Suggested Topics within your search.
Suggested Topics within your search.
- Study and teaching 2
- EDUCATION / Teaching Methods & Materials / Arts & Humanities 1
- EDUCATION / Teaching Methods & Materials / Science & Technology 1
- EDUCATION / Teaching Methods & Materials / Social Science 1
- FICTION / Fantasy / Short Stories 1
- Geography 1
- Pragmatics 1
- Translating and interpreting 1
-
1781
Bumblebee social learning outcomes correlate with their flower-facing behaviour
Published 2024-11-01“…Two groups of bumblebees observed live conspecifics foraging from either blue or yellow flowers during a single foraging bout, and were subsequently tested for their socially learned colour preferences. …”
Get full text
Article -
1782
Kokybinis žvilgsnis į traumą: psichikos sveikatos specialistų terapinio darbo su trauminius išgyvenimus patyrusiais suaugusiais klientais ypatumai
Published 2024-07-01“…Tyrimas atskleidė subjektyvų terapinio darbo su trauma kompleksiškumą. Gautos įžvalgos gali būti vertingos ruošiantiems ar peržiūrintiems naujų specialistų mokymo programas, supervizoriams bei patiems su psichologine trauma dirbantiems specialistams, ieškantiems informacijos apie patiriamus profesinius sunkumus. …”
Get full text
Article -
1783
RECEPTION OF THE BIOGRAPHICAL METHOD IN HISTORICAL AND ANTHROPOGICAL STUDIES
Published 2018-06-01“…The subject of our message is a biographical method that is genetically derived from Ch. A. Sainte-Beuve, who believed that the main task of the biographer is to carry out an analysis of the personality of a prominent person. …”
Get full text
Article -
1784
EFFECTIVENESS OF GOALBALL ATHLETES THROWING IN THE CHILEAN NATIONAL LEAGUE
Published 2021-11-01“…Goalball is a collective Paralympic sport with oppositional characteristics but without invasion bythe athletes that,despite requiring great physical condition in offensive and defensive actions, is also identified as a tactical sport, where the administration of technique in the various game situations determines success in competition. …”
Get full text
Article -
1785
Sedentarismo e inactividad física según sexo, edad y nivel socioeconómico en el País Vasco. Estudio transversal
Published 2025-01-01“…Se calcularon prevalencias brutas de sedentarismo e inactividad física, total y por grupos de edad, y se evaluó la existencia de un patrón socioeconómico mediante modelos de regresión de Poisson de varianza robusta. …”
Get full text
Article -
1786
EKONOMINĖS IR KULTŪRINĖS VERTYBĖS: PANAŠUMAI IR SKIRTUMAI
Published 2004-01-01“…Analizuojamos esminės kultūrinės vertybės vertingumo dimensijos, taip pat kriterijai, kuriais remiantis būtų galima įvertinti kultūrinę vertybę, jos priimtinumą ir svarbą žmonėms. …”
Get full text
Article -
1787
Redaktoriaus žodis
Published 2020-06-01“…Ebolos viruso pandemija 2013-2016 m. galėjo būti gera mokykla ruošiantis COVID-19. Tačiau šis virusas mūsų nepalietė. …”
Get full text
Article -
1788
UTILITARUS SVEIKATOS PRIEŽIŪROS IŠTEKLIŲ SKIRSTYMO MODELIS
Published 2002-01-01“…Gyvenimo vertės nustatymas apskaičiuojant jo ekonominę vertę laikomas nepakankama sąlyga tam, kad būtų padidinta bendra nauda. Pasirinkta straipsnio struktūra padeda geriau išryškinti utilitarizmo teorijos taikymo sveikatos priežiūros sistemoje ribas. …”
Get full text
Article -
1789
Smart Contract Penyimpanan Data Genetika Manusia Berbiaya Murah pada Blockchain Ethereum
Published 2024-07-01“…Hasil pengujian menjalankan smart contract pada blockchain Ethereum yang hanya menyimpan signature data genetik ini menunjukkan biaya gas yang sangat efisien karena hanya menyimpan 256 bit saja dari data genetik riilnya yang dapat mencapai giga byte.…”
Get full text
Article -
1790
Encrypted traffic identification method based on deep residual capsule network with attention mechanism
Published 2023-02-01“…With the improvement of users’ security awareness and the development of encryption technology, encrypted traffic has become an important part of network traffic, and identifying encrypted traffic has become an important part of network traffic supervision.The encrypted traffic identification method based on the traditional deep learning model has problems such as poor effect and long model training time.To address these problems, the encrypted traffic identification method based on a deep residual capsule network (DRCN) was proposed.However, the original capsule network was stacked in the form of full connection, which lead to a small model coupling coefficient and it was impossible to build a deep network model.The DRCN model adopted the dynamic routing algorithm based on the three-dimensional convolutional algorithm (3DCNN) instead of the fully-connected dynamic routing algorithm, to reduce the parameters passed between each capsule layer, decrease the complexity of operations, and then build the deep capsule network to improve the accuracy and efficiency of recognition.The channel attention mechanism was introduced to assign different weights to different features, and then the influence of useless features on the recognition results was reduced.The introduction of the residual network into the capsule network layer and the construction of the residual capsule network module alleviated the gradient disappearance problem of the deep capsule network.In terms of data pre-processing, the first 784byte of the intercepted packets was converted into images as input of the DRCN model, to avoid manual feature extraction and reduce the labor cost of encrypted traffic recognition.The experimental results on the ISCXVPN2016 dataset show that the accuracy of the DRCN model is improved by 5.54% and the training time of the model is reduced by 232s compared with the BLSTM model with the best performance.In addition, the accuracy of the DRCN model reaches 94.3% on the small dataset.The above experimental results prove that the proposed recognition scheme has high recognition rate, good performance and applicability.…”
Get full text
Article -
1791
TURINIO RINKODAROS TYRIMŲ KAITOS TENDENCIJOS 2010-2021 M.: SISTEMINIS POŽIŪRIS
Published 2021-09-01“…Turinio rinkodaroje svarbus yra pats turinys, kuris turi būti unikalus, vertingas ir formuotų priežastingumą atlikti veiksmus ar sudarytų prielaidas ketinimams. …”
Get full text
Article -
1792
Redaktoriaus žodis
Published 2020-06-01“…Ebolos viruso pandemija 2013-2016 m. galėjo būti gera mokykla ruošiantis COVID-19. Tačiau šis virusas mūsų nepalietė. …”
Get full text
Article -
1793
Characterization of the First Marine Pestivirus, Phocoena Pestivirus (PhoPeV)
Published 2025-01-01“…While Bungowannah pestivirus (BuPV), a unique porcine pestivirus closely related to PhoPeV, exhibits a broad cell tropism, PhoPeV only infects cells from pigs, cattle, sheep, and cats, as has been described for classical swine fever virus (CSFV). …”
Get full text
Article -
1794
Microstructural and Mechanical Behaviors of Friction Stir Welded Dissimilar AA6082-AA7075 Joints
Published 2021-01-01“…A taper pin-profiled tool was utilized to produce the butt welded joints. Mechanical properties of microhardness, tensile strength, yield strength, elongation, and bending strength of the joints were analyzed. …”
Get full text
Article -
1795
Encrypted traffic classification method based on convolutional neural network
Published 2022-12-01“…Aiming at the problems of low accuracy, weak generality, and easy privacy violation of traditional encrypted network traffic classification methods, an encrypted traffic classification method based on convolutional neural network was proposed, which avoided relying on original traffic data and prevented overfitting of specific byte structure of the application.According to the data packet size and arrival time information of network traffic, a method to convert the original traffic into a two-dimensional picture was designed.Each cell in the histogram represented the number of packets with corresponding size that arrive at the corresponding time interval, avoiding reliance on packet payloads and privacy violations.The LeNet-5 convolutional neural network model was optimized to improve the classification accuracy.The inception module was embedded for multi-dimensional feature extraction and feature fusion.And the 1*1 convolution was used to control the feature dimension of the output.Besides, the average pooling layer and the convolutional layer were used to replace the fully connected layer to increase the calculation speed and avoid overfitting.The sliding window method was used in the object detection task, and each network unidirectional flow was divided into equal-sized blocks, ensuring that the blocks in the training set and the blocks in the test set in a single session do not overlap and expanding the dataset samples.The classification experiment results on the ISCX dataset show that for the application traffic classification task, the average accuracy rate reaches more than 95%.The comparative experimental results show that the traditional classification method has a significant decrease in accuracy or even fails when the types of training set and test set are different.However, the accuracy rate of the proposed method still reaches 89.2%, which proves that the method is universally suitable for encrypted traffic and non-encrypted traffic.All experiments are based on imbalanced datasets, and the experimental results may be further improved if balanced processing is performed.…”
Get full text
Article -
1796
NEIGIAMŲ SOCIALINIŲ REIŠKINIŲ PREVENCIJA IKIMOKYKLINIO UGDYMO MOKYKLOSE
Published 2023-07-01“…Vaikai mokosi valdyti savo emocijas, atpažinti ir tinkamai reaguoti į neigiamus socialinius reiškinius, įveikti socialinius bei emocinius sunkumus, būti atspariais susidūrę su neigiama išorinio pasaulio įtaka, jausti atsakomybę už save ir kitus. …”
Get full text
Article -
1797
DVI NARCIZO INTERPRETACIJOS: ETIKA IR POETIKA PSICHOANALITINIAME KONTEKSTE
Published 2002-01-01“…Mitologinis Narcizas gali būti pasmerktas etikos ir išteisintas estetikos požiūriu. …”
Get full text
Article -
1798
The simulation of ELM control by the advanced divertor configuration in EAST
Published 2025-01-01“…To obtain the physical mechanism of ELM suppression, the numerical simulations are carried out using the BOUT++ turbulence model. The simulations reveal that the large local magnetic shear near the outer mid-plane (OMP) induced by QSF divertor plays a key role in the ELM suppression. …”
Get full text
Article -
1799
EKONOMINĖS IR KULTŪRINĖS VERTYBĖS: PANAŠUMAI IR SKIRTUMAI
Published 2004-01-01“…Analizuojamos esminės kultūrinės vertybės vertingumo dimensijos, taip pat kriterijai, kuriais remiantis būtų galima įvertinti kultūrinę vertybę, jos priimtinumą ir svarbą žmonėms. …”
Get full text
Article -
1800
MRI-based analysis of the microstructure of the thalamus and hypothalamus and functional connectivity between cortical networks in episodic cluster headache
Published 2025-01-01“…Methods We collected 3T MRI data from 26 patients with CH during the in-bout period outside the attacks and compared them with data from 20 HCs. …”
Get full text
Article