Suggested Topics within your search.
Suggested Topics within your search.
- Effective teaching 2
- Elementary school teaching 2
- Quality of life 2
- Social conditions 2
- Social problems 2
- ART / Digital 1
- Artificial intelligence 1
- Business 1
- Business communication 1
- Business ethics 1
- Child welfare 1
- Communication of technical information 1
- Computer animation 1
- Computer programs 1
- Criminal law 1
- Cultural policy 1
- Cultural property 1
- Custody of children 1
- Digital cinematography 1
- Electronic spreadsheets 1
- Evidence (Law) 1
- Executive coaching 1
- Family assessment 1
- Family psychotherapy 1
- Foreign Exchange Rates 1
- Forensic child psychology 1
- Historic preservation 1
- Human geography 1
- Industrial design 1
- Intelligent control systems 1
-
2201
Misdiagnosis of Psychosis and Obsessive-Compulsive Disorder in a Young Patient with Autism Spectrum Disorder
Published 2023-01-01“…It is not easy to differentiate ASD from psychosis among some adult patients, even for expert psychiatrists. Cognitive rigidity in ASD may be similar to delusions in psychosis. …”
Get full text
Article -
2202
Responsibility as a consolidation factor in the urban community of the Russian border region
Published 2024-12-01“…The article is based on the results of the authors’ sociological study conducted in 2022-2023 using the survey of urban residents in the Belgorod, Kursk and Voronezh Regions, expert survey and focus groups. The study showed the ambiguity and even paradoxical nature of common judgments regarding the extent of responsibility for oneself and society. …”
Get full text
Article -
2203
Strategy for Reducing Stunting Rate Using Analytical Hierarchy Process in Garut District
Published 2024-07-01“…The analysis method uses the Analytical Hierarchy Process method along with an analysis tool called Expert Choice software to make choosing the most important criteria, sub-criteria, and options easier. …”
Get full text
Article -
2204
Circumstances to Be Clarified under the Investigation of Interference into Law Enforcement Officer’s Activity
Published 2021-07-01“…In order to determine the circumstances to be clarified during the investigation of interference in the activities of a law enforcement officer, the author has studied the circumstances to be clarified within the group of criminal offenses related to obstruction of the activities of a law enforcement officer, as well as during the investigation of interference in the activities of a forensic expert. Taking into account the specified scientific provisions, the author has defined a detailed list of circumstances to be clarified during the investigation of interference in the activities of a law enforcement officer. …”
Get full text
Article -
2205
Multiobjective Optimization of Hard Turning on OHNS Steel Using Desirability and TOPSIS Approaches
Published 2024-01-01“…The seventeen experimental trials were designed by central composite design (CCD) with different levels of cutting parameters, like feed rate, cutting speed, and depth of cut. Design Expert-11 software desirability approach and TOPSIS (Technique for Order Preference by Simulating the Ideal Solution) were used to analyse the experimental results to obtain a single optimal solution that defines better results on metal removal rate (MRR) and surface finish (Ra). …”
Get full text
Article -
2206
Subject matter of proof and peculiarities of collecting evidence in the investigation of crimes committed against the law enforcement officers
Published 2023-12-01“…It has been determined that the measures of collecting evidence include: investigative (search) and covert investigative (search) actions, some measures to ensure criminal proceedings, as well as things, documents, information, expert opinions, etc. requested and received by the subject of proof from representatives of public authorities, local self-government bodies, enterprises, institutions and organisations, officials and individuals. …”
Get full text
Article -
2207
A Discrete Mathematical Modeling and Optimal Control of the Rumor Propagation in Online Social Network
Published 2020-01-01“…We propose a new version primarily based on the cholera model in order to take into account the expert pages specialized in the dissemination of rumors from an existing IRCSS model. …”
Get full text
Article -
2208
The influence of the use of regulatory codes on the diagnosis of pathologies of reinforced concrete frame bridges
Published 2023-12-01“…To achieve this goal, a frame bridge of total length of 37.2 m, located in the wilaya of Tiaret in Algeria, is expertized. It consists of two parts, one cast on site and the other prefabricated in reinforced concrete; it is classified of low seismicity and as an important bridge according to the Algerian seismic regulation. …”
Get full text
Article -
2209
Adaptive algorithms for change point detection in financial time series
Published 2024-12-01“…The work highlights the potential for future advancements in neural network applications and multi-expert decision systems, further enhancing predictive accuracy in volatile environments.…”
Get full text
Article -
2210
The Present and the Future of the Special Relationship: The Debate in the United States and the United Kingdom
Published 2020-11-01“…The second section examines the expert and political discourse on the current state and the future of the AASR in the 2010s as well as its media coverage. …”
Get full text
Article -
2211
Design and analysis of intelligent service chain system for network security resource pool
Published 2022-08-01“…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
Get full text
Article -
2212
The Regional Subsystem Concept: From Heterogeneity to Pluralism
Published 2020-11-01“…The author emphasizes that this initial foundational phase for the development of the research field was marked by extreme heterogeneity of views, opinions and assessments. The experts suggested various principles and criteria for identifying regional subsystems, while the very meaning of a ‘regional subsystem’ has not yet been settled. …”
Get full text
Article -
2213
Rule-based ai system for early paediatric diabetes diagnosis using backward chaining and certainty factors
Published 2025-01-01“…The aim of this study was to develop an artificial intelligence (AI)-based expert system for the early diagnosis of paediatric Type 1 DM using backward chaining and certainty factor methods. …”
Get full text
Article -
2214
Adaptive selection method of desensitization algorithm based on privacy risk assessment
Published 2023-06-01“…The financial industry deals with a vast amount of sensitive data in its business operations.However, the conventional approach of binding financial data for desensitization and using desensitization algorithms is becoming inefficient due to the fast-paced growth of financial businesses and the proliferation of data types.Additionally, manual verification and assessment of desensitized data by security experts are time-consuming and may carry potential privacy risks due to the improper selection of desensitization algorithms.While prior research has emphasized desensitization methods and privacy-preserving technologies, limited work has been conducted on desensitization algorithms from the perspective of automation.To address this issue, an adaptive recommendation framework was propose for selecting desensitization strategies that consider various factors, such as existing privacy protection technologies, data quality requirements of business scenarios, security risk requirements of financial institutions, and data attributes.Specifically, a dual-objective evaluation function was established for privacy risk and data quality to optimize the selection of desensitization algorithm parameters for different algorithms.Furthermore, the desensitization algorithm and parameters were adaptively selected by considering the data attributes through a multi-decision factor system and desensitization effect evaluation system.Compared to traditional approaches, the proposed framework effectively tackle issues of reduced data usability and inadequate personal data privacy protection that derive from manual intervention.Testing on a dataset with multiple financial institution types, the experiments show that the proposed method achieves a recommendation accuracy exceeding 95%, while the desensitized privacy risk level differed by less than 10% from the expected level.Additionally, the recommendation efficiency is 100 times faster than expert manual processing.…”
Get full text
Article -
2215
A Data Fusion System for Simulation of Critical Scenarios and Decision-Making
Published 2019-11-01“…This document describes the proposed architecture from a research process, developed by the FAC Aerospace Technology Development Center (CETAD), where using computational and expert system tools, allowed to create a computational environment for decision maker evaluated his options to prepares for real events, simulating characteristics, resources and strategies in a real time environment. …”
Get full text
Article -
2216
Regional governance as a success factor in protected area management. Network analysis of the Lüneburg Heath Nature Park (Germany)
Published 2025-01-01“…In the core group, data was generated from 12 semi-structured expert interviews. We identified existing communicative and collaborative structures between key actors, local rights holders and stakeholders facing implementation challenges. …”
Get full text
Article -
2217
Critical analysis of methods for measuring and monitoring of the population life quality
Published 2022-01-01“…Using the methods of content analysis, comparison, systems analysis, expert assessment, etc., the features of contemporary quality of life assessment tools have been highlighted. …”
Get full text
Article -
2218
Learning Slope and Position Effects in Rey Auditory Verbal Learning Test: Diagnostic Value in Schizophrenia
Published 2024-11-01“… <p>Impairments of verbal episodic memory are a central component of cognitive deficits in schizophrenia, and their investigation is important for solving diagnostic, expert and rehabilitation tasks. The study aimed to test the ability of learning slope and serial position effects to differentiate schizophrenia patients from non-psychiatric controls. …”
Get full text
Article -
2219
Communication Culture as a Matrix for Graduate's “Soft Skills” Development
Published 2020-12-01“…At the same time, an expert survey of recruiting specialists who assessed the level of communication skills of graduates majoring in economics and management showed a vivid disparity between free use of digital technologies (digital skills) and poor communication skills (soft skills).An analysis of the online questionnaire survey of teachers and students in the field of economics and management of nine Russian universities revealed barriers to the formation of “soft skills” of future graduates: inability to see the interests of the “Other”, the habit of pointing fingers instead of solving problems, the lack of client-oriented skills as well as willingness to take personal responsibility for the results of work. …”
Get full text
Article -
2220
Genetic Analysis Reveals A Missense Mutation In Reactivation Gene-2 Causing Severe Combined Immunodeficiency Disease In A Pakistani Family
Published 2024-06-01“…Results: Thorough clinical examination by team of expert physician revealed severe nappy rash, interstitial pneumonitis and intractable diarrhea leading to failure to thrive. …”
Get full text
Article