Suggested Topics within your search.
Suggested Topics within your search.
- History 11
- Management 6
- Purchasing 5
- Social conditions 5
- Philosophy 4
- Politics and government 4
- Business logistics 3
- Civilization 3
- History and criticism 3
- Information technology 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Marketing 3
- Methodology 3
- Nutrition 3
- Social life and customs 3
- Sociolinguistics 3
- Tourism 3
- Colonial influence 2
- Common law 2
- Diet Therapy 2
- Diet therapy 2
- Economic conditions 2
- Health 2
- Industrial procurement 2
- Internet in public administration 2
- Interpretation and construction 2
- Juvenile literature 2
-
10621
ON THE MOLDOVAN ECONOMY’S POTENTIAL OUTPUT AND OUTPUT GAP: EVIDENCE FROM THE HODRICK-PRESCOTT FILTER
Published 2024-06-01“…We use this data set to generate a time series of the evolution of Moldova’s real GDP in average prices of 2010 over the period 2010-2026. …”
Get full text
Article -
10622
Multifocal electroretinogram evaluation of different optical coherence tomography patterns of diabetic macular edema
Published 2025-01-01“…P1 amplitude was highest in Type 1, and lowest in Type 4c compared with other DME types. P1 implicit time was significantly delayed in all types, and significantly delayed in Type 4c compared with Type 1. …”
Get full text
Article -
10623
Separation of Some Anionic Dyes Using Reverse Micelles of CTAB and SDS as Efficient Surfactants Adsorbents from Aqueous Medium
Published 2022-01-01“…Under various experimental conditions, extraction efficiency was studied, including solution pH, extraction time, initial dye concentration, extractant concentration, temperature, stripping agent, and solvent reusability. …”
Get full text
Article -
10624
Factors in the choice of volitional regulation strategies among university students
Published 2024-12-01“…It was shown that full-time and distance learning students differ significantly in five of the six strategies. …”
Get full text
Article -
10625
Research on Safety Management Application of Dangerous Sources in Engineering Construction Based on BIM Technology
Published 2019-01-01“…Therefore, the purpose of this paper is to create a construction hazard source safety management module through secondary development of the Revit platform. At the same time, the Navisworks software is used to simulate the emergency rescue of construction safety accidents and formulate the corresponding emergency management plan. …”
Get full text
Article -
10626
Simulation and Production Optimization on Enhanced Oil Recovery during the Middle and Late Period for SAGD Development in Ultraheavy Oil Reservoirs with Interlayers
Published 2022-01-01“…According to the reservoir’s geological parameters and production parameters, a typical well group geological model was created for the first time. The model divided the well groups in block Z into three categories according to the position of the interlayer, the production degree of the horizontal section, the oil recovery ratio, and the available degree of reserve control. …”
Get full text
Article -
10627
FWA-SVM Network Intrusion Identification Technology for Network Security
Published 2025-01-01“…The training and testing time are 26.12 seconds and 11.23 seconds, respectively. …”
Get full text
Article -
10628
Two-Layer Optimization Algorithm for Multi-UAV Conflict Resolution considering Individual Fairness
Published 2021-01-01“…The solution strategy based on the cooperative game “coalition complaint value” can improve individual fairness to a certain extent. At the same time, it can achieve the rapid planning goal with priority drones at the expense of a small amount of overall benefits.…”
Get full text
Article -
10629
Research on the Conversion Relationship between Dynamic Point Load Strength and Dynamic Compressive Strength Based on Energy System
Published 2022-01-01“…Because the test process does not need to process the sample into laboratory size type, so it is widely used. At the same time, with the rapid development of rock dynamics, the dynamic strength index of rock becomes more and more important under dynamic load. …”
Get full text
Article -
10630
Modeling Forced Flow Chemical Vapor Infiltration Fabrication of SiC-SiC Composites for Advanced Nuclear Reactors
Published 2013-01-01“…Critical process parameters, such as the temperature and reactant concentration, were simulated to identify infiltration conditions which maximize composite density while minimizing the fabrication time.…”
Get full text
Article -
10631
Exploration of Flood Prediction in Watersheds Based on the Fusion Analysis of Remote Sensing Big Data with Multiple Physical Fields
Published 2022-01-01“…The scope of the traditional monitoring and forecasting early warning system is mainly limited to the area affected by flash floods, while the objective reality of real-time monitoring, forecasting, and early warning of flood disasters in the area affected by river floods and by the scheduling of riverine terrace power stations is not possible. …”
Get full text
Article -
10632
Software diversity evaluation method based on the properties of ROP/JOP gadgets
Published 2022-12-01“…In order to reduce the risk of rapid spread of homogeneous attacks in network systems, and enhance network and software security, software diversification technologies are applied widely nowadays.Software diversification aims to generate functionally equivalent but internally changed program variants, thereby alter a single operating environment and mitigating homogenization attacks.The existing diversified technical evaluation index ROP gadgets survival rate is difficult to directly reflect the safety impact and the evaluation method is single.In order to evaluate the effectiveness of the diversification method more comprehensively and effectively, a software diversification evaluation method based on the properties of ROP/JOP gadgets is proposed, by analyzing common code reuse attacks, and turns abstract quantification into concrete indicators evaluates the security gain and effect of diversified methods from three aspects of space, time and quality.The method first discusses how diversification techniques affect ROP/JOP attacks according to the three properties of gadgets similarity, damage degree and availability.Nine kinds of diversification methods, such as instruction replacement, NOP insertion, and control flow flattening, are used to diversify the GNU coreutils assembly to generate diversification assembly.Experiments based on the property of gadgets are carried out on the diverse assemblies, and the effectiveness of different diversification methods and the impact on attacks are evaluated according to the experimental results.The experimental results show that this method can accurately evaluate the security gain of software diversification methods, the diversification technology will lead to the increase of the attack chain space required by the ROP/JOP attack, the longer time to construct the attack chain and the lower the attack success rate.The effects of different diversification methods are different, it has a guiding role for the follow-up research on diversified technologies with higher safety gains.…”
Get full text
Article -
10633
A linear hydraulic fracture with tortuosity and fluid–slip at the fluid–rock interface
Published 2025-03-01“…For a fixed scaled time t, decreasing r results in a less tortuous fracture with a shorter length and a more tortuous fracture that is longer in length.…”
Get full text
Article -
10634
Excited states of mono- and biruthenium(II) complexes adsorbed on nanocrystalline titanium dioxide studied by electroabsorption spectroscopy
Published 2025-02-01“…Due to the difficulties arising from standard analysis based on Liptay formalism, we have for the first time successfully reproduced the EA spectra of the Ru/TiO2 systems using the time-dependent density functional (TDDFT) calculations, incorporating into the Hamiltonian a term describing the interaction of a molecule with the local electric field it experiences from the TiO2 structure and the neighboring Ru complex molecules, without additional assumptions about the lineshape of the EA signal. …”
Get full text
Article -
10635
Arsenic Mobility in As-Containing Soils from Geogenic Origin: Fractionation and Leachability
Published 2018-01-01“…Arsenic mobilization increased at alkaline pH and lower S : L ratio; the most decisive factor was the addition of phosphate, increasing arsenic leachability up to 1,000 times, and this increased even 2.3 times when the contact time was extended from 24 hours to 240 hours. …”
Get full text
Article -
10636
Monitoring of Ionospheric Anomalies Using GNSS Observations to Detect Earthquake Precursors
Published 2025-01-01“…The monitoring of space weather is achieved through analyzing the Vertical Total Electron Content (VTEC) and its anomalies by means of time series, maps, and other derived parameters. …”
Get full text
Article -
10637
The Method of Beliefs of The Mu'tadilah Regarding The Nature of Khabariyyah: An Introduction
Published 2023-05-01“…This dispute has been going on for a long time and has taken a very long time until today. …”
Get full text
Article -
10638
Pondering Parotid Masses
Published 2001-01-01“…The lesion was again aspirated for 30 mL of fluid and this time, the fluid had a turbid, brown appearance. …”
Get full text
Article -
10639
THE SANDY HILL LANDSCAPE (CORRIENTES, ARGENTINA) FROM LATE PLEISTOCENE TO THE PRESENT
Published 2018-09-01“…The presence of these elements, their distribution and interaction are combined throughout time to give shape to a particular place. In this context, water plays a fundamental role in the configuration of sandy hills landscape in Corrientes province, both originally and the modeling evolving over time, nowadays manifested by spatial patterns. …”
Get full text
Article -
10640
The Natural Science Underlying Big History
Published 2014-01-01“…These are global history greatly extended, big history with a scientific basis, and natural history broadly portrayed across ∼14 billion years of time. Human beings and our cultural inventions are not special, unique, or apart from Nature; rather, we are an integral part of a universal evolutionary process connecting all such complex systems throughout space and time. …”
Get full text
Article