Suggested Topics within your search.
Suggested Topics within your search.
- Application software 4
- Civil war 2
- Computer-assisted instruction 2
- Development 2
- Economic aspects 2
- Economic development 2
- Education, Elementary 2
- Educational technology 2
- Information technology 2
- Internet in education 2
- Internet in public administration 2
- Nursing 2
- Nursing Assessment 2
- Nursing Care 2
- Perioperative Nursing 2
- Political aspects 2
- Public administration 2
- Surgical nursing 2
- computer 2
- Academic writing 1
- Access control 1
- Automobiles 1
- CAD System Software 1
- Censorship 1
- Computer software 1
- Digital techniques 1
- Digital watermarking 1
- Digitale Photographie 1
- Dissertations, Academic 1
- Engineering 1
-
6441
Quantitative Risk Assessment of Vibrio parahaemolyticus Toxi Infection Associated with the Consumption of Roasted Shrimp (Penaeus monodon)
Published 2022-01-01“…This simulation was realized based on 10,000 iterations using the Model Risk software, version 4.0, in combination with Microsoft Excel. …”
Get full text
Article -
6442
Serum Calprotectin: A Potential Biomarker for Neonatal Sepsis
Published 2015-01-01“…Statistical analysis was performed using the statistical software package Stata 13.1 (Stata Corporation, College Station, Texas, USA). …”
Get full text
Article -
6443
Production Analysis for Fractured Vertical Well in Coal Seam Reservoirs with Stimulated Reservoir Volume
Published 2021-01-01“…The calculation speed of the new model is increased while the calculation accuracy is retained, and the intensity of software application is reached. The model achieves the purpose of rapid evaluation and accurate prediction of gas well productivity and obtains a set of productivity evaluation method suitable for coalbed methane reservoir with fractured vertical well, which provides a basis for the development and productivity evaluation of coalbed methane reservoir in domestic and international cooperation.…”
Get full text
Article -
6444
Investigation of the flow characteristics of slit check dams using novel models
Published 2024-12-01“…Then, the Butterfly model was validated extensively using OpenFOAM (v7) software for the numerical analysis. Finally, the other models were examined numerically using the k-ε turbulence model. …”
Get full text
Article -
6445
Investigating the Development of Urban Space in the face of Environmental Hazards (Case Study of Noor County)
Published 2024-12-01“…Based on the results, spatial assessment was performed using ArcGis software and hazard zones were identified. According to the results of risk potential zoning, the northern and southern areas of the city have the highest risk potential. …”
Get full text
Article -
6446
Fuzzy Multicriteria Decision-Making Model for Time-Cost-Risk Trade-Off Optimization in Construction Projects
Published 2019-01-01“…The algorithm was implemented in the MATLAB software and applied to two case studies to verify and validate the presented model. …”
Get full text
Article -
6447
Using the Functional Resonance Analysis Method (FRAM) in Aviation Safety: A Systematic Review
Published 2020-01-01“…This paper also characterises the FRAM studies focused on aviation in terms of the common methods and steps used to build FRAM and the available software tools to build FRAM nets. Current FRAM illustrates its advantages in capturing the dynamic and nonlinear nature of complex systems and facilitates our understanding and continual improvement of complex systems. …”
Get full text
Article -
6448
Presenting the model of realizing the right to the city based on the network analysis process (ANP) in the raw-towns of West Mazandaran
Published 2025-03-01“…The Analytical Network Process (ANP) method was employed to process and analyze the data, leading to the extraction of a balanced supermatrix using the Super Decision software. Following various steps, the final priorities of indicators and options for realizing the right to the city were determined. …”
Get full text
Article -
6449
-
6450
-
6451
Simulation of the Load Evolution of an Anchoring System under a Blasting Impulse Load Using FLAC3D
Published 2015-01-01“…This paper divides dynamic impulse loads into engineering loads and blasting loads and then employs numerical calculation software FLAC3D to analyze the stability of an anchoring system perturbed by an impulse load. …”
Get full text
Article -
6452
Photoplethysmography Biometric Recognition Model Based on Sparse Softmax Vector and k-Nearest Neighbor
Published 2020-01-01Get full text
Article -
6453
Stereo 3D Mouse Cursor: A Method for Interaction with 3D Objects in a Stereoscopic Virtual 3D Space
Published 2010-01-01“…For this purpose, we have adapted a real-time point-based rendering software called QSplat to a multiview rendering version named QSplatMV. …”
Get full text
Article -
6454
Analysis of the Structural Characteristics of the Online Social Network of Chinese Professional Athletes
Published 2021-01-01“…Data were collected through questionnaires, and several software programs were used to preprocess and analyse the collected data. …”
Get full text
Article -
6455
Investigation the Citizen\'s Satisfaction from the elements of sense of belonging (Case study: Golha Residential Complex of Rasht)
Published 2022-09-01“…Analysis of questionnaires was performed by SPSS software. Measurement of selectivity, permeability and readability was also accomplished using the space syntax method and integration and connectivity analysis on the road adjacent to Golha town. …”
Get full text
Article -
6456
Printed Wide-Slot Antenna Design with Bandwidth and Gain Enhancement on Low-Cost Substrate
Published 2014-01-01“…Moreover, radiation efficiency, input impedance, current distribution, axial ratio, and parametric studies of S11 for different design parameters are also investigated using the finite element method-based simulation software HFSS.…”
Get full text
Article -
6457
Soft Sensor Modeling Method Based on SPA-GWO-SVR for Marine Protease Fermentation Process
Published 2021-01-01“…The real-time monitoring was processed by MATLAB software for the marine protease fermentation process, which met the requirements of optimal control of the marine protease fermentation process.…”
Get full text
Article -
6458
Consumer Protection of Girls from Cybercrime in a Gender Perspective
Published 2024-12-01“…Using protective technologies such as antivirus software and parental monitoring apps can help reduce the risk of girls becoming victims of cybercrime. …”
Get full text
Article -
6459
Machine Learning and Deep Learning Optimization Algorithms for Unconstrained Convex Optimization Problem
Published 2025-01-01Get full text
Article -
6460
Information security vulnerability scoring model for intelligent vehicles
Published 2022-02-01“…More and more electronic devices are integrated into the modern vehicles with the development of intelligent vehicles.There are various design flaws and vulnerabilities hidden in a large number of hardware, firmware and software.Therefore, the vulnerabilities of intelligent vehicles have become the most important factor affecting the vehicle safety.The safety of vehicles is seriously affected by the disclosure of a large number of vulnerabilities, and the wide application of smart cars is also restricted.Vulnerability management is an effective method to reduce the risk of vulnerabilities and improve vehicle security.And vulnerability scoring is one the important step in vulnerability management procedure.However, current method have no capability assessing automotive vulnerabilities reasonably.In order to handle this problem, a vulnerability scoring model for intelligent vehicles was proposed, which was based on CVSS.The attack vector and attack complexity were optimized, and property security, privacy security, functional safety and life safety were added to characterize the possible impact of the vulnerabilities according to the characteristics of intelligent vehicles.With the machine learning method, the parameters in CVSS scoring formula were optimized to describe the characteristics of intelligent vehicle vulnerabilities and adapt to the adjusted and new added weights.It is found in case study and statistics that the diversity and distribution of the model are better than CVSS, which means the model can better score different vulnerabilities.And then AHP is used to evaluate the vulnerability of the whole vehicle based on the vulnerability score of the model, a score is given representing the risk level of whole vehicle.The proposed model can be used to evaluate the severity of information security vulnerabilities in intelligent vehicles and assess the security risks of the entire vehicle or part of the system reasonably, which can provide an evidence for fixing the vulnerabilities or reinforcing the entire vehicle.…”
Get full text
Article