-
281
Integrated hydrothermal evolution of a Botucatu paleodune and a blanketing lava flow from the Serra Geral Group, Uruguaiana
Published 2025-02-01“…The strongly altered volcanic zircon preserved in the reddened Catalán Flow yields a concordia-intercept age of 137.3 ±7.6 Ma. Complex processes are thus constrained in the evolution of the Botucatu Formation and the first Serra Geral lava flow.…”
Get full text
Article -
282
Single-Lung Transplant Results in Position Dependent Changes in Regional Ventilation: An Observational Case Series Using Electrical Impedance Tomography
Published 2016-01-01“…A mixed model with random intercept per subject was used for statistical analysis. …”
Get full text
Article -
283
Numerical Simulation of Dynamic Characteristics of Dam Concrete Based on Fuzzy Set
Published 2021-01-01“…Based on the definition of integrity, integrity area, and intercepted sections in the quantitative zoning theory, the concrete CT images were divided into the hole or crack area (P0−λ1), hardened cement stone area (Pλ1−λ2), and aggregate area (Pλ2−1). …”
Get full text
Article -
284
Starting then stopping: a nationwide register-based study on the magnitude, predictors, and urban-rural patterns of under-vaccination variation across health centers in The Gambia
Published 2024-12-01“…We cross tabulated under-vaccination status across study variables and fitted two-level random intercept multilevel logistic regression models to measure variance, contribution to the variance, and factors associated with the variance and under-vaccination. …”
Get full text
Article -
285
Controls of lithology and climate over chemical weathering trends: new insights from the precipitation-dominated Dokriani glacier, central Himalaya, India
Published 2024-01-01“…We observed a clear control of carbonic acid-mediated reactions in the early ablation periods, while sulfuric acid-mediated reactions dominate in peak and late ablation periods. The slopes and intercepts in best-fit regressions of [*Ca2+ + *Mg2+ vs *SO42− and HCO3−] and [HCO3− vs *SO42−] in meltwater were following the stoichiometric parameters of sulfide oxidation coupled to carbonate dissolution reactions. …”
Get full text
Article -
286
Hikikomori, a risk factor for life-threatening malnutrition: a case report of an emergency within the vulnerability
Published 2025-02-01“…The Emergency Department necessitates a more integrated approach with social and out-of-hospital health services for intercepting and addressing the needs of vulnerable individuals. …”
Get full text
Article -
287
Quantitative Determination of 18-β-Glycyrrhetinic Acid in HepG2 Cell Line by High Performance Liquid Chromatography Method
Published 2018-01-01“…The LOD and LOQ were determined based on standard deviation of the y-intercept and the slope of the calibration curve. The LOD and LOQ values were found to be 11.46 μg/mL and 34.72 μg/mL, respectively. …”
Get full text
Article -
288
A Comparison between Atlantic Canadian and National Correction Equations to Improve the Accuracy of Self-Reported Obesity Estimates in Atlantic Canada
Published 2012-01-01“…Using separate multiple regression models for men and women, self-reported body mass index (BMI) was corrected by multiplying the self-reported estimate by its corresponding model coefficient and adding the model intercept. Paired t-tests were used to determine whether corrected mean BMI values were significantly more accurate (i.e., closer to measured data) than the equivalent means based on self-reported data. …”
Get full text
Article -
289
Psychometric comparison of two short versions of the Perceived Stress Scale (PSS-4) in a representative sample of the German population
Published 2025-01-01“…Specifically, the original PSS-4 by Cohen et al. suffers from response style effects, which we remedied using random intercept factor analysis. With the addition of the method factor, it is a highly reliable and valid scale. …”
Get full text
Article -
290
MalAware: A tabletop exercise for malware security awareness education and incident response training
Published 2024-01-01“…Despite that, this interconnectivity and data sharing between systems and devices over the internet poses security and privacy risks as threat actors can intercept, steal, and use owners’ data for nefarious purposes. …”
Get full text
Article -
291
Reservoir connectivity in deep-water turbidite deposits over geological and production time scales: an integrated study of the Shwe field, Bay of Bengal
Published 2024-10-01“…From a geological perspective, the results indicate that: (1) multiple water intercepts at a single gas gradient imply the presence of a connected reservoir with non-producible perched waters; (2) compensational stacking leads to extensive overlaps between lobe element layers, enhancing lateral reservoir connectivity through a high net-to-gross ratio (avg. 82%; max. 100%) and multiple amalgamated sand-sand contacts; and (3) sand injectites act as conduits between vertically separated reservoirs, contributing to gas production. …”
Get full text
Article -
292
A Review Study on the Main Sources of Porosity in Al-Si Cast Alloys
Published 2021-01-01“…Intermetallics precipitate in the form of intercepted platelets which restricts the flow of the molten metal, leading to formation of shrinkage cavities. …”
Get full text
Article -
293
Cerium(III)-Selective Membrane Electrode Based on Dibenzo-24-crown-8 as a Neutral Carrier
Published 2010-01-01“…The internal solution concentration does not have a significant effect on the response of the electrode except for a change in intercept of the calibration curves. The working pH range for Ce(III) solutions (1x10-2 M and 1x10-3 M) is 3.5-8.0. …”
Get full text
Article -
294
Application of Image Recognition Algorithm Based on Partial Differential Equation and Wavelet Transform in the Intelligent Linkage System of Government Urban Public Management
Published 2021-01-01“…Due to the limitations of research ability and objective conditions, this article intercepts the “cross-section” of the big linkage mechanism in a certain street to demonstrate it and analyzes this “cross-section” more thoroughly. …”
Get full text
Article -
295
Monitoring Cortical and Neuromuscular Activity: Six-month Insights into Knee Joint Position Sense Following ACL Reconstruction
Published 2024-11-01“…Linear mixed models were performed with group (ACL or controls), the measurement time point, and respective limb as fixed effect and each grouping per subject combination as random effect with random intercept. # Results Significantly higher beta-2 power over the frontal region of interest was observed at the first measurement time point in the non-involved limb of the ACL group in comparison to the control group (p = 0.03). …”
Get full text
Article -
296
An Overview of Composite Standard Elastic-Net Distribution Based on Complex Wavelet Coefficients
Published 2022-01-01“…On the other hand, some methods depend on the slope, and the intercept is recommended. These methods can be described as thresholding rules. …”
Get full text
Article -
297
Generation and verification method of trusted signature seal incorporating handwriting features
Published 2024-02-01“…With the rapid development of electronic communication and internet technology, the digitization of document circulation and processing has become increasingly prevalent.The trend towards greater convenience, flexibility, and diversity in electronic document signing is evident through practices such as online signature collection, remote signature confirmation, and electronic signature authentication.However, the signing and verification processes face challenges related to authenticity, integrity, and more.Instances of unlawful entities intercepting, copying, and forging signature images using low-cost methods to sign documents with false identities, as well as tampering with and forging signature files, are common.The application of electronic signature systems also encounters obstacles such as high costs, limited deployment, lack of universality, and complexities in real-time and consistent verification.To address these risks and challenges and ensure reliable verification in personal document signing processes, a credible method for generating and verifying signature seals that integrate handwriting features was proposed.This method primarily utilized the facial recognition and identity information matching functions of a trusted identity authentication platform.It integrated signature handwriting features and uniquely bound them to the signer's identity for reliable authentication.Accordingly, a signature seal with integrated handwriting features, a verification link for the signed document, and a digital signature QR code were generated.Analysis indicates that the signature seal produced by the proposed method not only serves the purpose of identity verification but also enables the discernment of the authenticity of the signed document.The verification link embedded in the QR code can directly validate the signer's identity, handwriting, and the authenticity and consistency of the signed document through online channels, providing a convenient means for the verification of both electronic and paper documents.The proposed method holds broad application prospects in the fields of electronic document circulation and the verification of the authenticity of electronic and paper documents.…”
Get full text
Article -
298
Extensions to Mean–Geometric Mean Linking
Published 2024-12-01“…Additionally, a simulation study demonstrates that defining MGM linking based on item intercepts rather than item difficulties leads to more accurate linking parameter estimates. …”
Get full text
Article -
299
Encrypted traffic identification method based on deep residual capsule network with attention mechanism
Published 2023-02-01“…With the improvement of users’ security awareness and the development of encryption technology, encrypted traffic has become an important part of network traffic, and identifying encrypted traffic has become an important part of network traffic supervision.The encrypted traffic identification method based on the traditional deep learning model has problems such as poor effect and long model training time.To address these problems, the encrypted traffic identification method based on a deep residual capsule network (DRCN) was proposed.However, the original capsule network was stacked in the form of full connection, which lead to a small model coupling coefficient and it was impossible to build a deep network model.The DRCN model adopted the dynamic routing algorithm based on the three-dimensional convolutional algorithm (3DCNN) instead of the fully-connected dynamic routing algorithm, to reduce the parameters passed between each capsule layer, decrease the complexity of operations, and then build the deep capsule network to improve the accuracy and efficiency of recognition.The channel attention mechanism was introduced to assign different weights to different features, and then the influence of useless features on the recognition results was reduced.The introduction of the residual network into the capsule network layer and the construction of the residual capsule network module alleviated the gradient disappearance problem of the deep capsule network.In terms of data pre-processing, the first 784byte of the intercepted packets was converted into images as input of the DRCN model, to avoid manual feature extraction and reduce the labor cost of encrypted traffic recognition.The experimental results on the ISCXVPN2016 dataset show that the accuracy of the DRCN model is improved by 5.54% and the training time of the model is reduced by 232s compared with the BLSTM model with the best performance.In addition, the accuracy of the DRCN model reaches 94.3% on the small dataset.The above experimental results prove that the proposed recognition scheme has high recognition rate, good performance and applicability.…”
Get full text
Article -
300
Toward efficient authentication for space-air-ground integrated Internet of things
Published 2019-07-01“…While space-air-ground integrated Internet of things is promising to be very useful in many aspects, its deployment and application should overcome severe security threats, for example, interceptions, identity forgery, data tampering, and so on. …”
Get full text
Article