Suggested Topics within your search.
Suggested Topics within your search.
- Design and construction 10
- Law 6
- Interpretation and construction 5
- Building 4
- Construction industry 4
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 4
- Estimates 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Reinforced concrete construction 3
- Sociolinguistics 3
- Architecture 2
- Common law 2
- Computer-aided design 2
- Data processing 2
- Equity 2
- Grammar, Comparative and general 2
- Handbooks, Manuals, etc 2
- Law--Interpretation and construction 2
- MATHEMATICS / Mathematical Analysis 2
- Management 2
- Mathematical analysis 2
- Methodology 2
- Moral and ethical aspects 2
- Philosophy 2
- Syntax 2
- Trusts and trustees 2
- foundations 2
- roof 2
-
20681
A retrial queueing system with processor sharing and impatient customers
Published 2022-06-01“…Objectives. The problem of constructing and investigating a mathematical model of a stochastic system with processor sharing, repeated calls, and customer impatience is considered. …”
Get full text
Article -
20682
Assessment of walnut (Juglans regia L.) cultivation land suitability using a multiple-criteria decision-making method in Southeastern Turkey
Published 2025-01-01“…As a result of the validation analysis, the constructed model had an Area Under the Curve (AUC) of 0.911, which indicates an excellent fit between the model and reality; therefore, the model is acceptable. …”
Get full text
Article -
20683
GPS TRAJECTORY CLUSTERING FOR SPATIO – TEMPORAL BEHAVIOR ANALYSIS: THE APPLICATION OF HEATMAP TECHNIQUES AND SPATIO- TEMPORAL DUAL GRAPH NEURAL NETWORK
Published 2025-02-01“…The method entails constructing node-level and edge-level graphs that depict the adjacency connections between intersections and road segments. …”
Get full text
Article -
20684
«Danger: Security»! Securitization Theory and the Paris School of International Security Studies
Published 2022-03-01“…The proposed approach is valuable for constructive reflection and critical analysis of security practices that are most common in contemporary neoliberal societies of the West.…”
Get full text
Article -
20685
Node and Edge Joint Embedding for Heterogeneous Information Network
Published 2024-09-01“…Finally, a new homogeneous network is constructed from the original heterogeneous network, and the graph attention model is further used on the new network to perform element-level joint learning. …”
Get full text
Article -
20686
High-performance reconfigurable encryption scheme for distributed storage
Published 2023-10-01“…As the world embraces the digital economy and enters an information society, data has emerged as a critical production factor.The collection, processing, and storage of data have become increasingly prevalent.Distributed storage systems, known for their efficiency, are widely used in various data fields.However, as the scale of data storage continues to expand, distributed storage faces more significant security risks, such as information leakage and data destruction.These challenges drive the need for innovative advancements in big data distributed storage security technology and foster the integration of domestic cryptographic technology with computing storage technology.This work focused on addressing security issues, particularly information leakage, in distributed storage nodes.A dynamic and reconfigurable encryption storage solution was proposed, which considered the requirements for encryption performance and flexibility.A high-performance reconfigurable cryptographic module was designed based on the bio mapping framework.Based on this module, multiple storage pools equipped with different cryptographic algorithms were constructed to facilitate high-performance encryption and decryption operations on hard disk data.The scheme also enabled dynamic switching of cryptographic algorithms within the storage pools.A cryptographic protocol with remote online loading functions for cryptographic algorithms and keys was developed to meet the unified management and convenient security update requirements of reconfigurable cryptographic modules in various storage nodes.Furthermore, the scheme implemented fine-grained data encryption protection and logical security isolation functions based on cryptographic reconstruction technology.Experimental results demonstrate that the performance loss of this scheme for encryption protection and security isolation of stored data is approximately 10%.It provides a technical approach for distributed storage systems to meet the cryptographic application technology requirements outlined in GB/T 39786-2021 “Information Security Technology-Basic Requirements for Cryptography Applications” Level 3 and above in terms of device and computing security, application and data security.…”
Get full text
Article -
20687
Safety Assessment and Risk Estimation for Unmanned Aerial Vehicles Operating in National Airspace System
Published 2018-01-01“…In the model, a relative collision area and flying speed between UAVs and manned aircraft are constructed to calculate expected frequency of fatalities for each province correspondingly. …”
Get full text
Article -
20688
Global long-run convergence of carbon emissions and intensity vis-à-vis countries' industrial profiles
Published 2024-10-01“…The convergence was more (less) significant and towards higher (lower) REPC and RCI values for economies with low (high) industrialization. We constructed a policy priority list consisting of the least services-oriented (Q1) countries with REPC (RCI) values of 3 (7.4) and 20 (30) percent probability of further divergence from the global average in the coming years. …”
Get full text
Article -
20689
Prediction of Solar Coronal Structures Using Fourier Neural Operators Based on the Solar Photospheric Magnetic Field Observation
Published 2024-05-01“…Abstract This paper constructs the structures of the solar corona (SC) using Fourier neural operators (FNO) based on solar photospheric magnetic field observation. …”
Get full text
Article -
20690
Prevalence of Osteoporosis in Women Over 50 Years of Age: Preventive and Therapeutic Management Skills
Published 2023-10-01“…To verify the data, used a diagnostic survey method and a questionnaire constructed for the purposes of this study and validated by center experts. …”
Get full text
Article -
20691
Просторовий аналіз та моделювання індивідуального сільського житла 60–70-их рр. ХХ ст. в експозиції НМНАП України...
Published 2024-12-01“…On the basis of the analysis and systematization of literary sources, field studies, an attempt was made to show the architectural image of the housing and the constructive solutions of folk housing from various local building materials using the example of museum exhibits. …”
Get full text
Article -
20692
The impact of policy-oriented agricultural insurance on China’s grain production resilience
Published 2025-01-01“…IntroductionAs an effective tool and public welfare product of the state to support and benefit agriculture, policy-oriented agricultural insurance has unique advantages in dispersing agricultural risks and guaranteeing stable grain production and supply.MethodsBased on provincial panel data from 2002 to 2021, this paper analyzes the impact of policy-oriented agricultural insurance on grain production resilience. It constructs a comprehensive indicator system to assess grain production resilience and examines the impact of the insurance premium subsidy policy and the insurance development level on grain production resilience.ResultsThe study finds that policy-oriented agricultural insurance significantly improves grain production resilience and passes the robustness test. …”
Get full text
Article -
20693
The Impact of the Internet on Relational Goods: Empirical Evidence from European Countries
Published 2024-12-01“…In this direction, firstly, categorical principal component analysis was employed in order to construct proxy indicators coded as “social relations” and “family relations” instead of relational goods. …”
Get full text
Article -
20694
Analysis of Water and Sediment Variation Characteristics in Jingjiang River Reach before and after Operation of Three Gorges Reservoir Based on GAM
Published 2025-01-01“…In order to explore the different water and sediment variation characteristics in Jingjiang River reach before and after the operation of the Three Gorges Reservoir, the Mann-Kendall trend test method and rescaled range (R/S) analysis method were used to analyze and predict the variation trend of water and sediment in Jingjiang River reach, and the generalized additive model (GAM) was constructed to quantitatively analyze the influence of water and sediment outflows from the Three Gorges Reservoir on the Jingjiang River reach. …”
Get full text
Article -
20695
Coding Readiness Assessment: A Measure of Computational Thinking for Preschoolers
Published 2024-12-01“…We created the Coding Readiness Assessment (CRA) from a subset of nine TechCheck-PreK items and twelve new items that assess additional CT and coding readiness constructs. In an initial feasibility study of the CRA, teachers observed impulsive responses by children. …”
Get full text
Article -
20696
Analysis and Prediction of Grouting Reinforcement Performance of Broken Rock Considering Joint Morphology Characteristics
Published 2025-01-01“…Furthermore, multiple machine learning algorithms are employed to construct a robust predictive model. Machine learning, recognized as a rapidly advancing field, plays a pivotal role in data-driven engineering applications due to its powerful analytical capabilities. …”
Get full text
Article -
20697
Maximum Dry Unit Weight and Optimum Moisture Content Prediction of Lateritic Soils Using Regression Analysis
Published 2023-03-01“…Soils compaction with experimental tests is a pivotal facet in the selection of materials for earth constructions. Due to the time limitations and concerns of finishing resources, it is obligate to develop some relationships for predicting compaction parameters such as maximum dry unit weight (γdmax) and optimum moisture content (ωopt) from easily estimated index properties. …”
Get full text
Article -
20698
Numerical simulation study on coal seam response characteristics of shallow three-electrode laterolog
Published 2025-02-01“…In this paper, through the finite element simulation software COMSOL Multiphysics, 2D and 3D models are constructed based on shallow three-electrode laterolog, and the characteristics of using shallow three-electrode laterolog in coal field logging are studied. …”
Get full text
Article -
20699
Numerical and Analytical Calculations for Modeling and Designing Drilling Wicks or Rotary Cutters Based of Functionally Graded Materials
Published 2018-01-01“…It will be assumed that the instrument in the chosen model in this work is a rotating hollow cylinder constructed from a Functional Graded Material (FGM). …”
Get full text
Article -
20700
Theoretical analysis of MHD Maxwell two phase nano flow subject to viscous dissipation and chemical reaction: A nonsimilar approach
Published 2025-01-01“…The novelty of this investigation is to construct a two-equation non-similar model. It aims to examine the momentum, thermal and mass transport of Maxwell fluid with suspended conducting nanoparticles, which incorporates viscous dissipation, chemical reaction, an external magnetic and electric field, Brownian motion and thermophoresis. …”
Get full text
Article