Showing 20,521 - 20,540 results of 23,138 for search '"construction"', query time: 0.09s Refine Results
  1. 20521

    Mining the Hidden Link Structure from Distribution Flows for a Spatial Social Network by Yanqiao Zheng, Xiaobing Zhao, Xiaoqi Zhang, Xinyue Ye, Qiwen Dai

    Published 2019-01-01
    “…To uncover the hidden link structure and its dependence on the external social-economic features of the node set, a multidimensional spatial social network model is constructed in this study with the spatial dimension large enough to account for all influential social-economic factors. …”
    Get full text
    Article
  2. 20522

    Accusations and Law Articles Prediction in the Field of Environmental Protection by Sihan Leng, Xiaojun Kang, Qingzhong Liang, Xinchuan Li, Yuanyuan Fan

    Published 2024-12-01
    “…By extracting information such as fact descriptions and court opinions from documents of criminal, civil, and administrative cases related to judicial environmental protection, we construct the Judicial Environmental Law Judgment Dataset (JELJD). …”
    Get full text
    Article
  3. 20523

    HGL: A hybrid global-local load balancing routing scheme for the Internet of Things through satellite networks by Ziluan Liu, Jiangsheng Li, Yanru Wang, Xin Li, Shanzhi Chen

    Published 2017-03-01
    “…Satellite networks provide complete connectivity and worldwide data transmission capability for constructing the Internet of Things. However, because of the varying Internet of Things traffic density, satellite networks may endure imbalanced traffic requirements and frequent link congestion. …”
    Get full text
    Article
  4. 20524

    THE PRINCIPLES OF PHONOLOGICAL WORD STRUCTURE COMPARISON OF RUSSIAN AND CHINESE LANGUAGES by A. N. Aleksakhin

    Published 2014-06-01
    “…The Sound variety of simple one-syllable words of the Chinese language is constructed by oppositions: twenty-five consonants in the zero position, thirty-one strong vowel phonemes in the even position, as well as three weak vowels in the left odd position and five weak vowels in the right odd position . …”
    Get full text
    Article
  5. 20525

    Control of meiotic crossing over in plant breeding by S. R. Strelnikova, R. A. Komakhin

    Published 2023-04-01
    “…Meiotic crossing over is the main mechanism for constructing a new allelic composition of individual chromosomes and is necessary for the proper distribution of homologous chromosomes between gametes. …”
    Get full text
    Article
  6. 20526

    Servant Leadership Competencies Development Challenges for Middle Managers in the Organisation by Ugnė Supranavičienė, Genutė Gedvilienė

    Published 2024-01-01
    “…The organisation’s processes and procedures are constructed to control and constrain the decision-making of middle managers. …”
    Get full text
    Article
  7. 20527

    Phase-Shifted Bragg Grating based on Silicon-on-Insulator Nanowire by QIN Zhibin, YAO Fei, XIAO Jing, WEI Qiqin

    Published 2024-12-01
    “…【Methods】By leveraging photolithography technology, periodic grooves are created on silicon nanowires to construct the grating structure, effectively reducing the transmission loss of optical signals. …”
    Get full text
    Article
  8. 20528

    DOA Estimation for a Mixture of Uncorrelated and Coherent Sources Based on Hierarchical Sparse Bayesian Inference with a Gauss-Exp-Chi2 Prior by Pinjiao Zhao, Weijian Si, Guobing Hu, Liwei Wang

    Published 2018-01-01
    “…Then, by exploiting variational Bayesian approximation, the model parameters are estimated by alternately updating until Kullback-Leibler (KL) divergence between the true posterior and the variational approximation becomes zero. By constructing the source power spectra with the estimated model parameters, the number and locations of the highest peaks are extracted to obtain source number and DOA estimates. …”
    Get full text
    Article
  9. 20529

    GENDER INFLUENCE AND ACADEMIC PERFORMANCE IN NIGERIAN UNIVERSITIES SYSTEM: A STUDY OF BABCOCK UNIVERSITY AND UNIVERSITY OF LAGOS by VICTOR A. ADESIYAN, BABAJIDE JACOB, SEIGHA SONIA GESIERE, WOLE-TAIWO OLAYINKA

    Published 2024-12-01
    “… Gender is a biological as well as socially and culturally constructed concept of masculinity and femininity on individuals' actions, opportunities, and societal expectations. …”
    Get full text
    Article
  10. 20530

    Diagnosis of Open and Short Circuit Intermittent Connection Faults for DeviceNet Based on Multilayer Information Fusion and Circuit Network Analysis by Longkai Wang, Yong Lei

    Published 2025-01-01
    “…Finally, a search-based locating algorithm is developed using the possibility order and observed network states to pinpoint IOC and ISC faults separately. The testbed is constructed and case studies are conducted to demonstrate the effectiveness of the proposed method in various fault scenarios and network scales. …”
    Get full text
    Article
  11. 20531

    Effect of Cobble Content on the Shear Behaviour of Sand-Cobble Mixtures by Chuang Wang, Jinyu Dong, Zhiquan Huang, Jianjun Zhou, Jihong Yang

    Published 2021-01-01
    “…Shield machine often encounter problems such as difficulty in excavation, cutterhead wear, and poor slag discharge of the spiral dumper while constructing in this kind of stratum. Considering the complexly and variety of the material composition and structure of this stratum, the sand and cobble stratum in China, Chengdu Subway Line 7, Chadianzi-Yipintianxia Station, was selected to conduct indoor large-scale direct shear tests to systematically study the effects of cobble content (CC) on the shear strength and shear properties of sand and cobble soil. …”
    Get full text
    Article
  12. 20532

    Qualitative modeling and analysis of attack surface for process multi-variant execution software system by Fukang XING, Zheng ZHANG, Ran SUI, Sheng QU, Xinsheng JI

    Published 2022-10-01
    “…Attack surface is an important index to measure security of software system.The general attack surface model is based on the I/O automata model to model the software system, which generally uses a non-redundant architecture and it is difficult to apply to heterogeneous redundant system architectures such as multi variant systems.Manadhatad et al.proposed a method to measure the attack surface in a dissimilar redundancy system.However, the voting granularity and voting method of the system architecture adopted by Manadhatad are different from those of the multi-variant system, which cannot accurately measure the attack surface of the multi variant system.Therefore, based on the traditional attack surface model, combined with the characteristics of heterogeneous redundant architecture of multi variant systems, the traditional attack surface model was extended and the attack surface model of multivariant systems was constructed.The attack surface of the multi variant system was represented in a formal way, and the traditional attack surface model was improved according to the voting mechanism of the multi variant system at the exit point of the system, so that it can explain the phenomenon that the attack surface of the multi variant system shrinks.Through this modeling method, the change of the attack surface of the multi variant system adopting the multi variant architecture can be explained in the running process.Then, two groups of software systems with multi variant execution architecture were used as analyzing examples.The attack surface of the software systems with the same functions as those without multi variant architecture were compared and analyzed in two situations of being attacked and not being attacked, reflecting the changes of the multi variant system in the attack surface.Combining the attack surface theory and the characteristics of the multi variant execution system, an attack surface modeling method for the multi variant execution system was proposed.At present, the changes of the attack surface of the multi variant execution system can be qualitatively analyzed.In-depth research in the quantitative analysis of the attack surface of the multi variant execution system will be continually conducted.…”
    Get full text
    Article
  13. 20533

    Towards Efficient Object Detection in Large-Scale UAV Aerial Imagery via Multi-Task Classification by Shuo Zhuang, Yongxing Hou, Di Wang

    Published 2025-01-01
    “…Our method leverages bounding box label information to construct a salient region generation branch. Then, to improve the training process of the classification network, we design a multi-task loss function to optimize the parameters of the multi-branch network. …”
    Get full text
    Article
  14. 20534

    Alien introgressions and chromosomal rearrangements do not affect the activity of gliadin-coding genes in hybrid lines of Triticum aestivum L. × Aegilops columnaris Zhuk by A. Yu. Novoselskaya-Dragovich, A. A. Yankovskaya, E. D. Badaeva

    Published 2018-08-01
    “…Based on determining genetic control of various polypeptides in the electrophoretic aegilops spectrum, markers to identify Ae. columnaris chromosomes 1Xс, 6Xс and 6Uс were constructed.…”
    Get full text
    Article
  15. 20535

    A Study of Network Negative News Based on Behavioral Finance Analysis of Abnormal Fluctuation of Stock Price by Cheng Chung Wu, Ye Yan, Tiantong Yuan, Chih Chiang Huang, Ya Ju Tsai

    Published 2022-01-01
    “…It first defines the negative news of the network. Then, it constructs the negative news to the stock price influence model, from the perspective of the theory of behavioral finance, the relationship between stock market and investor sentiment is systematically analyzed, and the theoretical support for the research of this paper is provided according to the definition of network negative news concept using the event study, abnormal returns test, regression analysis of the sample selected out of the study, observation of negative news before and after the abnormal returns, and excess returns changes. …”
    Get full text
    Article
  16. 20536

    GenSQLi: A Generative Artificial Intelligence Framework for Automatically Securing Web Application Firewalls Against Structured Query Language Injection Attacks by Vahid Babaey, Arun Ravindran

    Published 2024-12-01
    “…The framework achieves two primary objectives: (1) generating diverse and validated SQLi payloads using in-context learning, thereby minimizing hallucinations, and (2) automating defense mechanisms by testing these payloads against a vulnerable web application secured by a WAF, classifying bypassing attacks, and constructing effective WAF security rules through generative AI techniques. …”
    Get full text
    Article
  17. 20537

    Study on the Characteristics of Self-Stabilizing Height Distribution for Deep Foundation Pit Vertical Sidewall in Binary Strata of Upper Soil and Lower Rock by Zhang Ziguang, Yihang Li, Jiesheng Zhang, Tao Xu, Guangyong Cao, YiKang Xu

    Published 2021-01-01
    “…The spatial distribution map of the self-stabilizing height for deep foundation pit vertical sidewall in upper soil and lower rock binary stratum has been constructed, and the mathematical fitting equation between Hr0 and Hs has been obtained. …”
    Get full text
    Article
  18. 20538

    Operational Evaluation of Part-Time Shoulder Use for Interstate 476 in the State of Pennsylvania by Sean Coffey, Seri Park

    Published 2018-01-01
    “…Many countries are looking at methods that better utilize the transportation infrastructure currently constructed before widening the roadway. PTSU provides a possible solution to this problem, and this research aims to evaluate the operational benefits of PTSU using a case study based in the state of Pennsylvania. …”
    Get full text
    Article
  19. 20539

    Integrating network pharmacology and experimental validation to explore the pharmacological mechanism of Astragaloside IV in alleviating urotensin II-mediated renal tubular epithel... by Wenyuan Liu, Qianwei Liu, Ziyuan Zhang, Yaling Hu, Jingai Fang

    Published 2024-01-01
    “…DAVID software was then used to perform GO and KEGG enrichment analysis on these target genes, and STRING and cytoscape were used to construct a protein interaction network. Molecular docking analysis was performed on key genes. …”
    Get full text
    Article
  20. 20540

    Green finance and urban carbon emission dual control: an empirical evidence from China by Tian Zhang, Yao Zhang, Yumin Zhang

    Published 2025-01-01
    “…To reveal the impact and mechanism of green finance on urban carbon emissions and intensity in China, this paper constructs a general equilibrium model based on endogenous growth theory and employs a two-way fixed effects model for empirical testing. …”
    Get full text
    Article