-
541
Graph-based two-level indicator system construction method for smart city information security risk assessment
Published 2024-08-01“…However, existing methods cannot effectively analyze internal and hierarchical relationships because of the excessive number of indicators. …”
Get full text
Article -
542
Ontology-based expansion of virtual gene panels to improve diagnostic efficiency for rare genetic diseases
Published 2025-02-01“…Conclusion We have developed novel methods for VGP design that leverage the hierarchical structure of the Mondo disease ontology to improve rare genetic disease diagnosis efficiency. …”
Get full text
Article -
543
The exploitation of “Grade of Membership (GoM) model” and “Combined Analysis method” in analysing of urban dynamics and urban hierarchy in Khorasan region (1956-2016)
Published 2021-12-01“…As for future studies, which will seek to understand the hierarchical urban organization of other regions of the country and of the world, these indicators may be incorporated if adapted to the regional reality.…”
Get full text
Article -
544
Effect of Electroacupuncture Combined with Traditional Chinese Medicine Fumigation and Traditional Exercises in Treating Knee Osteoarthritis Rehabilitation
Published 2018-06-01“…Traditional Chinese medicine fumigation and traditional exercises were given to the patients in the control group; the trial group was received electroacupuncture as an additional therapy on the basis of the control group treatment. The hierarchical quantitative score of KOA, the visual analogue scale (VAS) score, the dosage of meloxicam, five-times-sit-to-stand test (FTSST) and knee joint flexion and extension of two groups were evalued and analyzed after four weeks of treatment.Results:After the treatment, the hierarchical quantitative score of KOA, VAS score, and FTSST were lower than before, and knee joint flexion and extension of both groups were improved (<italic>P</italic><0.01), the value differences before and after treatment of two groups had statistical significance (<italic>P</italic><0.01).The dosage of meloxicam of the trial group was significantly less than the control group (<italic>P</italic><0.01).Conclusion:Electroacupuncture combined with traditional Chinese medicine fumigation and traditional exercises could significantly relieve the pain, improve the comprehensive functions of knee joint and muscle strength of the lower limb, and increase the range of motion.…”
Get full text
Article -
545
Recognizing structure in novel tunes: differences between human and rats
Published 2024-03-01“…Abstract A central feature in music is the hierarchical organization of its components. Musical pieces are not a simple concatenation of chords, but are characterized by rhythmic and harmonic structures. …”
Get full text
Article -
546
Methods and technologies for adaptation of main and auxiliary equipment of compressor plants and stations to unstable operating conditions
Published 2023-10-01“…The hierarchical structure of the compressor industry facilities is presented, taking into account their interaction and mutual influence. …”
Get full text
Article -
547
Evaluating the Development Level of Agriculture Rating Rural Settlements for Wilderness Tourism Development Using ELECTERE III Techniques: A Case Study in Khurbiabanak
Published 2013-05-01“…Then, after completing the paired comparison questionnaires by expert and applying the hierarchical process (AHP), the weight of each criterion has been determined. …”
Get full text
Article -
548
The bristle pattern development in Drosophila melanogaster: the prepattern and achaete-scute genes
Published 2019-01-01“…The structural organization and principles of operation of the hierarchical molecular genetic system enabling the local expression of ASC genes and the resulting formation of ordered bristle pattern are described.…”
Get full text
Article -
549
Visual Analysis of E-Commerce User Behavior Based on Log Mining
Published 2022-01-01“…The system uses dimensional modeling to build a data warehouse hierarchical system to mine and analyze user behavior data through log mining algorithm deeply. …”
Get full text
Article -
550
THE ENSURING FUNCTIONAL INTERCHANGEABILITY WHEN FORMING THE CONTROL COMPLEX OF INDICATORS OF THE INITIAL CONDITION OF THE CONSUMER OF SPORTS AND IMPROVING SERVICES
Published 2017-09-01“…On its basis the hierarchical model of rating of informtiveness of a complex of the single (measured) indices, the providing objectivity of an integral assessment of the initial status is developed. …”
Get full text
Article -
551
Energy Adaptive Collaborative Charging Scheduling for Wireless Rechargeable Sensor Networks
Published 2024-01-01“…Next, we design a hybrid algorithm of the mean-shift and hierarchical clustering algorithm to cluster the charging groups into the charging zones, which ensures the compactness of the sensor nodes in each charging zone and the balance of the charging load distribution. …”
Get full text
Article -
552
Deployment optimization for a long-distance wireless backhaul network in industrial cyber physical systems
Published 2017-11-01“…For small networks, we propose a hierarchical traversal method to obtain the optimal solution, whereas for a large network, we used a hierarchical heuristic method to obtain an approximate solution, and for extremely large networks, we used a parallel interactive local search algorithm based on dynamic programming. …”
Get full text
Article -
553
Formal Verification Method for Configuration of Integrated Modular Avionics System Using MARTE
Published 2018-01-01“…After that, a special issue of schedulability analysis of ARINC653 system is studied. We design a hierarchical scheduling strategy with consideration of characters of the ARINC653 system, and a scheduling analyzer MAST-2 is used to implement hierarchical schedule analysis. …”
Get full text
Article -
554
The Construction of Regulatory Network for Insulin-Mediated Genes by Integrating Methods Based on Transcription Factor Binding Motifs and Gene Expression Variations
Published 2015-09-01“…We then looked for a hierarchical network of the candidate regulators, in such a way that the conditional combination of their expression changes may explain those of their target genes. …”
Get full text
Article -
555
INDICATORS OF EFFICIENCY OF THE PILOTLESS AVIATION COMPLEX
Published 2014-05-01“…The general principles of an estimation of efficiency of application of pilotless aviation complexes are considered at monitoring of a terrestrial surface in the conditions of presence of unauthenticity of the information on the basis of mathematical modelling with the account of hierarchical construction and influence of the human factor. …”
Get full text
Article -
556
Research on dependencies in simulated DNA sequences
Published 2005-12-01“… Many publications in bio-informatics deal with long-range correlation of nucleotides in DNA sequences, which implies that such sequences are complicated systems with hierarchical structure. Applying the method of simulation, this work reveals that long-range correlation might develop in the course of evolution of a sequence under very general rules. …”
Get full text
Article -
557
Discrete resource allocation to groups of customers
Published 2005-12-01“… The paper deals with the non-homogeny discrete resource allocation to groups of customers with non-linear profit functions. The fast hierarchical greedy algorithms are presented and investigated. …”
Get full text
Article -
558
The Predictive Power of Students' Metacognition and Perceptions of Instructional Competencies of Instructors on Academic Life Satisfaction
Published 2024-08-01“…The hierarchical regression included the student's achievement perception as a control variable. …”
Get full text
Article -
559
Sparse Deep Nonnegative Matrix Factorization
Published 2020-03-01“…However, deep learning networks, with their carefully designed hierarchical structure, can combine hidden features to form more representative features for pattern recognition. …”
Get full text
Article -
560
Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks
Published 2023-02-01“…With the characteristics of large space-time and satellite-ground network integration, the space integrated ground network has attracted much attention.Satellites can not only be used as emergency communication supplements, but also serve as air stations to expand the coverage of terrestrial networks, occupying an important position in both military and civilian scenarios.The entity authentication and key negotiation mechanism can prevent the malicious entities from joining the integrated network to steal users’ privacy, and guarantee network information security.In view of the characteristics of the high satellite-ground transmission delays, exposed links, limited processing capability and dynamic topology of the integrated network, a lightweight authentication scheme between satellites and ground suitable for double-layer satellite network was proposed to achieve a secure satellite networking architecture with session keys to protect data transmission.The scheme was based on symmetric cryptographic system, using lightweight cryptographic algorithms and introducing group key and hierarchical management mechanisms.The proposed scheme included three parts: inter-satellite authentication for geostationary earth orbit satellites, layer and inter-satellite authentication for same low earth orbit, and inter-satellite authentication for adjacent low earth orbit satellites.The group key and hierarchical management mechanism improved the efficiency of inter-group information transfer, reduced the authentication pressure on the ground control center, and enhanced the authentication security strength by realizing double verification in the three-entities authentication protocol.Different from the previous single scene authentication, the proposed authentication protocol took the form of multiplexing authentication parameters, which can realize the authentication requirements of dual scenes in one process.The results of Scyther, a protocol formal security simulation tool, show that the proposed scheme achieves secure access authentication.Compared with existing protocols, the proposed scheme improves authentication security and reduces communication and computational overhead.…”
Get full text
Article