Suggested Topics within your search.
Suggested Topics within your search.
- History 5
- Inheritance and succession 3
- Aging parents 2
- Britons 2
- Cultural property 2
- Fathers and daughters 2
- Historic preservation 2
- Kings and rulers 2
- Law 2
- Nursing assessment 2
- Philosophy 2
- Protection 2
- Religion 2
- methods 2
- Abnormalities 1
- Abnormalities, Human 1
- American literature 1
- Anesthesia 1
- Authoritarianism 1
- Biography 1
- Cardiac Surgical Procedures 1
- Child 1
- Christian education 1
- Christianity 1
- Church history 1
- Church schools 1
- Citizen participation 1
- City and town life 1
- Classification 1
- College readers 1
-
10561
Le diverse facce della montagna in declino: un’esperienza lombarda
Published 2019-04-01“…The lack of snow and dramatic ice melting put in crisis local economy, with decline and recession and is the origin of great natural disasters too, causing a radical change in the way of life of the Alps’ inhabitants. …”
Get full text
Article -
10562
Dinamika Kehidupan Kethoprak di Kabupaten Pati 1950-2007
Published 2023-05-01“…Kethoprak is a traditional performing art originating from Surakarta. Kethoprak is not able to develop optimally in its ownregion, because it cannot compete with wayang wong. …”
Get full text
Article -
10563
From Multivalent Writing to a Poetics of the Book: A Media-Specific Analysis of Mary Ruefle’s A Little White Shadow
Published 2022-12-01“…This work of erasure reproduces the marks Ruefle made to obscure words in the source text of the same name by Emily Malbone Morgan, published in 1889, by creating a facsimile of the original altered with white correction fluid. By utilizing the material object as an essential element of the poem, Ruefle engages this form to move beyond the concept of the book as object or apparatus for presenting poetry. …”
Get full text
Article -
10564
Algorithmic Generation of Parameterized Geometric Models of the Aortic Valve and Left Ventricle
Published 2024-12-01“…In particular, we developed 22 variations of left ventricular geometries, including one original model, seven models with varying wall thicknesses, seven models with varying heights, and seven models with varying shapes. …”
Get full text
Article -
10565
Research on Orbital Angular Momentum Mode Detection in an Atmospheric Environment with Fusion Transfer Learning
Published 2024-12-01“…The results show that compared with traditional convolutional neural networks, the modal classifier proposed in this paper reduces the dataset size to 1/10 of the original and successfully improves the OAM detection accuracy by 15.84%. …”
Get full text
Article -
10566
Toward Enhanced Prediction of High‐Impact Solar Energetic Particle Events Using Multimodal Time Series Data Fusion Models
Published 2024-06-01“…Abstract Solar energetic particle (SEP) events, originating from solar flares and Coronal Mass Ejections, present significant hazards to space exploration and technology on Earth. …”
Get full text
Article -
10567
Ippolit Bogdanovich and Voltaire’s 'Épître à l’impératrice de Russie': Adapting Praise
Published 2024-11-01“…Ippolit Bogdanovich was one of the most versatile poets of the period, appreciated for his original compositions and recognised for his adaptations of French poetry. …”
Get full text
Article -
10568
Analysis of user behavior and satisfaction under the elderly adaptation mode of an APP based on the fuzzy-IPA model
Published 2025-01-01“…The key findings are as follows: (1) The APP aging mode is quite popular; (2) middle-aged and elderly users hesitate to use the aging mode due to “loss of original functions” and “secondary interface layout and font adjustments”; (3) better user experience in the aging mode leads to higher satisfaction, whereas higher initial expectations lead to lower satisfaction; (4) four aspects-“simple operation,” “ease of learning,” “understanding of function descriptions,” and “effective help system”-have high importance but low satisfaction levels. …”
Get full text
Article -
10569
Regional Aggressive Root Resorption Caused by Neuronal Virus Infection
Published 2012-01-01“…The purpose is to present cases with idiopathic (of unknown origin) root resorption occurring regionally. Two cases of female patients, 26 and 28 years old, referred with aggressive root resorption were investigated clinically and radiographically. …”
Get full text
Article -
10570
The Psychometric Properties of the Meaning in Life Questionnaire (MLQ) in Patients with Life-Threatening Illnesses
Published 2020-01-01“…The confirmatory factor analysis supported the original two-factor model of the MLQ, comprised of the presence of meaning (five items) and search for meaning (five items). …”
Get full text
Article -
10571
From Stars to Stones: The Cultural and Linguistic Roots of the Name ‘Skardu’
Published 2024-08-01“…Drawing from linguistic analysis and historical texts the current study examines the origin of the name Skardu from the Tibetan word Skar-mDo, usually referred to as a star-lit fort /valley or starry place. …”
Get full text
Article -
10572
Defense scheme for the world state based attack in Ethereum
Published 2022-04-01“…Ethereum is taken as the representative platform of the second generation of blockchain system.Ethereum can support development of different distributed applications by running smart contracts.Local database is used to store the account state (named world state) for efficient validation of transactions, and the state root is stored in the block header to guarantee the integrity of the state.However, some researches revealed that the local database could be easily tempered with, and attackers can issue illegal transactions based on the modified account state to obtain illegitimate benefits.This world-state based security problem was introduced, and the preconditions for attack were analyzed.Compared with the two common security threats under the PoW (proof of work) consensus, it was found that when the attacker controls the same mining computing power, the world-state based attack brought higher risk, and the success rate approached 100%.In order to deal with this threat, a practical scheme for attack detection and defense was proposed accordingly.The secondary verification and data recovery process were added to the Ethereum source code.The feasibility and complexity of the proposed scheme was evaluated with single-machine multi-threading experiments.The proposed scheme improves Ethereum’s tolerance to malicious tampering of account state, and is applicable to other blockchain platforms applying local database for transaction validation, such as Hyperledger Fabric.In addition, the time and computational overhead brought by the proposed scheme are not prominent, so it has good applicability and induces acceptable impact on the performance of original system.…”
Get full text
Article -
10573
Open-Source Telemedicine Platform for Wireless Medical Video Communication
Published 2013-01-01“…Objective video quality assessment is based on PSNR ratings, following calibration using the variable frame delay (VFD) algorithm that removes temporal mismatch between original and received videos. Clinical evaluation is based on atherosclerotic plaque ultrasound video assessment protocol. …”
Get full text
Article -
10574
Strategy Committees on European Public Boards: Characteristics and Tasks
Published 2024-01-01“…The voluntary nature of revealing information about SCs implies that reported characteristics and tasks may not fully represent the actual state. Originality/Value: It is the first study to explore SCs in various European countries by showing their scale, structures, compositions and especially the tasks they declare and handle.…”
Get full text
Article -
10575
El registro burocrático del mérito: condiciones morales y lealtad. Un estudio de los legajos personales de los comandantes en jefe de la armada argentina (1955-1983)
Published 2024-12-01“…Analiza un corpus documental original, que no cuenta con antecedentes de análisis sistemáticos, los legajos de conceptos y de servicios de catorce comandantes. …”
Get full text
Article -
10576
Peripheral Gangerene, an Unusual Presentation of Infantile Kawasaki: A Case Report and Literature Review
Published 2021-01-01“…The diagnosis of Kawasaki disease and echocardiographic evaluation of the coronary arteries should be considered in young infants with prolonged fever of unknown origin. Peripheral gangrene is a rare but important complication of infantile Kawasaki disease, although the exact mechanism in not fully understood.…”
Get full text
Article -
10577
Distribution and genetic diversity of three apple viruses in Belarus
Published 2016-12-01“…The study of phylogenetic relationships between viruses isolated in different countries did not reveal any clear-cut relationship between their geographical origin and the degree of similarity of virus genome fragments.…”
Get full text
Article -
10578
The Secret Life of Secret Agents: Alan Bennett and John Schlesinger’s An Englishman Abroad (1983) and A Question of Attribution (1991)
Published 2016-12-01“…Although biopics are still widely held in critical disdain, a number of new stimulating perspectives on the genre have recently emerged. One original approach consists in tackling the biopic as a form of adaptation and an example of intermedial rewriting, thus enabling to overreach the traditional fiction-versus-fact debate. …”
Get full text
Article -
10579
CRITICAL ANALYSIS OF THE RELIABILITY OF INTUITIVE MORAL DECISIONS
Published 2017-06-01“…The work is based on the methodological attitude of empirical ethics, involving the use of findings from empirical research in ethical reflection and decision making. Originality. The main kinds of intuitive moral decisions are identified: 1) intuitively emotional decisions (i.e. decisions made under the influence of emotions that accompanies the process of moral decision making); 2) decisions made under the influence of moral risky psychological aptitudes (unconscious human tendencies that makes us think in a certain way and make decisions, unacceptable from the logical and ethical point of view); 3) intuitively normative decisions (decisions made under the influence of socially learned norms, that cause evaluative feeling «good-bad», without conscious reasoning). …”
Get full text
Article -
10580
Prime-number-assisted block-based neighbor discovery protocol in wireless sensor networks
Published 2019-01-01“…For example, for two sensors whose duty cycles are different, if the lengths of their discovery schedules are relatively prime, the prime-number-assisted block-based neighbor discovery protocol simply uses the balanced incomplete block design–based neighbor discovery protocol without adding any additional active slots; otherwise, it changes the original balanced incomplete block design–based schedule using a prime number. …”
Get full text
Article