Showing 2,201 - 2,220 results of 5,289 for search '"expert"', query time: 0.08s Refine Results
  1. 2201

    Misdiagnosis of Psychosis and Obsessive-Compulsive Disorder in a Young Patient with Autism Spectrum Disorder by Jiangbo Ying, Melvyn Weibin Zhang, Sreedharan Geetha Sajith, Giles Ming-Yee Tan, Ker-Chiah Wei

    Published 2023-01-01
    “…It is not easy to differentiate ASD from psychosis among some adult patients, even for expert psychiatrists. Cognitive rigidity in ASD may be similar to delusions in psychosis. …”
    Get full text
    Article
  2. 2202

    Responsibility as a consolidation factor in the urban community of the Russian border region by V. P. Babintsev, G. N. Gaidukova, Zh. A. Shapoval

    Published 2024-12-01
    “…The article is based on the results of the authors’ sociological study conducted in 2022-2023 using the survey of urban residents in the Belgorod, Kursk and Voronezh Regions, expert survey and focus groups. The study showed the ambiguity and even paradoxical nature of common judgments regarding the extent of responsibility for oneself and society. …”
    Get full text
    Article
  3. 2203

    Strategy for Reducing Stunting Rate Using Analytical Hierarchy Process in Garut District by Mila Karmila, Ikeu Kania, Mochammad Iqbal Fadhlurrohman, Dena Ananda Hilmaniah

    Published 2024-07-01
    “…The analysis method uses the Analytical Hierarchy Process method along with an analysis tool called Expert Choice software to make choosing the most important criteria, sub-criteria, and options easier. …”
    Get full text
    Article
  4. 2204

    Circumstances to Be Clarified under the Investigation of Interference into Law Enforcement Officer’s Activity by V. O. Gusieva

    Published 2021-07-01
    “…In order to determine the circumstances to be clarified during the investigation of interference in the activities of a law enforcement officer, the author has studied the circumstances to be clarified within the group of criminal offenses related to obstruction of the activities of a law enforcement officer, as well as during the investigation of interference in the activities of a forensic expert. Taking into account the specified scientific provisions, the author has defined a detailed list of circumstances to be clarified during the investigation of interference in the activities of a law enforcement officer. …”
    Get full text
    Article
  5. 2205

    Multiobjective Optimization of Hard Turning on OHNS Steel Using Desirability and TOPSIS Approaches by C. Manikandan, B. Rajeswari, Dhanesh G. Mohan, R. M. Aravind

    Published 2024-01-01
    “…The seventeen experimental trials were designed by central composite design (CCD) with different levels of cutting parameters, like feed rate, cutting speed, and depth of cut. Design Expert-11 software desirability approach and TOPSIS (Technique for Order Preference by Simulating the Ideal Solution) were used to analyse the experimental results to obtain a single optimal solution that defines better results on metal removal rate (MRR) and surface finish (Ra). …”
    Get full text
    Article
  6. 2206

    Subject matter of proof and peculiarities of collecting evidence in the investigation of crimes committed against the law enforcement officers by O. O. Sharova-Aidaieva

    Published 2023-12-01
    “…It has been determined that the measures of collecting evidence include: investigative (search) and covert investigative (search) actions, some measures to ensure criminal proceedings, as well as things, documents, information, expert opinions, etc. requested and received by the subject of proof from representatives of public authorities, local self-government bodies, enterprises, institutions and organisations, officials and individuals. …”
    Get full text
    Article
  7. 2207

    A Discrete Mathematical Modeling and Optimal Control of the Rumor Propagation in Online Social Network by Amine El Bhih, Rachid Ghazzali, Soukaina Ben Rhila, Mostafa Rachik, Adil El Alami Laaroussi

    Published 2020-01-01
    “…We propose a new version primarily based on the cholera model in order to take into account the expert pages specialized in the dissemination of rumors from an existing IRCSS model. …”
    Get full text
    Article
  8. 2208

    The influence of the use of regulatory codes on the diagnosis of pathologies of reinforced concrete frame bridges by Lakhal Sebahi, Mohamed Bensoula, Mohamed Zaoui, Tahar Kadri

    Published 2023-12-01
    “…To achieve this goal, a frame bridge of total length of 37.2 m, located in the wilaya of Tiaret in Algeria, is expertized. It consists of two parts, one cast on site and the other prefabricated in reinforced concrete; it is classified of low seismicity and as an important bridge according to the Algerian seismic regulation. …”
    Get full text
    Article
  9. 2209

    Adaptive algorithms for change point detection in financial time series by Alexander Musaev, Dmitry Grigoriev, Maxim Kolosov

    Published 2024-12-01
    “…The work highlights the potential for future advancements in neural network applications and multi-expert decision systems, further enhancing predictive accuracy in volatile environments.…”
    Get full text
    Article
  10. 2210

    The Present and the Future of the Special Relationship: The Debate in the United States and the United Kingdom by A. O. Mamedova

    Published 2020-11-01
    “…The second section examines the expert and political discourse on the current state and the future of the AASR in the 2010s as well as its media coverage. …”
    Get full text
    Article
  11. 2211

    Design and analysis of intelligent service chain system for network security resource pool by Zenan WANG, Jiahao LI, Chaohong TAN, Dechang PI

    Published 2022-08-01
    “…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
    Get full text
    Article
  12. 2212

    The Regional Subsystem Concept: From Heterogeneity to Pluralism by N. S. Labutkin

    Published 2020-11-01
    “…The author emphasizes that this initial foundational phase for the development of the research field was marked by extreme heterogeneity of views, opinions and assessments. The experts suggested various principles and criteria for identifying regional subsystems, while the very meaning of a ‘regional subsystem’ has not yet been settled. …”
    Get full text
    Article
  13. 2213

    Rule-based ai system for early paediatric diabetes diagnosis using backward chaining and certainty factors by Al-Hakim Rosyid R., Setiawan Retno Agus, Hidayat Rachman, Arkananta Edgina R., Samodra Galih, Jayusman Hadi, Suryani Riska, Famuji Tri Styo

    Published 2025-01-01
    “…The aim of this study was to develop an artificial intelligence (AI)-based expert system for the early diagnosis of paediatric Type 1 DM using backward chaining and certainty factor methods. …”
    Get full text
    Article
  14. 2214

    Adaptive selection method of desensitization algorithm based on privacy risk assessment by Lijun ZU, Yalin CAO, Xiaohua MEN, Zhihui LYU, Jiawei YE, Hongyi LI, Liang ZHANG

    Published 2023-06-01
    “…The financial industry deals with a vast amount of sensitive data in its business operations.However, the conventional approach of binding financial data for desensitization and using desensitization algorithms is becoming inefficient due to the fast-paced growth of financial businesses and the proliferation of data types.Additionally, manual verification and assessment of desensitized data by security experts are time-consuming and may carry potential privacy risks due to the improper selection of desensitization algorithms.While prior research has emphasized desensitization methods and privacy-preserving technologies, limited work has been conducted on desensitization algorithms from the perspective of automation.To address this issue, an adaptive recommendation framework was propose for selecting desensitization strategies that consider various factors, such as existing privacy protection technologies, data quality requirements of business scenarios, security risk requirements of financial institutions, and data attributes.Specifically, a dual-objective evaluation function was established for privacy risk and data quality to optimize the selection of desensitization algorithm parameters for different algorithms.Furthermore, the desensitization algorithm and parameters were adaptively selected by considering the data attributes through a multi-decision factor system and desensitization effect evaluation system.Compared to traditional approaches, the proposed framework effectively tackle issues of reduced data usability and inadequate personal data privacy protection that derive from manual intervention.Testing on a dataset with multiple financial institution types, the experiments show that the proposed method achieves a recommendation accuracy exceeding 95%, while the desensitized privacy risk level differed by less than 10% from the expected level.Additionally, the recommendation efficiency is 100 times faster than expert manual processing.…”
    Get full text
    Article
  15. 2215

    A Data Fusion System for Simulation of Critical Scenarios and Decision-Making by Jimmy Anderson Flórez Zuluaga, Esteban Patiño Carrasco, Jose David Ortega Pabón, Kelly Gallego León, O. Lucía Quintero Montoya

    Published 2019-11-01
    “…This document describes the proposed architecture from a research process, developed by the FAC Aerospace Technology Development Center (CETAD), where using computational and expert system tools, allowed to create a computational environment for decision maker evaluated his options to prepares for real events, simulating characteristics, resources and strategies in a real time environment. …”
    Get full text
    Article
  16. 2216

    Regional governance as a success factor in protected area management. Network analysis of the Lüneburg Heath Nature Park (Germany) by Kerstin Ströbel, Hubert Job, Eick von Ruschkowski

    Published 2025-01-01
    “…In the core group, data was generated from 12 semi-structured expert interviews. We identified existing communicative and collaborative structures between key actors, local rights holders and stakeholders facing implementation challenges. …”
    Get full text
    Article
  17. 2217

    Critical analysis of methods for measuring and monitoring of the population life quality by A. A. Golovin

    Published 2022-01-01
    “…Using the methods of content analysis, comparison, systems analysis, expert assessment, etc., the features of contemporary quality of life assessment tools have been highlighted. …”
    Get full text
    Article
  18. 2218

    Learning Slope and Position Effects in Rey Auditory Verbal Learning Test: Diagnostic Value in Schizophrenia by M. Alfimova, V.V. Plakunova, V.E. Golimbet

    Published 2024-11-01
    “… <p>Impairments of verbal episodic memory are a central component of cognitive deficits in schizophrenia, and their investigation is important for solving diagnostic, expert and rehabilitation tasks. The study aimed to test the ability of learning slope and serial position effects to differentiate schizophrenia patients from non-psychiatric controls. …”
    Get full text
    Article
  19. 2219

    Communication Culture as a Matrix for Graduate's “Soft Skills” Development by N. G. Chevtaeva, A. S. Nikitina, A. V. Vishnevskaya

    Published 2020-12-01
    “…At the same time, an expert survey of recruiting specialists who assessed the level of communication skills of graduates majoring in economics and management showed a vivid disparity between free use of digital technologies (digital skills) and poor communication skills (soft skills).An analysis of the online questionnaire survey of teachers and students in the field of economics and management of nine Russian universities revealed barriers to the formation of “soft skills” of future graduates: inability to see the interests of the “Other”, the habit of pointing fingers instead of solving problems, the lack of client-oriented skills as well as willingness to take personal responsibility for the results of work. …”
    Get full text
    Article
  20. 2220

    Genetic Analysis Reveals A Missense Mutation In Reactivation Gene-2 Causing Severe Combined Immunodeficiency Disease In A Pakistani Family by Shahida Awais, Lubna Siddique, Nida Shafi, Sobia Humerah, Summyah Niazi, Wafa Omer

    Published 2024-06-01
    “…Results:  Thorough clinical examination by team of expert physician revealed severe nappy rash, interstitial pneumonitis and intractable diarrhea leading to failure to thrive. …”
    Get full text
    Article