Showing 20,401 - 20,420 results of 23,138 for search '"construction"', query time: 0.13s Refine Results
  1. 20401

    Biocomposite Polyvinyl Alcohol/Ferritin Hydrogels with Enhanced Stretchability and Conductivity for Flexible Strain Sensors by Qiang Fu, Junxiao Tang, Weimin Wang, Rongjie Wang

    Published 2025-01-01
    “…In addition, the free residues and iron ions of ferritin endow the biocomposite hydrogel with enhanced ionic conductivity (0.15 S/m). The strain sensor constructed from this hydrogel shows good sensitivity (gauge factor = 1.7 at 150% strain), accurate real-time resistance response, and good long cyclic working stability when used for joint motion monitoring. …”
    Get full text
    Article
  2. 20402

    Experience in researching the identity of active internet users by Viktoriya A. Peregudina

    Published 2021-10-01
    “…The research is based on the idea of modern authors that identity on the Internet is one of the aspects of real identity that arises due to the projection of stable, significant personal characteristics into the virtual world, the use of the possibilities of information and communication technologies to construct new ones, as well as the transformation of existing aspects of personal identity. …”
    Get full text
    Article
  3. 20403

    Dual-Mode Encryption for UC-Secure String OT from Learning with Errors by Momeng Liu, Yupu Hu, Qiqi Lai, Shanshan Zhang, Huiwen Jia, Wen Gao, Baocang Wang

    Published 2024-01-01
    “…However, the study of UC-secure OT over lattices is still far behind compared with constructions over prequantum assumptions. Relying on the learning with errors (LWE) assumption, Quach proposes a dual-mode encryption scheme (SCN’20) for deriving a two-round OT whose security is provably UC-secure in the common reference string (CRS) model. …”
    Get full text
    Article
  4. 20404

    Forced motion control of a mobile robot by T. Yu. Kim, R. A. Prakapovich, A. A. Lobatiy

    Published 2022-09-01
    “…A control block for various motion maneuvers was developed in Simulink environment, which calculates the distance to the nearest turning point or stop and then by constructed cyclogram the corresponding speed at each moment of time is determined. …”
    Get full text
    Article
  5. 20405

    Connotation and practice of the integration of academic field based on Bourdieu’s theory——taking the cultivation of cyberspace security talents as an example by Qian ZHOU, Haiping HUANG, Le WANG, Yanchun ZHANG, Fu XIAO

    Published 2023-08-01
    “…The deployment of network security has become a crucial strategy for the development of modern nations, with skilled professionals serving as the core driving force behind cybersecurity efforts.Cultivating cybersecurity talents and fostering team building are essential for China's talent reserves and strategic capital accumulation.With economic globalization, 0-day vulnerabilities have constantly emerged in information systems, attack chains have become increasingly complex, threat targets were difficult to detect, and hidden viruses varied over time.Talents trained by traditional universities for network security were unable to adapt to innovative production and practical activities in the new fields, as it was confined to their training structure system.In order to break through the shackles of the internal administrative structure and traditional curriculum system of universities, and ease the contradiction between the uncertainty of cyberspace security situation and the standardization of talent cultivation, the talent cultivation models based on Bourdieu's theory were studied, the fusion meaning of cultural capital in the academic field was analyzed and three practical standards were put forward in terms of teaching content, cultivation model and teaching opportunity of cyberspace security talents in combination with the actual cases of the “Fang class”.In terms of education content, standards and open knowledge systems were established to meet the differentiated needs of students.The mentorship approach was employed to construct habitus, fostering students’ ability to adapt flexibly to problems by adopting different cognitive thinking modes.Favorable teaching opportunities were utilized by tutors in various roles to promote efficient integration of individuals and fields, helping students establish a valuable and stable mindset.By leveraging Bourdieu's theory to explore the integration path of academic fields, it has leveraged the advantages of independently cultivating high-quality talents, vigorously promoting technological innovation and the healthy ecological development of the industry.…”
    Get full text
    Article
  6. 20406

    Landscape of Alternative Splicing Events Related to Prognosis and Immune Infiltration in Glioma: A Data Analysis and Basic Verification by Hong-xin Su, Gang Yang, Fei Su, Chen-xiao Hu, Tao Zhang, Jun-tao Ran, Quan-lin Guan

    Published 2022-01-01
    “…Upon univariate Cox analysis, 425 AS events were found to be related to the survival of patients with glioma, and 42 AS events were further screened to construct the final prognostic model (area under the curve=0.974). …”
    Get full text
    Article
  7. 20407

    The experience of Italian student athletes enrolled in a dual career university program: the challenges of employability by Mattia Belluzzi, Alessia Ferraboli, Caterina Gozzoli, Chiara D’Angelo

    Published 2025-01-01
    “…The results highlight traits shared with classic university students while, at the same time, emphasizing peculiar sub-dimensions.DiscussionThis study integrates the constructs of employability and career transitions in the target group of university athletes. …”
    Get full text
    Article
  8. 20408

    Computer Simulation on Analgesic Functional Chemome Characteristics of <italic>Radix Saposhnikoviae</italic> by Chunsong ZHENG, Xiaojie XU, Hongzhi YE, Jinxia YE, Guangwen WU, Xianxiang LIU

    Published 2017-08-01
    “…Objective:To investigate analgesic functional chemome characteristics of <italic>Radix Saposhnikoviae</italic> (RS), and provide information on molecular basis for clinical application of RS in Bi syndrome therapy.Methods:The chemical components of RS were retrieved from <italic>the Handbook of the Constituents in Chinese Herb Original Plants</italic> and other literatures, and the molecular dataset of RS was constructed for computer simulation. Tumor necrosis factor alpha (TNF-α), p38, inducible nitric oxide synthase (iNOS) and phosphodiesterase 4A (PDE-4A) were considered as analgesic targets. …”
    Get full text
    Article
  9. 20409

    Estimation of Urban Link Travel Time Distribution Using Markov Chains and Bayesian Approaches by Wenwen Qin, Meiping Yun

    Published 2018-01-01
    “…Using the state-transition function, an importance distribution is constructed as the summation of historical link TTDs conditional on states weighted by the current link state probabilities. …”
    Get full text
    Article
  10. 20410

    Exploring medical students’ intention to use of ChatGPT from a programming course: a grounded theory study in China by Chen Wang, Changqi Xiao, Xuejiao Zhang, Yingying Zhu, Xueqing Chen, Yilin Li, Huiying Qi

    Published 2025-02-01
    “…Methods Drawing on the grounded theory research paradigm, this paper constructs a research model of the influencing factors of ChatGPT usage willingness for medical students in programming courses through the analysis of interview data from 30 undergraduate medical students. …”
    Get full text
    Article
  11. 20411

    What Is Affecting the Residents’ Subjective Perception toward Objective Environment Quality? by Jihong Zhang, Chaopeng Xie, Chuan Chen, Ninghan Xu, Rui Gao

    Published 2021-01-01
    “…Here, based on the environmental subjective assessment of more than 4,600 independent samples from 56 cities in 2014, this paper constructed an index between subjective and objective scores for each sample and its city, separating the total samples into two groups. …”
    Get full text
    Article
  12. 20412

    Research on optimal arrangement strategy of top coal caving support sensors based on vibration characteristics of coal and gangue by WANG Yao, YANG Shanguo, WU Mingke, MENG Bin, YANG Zheng, LIU Houguang

    Published 2025-01-01
    “…The evaluation indexes of coal and gangue vibration signals were constructed. Combined with Fisher information matrix criterion, a comprehensive evaluation index was formed to determine the optimal scheme of tail beam sensor arrangement. …”
    Get full text
    Article
  13. 20413

    How does digital literacy affect the health status of senior citizens? Micro-level evidence from the CFPS data by Xiaoyi Chen, Nian Wang

    Published 2025-01-01
    “…Based on the CFPS data, this study constructs a balanced panel and employs a two-way fixed-effects model for the estimation. …”
    Get full text
    Article
  14. 20414

    The Epistemological Status of Charisma in Historical Macrosociology by D. V. Kataev, V. O. Kalinina

    Published 2024-12-01
    “…The comparative-historical approach, in turn, defines the relationship between the analytical and empirical levels of Weber's sociology through the "immersion” of an ideal-typical construct in a real historical narrative. In this way, historical macrosociology overcomes the most valid criticisms (S. …”
    Get full text
    Article
  15. 20415

    Expanded taxonomies of human memory by Jason R. Finley

    Published 2025-01-01
    “…Refinements and expansions to this taxonomy followed, including the construct of working memory, itself with several components, to replace earlier simpler ideas of short-term memory. …”
    Get full text
    Article
  16. 20416

    Strategy of container migration and honeypot deployment based on signal game in cloud environment by Lingshu LI, Jiangxing WU, Wei ZENG, Wenyan LIU

    Published 2022-06-01
    “…Multi-tenant coexistence and resource sharing in the SaaS cloud pose serious security risks.On the one hand, soft isolation of logical namespaces is easy to be bypassed or broken.On the other hand, it is easy to be subjected to co-resident attacks due to sharing of the host operating system and underlying physical resources.Therefore it poses a serious threat to data availability, integrity and confidentiality in the container cloud.Given the problem that SaaS cloud services are vulnerable to container escape and side-channel equivalent resident attack, network deception technology increases the uncertainty of the cloud environment and reduces the effectiveness of attack by hiding the business function and characteristic attributes of the executor.Aiming at the security threat caused by the co-resident attack, combining dynamic migration and virtual honeypot security technology, the economical and reasonable network deception method was studied.Specifically, a container migration and honeypot deployment strategy based on the signal game was proposed.According to the security threat analysis, container migration and honeypot were used as defense methods.The former improved the undetectability of the system based on the idea of moving to target defense, while the latter confused attackers by placing decoy containers or providing false services.Furthermore, since network reconnaissance was the pre-step of the network attack chain, the attack and defense process was modeled as a two-person signal game with incomplete information.The sender chose to release a signal according to his type, and the receiver could only obtain the signal released by the sender but could not determine the type.Then, a game tree was constructed for the complete but imperfect information dynamic game, and the costs and benefits of different strategy combinations were set.The optimal deception strategy was determined by equilibrium analysis of attack-defense model.Experimental results show that the proposed strategy can effectively improve system security.Besides, it can also reduce container migration frequency and defense cost.…”
    Get full text
    Article
  17. 20417

    Project Approach to the Implementation of Individual Educational Paths in Modern University by Yu. V. Daneykin, O. E. Kalpinskaya, N. G. Fedotova

    Published 2020-09-01
    “…The results of the study were used by the authors to develop and implement an adaptive model for constructing individual educational trajectories at the Yaroslav-the-Wise Novgorod State University.…”
    Get full text
    Article
  18. 20418

    How to Handle Data Imbalance and Feature Selection Problems in CNN-Based Stock Price Forecasting by Zinnet Duygu Aksehir, Erdal Kilic

    Published 2022-01-01
    “…In addition, a CNN-based model, which was presented to predict the next day&#x2019;s trade action of stocks in the Dow30 index, was constructed to check the effectiveness of the data labeling and the feature selection approach. …”
    Get full text
    Article
  19. 20419

    High-risk factors and predictive models for hemorrhagic chronic radiation proctitis by Zhongli Liao, Xiaogang Hu, Liuling Hu, Jian Yang

    Published 2025-01-01
    “…Conclusion In this study, we constructed and developed a nomogram for predicting hemorrhagic CRP risk. …”
    Get full text
    Article
  20. 20420

    Assessment Design And Practices Toward Holistic Learning Of Higher Education Students: Empirical Evidence Via Path Analysis Modelling Approach by Ebenezer Afrifa-Yamoah, Esther Adama, Amanda Graf, Kwadwo Adusei-Asante

    Published 2024-09-01
    “…Model assessment indexes indicated acceptable convergent, divergent and construct validity scores for the instrument used. …”
    Get full text
    Article