Suggested Topics within your search.
Suggested Topics within your search.
-
4961
Natural barriers facing female cyclists and how to overcome them: A cross national examination of bikesharing schemes
Published 2024-12-01“…In the spirit of open science, all data and code on which this paper is based have been provided on Mendeley: https://data.mendeley.com/datasets/vmy42hywwx/1.…”
Get full text
Article -
4962
Analysis of Light in Office Space Based on Topic 4 of National Building Regulations in Different Climates (Case Study: Iran)
Published 2025-04-01“…In compliance with the National Building Code of Iran, it is mandated that office spaces possess access to natural light and ventilation through one or more windows, constituting at least 12.5% of the total glass area in relation to the floor space. …”
Get full text
Article -
4963
What Does It Mean to Be Leader of a “One Nation Conservative Government”? The Case of Boris Johnson
Published 2020-09-01“…The third part will consider the more loaded charge that One Nation “in a way has just become a code term for trying to make the party electable and to keep the party electable” to quote Lord Biffen, himself a leading One Nation Conservative. …”
Get full text
Article -
4964
Sustainable ecosystem of business models: experience and lessons of the development project
Published 2024-10-01“…The main objective of the study is to review current and propose effective approaches to project business planning in the National Park—Development Region system.To develop an effective, sustainable ecosystem of national park business models that make a positive contribution to the regional gross product (RGP) of the region, the current approaches to assessing the contribution of economic and other activities, including project activities, to the socio-economic development of regions and the country as a whole were analyzed. …”
Get full text
Article -
4965
Improving Token-Based Object Detection With Video
Published 2025-01-01“…We also compare it with several video detectors on UA-DETRAC to show that it is competitive with the current state of the art even with the computational bottleneck. We make our code and models publicly available.…”
Get full text
Article -
4966
Proteome-wide Mendelian randomization reveals causal associations between plasma proteins and autoimmune thyroid disease
Published 2025-06-01“…Identifying new biomarkers and therapeutic targets in plasma proteins is crucial. We conducted a proteome-wide Mendelian randomization (MR) and colocalization analysis to determine plasma proteins causally associated with AITD. …”
Get full text
Article -
4967
System Reliability Analysis of Slope Stability of Earth Rock Dams Based on Finite Element Strength Reduction Method
Published 2025-04-01“…The system reliability index (6.81) significantly exceeds the code target (4.2), highlighting the method’s ability to integrate material randomness, stress-strain nonlinearity, and multi-slip interactions. …”
Get full text
Article -
4968
Epidemiological Model for Stability Analysis of Wireless Sensor Network under Malware Attack
Published 2022-03-01“…And Wireless Sensor Network (WSN) is also facing a hazardous type of situation due to attack of malware (malicious code, virus, worm etc.). Malwares target sensor nodes easily because, nodes are equipped with limited resources. …”
Get full text
Article -
4969
New Potential Ultracompact X-Ray Binaries for Space-based Gravitational-wave Detectors from a Low-mass Main-sequence Companion Channel
Published 2025-01-01“…We investigate the formation and evolution of ultracompact X-ray binaries (UCXBs) using the COMPAS binary evolution code, starting from the zero-age main sequence (MS). …”
Get full text
Article -
4970
Remote Sensing Change Detection by Pyramid Sequential Processing With Mamba
Published 2025-01-01“…However, various challenges still persist, such as complex backgrounds, small targets, and diverse change types. To address these challenges, we propose a novel Mamba-based multiscale feature enhancement method. …”
Get full text
Article -
4971
Do People Believe They Are Less Predictable Than Others? Three Replications of Pronin and Kugler’s (2010) Experiment 1
Published 2024-12-01“…In Studies 1a and 1b that mirrored the target article’s mixed design (self-other between, past-future within), we found support for the original findings with weaker effects. …”
Get full text
Article -
4972
Machine Learning and Metaheuristic Algorithms for Voice-Based Authentication: A Mobile Banking Case Study
Published 2024-11-01“…On the other hand, by employing the frequency and phase properties to compare the target's voice to the discovered password key, this method will prevent speech forgeries. …”
Get full text
Article -
4973
Cybersecurity threats and mitigation measures in agriculture 4.0 and 5.0
Published 2024-12-01“…The analysis also revealed that malware attacks occur when hackers change the code of a system application to access sensitive farm-related data and may alter the operations of the digitized systems. …”
Get full text
Article -
4974
Pseudo-class distribution guided multi-view unsupervised domain adaptation for hyperspectral image classification
Published 2025-02-01“…Existing methods focus on aligning the distribution of source domain (SD) and target domain (TD). However, they all ignore the implicit class distribution information of TD data, which can help the model predict the class with a higher posterior probability. …”
Get full text
Article -
4975
Case Report: Hereditary spastic paraplegia associated with monoallelic variant in the motor domain of KIF1A
Published 2025-05-01“…ObjectivesTo investigate the genetic etiology of a familial case with spastic paraplegia.MethodsNeurological examination, clinical and genetic work-up, including exome sequencing (ES), followed by targeted testing, were performed to determine the underlying etiology of the patients’ phenotype.ResultsA 45-year-old man was initially diagnosed with spastic diplegic cerebral palsy in early childhood. …”
Get full text
Article -
4976
A Survey on Survivable Safety-Critical Systems
Published 2025-01-01“…Due to their crucial functions, these systems are frequent targets of various attacks, including Denial of Service (DoS) attacks, the execution of improper commands, code injection, and data manipulation, which can compromise system safety and put lives and critical infrastructure at risk. …”
Get full text
Article -
4977
Challenges and management of venomous bites and scorpion stings in Lebanon: a qualitative study
Published 2025-06-01“…The study also highlighted insufficient documentation and reporting mechanisms and inadequate networking among stakeholders, alongside a notable knowledge gap among victims.ConclusionThis study emphasizes the urgent need for targeted interventions to address systemic challenges in managing snakebites and scorpion stings in Lebanon. …”
Get full text
Article -
4978
Research on Video Monitoring Technology for Galloping of OCS Additional Conductors of High-Speed Railway in Strong Wind Zone
Published 2024-11-01“…Secondly, a preprocessing method for enhancing images of galloping in OCS additional conductors is developed, effectively reducing noise in edge detection through a region chain code clustering analysis. The video monitoring system effectively extracts wire edges, addressing the issues of splitting, breakage, and edge overlap in edge detection, while accurately identifying wire targets in video images. …”
Get full text
Article -
4979
Patterns and inequities in pyogenic arthritis-related mortality in the United States from 1999–2020
Published 2025-01-01“…In conclusion, PA mortality has been on the rise and targeted interventions are warranted to reduce disproportionate mortality rates among vulnerable populations.…”
Get full text
Article -
4980
Distributed High-Speed Videogrammetry for Real-Time 3D Displacement Monitoring of Large Structure on Shaking Table
Published 2024-11-01“…This paper presents a distributed high-speed videogrammetric method designed to rapidly measure the 3D displacement of large shaking table structures at high sampling frequencies. The method uses non-coded circular targets affixed to key points on the structure and an automatic correspondence approach to efficiently estimate the extrinsic parameters of multiple cameras with large fields of view. …”
Get full text
Article