Showing 1,781 - 1,800 results of 1,881 for search 'BYUtv~', query time: 1.43s Refine Results
  1. 1781

    Bumblebee social learning outcomes correlate with their flower-facing behaviour by Yuyi Lu, Zhenwei Zhuo, Mark Roper, Lars Chittka, Cwyn Solvi, Fei Peng, Ying Zhou

    Published 2024-11-01
    “…Two groups of bumblebees observed live conspecifics foraging from either blue or yellow flowers during a single foraging bout, and were subsequently tested for their socially learned colour preferences. …”
    Get full text
    Article
  2. 1782

    Kokybinis žvilgsnis į traumą: psichikos sveikatos specialistų terapinio darbo su trauminius išgyvenimus patyrusiais suaugusiais klientais ypatumai by Ieva Šaltenytė, Greta Kaluževičiūtė

    Published 2024-07-01
    “…Tyrimas atskleidė subjektyvų terapinio darbo su trauma kompleksiškumą. Gautos įžvalgos gali būti vertingos ruošiantiems ar peržiūrintiems naujų specialistų mokymo programas, supervizoriams bei patiems su psichologine trauma dirbantiems specialistams, ieškantiems informacijos apie patiriamus profesinius sunkumus. …”
    Get full text
    Article
  3. 1783

    RECEPTION OF THE BIOGRAPHICAL METHOD IN HISTORICAL AND ANTHROPOGICAL STUDIES by T. I. Vlasova, G. G. Krivtchik

    Published 2018-06-01
    “…The subject of our message is a biographical method that is genetically derived from Ch. A. Sainte-Beuve, who believed that the main task of the biographer is to carry out an analysis of the personality of a prominent person. …”
    Get full text
    Article
  4. 1784

    EFFECTIVENESS OF GOALBALL ATHLETES THROWING IN THE CHILEAN NATIONAL LEAGUE by M.Sc. Kevin Isaías Campos Campos, Ph.D Luis Felipe Castelli Correia de Campos, Ph.D Marcio Pereira Morato, M.Sc. Alessandro Tosim, M.Sc. Mónica Fernández Muñoz, M.Sc.. Karina Alarcón Segura, Ph.D Cristian Luarte Rocha

    Published 2021-11-01
    “…Goalball is a collective Paralympic sport with oppositional characteristics but without invasion bythe athletes that,despite requiring great physical condition in offensive and defensive actions, is also identified as a tactical sport, where the administration of technique in the various game situations determines success in competition. …”
    Get full text
    Article
  5. 1785

    Sedentarismo e inactividad física según sexo, edad y nivel socioeconómico en el País Vasco. Estudio transversal by Marta Ijalba Martínez, Antonio Moreno Llamas, Unai Martín Roncero

    Published 2025-01-01
    “…Se calcularon prevalencias brutas de sedentarismo e inactividad física, total y por grupos de edad, y se evaluó la existencia de un patrón socioeconómico mediante modelos de regresión de Poisson de varianza robusta. …”
    Get full text
    Article
  6. 1786

    EKONOMINĖS IR KULTŪRINĖS VERTYBĖS: PANAŠUMAI IR SKIRTUMAI by Valdas Pruskus

    Published 2004-01-01
    “…Analizuojamos esminės kultūrinės vertybės vertingumo dimensijos, taip pat kriterijai, kuriais remiantis būtų galima įvertinti kultūrinę vertybę, jos priimtinumą ir svarbą žmonėms. …”
    Get full text
    Article
  7. 1787

    Redaktoriaus žodis by R. Mameniškienė

    Published 2020-06-01
    “…Ebolos viruso pandemija 2013-2016 m. galėjo būti gera mokykla ruošiantis COVID-19. Tačiau šis virusas mūsų nepalietė. …”
    Get full text
    Article
  8. 1788

    UTILITARUS SVEIKATOS PRIEŽIŪROS IŠTEKLIŲ SKIRSTYMO MODELIS by Sigita Jakutytė

    Published 2002-01-01
    “…Gyvenimo vertės nustatymas apskaičiuojant jo ekonominę vertę laikomas nepakankama sąlyga tam, kad būtų padidinta bendra nauda. Pasirinkta straipsnio struktūra padeda geriau išryškinti utilitarizmo teorijos taikymo sveikatos priežiūros sistemoje ribas. …”
    Get full text
    Article
  9. 1789

    Smart Contract Penyimpanan Data Genetika Manusia Berbiaya Murah pada Blockchain Ethereum by Tri Stiyo Famuji, Herman Herman, Sunardi Sunardi

    Published 2024-07-01
    “…Hasil pengujian menjalankan smart contract pada blockchain Ethereum yang hanya menyimpan signature data genetik ini menunjukkan biaya gas yang sangat efisien karena hanya menyimpan 256 bit saja dari data genetik riilnya yang dapat mencapai giga byte.…”
    Get full text
    Article
  10. 1790

    Encrypted traffic identification method based on deep residual capsule network with attention mechanism by Guozhen SHI, Kunyang LI, Yao LIU, Yongjian YANG

    Published 2023-02-01
    “…With the improvement of users’ security awareness and the development of encryption technology, encrypted traffic has become an important part of network traffic, and identifying encrypted traffic has become an important part of network traffic supervision.The encrypted traffic identification method based on the traditional deep learning model has problems such as poor effect and long model training time.To address these problems, the encrypted traffic identification method based on a deep residual capsule network (DRCN) was proposed.However, the original capsule network was stacked in the form of full connection, which lead to a small model coupling coefficient and it was impossible to build a deep network model.The DRCN model adopted the dynamic routing algorithm based on the three-dimensional convolutional algorithm (3DCNN) instead of the fully-connected dynamic routing algorithm, to reduce the parameters passed between each capsule layer, decrease the complexity of operations, and then build the deep capsule network to improve the accuracy and efficiency of recognition.The channel attention mechanism was introduced to assign different weights to different features, and then the influence of useless features on the recognition results was reduced.The introduction of the residual network into the capsule network layer and the construction of the residual capsule network module alleviated the gradient disappearance problem of the deep capsule network.In terms of data pre-processing, the first 784byte of the intercepted packets was converted into images as input of the DRCN model, to avoid manual feature extraction and reduce the labor cost of encrypted traffic recognition.The experimental results on the ISCXVPN2016 dataset show that the accuracy of the DRCN model is improved by 5.54% and the training time of the model is reduced by 232s compared with the BLSTM model with the best performance.In addition, the accuracy of the DRCN model reaches 94.3% on the small dataset.The above experimental results prove that the proposed recognition scheme has high recognition rate, good performance and applicability.…”
    Get full text
    Article
  11. 1791

    TURINIO RINKODAROS TYRIMŲ KAITOS TENDENCIJOS 2010-2021 M.: SISTEMINIS POŽIŪRIS by Mantas Dilys, Lina Šarlauskienė, Andrius Šmitas

    Published 2021-09-01
    “…Turinio rinkodaroje svarbus yra pats turinys, kuris turi būti unikalus, vertingas ir formuotų priežastingumą atlikti veiksmus ar sudarytų prielaidas ketinimams. …”
    Get full text
    Article
  12. 1792

    Redaktoriaus žodis by R. Mameniškienė

    Published 2020-06-01
    “…Ebolos viruso pandemija 2013-2016 m. galėjo būti gera mokykla ruošiantis COVID-19. Tačiau šis virusas mūsų nepalietė. …”
    Get full text
    Article
  13. 1793

    Characterization of the First Marine Pestivirus, Phocoena Pestivirus (PhoPeV) by Lars Söder, Denise Meyer, Olaf Isken, Norbert Tautz, Matthias König, Alexander Postel, Paul Becher

    Published 2025-01-01
    “…While Bungowannah pestivirus (BuPV), a unique porcine pestivirus closely related to PhoPeV, exhibits a broad cell tropism, PhoPeV only infects cells from pigs, cattle, sheep, and cats, as has been described for classical swine fever virus (CSFV). …”
    Get full text
    Article
  14. 1794

    Microstructural and Mechanical Behaviors of Friction Stir Welded Dissimilar AA6082-AA7075 Joints by M. Vetrivel Sezhian, K. Giridharan, D. Peter Pushpanathan, G. Chakravarthi, B. Stalin, Alagar Karthick, P. Manoj Kumar, Murugesan Bharani

    Published 2021-01-01
    “…A taper pin-profiled tool was utilized to produce the butt welded joints. Mechanical properties of microhardness, tensile strength, yield strength, elongation, and bending strength of the joints were analyzed. …”
    Get full text
    Article
  15. 1795

    Encrypted traffic classification method based on convolutional neural network by Rongna XIE, Zhuhong MA, Zongyu LI, Ye TIAN

    Published 2022-12-01
    “…Aiming at the problems of low accuracy, weak generality, and easy privacy violation of traditional encrypted network traffic classification methods, an encrypted traffic classification method based on convolutional neural network was proposed, which avoided relying on original traffic data and prevented overfitting of specific byte structure of the application.According to the data packet size and arrival time information of network traffic, a method to convert the original traffic into a two-dimensional picture was designed.Each cell in the histogram represented the number of packets with corresponding size that arrive at the corresponding time interval, avoiding reliance on packet payloads and privacy violations.The LeNet-5 convolutional neural network model was optimized to improve the classification accuracy.The inception module was embedded for multi-dimensional feature extraction and feature fusion.And the 1*1 convolution was used to control the feature dimension of the output.Besides, the average pooling layer and the convolutional layer were used to replace the fully connected layer to increase the calculation speed and avoid overfitting.The sliding window method was used in the object detection task, and each network unidirectional flow was divided into equal-sized blocks, ensuring that the blocks in the training set and the blocks in the test set in a single session do not overlap and expanding the dataset samples.The classification experiment results on the ISCX dataset show that for the application traffic classification task, the average accuracy rate reaches more than 95%.The comparative experimental results show that the traditional classification method has a significant decrease in accuracy or even fails when the types of training set and test set are different.However, the accuracy rate of the proposed method still reaches 89.2%, which proves that the method is universally suitable for encrypted traffic and non-encrypted traffic.All experiments are based on imbalanced datasets, and the experimental results may be further improved if balanced processing is performed.…”
    Get full text
    Article
  16. 1796

    NEIGIAMŲ SOCIALINIŲ REIŠKINIŲ PREVENCIJA IKIMOKYKLINIO UGDYMO MOKYKLOSE by Rimanta Pagirienė, Daiva Ramanauskienė

    Published 2023-07-01
    “…Vaikai mokosi valdyti savo emocijas, atpažinti ir tinkamai reaguoti į neigiamus socialinius reiškinius, įveikti socialinius bei emocinius sunkumus, būti atspariais susidūrę su neigiama išorinio pasaulio įtaka, jausti atsakomybę už save ir kitus. …”
    Get full text
    Article
  17. 1797

    DVI NARCIZO INTERPRETACIJOS: ETIKA IR POETIKA PSICHOANALITINIAME KONTEKSTE by Leonarda Jekentaitė

    Published 2002-01-01
    “…Mitologinis Narcizas gali būti pasmerktas etikos ir išteisintas estetikos požiūriu. …”
    Get full text
    Article
  18. 1798

    The simulation of ELM control by the advanced divertor configuration in EAST by Y.L. Li, T.Y. Xia, Z.P. Luo, Q.Z. Yu, S.F. Mao, B. Gui, X.X. He, H.M. Qi, P.C. Xie, M.Y. Ye, the EAST team

    Published 2025-01-01
    “…To obtain the physical mechanism of ELM suppression, the numerical simulations are carried out using the BOUT++ turbulence model. The simulations reveal that the large local magnetic shear near the outer mid-plane (OMP) induced by QSF divertor plays a key role in the ELM suppression. …”
    Get full text
    Article
  19. 1799

    EKONOMINĖS IR KULTŪRINĖS VERTYBĖS: PANAŠUMAI IR SKIRTUMAI by Valdas Pruskus

    Published 2004-01-01
    “…Analizuojamos esminės kultūrinės vertybės vertingumo dimensijos, taip pat kriterijai, kuriais remiantis būtų galima įvertinti kultūrinę vertybę, jos priimtinumą ir svarbą žmonėms. …”
    Get full text
    Article
  20. 1800