Suggested Topics within your search.
Suggested Topics within your search.
- History 11
- Management 6
- Purchasing 5
- Social conditions 5
- Philosophy 4
- Politics and government 4
- Business logistics 3
- Civilization 3
- History and criticism 3
- Information technology 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Marketing 3
- Methodology 3
- Nutrition 3
- Social life and customs 3
- Sociolinguistics 3
- Tourism 3
- Colonial influence 2
- Common law 2
- Diet Therapy 2
- Diet therapy 2
- Economic conditions 2
- Health 2
- Industrial procurement 2
- Internet in public administration 2
- Interpretation and construction 2
- Juvenile literature 2
-
37681
The Frequency of Intestinal Parasitic Infections in COVID-19 Patients: A Case-Control Study in Tehran, Capital of Iran
Published 2023-01-01“…RNA extraction was performed, and then real time reverse-transcription polymerase chain reaction (rRT-PCR) assay was applied to detect viral RNA. …”
Get full text
Article -
37682
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01“…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
Get full text
Article -
37683
The Contemporary System of German Economic Diplomacy
Published 2015-06-01“…The author provides a brief summary of historical and economic background, stages and conditions of its development from the 1950-s to present time. He casts light upon the procedures and mechanisms of interaction between the key national economic-diplomatic agents i.e. ministries, agencies, other authorized bodies, public and private institutes outlining their usage of concrete economic, administrative and legal instruments in the course of respective policy measures. …”
Get full text
Article -
37684
Inversion-Based Face Swapping With Diffusion Model
Published 2025-01-01“…Furthermore, the proposed InFS achieved effective face swapping results without requiring additional guidance and reduces inference time by approximately 6.96 seconds compared to previous diffusion-based approaches.…”
Get full text
Article -
37685
Propofol-Based Sedation Does Not Increase Rate of Complication during Percutaneous Endoscopic Gastrostomy Procedure
Published 2011-01-01“…There were no significant differences in patients' characteristics, sedation time, indication, complications, anesthetic personnel and mortality rate between the two groups. …”
Get full text
Article -
37686
Perception among Healthcare Professionals of the Use of Social Media in Translating Research Evidence into Clinical Practice in Mangalore
Published 2018-01-01“…Majority of people believed that social media enables wide range of evidence over the shorter span of time, poses a threat to privacy, and cannot replace face to face interaction. …”
Get full text
Article -
37687
Design of Meteorological Element Detection Platform for Atmospheric Boundary Layer Based on UAV
Published 2017-01-01“…Thirdly, data management of the collected data was conducted, including local storage and real-time display on ground host computer. Finally, combined with the comprehensive analysis of the data of automatic weather station, the validity of the data was verified. …”
Get full text
Article -
37688
EDA, PPG and Skin Temperature as Predictive Signals for Mental Failure by a Statistical Analysis on Stress and Mental Workload
Published 2025-01-01“…Moreover, fifteen features were found to provide sufficient information to detect at the same time stress and MWL. <italic>Conclusions:</italic> These results demonstrate the feasibility of this approach and push to continue this research about the relationship between physiological signals and the variation of stress and MWL by enhancing the population and considering more biosignals.…”
Get full text
Article -
37689
Strength Theory Model of Unsaturated Soils with Suction Stress Concept
Published 2013-01-01“…Once the new model is used to predict the change of shear strength, lots of time could be saved due to avoiding heavy and complicated strength tests of unsaturated soils. …”
Get full text
Article -
37690
The Effect of Intake Temperature on the Idle Combustion Cycle Variation of Two-Stroke Aviation Kerosene Piston Engines
Published 2025-01-01“…In the lower range, increasing the intake air temperature has a greater effect on reducing the combustion cycle variation, while in the higher range, the combustion cycle variation has a greater impact on the output work. At the same time, the influence of intake air temperature on the fuel evaporation rate is related to engine speed, and this relationship weakens as the engine speed increases. …”
Get full text
Article -
37691
‘Fission Chips’: An Activist’s View on Anti-Nuclear Activism in South Africa from the 1980s to the 21st Century
Published 2024-10-01“…What we consider far more important to grasp is that ‘State Capture’ is not an entirely new phenomenon since what we call the ‘Putsch of Polokwane’ in 2007. From the time of General Jan Smuts to PW Botha, from Mandela to Zuma, the insidious relationship among international arms dealers, globe-trotting Mafiosi, and beneficiaries of the military-industrial global nexus, has remained a constant refrain: only names and places have been changed. …”
Get full text
Article -
37692
Linking the Historical Sample of the Netherlands with the USA Censuses, 1850–1940
Published 2020-09-01“…We also evaluated the result in the light of what we know from emigration patterns to the USA over time and period and we concluded that our efforts have produced a reasonable result. …”
Get full text
Article -
37693
A machine learning based classifier for topological quantum materials
Published 2024-12-01“…A major bottleneck in this field is the computational resources and time complexity related to finding new materials from ab initio calculations. …”
Get full text
Article -
37694
The Effects of Mother-Plant Irrigation Schedule on the Quality Of Tomato (<i>Lycopersicum esculentum</i>) Seed
Published 2013-07-01“…There was no consistent superiority of one irrigation interval over the other in respect of seed longevity over time. A general increase in seedling height and number of leaves per seedling was recorded as storage period progressed before a decline sets in at different ages. …”
Get full text
Article -
37695
A Practical Approach for Predicting Power in a Small-Scale Off-Grid Photovoltaic System using Machine Learning Algorithms
Published 2022-01-01“…Further, a website is developed wherein the user can key in the date and time. The output of that transaction is predicted temperature, humidity, and forecasted power generation of the specific standalone photovoltaic system. …”
Get full text
Article -
37696
Starożytne źródła antropocentryzmu
Published 2009-12-01“…One can distinguish at least several stages of the process, which led to this crisis, namely: stage of Magic and Myth, Ancient Times, Middle Ages, and Modern Times. The aim of this article is to show the process of development of an anthropocentric thought in Ancient European culture. …”
Get full text
Article -
37697
Transformed Calculation Models in Practice of Dynamic Analysis of Fixed Offshore Platform Structures
Published 2024-12-01“…Modal analysis using a transformed calculation model (TCM) provides a significant reduction in the order and total computational time of the mechanical system. The possibility of analyzing dynamic reactions by a direct method based on the accelerogram of a real earthquake is provided.…”
Get full text
Article -
37698
RESEARCH ON THE DESIGN METHOD OF THE AEROSPACE STANDARD THIN-WALLED SPECIMEN TO MEASURE THE PRECISION OF MACHINE TOOL
Published 2017-01-01“…Based on the results of finite element analysis,it’s the first time to put forward the processing complexity coefficient concept,compares the cutting force and thermal load,the cutting force dominates in the residual stress generated,this paper only consider the effect of cutting force,to evaluate the characteristics of the"X"shape aviation thin-wall specimen in the geometric model and mechanical structure design in-depth. …”
Get full text
Article -
37699
Using SaTScan to identify and map nightlife areas in Philadelphia, PA
Published 2024-12-01“…With data from the National Establishment Time Series (NETS) business database, we developed methods to use SaTScan cluster detection software to identify entertainment districts, and applied the method in a case-study of Philadelphia, Pennsylvania. …”
Get full text
Article -
37700
Simulation and Impact Analysis of Flooding Caused by the Break of a Concrete-face Rockfill Dam
Published 2022-01-01“…Simulation and impact analysis of flooding caused by the break of water reservoir dams is a research priority in the field of prevention and mitigation of disasters surrounding water conservancy projects.To study the scope of submergence and the influencing degree in the downstream areas caused by the break of a concrete-face rockfill dam,by analyzing the characteristics of the concrete-face rockfill dam break,this paper built a one-dimensional unsteady hydrodynamic model of the area from the concrete-face rockfill dam to the hydroelectric power plant reservoir in the downstream.Then,with an actual concrete-face rockfill dam project as a research case,the flood flow distribution under various failure modes of the selected dam case was simulated.The peak flow rate,highest flood level,and the corresponding emergence time of typical sections along the watercourse under the dam were obtained.The results show that the dam-break duration,the final size of the breach,and the water level in front of the dam before the break are the three major factors influencing the simulation calculations with this hydrodynamic model.Shorter duration of dam break,a larger final size of the breach,and a higher water level in front of the dam before the break will lead to a larger peak flow at the dam site.Also,in various dam-break conditions,a large proportion of the major villages and towns on both sides of the downstream flow are expected to be completely submerged.These findings may offer reliable scientific references for the formulation of emergency response and rescue protocols as well as disaster severity evaluation associated with flooding caused by the break of presently active concrete-face rockfill dams.…”
Get full text
Article