Suggested Topics within your search.
Suggested Topics within your search.
- Design and construction 10
- Law 6
- Interpretation and construction 5
- Building 4
- Construction industry 4
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 4
- Estimates 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Reinforced concrete construction 3
- Sociolinguistics 3
- Architecture 2
- Common law 2
- Computer-aided design 2
- Data processing 2
- Equity 2
- Grammar, Comparative and general 2
- Handbooks, Manuals, etc 2
- Law--Interpretation and construction 2
- MATHEMATICS / Mathematical Analysis 2
- Management 2
- Mathematical analysis 2
- Methodology 2
- Moral and ethical aspects 2
- Philosophy 2
- Syntax 2
- Trusts and trustees 2
- foundations 2
- roof 2
-
20521
Mining the Hidden Link Structure from Distribution Flows for a Spatial Social Network
Published 2019-01-01“…To uncover the hidden link structure and its dependence on the external social-economic features of the node set, a multidimensional spatial social network model is constructed in this study with the spatial dimension large enough to account for all influential social-economic factors. …”
Get full text
Article -
20522
Accusations and Law Articles Prediction in the Field of Environmental Protection
Published 2024-12-01“…By extracting information such as fact descriptions and court opinions from documents of criminal, civil, and administrative cases related to judicial environmental protection, we construct the Judicial Environmental Law Judgment Dataset (JELJD). …”
Get full text
Article -
20523
HGL: A hybrid global-local load balancing routing scheme for the Internet of Things through satellite networks
Published 2017-03-01“…Satellite networks provide complete connectivity and worldwide data transmission capability for constructing the Internet of Things. However, because of the varying Internet of Things traffic density, satellite networks may endure imbalanced traffic requirements and frequent link congestion. …”
Get full text
Article -
20524
THE PRINCIPLES OF PHONOLOGICAL WORD STRUCTURE COMPARISON OF RUSSIAN AND CHINESE LANGUAGES
Published 2014-06-01“…The Sound variety of simple one-syllable words of the Chinese language is constructed by oppositions: twenty-five consonants in the zero position, thirty-one strong vowel phonemes in the even position, as well as three weak vowels in the left odd position and five weak vowels in the right odd position . …”
Get full text
Article -
20525
Control of meiotic crossing over in plant breeding
Published 2023-04-01“…Meiotic crossing over is the main mechanism for constructing a new allelic composition of individual chromosomes and is necessary for the proper distribution of homologous chromosomes between gametes. …”
Get full text
Article -
20526
Servant Leadership Competencies Development Challenges for Middle Managers in the Organisation
Published 2024-01-01“…The organisation’s processes and procedures are constructed to control and constrain the decision-making of middle managers. …”
Get full text
Article -
20527
Phase-Shifted Bragg Grating based on Silicon-on-Insulator Nanowire
Published 2024-12-01“…【Methods】By leveraging photolithography technology, periodic grooves are created on silicon nanowires to construct the grating structure, effectively reducing the transmission loss of optical signals. …”
Get full text
Article -
20528
DOA Estimation for a Mixture of Uncorrelated and Coherent Sources Based on Hierarchical Sparse Bayesian Inference with a Gauss-Exp-Chi2 Prior
Published 2018-01-01“…Then, by exploiting variational Bayesian approximation, the model parameters are estimated by alternately updating until Kullback-Leibler (KL) divergence between the true posterior and the variational approximation becomes zero. By constructing the source power spectra with the estimated model parameters, the number and locations of the highest peaks are extracted to obtain source number and DOA estimates. …”
Get full text
Article -
20529
GENDER INFLUENCE AND ACADEMIC PERFORMANCE IN NIGERIAN UNIVERSITIES SYSTEM: A STUDY OF BABCOCK UNIVERSITY AND UNIVERSITY OF LAGOS
Published 2024-12-01“… Gender is a biological as well as socially and culturally constructed concept of masculinity and femininity on individuals' actions, opportunities, and societal expectations. …”
Get full text
Article -
20530
Diagnosis of Open and Short Circuit Intermittent Connection Faults for DeviceNet Based on Multilayer Information Fusion and Circuit Network Analysis
Published 2025-01-01“…Finally, a search-based locating algorithm is developed using the possibility order and observed network states to pinpoint IOC and ISC faults separately. The testbed is constructed and case studies are conducted to demonstrate the effectiveness of the proposed method in various fault scenarios and network scales. …”
Get full text
Article -
20531
Effect of Cobble Content on the Shear Behaviour of Sand-Cobble Mixtures
Published 2021-01-01“…Shield machine often encounter problems such as difficulty in excavation, cutterhead wear, and poor slag discharge of the spiral dumper while constructing in this kind of stratum. Considering the complexly and variety of the material composition and structure of this stratum, the sand and cobble stratum in China, Chengdu Subway Line 7, Chadianzi-Yipintianxia Station, was selected to conduct indoor large-scale direct shear tests to systematically study the effects of cobble content (CC) on the shear strength and shear properties of sand and cobble soil. …”
Get full text
Article -
20532
Qualitative modeling and analysis of attack surface for process multi-variant execution software system
Published 2022-10-01“…Attack surface is an important index to measure security of software system.The general attack surface model is based on the I/O automata model to model the software system, which generally uses a non-redundant architecture and it is difficult to apply to heterogeneous redundant system architectures such as multi variant systems.Manadhatad et al.proposed a method to measure the attack surface in a dissimilar redundancy system.However, the voting granularity and voting method of the system architecture adopted by Manadhatad are different from those of the multi-variant system, which cannot accurately measure the attack surface of the multi variant system.Therefore, based on the traditional attack surface model, combined with the characteristics of heterogeneous redundant architecture of multi variant systems, the traditional attack surface model was extended and the attack surface model of multivariant systems was constructed.The attack surface of the multi variant system was represented in a formal way, and the traditional attack surface model was improved according to the voting mechanism of the multi variant system at the exit point of the system, so that it can explain the phenomenon that the attack surface of the multi variant system shrinks.Through this modeling method, the change of the attack surface of the multi variant system adopting the multi variant architecture can be explained in the running process.Then, two groups of software systems with multi variant execution architecture were used as analyzing examples.The attack surface of the software systems with the same functions as those without multi variant architecture were compared and analyzed in two situations of being attacked and not being attacked, reflecting the changes of the multi variant system in the attack surface.Combining the attack surface theory and the characteristics of the multi variant execution system, an attack surface modeling method for the multi variant execution system was proposed.At present, the changes of the attack surface of the multi variant execution system can be qualitatively analyzed.In-depth research in the quantitative analysis of the attack surface of the multi variant execution system will be continually conducted.…”
Get full text
Article -
20533
Towards Efficient Object Detection in Large-Scale UAV Aerial Imagery via Multi-Task Classification
Published 2025-01-01“…Our method leverages bounding box label information to construct a salient region generation branch. Then, to improve the training process of the classification network, we design a multi-task loss function to optimize the parameters of the multi-branch network. …”
Get full text
Article -
20534
Alien introgressions and chromosomal rearrangements do not affect the activity of gliadin-coding genes in hybrid lines of Triticum aestivum L. × Aegilops columnaris Zhuk
Published 2018-08-01“…Based on determining genetic control of various polypeptides in the electrophoretic aegilops spectrum, markers to identify Ae. columnaris chromosomes 1Xс, 6Xс and 6Uс were constructed.…”
Get full text
Article -
20535
A Study of Network Negative News Based on Behavioral Finance Analysis of Abnormal Fluctuation of Stock Price
Published 2022-01-01“…It first defines the negative news of the network. Then, it constructs the negative news to the stock price influence model, from the perspective of the theory of behavioral finance, the relationship between stock market and investor sentiment is systematically analyzed, and the theoretical support for the research of this paper is provided according to the definition of network negative news concept using the event study, abnormal returns test, regression analysis of the sample selected out of the study, observation of negative news before and after the abnormal returns, and excess returns changes. …”
Get full text
Article -
20536
GenSQLi: A Generative Artificial Intelligence Framework for Automatically Securing Web Application Firewalls Against Structured Query Language Injection Attacks
Published 2024-12-01“…The framework achieves two primary objectives: (1) generating diverse and validated SQLi payloads using in-context learning, thereby minimizing hallucinations, and (2) automating defense mechanisms by testing these payloads against a vulnerable web application secured by a WAF, classifying bypassing attacks, and constructing effective WAF security rules through generative AI techniques. …”
Get full text
Article -
20537
Study on the Characteristics of Self-Stabilizing Height Distribution for Deep Foundation Pit Vertical Sidewall in Binary Strata of Upper Soil and Lower Rock
Published 2021-01-01“…The spatial distribution map of the self-stabilizing height for deep foundation pit vertical sidewall in upper soil and lower rock binary stratum has been constructed, and the mathematical fitting equation between Hr0 and Hs has been obtained. …”
Get full text
Article -
20538
Operational Evaluation of Part-Time Shoulder Use for Interstate 476 in the State of Pennsylvania
Published 2018-01-01“…Many countries are looking at methods that better utilize the transportation infrastructure currently constructed before widening the roadway. PTSU provides a possible solution to this problem, and this research aims to evaluate the operational benefits of PTSU using a case study based in the state of Pennsylvania. …”
Get full text
Article -
20539
Integrating network pharmacology and experimental validation to explore the pharmacological mechanism of Astragaloside IV in alleviating urotensin II-mediated renal tubular epithel...
Published 2024-01-01“…DAVID software was then used to perform GO and KEGG enrichment analysis on these target genes, and STRING and cytoscape were used to construct a protein interaction network. Molecular docking analysis was performed on key genes. …”
Get full text
Article -
20540
Green finance and urban carbon emission dual control: an empirical evidence from China
Published 2025-01-01“…To reveal the impact and mechanism of green finance on urban carbon emissions and intensity in China, this paper constructs a general equilibrium model based on endogenous growth theory and employs a two-way fixed effects model for empirical testing. …”
Get full text
Article