Suggested Topics within your search.
Suggested Topics within your search.
- Law reports, digests, etc 5
- methods 3
- Economics 2
- Health and hygiene 2
- History 2
- Law 2
- Medicine 2
- Moral and ethical aspects 2
- Religious life 2
- Women 2
- Academic writing 1
- Administration 1
- Advertising 1
- Anesthesia 1
- Anesthesiology 1
- Application software 1
- Arthritis 1
- Arthritis, Rheumatoid 1
- Attitudes 1
- Big data 1
- Biochemical Phenomena 1
- Biochemistry 1
- Cave ecology 1
- Christian men 1
- Christian sociology 1
- Christian women 1
- Christianity 1
- Climate Change 1
- Clinical biochemistry 1
- Consumers 1
-
8441
Energy policy of the Republic of Turkey: expansion in the Eastern Mediterranean
Published 2023-05-01“…Another important reason is the desire of official Ankara and the Turkish big business that has taken shape over the past two decades to strengthen its influence in neighboring countries and territories. …”
Get full text
Article -
8442
Yalta 1945: the Black Sea Straits and the War in the Far East
Published 2015-06-01“…Behind this processes were certain political goals, and when the war began Stalin stopped work on the first "big shipbuilding program" though it did not mean that he refused them. …”
Get full text
Article -
8443
A Modified Fully Convolutional Network for Crack Damage Identification Compared with Conventional Methods
Published 2021-01-01Get full text
Article -
8444
Compression Algorithm of Road Traffic Spatial Data Based on LZW Encoding
Published 2017-01-01“…Wide-ranging applications of road traffic detection technology in road traffic state data acquisition have introduced new challenges for transportation and storage of road traffic big data. In this paper, a compression method for road traffic spatial data based on LZW encoding is proposed. …”
Get full text
Article -
8445
Howard S. Becker - Kanıt
Published 2022-04-01“…Günümüzde anket, mülakat, doküman incelemesi, kurumların tuttuğu istatistiki veriler gibi geleneksel veri toplama yöntemleri ve kaynaklarının yanı sıra büyük veri (big data) olarak adlandırılan internet temelli yeni veri kaynakları da bulunmaktadır. …”
Get full text
Article -
8446
Graph clustering method based on structure entropy constraints
Published 2021-12-01“…Aiming at the problem of how to decode the true structure of the network from the network embedded in the large-scale noise structure at the open information sharing platform centered on big data, and furthermore accurate mining results can be obtained in the mining related information process, the method of clustering based on structure entropy was proposed to realize divide the correlation degree of nodes in the graph.A solution algorithm for calculating two-dimensional structural information and a module division algorithm based on the principle of entropy reduction were proposed to divide the nodes in the graph structure to obtain corresponding modules.The K-dimensional structural information algorithm was used to further divide the divided modules to realize the clustering of nodes in the graph structure.An example analysis shows that the proposed graph clustering method can not only reflect the true structure of the graph structure, but also effectively mine the degree of association between nodes in the graph structure.At the same time, the other three clustering schemes are compared, and the experiment shows that this scheme has higher efficiency in execution time and guarantees the reliability of the clustering results.…”
Get full text
Article -
8447
Animal Objects: Memory, Desire and Mourning
Published 2018-12-01“…Hunting trophies, taxidermic mounts and domestic objects made from preserved dismembered parts, allowed retired colonial ‘Nimrods’ and intrepid ‘Dianas’ to relive the vivid experiences of big game hunting. At the same time disembodied claws, teeth and horns carried an erotic charge when transformed into lovers’ gifts, while the sensuous reaction to animal skins can be seen in contemporary art and fiction. …”
Get full text
Article -
8448
-
8449
Chandipura virus: The 2024 resurgence and Gujarat outbreak
Published 2024-12-01“…Acute encephalitis syndrome, which mostly affects children and has a high death rate, has been associated with Chandipura virus, an arbovirus largely spread by sandflies (Phlebotomus spp.). …”
Get full text
Article -
8450
New Analyses of Duopoly Game with Output Lower Limiters
Published 2013-01-01“…Numerical experiments show that the output evolution system having lower limiters becomes more robust than without them, and chaos disappears if the lower limiters are big enough. The local or global stability of the conditional equilibrium points provides a theoretical basis for the limiter control method of chaos in economic systems.…”
Get full text
Article -
8451
Incremental Fuzzy Clustering Based on Feature Reduction
Published 2022-01-01“…In the era of big data, more and more datasets are gradually beyond the application scope of traditional clustering algorithms because of their large scale and high dimensions. …”
Get full text
Article -
8452
A Critique on the Translation of the Book “A Fiscal History of Iran in the Safavid and Qajar Periods” By Willem Floor
Published 2020-03-01“…We find out that being unfamiliar with some aspects of the text such as political history, historical geography, financial idioms and terminology, and documentation causes some big mistakes in translation, and all the readers, writers, and translators get mixed up.…”
Get full text
Article -
8453
Impact of digital transformation on the competitive advantage of companies
Published 2024-01-01“…Key factors of digital transformation, as well as ways in which technologies such as artificial intelligence, big data, automation, and cloud computing enable companies to improve their operations, innovate products and services, and achieve sustainable competitive advantage in the market. …”
Get full text
Article -
8454
An Artificial Intelligence Approach for Verifying Persons by Employing the Deoxyribonucleic Acid (DNA) Nucleotides
Published 2023-01-01“…However, it seems that there is still a need to propose a new approach for verifying humans, especially after the recent big wars, where too many people lost and die. This approach should have the capability to provide high personal verification performance. …”
Get full text
Article -
8455
Machine Learning–Based Predictive Farmland Optimization and Crop Monitoring System
Published 2020-01-01“…Random forest algorithm and BigML were employed to analyze and classify datasets containing crop features that generated subclasses based on random crop feature parameters. …”
Get full text
Article -
8456
Research on the security of national secret algorithm based compute first networking
Published 2023-08-01“…With the promotion of national secret algorithm, in-depth research on the arithmetic network was carried out, a more efficient and reasonable security scheme for the arithmetic network was proposed, ensuring the data security and privacy of the arithmetic network with the help of the state secret algorithm.The main elements of the design program included: Supporting arithmetic demand and cryptographic invocation through the underlying resources, the arithmetic orchestration layer provided the ability to orchestrate data arithmetic, meanwhile, the arithmetic scheduling layer intelligently discerned the optimal nodes for arithmetic resource scheduling and allocation; the cryptographic reinforcement layer used the national secret algorithm based on hardware support with the help of public key cryptosystem, hash function, digital envelope, homomorphic encryption, blockchain and other technologies.Focusing on arithmetic network access security, transmission security, data security and privacy protection aspects of security implementation.An architecture and application form was innovatively proposed to guarantee the data security of the arithmetic network, which could meet the needs of the application layer arithmetic in the scenarios of big data, intelligent technology, etc..The security of the arithmetic network is enhanced by empowering the arithmetic network through the state-secret algorithm.…”
Get full text
Article -
8457
Construction of diffusion layers based on cipher structures
Published 2017-06-01“…Taked diffusion layers of block cipher algorithms as the research object,lightweight diffusion layers were constructed by two cipher structures based on the characteristics of diffusion layers of lightweight block cipher algorithms,which were the construction of software-oriented diffusion layers based on Feistel structure and the construction of hardware-oriented diffusion layers based on LFSR.Lightweight involution diffusion layers with branch numbers 7 over eight 4-bit and 8-bit S-boxes were constructed by 3-round Feistel structure and the round functions adopt linear transformations with rotation and XORs.Some suboptimal diffusion layers over four 4 bit and 8 bit S-boxes and diffusion layers with branch numbers 7 over eight 4 bit and 8 bit S boxes based on LFSR were constructed.In addition,6,7,8 dimension MDBL matrices and many 16,18,32 dimension binary matrices with big dimension and branch numbers 7,7,12 based on LFSR were constructed.The experimental results have high practical significance in realm of the design of block cipher algorithms.…”
Get full text
Article -
8458
ROLE OF RADIOGRAPHER IN HANDLING COVID-19 AT CT SCAN ROOM DURING PANDEMIC
Published 2020-11-01“…Background: Radiographers have a big role in handling COVID-19 during the pandemic. …”
Get full text
Article -
8459
The Multivariate Fusion Distribution Characteristics in Physician Demand Prediction
Published 2025-01-01“…Aiming at the optimization of the big data infrastructure in China’s healthcare system, this study proposes a lightweight time series physician demand prediction model, which is especially suitable for the field of telemedicine. …”
Get full text
Article -
8460
Mathematical Modeling and Simulation of Online Teaching Effect Evaluation Based on Decision Tree Algorithm
Published 2022-01-01“…With the support of big data technology, the field of education is also facing new problems and opportunities. …”
Get full text
Article