Suggested Topics within your search.
Suggested Topics within your search.
- Design and construction 10
- Law 6
- Interpretation and construction 5
- Building 4
- Construction industry 4
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 4
- Estimates 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Reinforced concrete construction 3
- Sociolinguistics 3
- Architecture 2
- Common law 2
- Computer-aided design 2
- Data processing 2
- Equity 2
- Grammar, Comparative and general 2
- Handbooks, Manuals, etc 2
- Law--Interpretation and construction 2
- MATHEMATICS / Mathematical Analysis 2
- Management 2
- Mathematical analysis 2
- Methodology 2
- Moral and ethical aspects 2
- Philosophy 2
- Syntax 2
- Trusts and trustees 2
- foundations 2
- roof 2
-
20401
Biocomposite Polyvinyl Alcohol/Ferritin Hydrogels with Enhanced Stretchability and Conductivity for Flexible Strain Sensors
Published 2025-01-01“…In addition, the free residues and iron ions of ferritin endow the biocomposite hydrogel with enhanced ionic conductivity (0.15 S/m). The strain sensor constructed from this hydrogel shows good sensitivity (gauge factor = 1.7 at 150% strain), accurate real-time resistance response, and good long cyclic working stability when used for joint motion monitoring. …”
Get full text
Article -
20402
Experience in researching the identity of active internet users
Published 2021-10-01“…The research is based on the idea of modern authors that identity on the Internet is one of the aspects of real identity that arises due to the projection of stable, significant personal characteristics into the virtual world, the use of the possibilities of information and communication technologies to construct new ones, as well as the transformation of existing aspects of personal identity. …”
Get full text
Article -
20403
Dual-Mode Encryption for UC-Secure String OT from Learning with Errors
Published 2024-01-01“…However, the study of UC-secure OT over lattices is still far behind compared with constructions over prequantum assumptions. Relying on the learning with errors (LWE) assumption, Quach proposes a dual-mode encryption scheme (SCN’20) for deriving a two-round OT whose security is provably UC-secure in the common reference string (CRS) model. …”
Get full text
Article -
20404
Forced motion control of a mobile robot
Published 2022-09-01“…A control block for various motion maneuvers was developed in Simulink environment, which calculates the distance to the nearest turning point or stop and then by constructed cyclogram the corresponding speed at each moment of time is determined. …”
Get full text
Article -
20405
Connotation and practice of the integration of academic field based on Bourdieu’s theory——taking the cultivation of cyberspace security talents as an example
Published 2023-08-01“…The deployment of network security has become a crucial strategy for the development of modern nations, with skilled professionals serving as the core driving force behind cybersecurity efforts.Cultivating cybersecurity talents and fostering team building are essential for China's talent reserves and strategic capital accumulation.With economic globalization, 0-day vulnerabilities have constantly emerged in information systems, attack chains have become increasingly complex, threat targets were difficult to detect, and hidden viruses varied over time.Talents trained by traditional universities for network security were unable to adapt to innovative production and practical activities in the new fields, as it was confined to their training structure system.In order to break through the shackles of the internal administrative structure and traditional curriculum system of universities, and ease the contradiction between the uncertainty of cyberspace security situation and the standardization of talent cultivation, the talent cultivation models based on Bourdieu's theory were studied, the fusion meaning of cultural capital in the academic field was analyzed and three practical standards were put forward in terms of teaching content, cultivation model and teaching opportunity of cyberspace security talents in combination with the actual cases of the “Fang class”.In terms of education content, standards and open knowledge systems were established to meet the differentiated needs of students.The mentorship approach was employed to construct habitus, fostering students’ ability to adapt flexibly to problems by adopting different cognitive thinking modes.Favorable teaching opportunities were utilized by tutors in various roles to promote efficient integration of individuals and fields, helping students establish a valuable and stable mindset.By leveraging Bourdieu's theory to explore the integration path of academic fields, it has leveraged the advantages of independently cultivating high-quality talents, vigorously promoting technological innovation and the healthy ecological development of the industry.…”
Get full text
Article -
20406
Landscape of Alternative Splicing Events Related to Prognosis and Immune Infiltration in Glioma: A Data Analysis and Basic Verification
Published 2022-01-01“…Upon univariate Cox analysis, 425 AS events were found to be related to the survival of patients with glioma, and 42 AS events were further screened to construct the final prognostic model (area under the curve=0.974). …”
Get full text
Article -
20407
The experience of Italian student athletes enrolled in a dual career university program: the challenges of employability
Published 2025-01-01“…The results highlight traits shared with classic university students while, at the same time, emphasizing peculiar sub-dimensions.DiscussionThis study integrates the constructs of employability and career transitions in the target group of university athletes. …”
Get full text
Article -
20408
Computer Simulation on Analgesic Functional Chemome Characteristics of <italic>Radix Saposhnikoviae</italic>
Published 2017-08-01“…Objective:To investigate analgesic functional chemome characteristics of <italic>Radix Saposhnikoviae</italic> (RS), and provide information on molecular basis for clinical application of RS in Bi syndrome therapy.Methods:The chemical components of RS were retrieved from <italic>the Handbook of the Constituents in Chinese Herb Original Plants</italic> and other literatures, and the molecular dataset of RS was constructed for computer simulation. Tumor necrosis factor alpha (TNF-α), p38, inducible nitric oxide synthase (iNOS) and phosphodiesterase 4A (PDE-4A) were considered as analgesic targets. …”
Get full text
Article -
20409
Estimation of Urban Link Travel Time Distribution Using Markov Chains and Bayesian Approaches
Published 2018-01-01“…Using the state-transition function, an importance distribution is constructed as the summation of historical link TTDs conditional on states weighted by the current link state probabilities. …”
Get full text
Article -
20410
Exploring medical students’ intention to use of ChatGPT from a programming course: a grounded theory study in China
Published 2025-02-01“…Methods Drawing on the grounded theory research paradigm, this paper constructs a research model of the influencing factors of ChatGPT usage willingness for medical students in programming courses through the analysis of interview data from 30 undergraduate medical students. …”
Get full text
Article -
20411
What Is Affecting the Residents’ Subjective Perception toward Objective Environment Quality?
Published 2021-01-01“…Here, based on the environmental subjective assessment of more than 4,600 independent samples from 56 cities in 2014, this paper constructed an index between subjective and objective scores for each sample and its city, separating the total samples into two groups. …”
Get full text
Article -
20412
Research on optimal arrangement strategy of top coal caving support sensors based on vibration characteristics of coal and gangue
Published 2025-01-01“…The evaluation indexes of coal and gangue vibration signals were constructed. Combined with Fisher information matrix criterion, a comprehensive evaluation index was formed to determine the optimal scheme of tail beam sensor arrangement. …”
Get full text
Article -
20413
How does digital literacy affect the health status of senior citizens? Micro-level evidence from the CFPS data
Published 2025-01-01“…Based on the CFPS data, this study constructs a balanced panel and employs a two-way fixed-effects model for the estimation. …”
Get full text
Article -
20414
The Epistemological Status of Charisma in Historical Macrosociology
Published 2024-12-01“…The comparative-historical approach, in turn, defines the relationship between the analytical and empirical levels of Weber's sociology through the "immersion” of an ideal-typical construct in a real historical narrative. In this way, historical macrosociology overcomes the most valid criticisms (S. …”
Get full text
Article -
20415
Expanded taxonomies of human memory
Published 2025-01-01“…Refinements and expansions to this taxonomy followed, including the construct of working memory, itself with several components, to replace earlier simpler ideas of short-term memory. …”
Get full text
Article -
20416
Strategy of container migration and honeypot deployment based on signal game in cloud environment
Published 2022-06-01“…Multi-tenant coexistence and resource sharing in the SaaS cloud pose serious security risks.On the one hand, soft isolation of logical namespaces is easy to be bypassed or broken.On the other hand, it is easy to be subjected to co-resident attacks due to sharing of the host operating system and underlying physical resources.Therefore it poses a serious threat to data availability, integrity and confidentiality in the container cloud.Given the problem that SaaS cloud services are vulnerable to container escape and side-channel equivalent resident attack, network deception technology increases the uncertainty of the cloud environment and reduces the effectiveness of attack by hiding the business function and characteristic attributes of the executor.Aiming at the security threat caused by the co-resident attack, combining dynamic migration and virtual honeypot security technology, the economical and reasonable network deception method was studied.Specifically, a container migration and honeypot deployment strategy based on the signal game was proposed.According to the security threat analysis, container migration and honeypot were used as defense methods.The former improved the undetectability of the system based on the idea of moving to target defense, while the latter confused attackers by placing decoy containers or providing false services.Furthermore, since network reconnaissance was the pre-step of the network attack chain, the attack and defense process was modeled as a two-person signal game with incomplete information.The sender chose to release a signal according to his type, and the receiver could only obtain the signal released by the sender but could not determine the type.Then, a game tree was constructed for the complete but imperfect information dynamic game, and the costs and benefits of different strategy combinations were set.The optimal deception strategy was determined by equilibrium analysis of attack-defense model.Experimental results show that the proposed strategy can effectively improve system security.Besides, it can also reduce container migration frequency and defense cost.…”
Get full text
Article -
20417
Project Approach to the Implementation of Individual Educational Paths in Modern University
Published 2020-09-01“…The results of the study were used by the authors to develop and implement an adaptive model for constructing individual educational trajectories at the Yaroslav-the-Wise Novgorod State University.…”
Get full text
Article -
20418
How to Handle Data Imbalance and Feature Selection Problems in CNN-Based Stock Price Forecasting
Published 2022-01-01“…In addition, a CNN-based model, which was presented to predict the next day’s trade action of stocks in the Dow30 index, was constructed to check the effectiveness of the data labeling and the feature selection approach. …”
Get full text
Article -
20419
High-risk factors and predictive models for hemorrhagic chronic radiation proctitis
Published 2025-01-01“…Conclusion In this study, we constructed and developed a nomogram for predicting hemorrhagic CRP risk. …”
Get full text
Article -
20420
Assessment Design And Practices Toward Holistic Learning Of Higher Education Students: Empirical Evidence Via Path Analysis Modelling Approach
Published 2024-09-01“…Model assessment indexes indicated acceptable convergent, divergent and construct validity scores for the instrument used. …”
Get full text
Article