Suggested Topics within your search.
Suggested Topics within your search.
- Design and construction 10
- Law 6
- Interpretation and construction 5
- Building 4
- Construction industry 4
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 4
- Estimates 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Reinforced concrete construction 3
- Sociolinguistics 3
- Architecture 2
- Common law 2
- Computer-aided design 2
- Data processing 2
- Equity 2
- Grammar, Comparative and general 2
- Handbooks, Manuals, etc 2
- Law--Interpretation and construction 2
- MATHEMATICS / Mathematical Analysis 2
- Management 2
- Mathematical analysis 2
- Methodology 2
- Moral and ethical aspects 2
- Philosophy 2
- Syntax 2
- Trusts and trustees 2
- foundations 2
- roof 2
-
20241
Adaptation of the Ego and Task Orientation in Sport Questionnaire (TEOSQ) in Argentine athletes
Published 2021-12-01“…However, there are no local studies that allow measuring the construct in adult Argentine athletes. For this reason, the objective of this study was to carry out the linguistic, conceptual, and metric adaptation of the TEOSQ in adult athletes from the Province of Buenos Aires. …”
Get full text
Article -
20242
Monthly Runoff Prediction with RVM and SVM Optimized by Singular Spectrum Analysis and Gradient-Based Optimization Algorithm
Published 2022-01-01“…According to the idea of sequence decomposition-parameter optimization-subitem prediction-result superposition,we construct a medium and long-term monthly runoff prediction model integrating singular spectrum analysis (SSA)-gradient-based optimization (GBO) algorithm with correlation vector machine (RVM) and support vector machine (SVM).To start with,SSA is conducted to process the monthly runoff data of the example and thereby extract multiple independent subsequences.Then,the principle of the GBO algorithm is expounded,and the GBO algorithm is simulated and tested with 6 typical functions.The GBO algorithm is applied to optimize the RVM kernel width factor and hyperparameters as well as the SVM penalty factor and kernel function parameters.SSA-GBO-RVM and SSA-GBO-SVM models are built to predict each subsequence,which is subsequently superimposed to serve as the final monthly runoff prediction result. …”
Get full text
Article -
20243
Spanish version of the short European Health Literacy Survey Questionnaire HLS-Q12: Transcultural adaptation and psychometric properties.
Published 2024-01-01“…For validation of the HLS-Q12, a psychometric analysis was performed to assess feasibility, reliability, sensitivity to change and construct validity with other measures such as health-related quality of life, empowerment, and health needs.…”
Get full text
Article -
20244
Characterization of m6A Methylation Modification Patterns in Colorectal Cancer Determines Prognosis and Tumor Microenvironment Infiltration
Published 2022-01-01“…Using principal component analysis (PCA), a risk model was constructed to quantify individual m6A modification patterns in patients with CRC. …”
Get full text
Article -
20245
Assessment of economic efficiency of hydrogen production using wind and solar energy
Published 2025-01-01“…Results. The authors have constructed the graphs of electricity and hydrogen cost dependence on climatic conditions (average long-term wind speed and annual solar radiation). …”
Get full text
Article -
20246
A Lightweight Small Target Detection Algorithm for UAV Platforms
Published 2024-12-01“…The algorithm introduces an attention module constructed with receptive field attention and coordinate attention, which helps reduce background noise interference while improving long-range information dependency. …”
Get full text
Article -
20247
The Intertemporal Evolution Model of Enterprise R&D Cooperative Network
Published 2019-01-01“…Given the intertemporal R&D network evolution and the complex influence between stock knowledge, this study constructs a discrete indefinitely intertemporal evolution model of an enterprise R&D cooperation network. …”
Get full text
Article -
20248
Optimization of Covariance Matrices of Kalman Filter with Unknown Input Using Modified Directional Bat Algorithm
Published 2025-01-01“…The objective functions are constructed using the measurement vectors and the corresponding estimated values, and MDBA is adopted to optimize the two covariance matrices of KF-UI and EKF-UI. …”
Get full text
Article -
20249
Validity and Reliability of the Anxiety Assessment Scale: A New Three-dimensional Perspective
Published 2022-06-01“…Both exploratory and confirmatory factor analyses (EFA and CFA) were used for construct validity. The Beck Anxiety Inventory was also applied for concurrent validity. …”
Get full text
Article -
20250
Integrated Analysis of mRNA and lncRNA Expression Profiles Reveals Regulatory Networks Associated with Decompensated Cirrhosis
Published 2022-01-01“…The functions of differentially expressed mRNAs were revealed by Gene Ontology (GO) functional annotation and Kyoto Encyclopedia of Genes and Genomes (KEGG) pathway enrichment analyses, and a regulatory network was also constructed. A total of 1046 differentially expressed mRNAs and 1175 lncRNAs were identified between the decompensated cirrhosis patients and cirrhosis controls. …”
Get full text
Article -
20251
A Clinical Nomogram Based on the Triglyceride-Glucose Index to Predict Contrast-Induced Acute Kidney Injury after Percutaneous Intervention in Patients with Acute Coronary Syndrome...
Published 2022-01-01“…And the DCA results showed that the nomogram had a high clinical application. In conclusion, we constructed and validated the nomogram to predict CI-AKI risk after PCI in patients with ACS and DM. …”
Get full text
Article -
20252
A Nonlinear Rebalanced Control Compensation Model for Visual Information of Drivers in the Foggy Section of Expressways
Published 2025-01-01“…To obtain the optimal driving visual guidance methods in sudden low-visibility fog environments, it is crucial to analyze the changes in visual characteristics and information demand under low-visibility foggy conditions. The paper constructs a driving visual information demand model for foggy environments based on visual information input and output, using Shannon’s theory and feedback control theory. …”
Get full text
Article -
20253
Malicious user detection in Momo application based on spatio-temporal behavior and static attribute analysis
Published 2024-08-01“…Firstly, a user spatio-temporal information dataset was constructed by collecting user online time, location, and abnormal labels data provided by Momo’s location service. …”
Get full text
Article -
20254
Safety Analysis of the Running Train under Earthquake Dynamic Disturbance
Published 2021-01-01“…Focusing on the safe operation of rail transit during earthquakes, the finite element method is used to construct a wheel-track-subgrade dynamics model in this study. …”
Get full text
Article -
20255
A Risk Assessment Algorithm for College Student Entrepreneurship Based on Big Data Analysis
Published 2021-01-01“…On the basis of summarizing and analyzing previous research results, this article expounded the research status and significance of the risk assessment algorithm for college student entrepreneurship, elaborated the development background, current status, and future challenges of big data analysis technology, introduced the basic principles of support vector machine (SVM) and hierarchical analytic process, constructed a risk assessment model for college student entrepreneurship based on big data analysis, analyzed the risk factors and assessment indicators of the entrepreneurial model, proposed a risk assessment algorithm for college student entrepreneurship based on big data analysis, performed the discrimination coefficient calculation and comprehensive correlation optimization, and finally conducted a case experiment and its result analysis. …”
Get full text
Article -
20256
Honeypot defense and transmission strategy based on offensive and defensive games in vehicular networks
Published 2022-08-01“…With the rapid development of the Internet of Vehicles, service providers can efficiently provide caching services for vehicle users by deploying 5G base station-type RSUs adjacent to vehicles.However, due to the presence of malicious attackers, the controlled base station is turned to be malicious for the purpose of identity forgery attack.When messages are sent in the name of malicious base stations to interfere with the communication link between vehicles and the trusted base stations, it is easy to cause serious driving safety problems.To solve the above problem, an efficient transmission and honeypot defense strategy was proposed, which was based on the offensive and defensive game in the Internet of Vehicles to reduce the risk of identity forgery attacks and improve the security of data transmission.The interaction between trusted base stations and malicious base stations in the Internet of Vehicles scenario was modeled as an attack-defense game model.On this basis, trusted base stations and honeypot base stations were jointly used as defenders to defend against malicious attacks.Then, the trusted base station and the malicious base station, as the two sides of the offensive and defensive game, chose their respective strategies to construct a model of the benefit function of both sides.Combined with the vehicle delay feedback mechanism, the defender and the malicious base station dynamically adjusted their respective strategies.By adjusting the interaction between the honeypot base station and the vehicle, and also the degree of IP randomization, the overall benefit of the defender was effectively improved.Besides, the optimal solution was obtained by using the mixed strategy Nash equilibrium theory.Simulation experimental results show that the proposed strategy can improve the secure transmission performance of the Internet of Vehicles service in the presence of malicious attackers, and the defender’s expected benefit is improved by 48.9% and the data transmission delay is reduced by 57.1% compared to the no-honeypot defense scheme.…”
Get full text
Article -
20257
Elucidating the Correlation of D-Dimer Levels with COVID-19 Severity: A Scoping Review
Published 2022-01-01“…Based on all these articles and clinical experience, a scoping review was constructed and the full texts of the articles that were retrieved were accessed. …”
Get full text
Article -
20258
Unveiling the landscape of antistigma interventions for individuals with substance use disorders: A scoping review
Published 2024-12-01“…The Theoretical Domain Framework (TDF) identified intervention domains and constructs of the interventions. Results: Of 698 studies, 29 met eligibility, with three from low-middle-income countries: 12 studies addressed the public, 11 self, and 5 structural stigmas. …”
Get full text
Article -
20259
Ecohydrological responses to solar radiation changes
Published 2025-01-01“…These sensitivities are then applied to local observations and used to construct two sets of numerical experiments: the first focuses on solar radiation changes only, and the second systematically modifies precipitation, air temperature, specific humidity, and wind speed using the CMIP6-derived sensitivities to radiation changes, i.e., including its land–atmosphere feedback. …”
Get full text
Article -
20260
Analysis of the Characteristics of Ship Collision-Avoidance Behavior Based on Apriori and Complex Network
Published 2024-12-01“…Complex networks of CABFPS for different encounter situations are constructed, and network topological indicators are analyzed. …”
Get full text
Article