Suggested Topics within your search.
Suggested Topics within your search.
- Design and construction 10
- Law 6
- Interpretation and construction 5
- Building 4
- Construction industry 4
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 4
- Estimates 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Reinforced concrete construction 3
- Sociolinguistics 3
- Architecture 2
- Common law 2
- Computer-aided design 2
- Data processing 2
- Equity 2
- Grammar, Comparative and general 2
- Handbooks, Manuals, etc 2
- Law--Interpretation and construction 2
- MATHEMATICS / Mathematical Analysis 2
- Management 2
- Mathematical analysis 2
- Methodology 2
- Moral and ethical aspects 2
- Philosophy 2
- Syntax 2
- Trusts and trustees 2
- foundations 2
- roof 2
-
20721
Integrating Digital Technology Into Marathon Race With a Technology-Driven Service Design Approach to Enhance Marathoner Experiences
Published 2024-01-01“…A service blueprint was constructed to visualize the integration of digital technologies into marathon events covering marathoner actions, front-of-house employee actions, back-of-house employee actions, and internal information technology systems. …”
Get full text
Article -
20722
Clausewitz's conceptualization of war as an ontological starting point in its research and understanding
Published 2024-01-01“…On the other hand, because of a multidisciplinary consideration of the essence of war in research done so far, that were dominated by the perception that war was too complex and unpredictable phenomenon to be studied only by one field of study, military theory remained underdeveloped, supressed by scientifically and theoretically constructed sciences. To overcome this problem, Clausewitz's conceptualisation of war represents a suitable ontological starting point for an all-encompassing scientific insight and understanding of war. …”
Get full text
Article -
20723
Risk Control of Virtual Enterprise Based on Distributed Decision-Making Model
Published 2021-01-01“…On the basis of summarizing and analyzing previous research works, this paper expounded the research status and significance of the risk control of virtual enterprise; elaborated the development background, current status, and future challenges of distributed decision-making model; introduced the related works of decision-making variable calculation and constraint determination; constructed a risk control model for virtual enterprise based on distributed decision-making model; analyzed the multiobjective model and interval programming model of risk control; established a risk control approach for virtual enterprise based on distributed decision-making model; performed the optimal allocation of risk control funds and the selective optimization of backup allies; and finally conducted a case analysis. …”
Get full text
Article -
20724
Accurate Diagnosis and Treatment of Painful Temporomandibular Disorders: A Literature Review Supplemented by Own Clinical Experience
Published 2023-01-01“…Following the diagnostic process, once a diagnosis is established, a treatment plan can be constructed to address the patient’s complaints.…”
Get full text
Article -
20725
Importance of the 5’ untranslated region for recombinant enzyme production in isolated Bacillus subtilis 007
Published 2025-02-01“…Since the aprE 5’ untranslated region contributes to a high mRNA stability, it was incorporated into the P43 construct to determine whether mRNA stability is responsible for the differences observed in β-galactosidase production. …”
Get full text
Article -
20726
SOCIALINĖS EPISTEMOLOGIJOS IDĖJA IR NATŪRALISTINĖ DILEMA
Published 2003-01-01“…The evolution of the approaches of both the social epistemologists demonstrates this. At first Goldman constructs his conception of the naturalistic-normative epistemology as a combination of two distinct forms of inquiry - conceptual and empirical analyses - and so disproves the basic claim of naturalism that epistemological questions may be replaced by psychological questions, because psychological questions hold all the content there is in epistemological questions. …”
Get full text
Article -
20727
A Dual-Channel and Frequency-Aware Approach for Lightweight Video Instance Segmentation
Published 2025-01-01“…In instance tracking, a dual-frequency perceptual enhancement network structure is constructed, which uses an independent instance query mechanism to capture temporal information and combines with a frequency-aware attention mechanism to capture instance features on different attention layers of high and low frequencies, respectively, to effectively reduce the complexity of the model, decrease the number of parameters, and improve the segmentation efficiency. …”
Get full text
Article -
20728
Pyroptosis-Related Signature Predicts the Progression of Ulcerative Colitis and Colitis-Associated Colorectal Cancer as well as the Anti-TNF Therapeutic Response
Published 2023-01-01“…By intersecting with the differentially expressed PRGs, CASP5, GBP1, GZMB, IL1B, and IRF1 were selected as key PRGs to construct a pyroptosis-related signature (PR-signature). …”
Get full text
Article -
20729
Optimal Pricing Strategy of Electric Vehicle Charging Station for Promoting Green Behavior Based on Time and Space Dimensions
Published 2020-01-01“…Taking the optimization of the comprehensive index as the objective function, the TOU pricing optimization model of EVs is constructed. Finally, the nondominated sorting genetic algorithm (NSGA-II) is introduced to solve the above optimization problems. …”
Get full text
Article -
20730
Asymmetric risk contagion effect of the interaction between the real economy and the financial sector—an analysis based on the domestic commodity price index
Published 2025-01-01“…Taking January 2007 to July 2021 as the sample period and using data from nine commodity price indices and banking, diversified finance, and insurance industry indices, this article uses rolling regression method to construct different commodity price risk and financial sector risk indicators. …”
Get full text
Article -
20731
Two-stage deep reinforcement learning method for agile optical satellite scheduling problem
Published 2024-11-01“…Then, a pointer network with a local selection mechanism and a rough pruning mechanism is constructed as the sequencing network to generate an executable task sequence in the task sequencing stage. …”
Get full text
Article -
20732
An empirical study of exploring the predictors of university teachers’ job satisfaction in Bangladesh: A structural equation modeling approach
Published 2025-01-01“…This study aims to investigate the factors influencing job satisfaction among university teachers, considering various complex constructs such as salary and financial benefits, career growth and opportunities, relationships with colleagues, recognition, working environment, and leadership. …”
Get full text
Article -
20733
Impact of green finance on poverty reduction: evidence from China
Published 2025-01-01“…This study investigates the impact of green finance on poverty reduction in China. We construct a comprehensive index of green finance, which includes green credit, green insurance, and green investment, to evaluate its development across China’s provinces. …”
Get full text
Article -
20734
Multi-query based key node mining algorithm for social networks
Published 2024-02-01“…Mining key nodes in complex networks has been a hotly debated topic as it played an important role in solving real-world problems.However, the existing key node mining algorithms focused on finding key nodes from a global perspective.This approach became problematic for large-scale social networks due to the unacceptable storage and computing resource overhead and the inability to utilize known query node information.A key node mining algorithm based on multiple query nodes was proposed to address the issue of key suspect mining.In this method, the known suspects were treated as query nodes, and the local topology was extracted.By calculating the critical degree of non-query nodes in the local topology, nodes with higher critical degrees were selected for recommendation.Aiming to overcome the high computational complexity of key node mining and the difficulty of effectively utilizing known query node information in existing methods, a two-stage key node mining algorithm based on multi-query was proposed to integrate the local topology information and the global node aggregation feature information of multiple query nodes.It reduced the calculation range from global to local and quantified the criticality of related nodes.Specifically, the local topology of multiple query nodes was obtained using the random walk algorithm with restart strategy.An unsupervised graph neural network model was constructed based on the graphsage model to obtain the embedding vector of nodes.The model combined the unique characteristics of nodes with the aggregation characteristics of neighbors to generate the embedding vector, providing input for similarity calculations in the algorithm framework.Finally, the criticality of nodes in the local topology was measured based on their similarity to the features of the query nodes.Experimental results demonstrated that the proposed algorithm outperformed traditional key node mining algorithms in terms of time efficiency and result effectiveness.…”
Get full text
Article -
20735
Achieving near-zero energy in hot climates: Retrofitting building envelopes for existing homes
Published 2025-02-01“…Initially, a baseline scenario was constructed and verified against actual monthly electricity bills to ensure accuracy. …”
Get full text
Article -
20736
Paradox in Disaster Management: 2020 Aegean Sea Earthquake
Published 2022-07-01“…Instead of a command-control-based centralized and bureaucratic disaster management approach that requires bureaucratic expertise, a multi-actor and solidarist disaster management approach, in which authorities and responsibilities are not constructed from top to bottom, has gained weight. …”
Get full text
Article -
20737
Through attraction to the deterrence: Issues and possibilities of the Western Balkan countries
Published 2023-01-01“…Thus, the elimination of security dilemmas (and eventually the elimination of threats) between the Western Balkan countries would present the result of the attraction as the most constructive category in strategic deterrence. The chance that the Republic of Serbia has (again) - to replace the role of decades long deterrence factor with the progressive one, attraction - should not be missed.…”
Get full text
Article -
20738
Twitter user geolocation method based on single-point toponym matching and local toponym filtering
Published 2023-08-01“…The availability of accurate toponyms in user tweets is crucial for geolocating Twitter users.However, existing methods for locating Twitter users often suffer from limited quantity and reliability of acquired toponyms, thus impacting the accuracy of user geolocation.To address this issue, a twitter user geolocation method based on single-point toponym matching and local toponym filtering was proposed.A toponym type discriminating algorithm based on the aggregation degree of locations of the toponym was designed.In the proposed algorithm, a single-point toponym database was generated to provide more reliable toponyms extracted from tweets.Then, according to a proposed local place name filtering algorithm based on the aggregation degree of user location, the aggregation degree of user location centered on the longitude and latitude of toponyms and the average longitude and latitude of users were calculated.This process helped in extracting local toponyms with a high aggregation degree, which enhances the reliability of toponyms used in geolocation.Finally, a user-toponym heterogeneous graph was constructed based on user social relationships and user mentions of toponyms, and users were located by graph representation learning and neural networks.A large number of user geolocation experiments were conducted based on two commonly used public datasets in this field, namely GEOTEXT and TW-US.Comparisons with nine existing typical methods for Twitter user geolocation, including HGNN, ReLP, and GCN, demonstrate that our proposed method achieves significantly higher geolocation accuracy.On the GEOTEXT dataset, the average error is reduced by 7.3~342.8 km, the median error is reduced by 2.4~354.4 km, and the accuracy of large area-level geolocation is improved by 1.3%~26.3%.On the TW-US dataset, the average error is reduced by 8.6~246.6 km, the median error is reduced by 5.7~149.7 km, and the accuracy of large area-level geolocation is improved by 1.5%~20.5%.…”
Get full text
Article -
20739
Research on credit card transaction security supervision based on PU learning
Published 2023-06-01“…The complex and ever-evolving nature of credit card cash out methods and the emergence of various forms of fake transactions present challenges in obtaining accurate transaction information during customer interactions.In order to develop an accurate supervision method for detecting fake credit card transactions, a PU (positive-unlabeled learning) based security identification model for single credit card transactions was established.It was based on long-term transaction label data from cashed-up accounts in commercial banks’ credit card systems.A Spy mechanism was introduced into sample data annotation by selecting million positive samples of highly reliable cash-out transactions and 1.3 million samples of transactions to be labeled, and using a learner to predict the result distribution and label negative samples of non-cash-out transactions that were difficult to identify, resulting in 1.2 million relatively reliable negative sample labels.Based on these samples, 120 candidate variables were constructed, including credit card customer attributes, quota usage, and transaction preference characteristics.After importance screening of variables, nearly 50 candidate variables were selected.The XGBoost binary classification algorithm was used for model development and prediction.The results show that the proposed model achieve an identification accuracy of 94.20%, with a group stability index (PSI) of 0.10%, indicating that the single credit card transaction security identification model based on PU learning can effectively monitor fake transactions.This study improves the model discrimination performance of machine learning binary classification algorithm in scenarios where high-precision sample label data is difficult to obtain, providing a new method for transaction security monitoring in commercial bank credit card systems.…”
Get full text
Article -
20740
SSA-ELM Hydrological Time Series Forecast Model Based on Wavelet Packet Decomposition and Phase Space Reconstruction
Published 2022-01-01“…Considering the nonlinear and multi-scale characteristics of hydrological time series,this paper proposes a squirrel search algorithm (SSA)-extreme learning machine (ELM) forecasting model based on wavelet packet decomposition (WPD) and phase space reconstruction.It is then applied to the Shangguo Hydrological Station in Yunnan Province for monthly runoff and precipitation forecasting.Specifically,WPD is performed to decompose the runoff and precipitation time series data,and the Cao method is applied to reconstruct the phase space of each subseries component.Then,the principle of SSA is outlined,and objective functions are constructed through the training samples of each component.The objective functions are optimized by SSA,and the results are compared with the optimization results of the whale optimization algorithm (WOA),the gray wolf optimization (GWO) algorithm,and the particle swarm optimization (PSO) algorithm.Finally,the weight of the ELM input layer and the hidden layer bias obtained by optimization based on SSA,WOA,GWO algorithm,and PSO algorithm,respectively,are utilized to build SSA-ELM,WOA-ELM,GWO-ELM,and PSO-ELM models,which,in addition to the unoptimized ELM models,are applied to forecast each subseries component,and the forecast results are summed and reconstructed to obtain the final forecasting results.The results show that SSA outperforms WOA,GWO algorithm,and PSO algorithm in optimizing the objective functions of each component and that it offers better optimization accuracy.The mean relative error,mean absolute error,mean square root error,and forecast pass rate of the proposed SSA-ELM model for monthly runoff and monthly precipitation forecast are 5.32% and 3.84%,0.078 m<sup>3</sup>/s and 0.169 mm,0.103 m<sup>3</sup>/s and 0.209 mm,97.5% and 95.8%,respectively,indicating that its forecasting accuracy is higher than that of other models such as the WOA-ELM model.…”
Get full text
Article