Showing 51,561 - 51,580 results of 63,767 for search '"The Times"', query time: 0.28s Refine Results
  1. 51561

    Like a Wave in Its Variable Shape, Breadth, and Depth: A Qualitative Interview Study of Experiences of Daytime Sleepiness in People with Parkinson’s Disease by Arja Höglund, Peter Hagell, Ulrika Östlund, Sten Fredrikson, Christina Sandlund

    Published 2022-01-01
    “…Some participants needed to struggle against daytime sleepiness most of the time, and others had found a way to handle it, for example, with physical activity. …”
    Get full text
    Article
  2. 51562

    Proof of storage with corruption identification and recovery for dynamic group users by Tao JIANG, Hang XU, Liangmin WANG, Jianfeng MA

    Published 2022-10-01
    “…The outsourced storage mode of cloud computing leads to the separation of data ownership and management rights of data owners, which changes the data storage network model and security model.To effectively deal with the software and hardware failures of the cloud server and the potential dishonest service provider and also ensure the availability of the data owners’ data, the design of secure and efficient data availability and recoverability auditing scheme has both theoretical and practical importance in solving the concern of users and ensuring the security of cloud data.However, most of the existing studies were designed for the security and efficiency of data integrity or recoverability schemes, without considering the fast identification and reliable recovery of damaged data under dynamic group users.Thus, to quickly identify and recover damaged data, a publicly verifiable proof of storage scheme was proposed for dynamic group cloud users.The designed scheme enabled a trusted third-party auditor to efficiently identify the damaged files through a challenge-response protocol and allowed the cloud storage server to effectively recover them when the degree of data damage is less than an error correction ability threshold.The scheme combined association calculation and accumulation calculation, which effectively reduced the number of calculations for the identification of damaged data.By combining erasure coding and shared coding technology, the scheme achieved effective recovery of damaged data of dynamic group users.At the same time, the scheme also supported dynamic user revocation, which ensured the integrity audit and reliable recovery of the collective data after user revocation.The network model and threat model of the designed scheme were defined and the security of the scheme under the corresponding security model was proved.Through the prototype implementation of the scheme in the real environment and the modular performance analysis, it is proved that the proposed scheme can effectively identify the damaged data and reliably recover the cloud data when the data is damaged.Besides, compared with other schemes, it is also proved that the proposed scheme has less computational overhead in identifying and recovering damaged data.…”
    Get full text
    Article
  3. 51563

    Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network by Weicheng QIU, Xiuzhen CHEN, Yinghua MA, Jin MA, Zhihong ZHOU

    Published 2023-08-01
    “…Threat analysis relies on knowledge bases that contain a large number of security entities.The scope and impact of security threats and risks are evaluated by modeling threat sources, attack capabilities, attack motivations, and threat paths, taking into consideration the vulnerability of assets in the system and the security measures implemented.However, the lack of entity relations between these knowledge bases hinders the security event tracking and attack path generation.To complement entity relations between CAPEC and ATT&CK techniques and enrich threat paths, an entity correlation prediction method called WGS was proposed, in which entity descriptions were analyzed based on word embedding and a graph convolution network.A Word2Vec model was trained in the proposed method for security domain to extract domain-specific semantic features and a GCN model to capture the co-occurrence between words and sentences in entity descriptions.The relationship between entities was predicted by a Siamese network that combines these two features.The inclusion of external semantic information helped address the few-shot learning problem caused by limited entity relations in the existing knowledge base.Additionally, dynamic negative sampling and regularization was applied in model training.Experiments conducted on CAPEC and ATT&CK database provided by MITRE demonstrate that WGS effectively separates related entity pairs from irrelevant ones in the sample space and accurately predicts new entity relations.The proposed method achieves higher prediction accuracy in few-shot learning and requires shorter training time and less computing resources compared to the Bert-based text similarity prediction models.It proves that word embedding and graph convolutional network based entity relation prediction method can extract new entity correlation relationships between attack patterns and techniques.This helps to abstract attack techniques and tactics from low-level vulnerabilities and weaknesses in security threat analysis.…”
    Get full text
    Article
  4. 51564
  5. 51565

    Start of Higher School in Crimea: Taurida University (1918–1920) by Sergey B. Filimonov

    Published 2019-03-01
    “…After all, the pre-war university archive was lost, and the main source for a long time remained only two volumes of the “News of the Tauride University” published in 1919 and 1920. …”
    Get full text
    Article
  6. 51566

    Finite element modelling and indirect tensile strength of SBS and CR modified asphalt mixtures by Mohammad Fahad, Richard Nagy

    Published 2025-01-01
    “…Indirect tensile strength for each mixtures type has been evaluated in the lab with varying rise time. Furthermore, stiffness moduli of each mixture have been evaluated at four different frequency values of 1.2 Hz, 1.9 Hz, 3.5 Hz and 5 Hz at 20 °C. …”
    Get full text
    Article
  7. 51567

    Design Optimization and Performance Evaluation of the Open-Graded Friction Course with Small Particle Size Aggregate by Hao Fu, Chaohui Wang, GongXin Yu, Qian Chen, Luqing Liu

    Published 2021-01-01
    “…The ultrathin OGFC including waterborne epoxy resin emulsified asphalt (WEA) bonding layer and open-graded asphalt concrete with 9.5 mm nominal maximum aggregate size gradation was optimized. The construction timing of the open-graded asphalt mixture was determined. …”
    Get full text
    Article
  8. 51568

    Forming the Professional Identity of Future Teachers through Service-Learning by I. A. Rudneva, O. A. Kozyreva

    Published 2025-02-01
    “…The problem of forming the professional identity of future teachers through service-learning has become the subject of a special pedagogical study for the first time. The purpose of the article is to present the results of the study on the possibilities of service-learning as means of forming the professional identity of future teachers at the stage of professional training.The study focuses on the analysis of the results of testing service learning as innovative means of professional training of future teachers at a pedagogical university, aimed at forming their professional identity. …”
    Get full text
    Article
  9. 51569

    Microbial Contamination, an Increasing Threat to the Consumption of Fresh Fruits and Vegetables in Today’s World by Gadafi Iddrisu Balali, Denis Dekugmen Yar, Vera Gobe Afua Dela, Priscilla Adjei-Kusi

    Published 2020-01-01
    “…The larger production of vegetables within the shortest possible time to meet the growing demand has placed them at a higher risk of contamination with the pathogenic microbes, making the safety of consumers uncertain. …”
    Get full text
    Article
  10. 51570

    Field Measurements of Vibration on the Car Body-Suspended Equipment for High-Speed Rail Vehicles by Jinying Guo, Huailong Shi, Fansong Li, Pingbo Wu

    Published 2020-01-01
    “…The test configuration and arrangements are introduced first, followed by the data analysis in time and frequency domains. It is seen that the wheelset conicity increases 0.008 per 10,000 km, which increases approximately linearly with the OD from 0.10 to 0.40. …”
    Get full text
    Article
  11. 51571
  12. 51572

    AI-based approaches for improving autonomous mobile robot localization in indoor environments: A comprehensive review by Shoude Wang, Nur Syazreen Ahmad

    Published 2025-03-01
    “…Additionally, we discuss real-time performance challenges associated with AI-based approaches and delineate the distinctions between AI-enhanced localization methods and traditional localization techniques, highlighting the necessity and advantages of adopting AI-based solutions. …”
    Get full text
    Article
  13. 51573

    Novel plant extract-chitosan nanocomposite (SCE/ChNPs) biosensor for trace level arsenic sensing in water samples using quartz crystal microbalance with dissipation monitoring by Miad Ali Siddiq

    Published 2025-01-01
    “…The sensor showed a rapid 10 s response time and maintained stability over five adsorption–desorption cycles. …”
    Get full text
    Article
  14. 51574

    Technical Standard of "Five-Tone Figurative Hypnosis" by ZHOU Xia, LI Li, SHEN Yan, LI Chengbin, LIU Zhimei, ZHANG Yikun, ZHANG Mingqian, YU Shaohong, WANG Hongxia, LU Yi, WANG Qin, REN Binbin, JIANG Hengkun, NIU Li, CHENG Aijun, LI Benyuan

    Published 2024-01-01
    “…This technical operation code is formulated from the aspects of technical scope, normative reference documents, terms and definitions,indications and contraindications, operation steps and requirements,operation process, treatment time and frequency, precautions and efficacy evaluation, forming a relatively standardized, scientific and unified operation guide. …”
    Get full text
    Article
  15. 51575

    University proceedings. Volga region. Social sciences by Legislation on the rights of indigenous small-numbered peoples of the Russian Federation: current situation and some development trends

    Published 2024-11-01
    “…The legislative framework that pertains to the rights of Indigenous Small-numbered Peoples is dual-layered which was evolved over time, demonstrating a historical progres-sion in the laws that recognize and protect the unique legal status of these communities. …”
    Article
  16. 51576

    Nomophobia and University Business Students’ Burnout in Online Learning: Mediating effect of Fear of Missing Out by Gangaram Biswakarma, Basu Dev Lamichhane, Deepika Neupane, Keshav Subedi

    Published 2024-10-01
    “…They also showed increased Nomophobia and moderate concerns about fear of missing real-time class interactions. The study found a significant relationship between Nomophobia, FoMO, and SBO, where Nomophobia affects FoMO and SBO, while FoMO notably impacts SBO's academic efficacy. …”
    Get full text
    Article
  17. 51577

    Study on the effect of space tightness on the inerting effect of liquid CO2 in pottery jar liquor warehouses by Xueming Li, Wei Wan, Gang Bai, Youkai Zhao, Xunxian Shi, Jinsong Zhu

    Published 2025-01-01
    “…The space inerting effect increased with the injection flow and space tightness, whereas the effective inerting rate decreased with the space height and injection time. After 60 s of injection, the leakage reached the maximum, about 1.0 ~ 1.2 kg/s. …”
    Get full text
    Article
  18. 51578

    On small Dirac neutrino masses in string theory by Gonzalo F. Casas, Luis E. Ibáñez, Fernando Marchesano

    Published 2025-01-01
    “…The neutrino mass suppression occurs because the right-handed neutrino kinetic term behaves as K νν ≃ 1/ g ν 2 $$ {g}_{\nu}^2 $$ . At the same time a tower of ν R -like states appears with characteristic scale m 0 ≃ g ν 2 M P $$ {g}_{\nu}^2{M}_{\textrm{P}} $$ ≃ 0.1 − 500 eV, in agreement with Swampland expectations. …”
    Get full text
    Article
  19. 51579

    Complementary feeding and the early origins of obesity risk: a study protocol by Daniel D Reidpath, Ireneous N Soyiri, Naleena Devi Muniandy, Pascale A Allotey

    Published 2016-11-01
    “…The assessment will occur around the time complementary feeding is expected to start (7 Months) and again at 12 months. …”
    Get full text
    Article
  20. 51580

    Collaborative Online Learning: Plurilingual and Pluricultural Development by O. Polyakova, I. N. Goryacheva, R. Galstyan-Sargsyan

    Published 2021-10-01
    “…None of the partakers reported having experienced any difficulty doing the project and only regretted that interaction time was too short. Additionally, lecturers were able to test new curricula implementation and assessment procedures.Conclusions. …”
    Get full text
    Article