Suggested Topics within your search.
Suggested Topics within your search.
- Sociolinguistics 4
- Criminal law 3
- Philosophy 3
- Effective teaching 2
- Elementary school teaching 2
- English language 2
- History 2
- History and criticism 2
- Rhetoric 2
- Academic writing 1
- African American psychologists 1
- Anatomy 1
- Anthropometry 1
- Benefactors 1
- Black people 1
- Clinical cases 1
- Consumers 1
- Consumption (Economics) 1
- Criticism 1
- Diabetes 1
- Diabetes Mellitus, Type 2 1
- Dissertations, Academic 1
- Economics 1
- Electrocardiography 1
- English 1
- Ethnopsychology 1
- Etiology 1
- Ex-convicts 1
- Fathers and sons 1
- Genanalyse 1
-
3181
Midregion PTHrP and Human Breast Cancer Cells
Published 2010-01-01“…PTHrP is a polyhormone undergoing proteolytic processing into smaller bioactive forms, comprising an N-terminal peptide, which is the mediator of the “classical” PTH-like effect, as well as midregion and C-terminal peptides. …”
Get full text
Article -
3182
Optimization of the Intelligent Sports Health Management System Based on Big Data Technology and Internet of Things
Published 2022-01-01“…Secondly, the experiment is compared with SCLS, SSFS, and six other multilabel feature selection algorithms in 6 classic medical multilabel datasets. Experimental results under five indexes show the effectiveness and superiority of the proposed feature selection algorithm. …”
Get full text
Article -
3183
Three Waves of Populism in Latin America
Published 2014-12-01“…It is stated that the Châvez and Morales left populist regimes resemble classic populist regimes in that they rely on incendiary anti-establishment discourse. …”
Get full text
Article -
3184
Generalized Cycle Benchmarking Algorithm for Characterizing Midcircuit Measurements
Published 2025-01-01“…The key idea is to use a joint Fourier transform on the classical and quantum registers and then estimate parameters in the Fourier space, analogous to Pauli fidelities used in CB-type algorithms for characterizing the Pauli-noise channel of Clifford gates. …”
Get full text
Article -
3185
Smoothing and Regularization with Modified Sparse Approximate Inverses
Published 2010-01-01“…Sparse approximate inverses 𝑀 which satisfy min𝑀‖𝐴𝑀−𝐼‖𝐹 have shown to be an attractive alternative to classical smoothers like Jacobi or Gauss-Seidel (Tang and Wan; 2000). …”
Get full text
Article -
3186
Node Importance Measurement Method in Heterogeneous Information Satellite Network
Published 2022-06-01“…In satellite network, different nodes have different effects on network connectivity and throughput.In order to avoid network communication disturbances caused by the failure of key nodes in the satellite network, network planning can be carried out in advance by measuring the importance of satellite network nodes.According to the characteristics of satellite network information heterogeneity, satellite virtual nodes and virtual sub-layers were defined, and the satellite multi-layer heterogeneous information correlation network model was proposed.The normalized degree, normalized node betweenness and virtual node correlation factor of virtual nodes were defi ned, and the network node importance calculation function was proposed through the defined parameters, which could accurately measured the node importance in the satellite multi-layer heterogeneous information network.Based on typical examples, the network connectivity and throughput indicators were analyzed.The results showed that the proposed algorithm was better than the classical graph theory algorithm, which could comprehensively considered the impact of data information on the importance of network nodes, and more accurately described the connectivity index of satellite multi-layer heterogeneous information networks.…”
Get full text
Article -
3187
Reverse Genetic Strategies in Caenorhabditis elegans: Towards Controlled Manipulation of the Genome
Published 2011-01-01“…Fundamental to this aim is the ability to alter the structure of particular genes by means that are not accessible to classical genetic strategies. Thus, one dream of C. elegans researchers is to establish a toolkit for the controlled manipulation of any loci within the genome. …”
Get full text
Article -
3188
Survey of artificial intelligence data security and privacy protection
Published 2021-02-01“…Artificial intelligence and deep learning algorithms are developing rapidly.These emerging techniques have been widely used in audio and video recognition, natural language processing and other fields.However, in recent years, researchers have found that there are many security risks in the current mainstream artificial intelligence model, and these problems will limit the development of AI.Therefore, the data security and privacy protection was studied in AI.For data and privacy leakage, the model output based and model update based problem of data leakage were studied.In the model output based problem of data leakage, the principles and research status of model extraction attack, model inversion attack and membership inference attack were discussed.In the model update based problem of data leakage, how attackers steal private data in the process of distributed training was discussed.For data and privacy protection, three kinds of defense methods, namely model structure defense, information confusion defense and query control defense were studied.In summarize, the theoretical foundations, classic algorithms of data inference attack techniques were introduced.A few research efforts on the defense techniques were described in order to provoke further research efforts in this critical area.…”
Get full text
Article -
3189
Observer Based Optimal Vibration Control of a Full Aircraft System Having Active Landing Gears and Biodynamic Pilot Model
Published 2016-01-01“…Since the state variables of the pilot body are not available for measurement in practice, an observed based optimal controller is designed via Linear Matrix Inequalities (LMIs) approach. In addition, classical LQR controller is designed to investigate effectiveness of the proposed controller. …”
Get full text
Article -
3190
Integration of a Quantum Voting Scheme into Grayscale Images Using the Novel Enhanced Quantum Representation and Qiskit Framework
Published 2022-01-01“…The superdense coding circuit is part of the design, allowing each voter to use one qubit in order to transmit two classical bits (the vote value). The selected platform for testing this scheme is IBM Quantum Experience, together with the open-source framework called Qiskit (written in Python). …”
Get full text
Article -
3191
APOPTOSIS IN CITY SYSTEMS: A BIOMIMETIC APPROACH TO CITY REGENERATION
Published 2013-05-01“…This poses a serious threat to the efficacy of classical urban and architectural design strategies, and their motive. …”
Get full text
Article -
3192
Effective Data Transmission and Control Based on Social Communication in Social Opportunistic Complex Networks
Published 2020-01-01“…Through comparison experiments with other classic algorithms of opportunistic complex networks, this method has outstanding performance in reducing energy consumption and improving information transmission efficiency.…”
Get full text
Article -
3193
Free Vibrations of a Trapezoidal Plate with an Internal Line Hinge
Published 2014-01-01“…The analysis was carried out by using the kinematics corresponding to the classical laminated plate theory (CLPT). The eigenvalue problem is obtained by employing a combination of the Ritz method and the Lagrange multipliers method. …”
Get full text
Article -
3194
Research of Force Analysis of the Split Sprocket Body
Published 2023-05-01“…The split sprocket shaft group has great advantages in maintenance cost and convenience compared with the integral sprocket shaft group. According to the classical theoretical mechanics, the force analysis of the split sprocket body with new structure is carried out. …”
Get full text
Article -
3195
Horizontal Management at Russian University: Current Trend or Urgent Need?
Published 2018-12-01“…The sample study included three federal universities located in one of the regions of Russia (classical university, university for humanities and pedagogy, and institute of culture and arts). …”
Get full text
Article -
3196
Sensory-Motor Polyneuropathy and Digital Ischemia: A Rare Presentation of Granulomatosis with Polyangiitis
Published 2021-01-01“…This case highlights the importance of suspecting GPA in a patient presenting with sensorimotor polyneuropathy and/or digital ischemia even in the absence of more classic presenting features and underlies the necessity of accurate differential diagnosis in evaluating a case of peripheral neuropathy.…”
Get full text
Article -
3197
Tonal Poetry, Bop Aesthetics, and Jack Kerouac’s Visions of Gerard
Published 2018-06-01“…Jack Kerouac composed his novel Visions of Gerard in 1956 (released in 1963), the same year Charles Mingus released his classic album Pithecanthropus Erectus. I contend that by reading Kerouac’s novel in terms of Mingus’s methods of composition as recorded on that album, we can more clearly hear the influence of jazz music on Kerouac’s prose; as such, we can better understand the means by which jazz music became important as a compositional method and not just as a theme for Kerouac’s novels. …”
Get full text
Article -
3198
De l’intericonicité comme espace et temps (ré)créatif : les Video Portraits de Robert Wilson
Published 2015-12-01“…These few examples illustrate, on the surface, the artist’s fondness for the juxtapositions of classical masterpieces and contemporary images from tabloid covers. …”
Get full text
Article -
3199
The Mathematical Model for the Tippe Top Inversion
Published 2021-01-01“…The dynamics of rotating objects is an area of classical mechanics that has many unsolved problems. …”
Get full text
Article -
3200
Opportunistic routing algorithm based on trust model for ad hoc network
Published 2013-09-01“…Due to the absence of enough physical protection,dynamic topology,distributed collaboration,the limited bandwidth and computing ability in ad hoc network,traditional routing security mechanism cannot adapt to the design of routing protocols.Recently,opportunistic routing is of the research hotspots,which can cope with the unreliable transmissions to improve throughput of the whole network by exploiting the broadcast nature of the wireless medium and spatial diversity of multi-hop wireless network.The concept of trust-based similarity in opportunistic routing for ad hoc network was incorporated,and a novel trusted opportunistic forwarding model based on trust degree of node and least cost of opportunistic routing were also built.Then a trusted minimum cost routing algorithm (MCOR) was proposed and the correctness and effectiveness of this algorithm from theoretical ana ysis were proved.Finally,MCOR algorithm was verified by simulation and was compared with the classic protocols:ExOR,TAODV and Watchdog-DSR.The simulation results show that MCOR scheme can detect and mitigate node misbehaviors.Furthermore,MCOR scheme outperforms the other protocols in terms of throughput,delay,expected ETX and cost of routing.…”
Get full text
Article