Suggested Topics within your search.
Suggested Topics within your search.
- Design and construction 10
- Law 6
- Interpretation and construction 5
- Building 4
- Construction industry 4
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 4
- Estimates 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Reinforced concrete construction 3
- Sociolinguistics 3
- Architecture 2
- Common law 2
- Computer-aided design 2
- Data processing 2
- Equity 2
- Grammar, Comparative and general 2
- Handbooks, Manuals, etc 2
- Law--Interpretation and construction 2
- MATHEMATICS / Mathematical Analysis 2
- Management 2
- Mathematical analysis 2
- Methodology 2
- Moral and ethical aspects 2
- Philosophy 2
- Syntax 2
- Trusts and trustees 2
- foundations 2
- roof 2
-
19941
Models of technological development: The influence of investment structure
Published 2025-01-01“…Then, accord ing to the impact of investment in new technologies on technological modernisation it justifies the models “blockage”, “rigidity”, “modernisation”, “saturation”, and, in a similar manner, validates the models “degradation”, “backwardness”, “reliance on old technologies”, “reliance on new technologies” according to the impact of investment in old technologies on technological modernisation. The paper constructs a theoreti cal model of the connection between investment and risk, institutional parameters of investment process. …”
Get full text
Article -
19942
Accelerated and Highly Correlated ASIC Synthesis of AI Hardware Subsystems Using CGP
Published 2024-01-01“…Incorporating CGP-derived hierarchical designs into the traditional synthesis flow is instrumental for implementing and evaluating higher-order designs comprising nonlinear functional constructs. Six activation functions and power functions that fall in the category of unconventional functions are realized by the CGP method using custom cells to demonstrate the capability. …”
Get full text
Article -
19943
Global and national university rankings: A multivariate analysis
Published 2021-12-01“…These processes actualise the issues of possibilities for practical use of methodologies for calculation of global and national university rankings.The aim of the study was to develop and apply a methodological approach to multivariate the analysis of Higher Education Institutions (HEIs) classification procedures, to construct and analyse aggregated indicators for global and national rating systems of higher education organisations, and to assess the relationship between them.Methodology and research methods. …”
Get full text
Article -
19944
Identification and validation of TSPAN13 as a novel temozolomide resistance-related gene prognostic biomarker in glioblastoma.
Published 2025-01-01“…Using LASSO Cox analysis, we selected 12 TMZR-RDEGs to construct a risk score model, which was evaluated for performance through survival analysis, time-dependent ROC, and stratified analyses. …”
Get full text
Article -
19945
Mechanism of Vibration Energy Action on Dynamic Instability of Shock-Type Rockburst Carrier System
Published 2020-01-01“…The theoretical model of the shock-type rockburst carrier system was constructed, and the key characteristic parameter of shock-type rockburst was put forward. …”
Get full text
Article -
19946
SVDDD: SAR Vehicle Target Detection Dataset Augmentation Based on Diffusion Model
Published 2025-01-01“…In response to this issue, this paper collects SAR images of the Ka, Ku, and X bands to construct a labeled dataset for training Stable Diffusion and then propose a framework for data augmentation for SAR vehicle detection based on the Diffusion model, which consists of a fine-tuned Stable Diffusion model, a ControlNet, and a series of methods for processing and filtering images based on image clarity, histogram, and an influence function to enhance the diversity of the original dataset, thereby improving the performance of deep learning detection models. …”
Get full text
Article -
19947
Human Evolution: the Limits of Technocentrism
Published 2021-06-01“…Technology is a technique that has gained recognition and has been mastered by those who did not invent it but used the algorithm proposed by the inventor, a detailed and functionally sound explanation, a method of constructing this technique. But the main thing is that technology is a technique that has received an acceptable justification for society. …”
Get full text
Article -
19948
Traditional guidance mechanism based deep robust watermarking
Published 2023-04-01“…With the development of network and multimedia technology, multimedia data has gradually become a key source of information for people, making digital media the primary battlefield for copyright protection and anti-counterfeit traceability.Digital watermarking techniques have been widely studied and recognized as important tools for copyright protection.However, the robustness of conventional digital watermarking methods is limited as sensitive digital media can easily be affected by noise and external interference during transmission.Then the existing powerful digital watermarking technology’s comprehensive resistance to all forms of attacks must be enhanced.Moreover, the conventional robust digital watermarking algorithm’s generalizability across a variety of image types is limited due to its embedding method.Deep learning has been widely used in the development of robust digital watermarking systems due to its self-learning abilities.However, current initialization techniques based on deep neural networks rely on random parameters and features, resulting in low-quality model generation, lengthy training times, and potential convergence issues.To address these challenges, a deep robust digital watermarking algorithm based on a traditional bootstrapping mechanism was proposed.It combined the benefits of both traditional digital watermarking techniques and deep neural networks, taking into account their learning abilities and robust characteristics.The algorithm used the classic robust digital watermarking algorithm to make watermarked photos, and the constructed feature guaranteed the resilience of traditional watermarked images.The final dense image was produced by fusing the conventionally watermarked image with the deep network using the U-Net structure.The testing results demonstrate that the technique can increase the stego image’s resistance to various attacks and provide superior visual quality compared to the conventional algorithm.…”
Get full text
Article -
19949
Farmer’s Credit Rating Model and Application Based on Multilayer Unified Network with Linear Classifier
Published 2020-01-01“…First, according to the logical structure of the three-level credit rating index system, a four-level unidirectional network is constructed, and the credit rating calculation formulas of all indexes at the four-level network are established. …”
Get full text
Article -
19950
Phantom hairy black holes and wormholes in Einstein-bumblebee gravity
Published 2025-01-01“…., the regular phantom black hole reported in (Phys Rev Lett 96:251101), the first law cannot be constructed at all. We also show there still exists a stable circular orbit around the BP black hole. …”
Get full text
Article -
19951
ANTHROPOLOGICAL COMPONENT OF DESCARTES’ ONTOLOGY
Published 2014-06-01“…The premise for its constructive overcoming is the attention to ambivalence of the basic intention and the significance of ethics in the philosopher’s legacy. …”
Get full text
Article -
19952
Anthropological Component of Descartes’ Ontology
Published 2014-06-01“…The premise for its constructive overcoming is the attention to ambivalence of the basic intention and the significance of ethics in the philosopher’s legacy. …”
Get full text
Article -
19953
Polyethylene glycol-based deep eutectic solvents as a novel agent for natural gas sweetening.
Published 2020-01-01“…Thus, an extensive database of estimated Henry's law constants (Hi) and solubilities (xi) of CO2 in 170 different DESs at 25°C has been constructed using the COSMO-RS method to select potential DESs. …”
Get full text
Article -
19954
Software diversity evaluation method based on the properties of ROP/JOP gadgets
Published 2022-12-01“…In order to reduce the risk of rapid spread of homogeneous attacks in network systems, and enhance network and software security, software diversification technologies are applied widely nowadays.Software diversification aims to generate functionally equivalent but internally changed program variants, thereby alter a single operating environment and mitigating homogenization attacks.The existing diversified technical evaluation index ROP gadgets survival rate is difficult to directly reflect the safety impact and the evaluation method is single.In order to evaluate the effectiveness of the diversification method more comprehensively and effectively, a software diversification evaluation method based on the properties of ROP/JOP gadgets is proposed, by analyzing common code reuse attacks, and turns abstract quantification into concrete indicators evaluates the security gain and effect of diversified methods from three aspects of space, time and quality.The method first discusses how diversification techniques affect ROP/JOP attacks according to the three properties of gadgets similarity, damage degree and availability.Nine kinds of diversification methods, such as instruction replacement, NOP insertion, and control flow flattening, are used to diversify the GNU coreutils assembly to generate diversification assembly.Experiments based on the property of gadgets are carried out on the diverse assemblies, and the effectiveness of different diversification methods and the impact on attacks are evaluated according to the experimental results.The experimental results show that this method can accurately evaluate the security gain of software diversification methods, the diversification technology will lead to the increase of the attack chain space required by the ROP/JOP attack, the longer time to construct the attack chain and the lower the attack success rate.The effects of different diversification methods are different, it has a guiding role for the follow-up research on diversified technologies with higher safety gains.…”
Get full text
Article -
19955
Drivers of innovation value: simulation for new drug pricing evaluation based on system dynamics modelling
Published 2025-01-01“…Assessing and exploiting the factors influencing innovation premium to forecast trends and shortcomings within the pharmaceutical innovation ecosystem.MethodsUtilizing system dynamics, this research constructs a decision evaluation system for new drug pricing in Japan. …”
Get full text
Article -
19956
Optimisation of Graphene Nanofiller Addition on the Mechanical and Adsorption Properties of Woven Banana/Polyester Hybrid Nanocomposites by Grey-Taguchi Method
Published 2022-01-01“…The main objective of the current experiment is to determine how the accumulation of graphene to hybrid polyester composites reinforced with woven banana fibre affects their mechanical properties. Composites were constructed utilising the hand lay-up process with the following limitations: (i) graphene filler weightiness, (ii) woven banana fibre thickness in gsm, and (iii) number of woven banana layers, all at three different levels. …”
Get full text
Article -
19957
An Analytical Solution for the Steady Seepage of Localized Line Leakage in Tunnels
Published 2024-12-01“…Finally, the principle of orthogonality of trigonometric functions is specially adopted to construct a non-homogeneous system of equations to solve the unknowns in the analytical solution, and through the inverse transformation of the conformal transformation, an analytical solution for the steady-state seepage field when localized line leakage occurs in a tunnel is obtained. …”
Get full text
Article -
19958
Errors in Latin Inscriptions on Renaissance Works of Fine Art
Published 2024-12-01“…Fewer are the errors of the morphological (declension) and syntactic (use of syntactic constructions, agreement, etc.) levels. Even rarer are the lexical deviations from the norms of classical Latin: most of the vocabulary of the inscriptions comes from the classical period. …”
Get full text
Article -
19959
Explanation the Functional principals of Spatial Governance in trans structure framework methodology
Published 2019-09-01“…According to the governance framework, the management and production of space is not only an objective or objective action, but also it is a constructive, unfinished, contingent, and conditional, conditional and social condition. therefore, the space policy was created in a cultural-historical territory must be consistent with the cultural and historical values of a particular of human beings group and the conditions for the development and optimization of space by these policies should fit into the pattern of their social life. in governance approach, some of the concepts such as truth, rationality, justice, goodness, and especially development, are not independent from its the social processes that shape it. …”
Get full text
Article -
19960