Suggested Topics within your search.
Suggested Topics within your search.
- Rhetoric 5
- English language 4
- Grammar 4
- Attitude to Health 3
- Behavioral Medicine 2
- Handbooks, manuals, etc 2
- Health behavior 2
- Psychology 2
- Animals 1
- Brothers and sisters 1
- Business communication 1
- Business writing 1
- Care 1
- Case studies 1
- Child development 1
- Child rearing 1
- Communication in organizations 1
- Dialectical materialism 1
- Education 1
- Elias (Fictitious character) 1
- English 1
- Examinations, questions, etc 1
- Fantasy 1
- Fiction 1
- Fugitives from justice 1
- Habitat (Ecology) 1
- Health 1
- Infants 1
- Laia (Fictitious character) 1
- Mass media 1
-
10941
Analisis faktor produksi terhadap kepuasan petani dalam mendorong ketahanan pangan di Sulawesi Selatan
Published 2024-07-01“…The research used a survey with Likert Scale data from 100 randomly selected rice farmers in Mattirobulu, Tiroang, Patampanua, and Duampanua districts, Pinrang Regency, South Sulawesi. …”
Get full text
Article -
10942
Screw Remaining Life Prediction Based on Quantum Genetic Algorithm and Support Vector Machine
Published 2017-01-01“…Meanwhile, the sensitive feature vectors are randomly chosen from the database and constitute training samples and testing samples. …”
Get full text
Article -
10943
The Effect of Grinding Media on Mineral Breakage Properties of Magnetite Ores
Published 2021-01-01“…Optimal control of the particle size distribution of the products is therefore essential, but the complexity and randomness of ball mill grinding make it difficult to determine the appropriate ball size. …”
Get full text
Article -
10944
Differentially private sequence generative adversarial networks for data privacy masking
Published 2020-08-01“…Based on generative adversary networks and the differential privacy mechanism,a differentially private sequence generative adversarial net (DP-SeqGAN) was proposed,with which the privacy of text sequence data sets can be filtered out.DP-SeqGAN can be used to automatically extract important features of a data set and then generate a new data set which was close to the original one in terms of data distributions.Based on differential privacy,randomness is introduced to the model,which improves the privacy of the generated data set and further reduces the over fitting of the discriminator.The proposed DP-SeqGAN was universal,so there is no need to adjust the model adaptively for datasets or design complex masking rules against dataset characters.The experiments show that the privacy and usability of a sequence data set are both improved significantly after it is processed by the DP-SeqGAN model,and DP-SeqGAN can greatly reduce the success rate of member inference attacks against the generated data set.…”
Get full text
Article -
10945
Abdominal Decompression in Children
Published 2012-01-01“…However, prospective randomized studies are needed to fully understand the indications and impact of these therapies on survival in children.…”
Get full text
Article -
10946
Patent Foramen Ovale and Closure Technique with the Amplatzer Occluder
Published 2014-01-01“…Paradoxical embolism is a rare event occurring over decades rather than years. None of the 4 randomized trials published carried enough patients or was followed up for long enough to reach superiority endpoints. …”
Get full text
Article -
10947
Optimizing Transmit Sequence and Instrumental Variables Receiver for Dual-Function Complexity System
Published 2020-01-01“…The relaxation plus randomization technique is used to find an approximate solution. …”
Get full text
Article -
10948
Research on worm propagation model in IPv6 networks
Published 2011-01-01“…A wide variety of scanning strategies for IPv6 networks when a worm scans across subnets and inside subnets was investigated.A P2P-based mechanism for decreasing the repeated infection and implementing control strategies was discussed,and a new hybrid worm named NHIW,which can form large-scale propagation in IPv6 network,was also constructed.The NHIW can not only scan the worm randomly,but also can quickly obtain IP addresses of susceptible active hosts in the subnet as well.Furthermore,NHIW is able to prevent re-infection of the host.Through analyzing the delay in different stage of NHIW propagation and its propagation rate,a full NHIW propagation model TLWPM was established.Experimental results show that NHIW can form a flooding propagation in the IPv6 network.With respect to the features of NHIW,some relevant defense strategies were discussed finally.…”
Get full text
Article -
10949
Investigation of physical education teachers’ sensation seeking levels according to different variables
Published 2023-12-01“…The study group was randomly selected and consisted of a total of 550 people, 320 of whom were male and 230 females. …”
Get full text
Article -
10950
On the Reorganization of Incentive Structure to Promote Delay Tolerance: A Therapeutic Possibility for AD/HD?
Published 2004-01-01“…First is the suggestion, backed up by data from randomized trials, that training and practice in carefully selected cognitive activities (executive and attentional training) and tasks can provide a way of modifying the processes underlying cognitive, especially executive, deficits in AD/HD. …”
Get full text
Article -
10951
KORELASI FENOTYPE DAN HASIL JAGUNG MANIS (Zea mays saccharata, Sturt) DI KECAMATAN RUMBAI PEKANBARU
Published 2018-08-01“…The environmental design used was a complete randomized design with 20 replications. Data analysis using correlation analysis. …”
Get full text
Article -
10952
Eclecticism in child welfare
Published 2024-05-01“…Several researchers then advocated a clean-up campaign where one through randomized controlled trials should decide which theories are true and which methods work. …”
Get full text
Article -
10953
Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
Published 2023-01-01“…Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment. …”
Get full text
Article -
10954
Numerical modelling of intergranular fracture in polycrystalline materials and grain size effects
Published 2013-04-01“…Since the shape and the parameters of the nonlocal CZM depend on the interface thickness, a distribution of interface fracture energies is obtained as a consequence of the randomness of the material microstructure. Using these data, fracture mechanics simulations are performed and the homogenized stress-strain curves of 2D representative volume elements (RVEs) are computed. …”
Get full text
Article -
10955
Educational Video Quality on TikTok for Vocabulary Teaching
Published 2023-12-01“…The researcher selected video samples randomly with the existing criteria. The criteria used to assess the quality were theories by Brame and Lopez. …”
Get full text
Article -
10956
The Comparative Effect of Teaching Collocations through Literary vs. Non-Literary Content on EFL Learners
Published 2019-03-01“…The selected participants were randomly divided into two experimental groups. Collocations were taught through literary content in one group; the others were instructed via non-literary content. …”
Get full text
Article -
10957
The role of lyrics in music–exercise performance on perceived exertion
Published 2015-07-01“…For this purpose, 23 (11 males, 12 females) were selected randomly among volunteered students. The participants underwent physical activity under condition of lyrics music in the first session, same no-lyrics music in the second session and no music in the third session. …”
Get full text
Article -
10958
Early Evaluation of Provenance and Progeny Trial Combination of Araucaria Cunninghamii Age 12 Months in Bondowoso, East Java
Published 2011-01-01“…The trial was designed as a Randomized Complete Block Design (RCBD) consisted of 80 seedlots, 4 tree-line plots, 4 replicates with spacing of 4 m x 2 m. …”
Get full text
Article -
10959
Vocational High School Female Students’ Opinions About Application Level of Skill Education
Published 2010-05-01“…The purpose of this study is to analyze application level of the vocational education given in school/company and enterprises in accordance with Vocational Education Law. 138 senior level students from four different vocational high schools in Ankara were randomly selected and included in this study. Data were collected using survey and scanning methods. …”
Get full text
Article -
10960
Provably secure rational delegation computation protocol
Published 2019-07-01“…A provably secure rational delegation computation scheme was proposed to solve the requirement of security issues in rational delegate computation.Firstly,game theory was introduced into delegation computation and according to rational participants behavior preferences analysis,a rational delegate computing game model was designed.Secondly,according to the equilibrium demand of game model and the security requirement of rational delegation computation,a rational security model was established.Thirdly,combining Yao's garbled circuit with its advantages of re-randomization,as well as full homomorphic encryption technology,the rational delegation computation protocol was constructed.And the combination of strategies in the protocol could reach the Nash equilibrium state.Finally,the security of the protocol and the privacy of the input and output were proved according to the rational security model,and the performance analysis shows the validity of the protocol.The proposed rational delegation computing protocol not only satisfies the traditional security,but also considers the behavioral preference of participants,which is more in line with the delegationcomputing mode under the big data environment.…”
Get full text
Article