Showing 19,941 - 19,960 results of 23,138 for search '"construction"', query time: 0.13s Refine Results
  1. 19941

    Models of technological development: The influence of investment structure by Vilhelmina V. Glazunova, Oleg S. Sukharev

    Published 2025-01-01
    “…Then, accord ing to the impact of investment in new technologies on technological modernisation it justifies the models “blockage”, “rigidity”, “modernisation”, “saturation”, and, in a similar manner, validates the models “degradation”, “backwardness”, “reliance on old technologies”, “reliance on new technologies” according to the impact of investment in old technologies on technological modernisation. The paper constructs a theoreti cal model of the connection between investment and risk, institutional parameters of investment process. …”
    Get full text
    Article
  2. 19942

    Accelerated and Highly Correlated ASIC Synthesis of AI Hardware Subsystems Using CGP by H. C. Prashanth, Madhav Rao

    Published 2024-01-01
    “…Incorporating CGP-derived hierarchical designs into the traditional synthesis flow is instrumental for implementing and evaluating higher-order designs comprising nonlinear functional constructs. Six activation functions and power functions that fall in the category of unconventional functions are realized by the CGP method using custom cells to demonstrate the capability. …”
    Get full text
    Article
  3. 19943

    Global and national university rankings: A multivariate analysis by Т. А. Salimova, I. А. Ivanova, Е. А. Sysoeva

    Published 2021-12-01
    “…These processes actualise the issues of possibilities for practical use of methodologies for calculation of global and national university rankings.The aim of the study was to develop and apply a methodological approach to multivariate the analysis of Higher Education Institutions (HEIs) classification procedures, to construct and analyse aggregated indicators for global and national rating systems of higher education organisations, and to assess the relationship between them.Methodology and research methods. …”
    Get full text
    Article
  4. 19944

    Identification and validation of TSPAN13 as a novel temozolomide resistance-related gene prognostic biomarker in glioblastoma. by Haofei Wang, Zhen Liu, Zesheng Peng, Peng Lv, Peng Fu, Xiaobing Jiang

    Published 2025-01-01
    “…Using LASSO Cox analysis, we selected 12 TMZR-RDEGs to construct a risk score model, which was evaluated for performance through survival analysis, time-dependent ROC, and stratified analyses. …”
    Get full text
    Article
  5. 19945

    Mechanism of Vibration Energy Action on Dynamic Instability of Shock-Type Rockburst Carrier System by Lyu Pengfei, Cui Xuekai

    Published 2020-01-01
    “…The theoretical model of the shock-type rockburst carrier system was constructed, and the key characteristic parameter of shock-type rockburst was put forward. …”
    Get full text
    Article
  6. 19946

    SVDDD: SAR Vehicle Target Detection Dataset Augmentation Based on Diffusion Model by Keao Wang, Zongxu Pan, Zixiao Wen

    Published 2025-01-01
    “…In response to this issue, this paper collects SAR images of the Ka, Ku, and X bands to construct a labeled dataset for training Stable Diffusion and then propose a framework for data augmentation for SAR vehicle detection based on the Diffusion model, which consists of a fine-tuned Stable Diffusion model, a ControlNet, and a series of methods for processing and filtering images based on image clarity, histogram, and an influence function to enhance the diversity of the original dataset, thereby improving the performance of deep learning detection models. …”
    Get full text
    Article
  7. 19947

    Human Evolution: the Limits of Technocentrism by M. I. Boichenko

    Published 2021-06-01
    “…Technology is a technique that has gained recognition and has been mastered by those who did not invent it but used the algorithm proposed by the inventor, a detailed and functionally sound explanation, a method of constructing this technique. But the main thing is that technology is a technique that has received an acceptable justification for society. …”
    Get full text
    Article
  8. 19948

    Traditional guidance mechanism based deep robust watermarking by Xuejing GUO, Yixiang FANG, Yi ZHAO, Tianzhu ZHANG, Wenchao ZENG, Junxiang WANG

    Published 2023-04-01
    “…With the development of network and multimedia technology, multimedia data has gradually become a key source of information for people, making digital media the primary battlefield for copyright protection and anti-counterfeit traceability.Digital watermarking techniques have been widely studied and recognized as important tools for copyright protection.However, the robustness of conventional digital watermarking methods is limited as sensitive digital media can easily be affected by noise and external interference during transmission.Then the existing powerful digital watermarking technology’s comprehensive resistance to all forms of attacks must be enhanced.Moreover, the conventional robust digital watermarking algorithm’s generalizability across a variety of image types is limited due to its embedding method.Deep learning has been widely used in the development of robust digital watermarking systems due to its self-learning abilities.However, current initialization techniques based on deep neural networks rely on random parameters and features, resulting in low-quality model generation, lengthy training times, and potential convergence issues.To address these challenges, a deep robust digital watermarking algorithm based on a traditional bootstrapping mechanism was proposed.It combined the benefits of both traditional digital watermarking techniques and deep neural networks, taking into account their learning abilities and robust characteristics.The algorithm used the classic robust digital watermarking algorithm to make watermarked photos, and the constructed feature guaranteed the resilience of traditional watermarked images.The final dense image was produced by fusing the conventionally watermarked image with the deep network using the U-Net structure.The testing results demonstrate that the technique can increase the stego image’s resistance to various attacks and provide superior visual quality compared to the conventional algorithm.…”
    Get full text
    Article
  9. 19949

    Farmer’s Credit Rating Model and Application Based on Multilayer Unified Network with Linear Classifier by Sulin Pang, Shouyang Wang, Lianhu Xia

    Published 2020-01-01
    “…First, according to the logical structure of the three-level credit rating index system, a four-level unidirectional network is constructed, and the credit rating calculation formulas of all indexes at the four-level network are established. …”
    Get full text
    Article
  10. 19950

    Phantom hairy black holes and wormholes in Einstein-bumblebee gravity by Chikun Ding, Changqing Liu, Yuehua Xiao, Jun Chen

    Published 2025-01-01
    “…., the regular phantom black hole reported in (Phys Rev Lett 96:251101), the first law cannot be constructed at all. We also show there still exists a stable circular orbit around the BP black hole. …”
    Get full text
    Article
  11. 19951

    ANTHROPOLOGICAL COMPONENT OF DESCARTES’ ONTOLOGY by Anatolii M. Malivskyi

    Published 2014-06-01
    “…The premise for its constructive overcoming is the attention to ambivalence of the basic intention and the significance of ethics in the philosopher’s legacy. …”
    Get full text
    Article
  12. 19952

    Anthropological Component of Descartes’ Ontology by Anatolii M. Malivskyi

    Published 2014-06-01
    “…The premise for its constructive overcoming is the attention to ambivalence of the basic intention and the significance of ethics in the philosopher’s legacy. …”
    Get full text
    Article
  13. 19953

    Polyethylene glycol-based deep eutectic solvents as a novel agent for natural gas sweetening. by Jiyad N Aldawsari, Idowu A Adeyemi, Abdelbasset Bessadok-Jemai, Emad Ali, Inas M AlNashef, Mohamed K Hadj-Kali

    Published 2020-01-01
    “…Thus, an extensive database of estimated Henry's law constants (Hi) and solubilities (xi) of CO2 in 170 different DESs at 25°C has been constructed using the COSMO-RS method to select potential DESs. …”
    Get full text
    Article
  14. 19954

    Software diversity evaluation method based on the properties of ROP/JOP gadgets by Yuning CHI, Yunfei GUO, Yawen WANG, Hongchao HU

    Published 2022-12-01
    “…In order to reduce the risk of rapid spread of homogeneous attacks in network systems, and enhance network and software security, software diversification technologies are applied widely nowadays.Software diversification aims to generate functionally equivalent but internally changed program variants, thereby alter a single operating environment and mitigating homogenization attacks.The existing diversified technical evaluation index ROP gadgets survival rate is difficult to directly reflect the safety impact and the evaluation method is single.In order to evaluate the effectiveness of the diversification method more comprehensively and effectively, a software diversification evaluation method based on the properties of ROP/JOP gadgets is proposed, by analyzing common code reuse attacks, and turns abstract quantification into concrete indicators evaluates the security gain and effect of diversified methods from three aspects of space, time and quality.The method first discusses how diversification techniques affect ROP/JOP attacks according to the three properties of gadgets similarity, damage degree and availability.Nine kinds of diversification methods, such as instruction replacement, NOP insertion, and control flow flattening, are used to diversify the GNU coreutils assembly to generate diversification assembly.Experiments based on the property of gadgets are carried out on the diverse assemblies, and the effectiveness of different diversification methods and the impact on attacks are evaluated according to the experimental results.The experimental results show that this method can accurately evaluate the security gain of software diversification methods, the diversification technology will lead to the increase of the attack chain space required by the ROP/JOP attack, the longer time to construct the attack chain and the lower the attack success rate.The effects of different diversification methods are different, it has a guiding role for the follow-up research on diversified technologies with higher safety gains.…”
    Get full text
    Article
  15. 19955

    Drivers of innovation value: simulation for new drug pricing evaluation based on system dynamics modelling by Qian Xing, Wendi Cheng, Wei Wang, Chunlin Jin, Haiyin Wang

    Published 2025-01-01
    “…Assessing and exploiting the factors influencing innovation premium to forecast trends and shortcomings within the pharmaceutical innovation ecosystem.MethodsUtilizing system dynamics, this research constructs a decision evaluation system for new drug pricing in Japan. …”
    Get full text
    Article
  16. 19956

    Optimisation of Graphene Nanofiller Addition on the Mechanical and Adsorption Properties of Woven Banana/Polyester Hybrid Nanocomposites by Grey-Taguchi Method by L. Natrayan, P. V. Arul Kumar, S. Kaliappan, S. Sekar, Pravin P. Patil, G. Velmurugan, Murtesa Dabesa Gurmesa

    Published 2022-01-01
    “…The main objective of the current experiment is to determine how the accumulation of graphene to hybrid polyester composites reinforced with woven banana fibre affects their mechanical properties. Composites were constructed utilising the hand lay-up process with the following limitations: (i) graphene filler weightiness, (ii) woven banana fibre thickness in gsm, and (iii) number of woven banana layers, all at three different levels. …”
    Get full text
    Article
  17. 19957

    An Analytical Solution for the Steady Seepage of Localized Line Leakage in Tunnels by Jun Yu, Chi Zhang, Dongkai Li

    Published 2024-12-01
    “…Finally, the principle of orthogonality of trigonometric functions is specially adopted to construct a non-homogeneous system of equations to solve the unknowns in the analytical solution, and through the inverse transformation of the conformal transformation, an analytical solution for the steady-state seepage field when localized line leakage occurs in a tunnel is obtained. …”
    Get full text
    Article
  18. 19958

    Errors in Latin Inscriptions on Renaissance Works of Fine Art by Lazer-Pankiv Olesia, Korolova Nataliia

    Published 2024-12-01
    “…Fewer are the errors of the morphological (declension) and syntactic (use of syntactic constructions, agreement, etc.) levels. Even rarer are the lexical deviations from the norms of classical Latin: most of the vocabulary of the inscriptions comes from the classical period. …”
    Get full text
    Article
  19. 19959

    Explanation the Functional principals of Spatial Governance in trans structure framework methodology by Ehsan Lashgari Tafreshi, َabbas Ahmadi

    Published 2019-09-01
    “…According to the governance framework, the management and production of space is not only an objective or objective action, but also it is a constructive, unfinished, contingent, and conditional, conditional and social condition. therefore, the space policy was created in a cultural-historical territory must be consistent with the cultural and historical values of a particular of human beings group and the conditions for the development and optimization of space by these policies should fit into the pattern of their social life. in governance approach, some of the concepts such as truth, rationality, justice, goodness, and especially development, are not independent from its the social processes that shape it. …”
    Get full text
    Article
  20. 19960