Suggested Topics within your search.
Suggested Topics within your search.
- Mass media 3
- Moral and ethical aspects 3
- Information technology 2
- Law and legislation 2
- Legal ethics 2
- Online social networks 2
- Social media 2
- ART / Film & Video 1
- Camcorders 1
- Communication 1
- Economic policy 1
- Economics 1
- English language 1
- Historiography 1
- History 1
- Human-computer interaction 1
- Industrial policy 1
- Internet marketing 1
- Mass media and technology 1
- Philosophy 1
- Production and direction 1
- Social aspects 1
- Sociology 1
- Study and teaching 1
- Technical English 1
- Technical writing 1
- Technological innovations 1
- Video recordings 1
- Video tape recorders 1
-
6321
Digital interventions for self-management of prediabetes: A scoping review.
Published 2024-01-01“…Delivery formats included text messages, mobile apps, virtually accessible dietitians/health coaches, online peer groups, and web-based platforms. Approximately half of studies assessed participant engagement/acceptability outcomes.…”
Get full text
Article -
6322
Designing, Implementing and Optimising a Capacity-Building Model for Infectious Disease Modelling in India
Published 2024-12-01“…Future courses are planned to be hosted on an online platform to facilitate participant completion of the course at their own pace. …”
Get full text
Article -
6323
The role of mediation in international conflict resolution
Published 2023-09-01“…Mediation is a key tool in resolving such conflicts, providing neutral mediation and creating a fruitful platform for dialog. The article analyzes various aspects of mediation in international conflicts, including the roles of mediators, the methods and strategies used to resolve differences, and examples of successful and unsuccessful mediation attempts in the history of international relations. …”
Get full text
Article -
6324
Applications of unmanned vehicle systems for multi-spatial scale monitoring and management of aquatic ecosystems: A review
Published 2025-03-01“…Furthermore, object tracking, Digital Image Processing (DIP), Geographic Information System (GIS), and data management platforms enable efficient, multi-spatial scale monitoring and advanced research capabilities, offering the potential to enhance data collection and management of aquatic ecosystems.…”
Get full text
Article -
6325
The Genesis of APEC: Economic Diplomacy of Australia, Japan, and the United States (On the 30<sup>th</sup> Anniversary of the Forum)
Published 2020-11-01“…At the same time the author notes that the forum has gone far beyond the initial expectations of its creators: it is not merely an effective tool for further trade liberalization in the Asia-Pacific region, but a unique platform for consultation, negotiation, and decision-making process suited for needs and capacities of each individual member state. …”
Get full text
Article -
6326
Crowdsourcing to support training for public health: A scoping review.
Published 2023-01-01“…Nine studies used open calls, 35 used a hackathon, designathon or other "a-thon" event, and 30 used other crowdsourcing methods, such as citizen science programs and online creation platforms. In terms of crowdsourcing purpose, studies used crowdsourcing to educate participants (20 studies), develop learning materials (17 studies), enhance mentorship (13 studies) and identify trainees (9 studies). …”
Get full text
Article -
6327
Emotional Intervention and Education System Construction for Rural Children Based on Semantic Analysis
Published 2022-01-01“…Method. In this paper, a platform for acquiring emotional semantic data of scene images in an open behavioral experimental environment is designed, which breaks the limitations of time and place, and thus acquires a large amount of emotional semantic data of scene images and then uses principal component analysis to evaluate the validity of the data analysis. …”
Get full text
Article -
6328
Liver Microbiome in Healthy Rats: The Hidden Inhabitants of Hepatocytes
Published 2023-01-01“…The V3–V4 region of the 16S rRNA gene was amplified by polymerase chain reaction (PCR) and sequenced using an Illumina HiSeq 2500 platform. Sequences were assigned taxonomically by the SILVA database. …”
Get full text
Article -
6329
Chromium Removal from Tannery Wastewater via a Hydroponic Technique with Vetiver Grass (Vetiveria zizanioides)
Published 2025-01-01“…The findings showed that the floating platform method of cultivating vetiver grass was significantly effective (p<0.05) in eliminating pollutants. …”
Get full text
Article -
6330
Research on network risk assessment based on attack graph of expected benefits-rate
Published 2022-08-01“…As Internet applications and services become more and more extensive, the endless network attacks lead to great risks and challenges to the security of information systems.As a model-based network security risk analysis technology, attack graph is helpful to find the vulnerability between network nodes and the harm of being attacked.It has been proved to be an effective method to find and prevent network security risks.Attack graph is mainly divided into state-based attack graph and attribute-based attack graph.Due to the problem of state explosion in state-based attack graph, most researchers prefer the attribute-based attack graph for network risk assessment.In view of the existing researches on attribute-based attack graph, they excessively rely on the vulnerability of network nodes and the essential attributes of atomic attack.However, they ignore that rational attackers usually choose specific attack paths by maximizing attack benefits.Then, a network risk assessment framework and a quantification method of attack benefits-rate based on expected benefits-rate attack graph were proposed.The network risk assessment framework took the open vulnerability resource database, the new vulnerabilities found by the vulnerability mining system and the big data related to network attack and defense as the basic data source.The network risk assessment framework also took the open source big data platform as the analysis tool to mine and calculate the elements related to attack cost and attack benefit.Using the concepts of cost, benefit and benefit-rate in economics, the calculation model of expected benefit-rate of atomic attack was constructed.By constructing the attribute-based attack graph of the target network, the expected benefit-rate of atomic attack on the attack path was calculated, and the expected benefit-rate list of all possible attack paths was generated.Furthermore, taking the expected goal as the starting point, the search was carried out according to the specific optimization strategy (backtracking method, greedy algorithm, dynamic programming).And the complete attack path with the maximum benefit-rate was obtained, which provided the basis for network risk assessment.The simulation results show the effectiveness and rationality of the proposed expected benefit-rate attack graph network risk assessment method, which can provide support for discovering and preventing network security problems.…”
Get full text
Article -
6331
Innovations at Ukrainian enterprises: use of information and communication technologies
Published 2024-06-01“…The article presents a subjective assessment, namely, the results of a survey of Ukraini-an companies based on 2023 data regarding using the new technologies, including: ChatGPT and Artificial Intelligence, cloud services and data storage, online services and platforms for remote work organization, QES for personal identification, CRM sys-tems for working with clients, creation of mobile applications and chatbots in messen-gers. …”
Get full text
Article -
6332
Ability of pulse oximetry-derived indices to predict hypotension after spinal anesthesia for cesarean delivery: A systematic review and meta-analysis.
Published 2025-01-01“…We searched MEDLINE, Embase, Web of Science, Cochrane Central Register of Controlled Trials, Cochrane Database of Systematic Reviews, ClinicalTrials.gov, European Union Clinical Trials Register, World Health Organization International Clinical Trials Registry Platform, and University Hospital Medical Information Network Clinical Trials Registry databases from inception until June 15, 2023. …”
Get full text
Article -
6333
Virtual Screening for Potential Inhibitors of NS3 Protein of Zika Virus
Published 2016-09-01“…Observations made in this study may extend an assuring platform for developing anti-viral competitive inhibitors against ZIKV infection.…”
Get full text
Article -
6334
Current status and associated factors of digital literacy among academic nurse educators: a cross-sectional study
Published 2025-01-01“…Methods A cross-sectional design study utilizing an online questionnaire platform (Wenjuanxing) to collect data from August to October 2023. …”
Get full text
Article -
6335
Caledonian reactivation and reworking of Timanian thrust systems and implications for latest Mesoproterozoic to mid-Paleozoic tectonics and magmatism in northern Baltica [version 2...
Published 2024-10-01“…Methods The present study provides a more definitive answer about the continuation of Trollfjorden–Komagelva Fault Zone west of the Varanger Peninsula by using seismic reflection, bathymetric, topographic, and magnetic data onshore Finnmark and offshore on the Finnmark Platform. Results The present study demonstrates that the Sørøya–Ingøya shear zone represents a portion of the Trollfjorden–Komagelva Fault Zone that was folded into a NE–SW orientation and reactivated as a top-southeast thrust during the Caledonian Orogeny, while other portions of the Trollfjorden–Komagelva Fault Zone (e.g., on the Varanger Peninsula) were reactivated as strike-slip faults. …”
Get full text
Article -
6336
Impetus of US hospital leaders to invest in patient-reported outcome measures (PROMs): a qualitative study
Published 2022-07-01Get full text
Article -
6337
Condition of the autonomic nervous system during the 'sit-stand-sit' orthostatic test in university students in areas of military conflict in Ukraine
Published 2023-12-01“…The experiment's data were statistically analyzed using the PyCharm CE platform and a range of Python coding libraries. Results. …”
Get full text
Article -
6338
What happens when you stop using the combined contraceptive pill? A qualitative study protocol on consequences and supply needs for women who discontinued the combined contraceptiv...
Published 2022-06-01“…This study is registered on the OSF platform under the following number: https://doi.org/10.17605/OSF.IO/JYWXM.…”
Get full text
Article -
6339
Overview of blockchain assets theft attacks and defense technology
Published 2023-02-01“…Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduced smart contract code, giving it the ability to synchronize and preserve the execution status of smart contract programs, automatically execute transaction conditions and eliminate the need for intermediaries.Web3.0 developers can use Ethereum’s general-purpose programmable blockchain platform to build more powerful decentralized applications.Ethereum’s characteristics, such as central-less control, public and transparent interaction data guaranteed by smart contracts, and user-controlled data, have attracted more attentions.With the popularization and application of blockchain technology, more and more users are storing their digital assets on the blockchain.Due to the lack of regulatory and governance authority, public chain systems such as Ethereum are gradually becoming a medium for hackers to steal digital assets.Generally, fraud and phishing attacks are committed using blockchain to steal digital assets held by blockchain users.This article aims to help readers develop the concept of blockchain asset security and prevent asset theft attacks implemented using blockchain at the source.The characteristics and implementation scenarios of various attacks were effectively studied by summarizing the asset theft attack schemes that hackers use in the blockchain environment and abstracting research methods for threat models.Through an in-depth analysis of typical attack methods, the advantages and disadvantages of different attacks were compared, and the fundamental reasons why attackers can successfully implement attacks were analyzed.In terms of defense technology, defense schemes were introduced such as targeted phishing detection, token authorization detection, token locking, decentralized token ownership arbitration, smart contract vulnerability detection, asset isolation, supply chain attack detection, and signature data legitimacy detection, which combine attack cases and implementation scenarios.The primary process and plans for implementation of each type of defense plan were also given.And then it is clear which protective measures can protect user assets in different attack scenarios.…”
Get full text
Article -
6340
Designing a Parent Training Model to Prevent Cyber Space Risks in Students
Published 2024-01-01“…The advent of the Internet and social networking platforms, coupled with an increase in individual liberties, has enabled swift access to a plethora of diverse and frequently unethical content available online. …”
Get full text
Article