters, and less research on rooftop greenhouses applied to regions with hot summers and warm winters. …”
Get full text
Article -
4336
Research on network risk assessment based on attack graph of expected benefits-rate
Published 2022-08-01“…As Internet applications and services become more and more extensive, the endless network attacks lead to great risks and challenges to the security of information systems.As a model-based network security risk analysis technology, attack graph is helpful to find the vulnerability between network nodes and the harm of being attacked.It has been proved to be an effective method to find and prevent network security risks.Attack graph is mainly divided into state-based attack graph and attribute-based attack graph.Due to the problem of state explosion in state-based attack graph, most researchers prefer the attribute-based attack graph for network risk assessment.In view of the existing researches on attribute-based attack graph, they excessively rely on the vulnerability of network nodes and the essential attributes of atomic attack.However, they ignore that rational attackers usually choose specific attack paths by maximizing attack benefits.Then, a network risk assessment framework and a quantification method of attack benefits-rate based on expected benefits-rate attack graph were proposed.The network risk assessment framework took the open vulnerability resource database, the new vulnerabilities found by the vulnerability mining system and the big data related to network attack and defense as the basic data source.The network risk assessment framework also took the open source big data platform as the analysis tool to mine and calculate the elements related to attack cost and attack benefit.Using the concepts of cost, benefit and benefit-rate in economics, the calculation model of expected benefit-rate of atomic attack was constructed.By constructing the attribute-based attack graph of the target network, the expected benefit-rate of atomic attack on the attack path was calculated, and the expected benefit-rate list of all possible attack paths was generated.Furthermore, taking the expected goal as the starting point, the search was carried out according to the specific optimization strategy (backtracking method, greedy algorithm, dynamic programming).And the complete attack path with the maximum benefit-rate was obtained, which provided the basis for network risk assessment.The simulation results show the effectiveness and rationality of the proposed expected benefit-rate attack graph network risk assessment method, which can provide support for discovering and preventing network security problems.…”
Get full text
Article -
4337
Research on the graphical convolution neural network based benefits recommendation system strategy
Published 2023-08-01Get full text
Article -
4338
Research on traffic identification and scheduling based on optical interconnection architecture in data center
Published 2018-09-01“…In order to solve the data center link congestion problem,based on the characteristics of the flow distribution and flow types,a flow identification and scheduling scheme based on optical interconnect structure,named HCFD (host-controller flow detection),was proposed to identify the elephant flow which has a large impact on the network performance,and use the SDN controller to make forward strategy,and schedule the network traffic reasonably.The implementation of the scheme was to use the Netfilter framework in Linux kernel protocol on the host side to mark the flow that exceeds the threshold amount.Then,the classification model was used in the controller side to classify the marked flow.Finally,the appropriate forwarding strategy was developed based on the above results.With the advantage of the photoelectric network,mechanisms of flow depth fusion and switching could be realized.The scheme which integrates the advantage of the existing research results,was expected to identify elephant flow more accurately and comprehensively.It can effectively alleviate the network congestion,make full use of network bandwidth,reduce end-to-end delay and packet loss rate.…”
Get full text
Article -
4339
Research on Protection and Development of Coastal Line and Shoal Resources in Pearl River Estuary
Published 2011-01-01Get full text
Article -
4340
Research on damage and degradation of coal-bearing sandstone under freeze-thaw cycles
Published 2025-01-01“…Additionally, the evolution equation of freeze-thaw damage factors was established with freezing temperature and number of freeze-thaw cycles as parameters, and the internal mechanism and physical characterization of freeze-thaw damage degradation of coal measure sandstone were revealed. This research provides a reference for the safety and stability evaluation and technology research and development of related rock engineering in cold areas.…”
Get full text
Article