Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
4461
Molecular basis and genetics of hypohidrotic ectodermal dysplasias
Published 2023-11-01“…The review also presents data on promising approaches for intrauterine ED treatment.…”
Get full text
Article -
4462
The importance of formative assessment based on students’ perception
Published 2022-06-01“…Jurnal Konseling dan Pendidikan…”
Get full text
Article -
4463
Anti-ransomware method based on active deception
Published 2024-07-01Subjects: Get full text
Article -
4464
Influence of Personality on Shape-Based Design Activities
Published 2019-01-01“…The results confirm the influence of personality on shape-based design activities and allow highlighting different keys to interpret and exploit these results. …”
Get full text
Article -
4465
Inversion-Based Face Swapping With Diffusion Model
Published 2025-01-01“…Previous studies have primarily utilized generative adversarial network-based models for face swapping. This paper introduces inversion-based face swapping (InFS), a novel framework employing diffusion inversion. …”
Get full text
Article -
4466
Net traffic identifier based on hierarchical clustering
Published 2014-10-01“…An improved net traffic identifier algorithm was proposed based on semi-supervised clustering.Symmetrical uncertainty was used to reduce the net flow attributes,and then kernel function was used to project the rest attributes to higher dimentional space.The train net flow was clustered in high dimentional space hierarchically.Smooth factor,sihouette coefficient and entropy controlled the cluster process to get a well result.Experiments show that the algorithm got flat clusters without any huge cluster and could identify most net flow even encrypted ones.…”
Get full text
Article -
4467
Asymmetric routing detection based on flow records
Published 2014-10-01“…The misconfiguration of border routers may cause asymmetric routing in campus networks which connect to multiple ISP.A method FARD was proposed according to the phenomenon.This method uses TCP connection-oriented transmission characteristics combined with the home IP address,locating the possible asymmetric routing IP address in the network based on the flow records provided by the router.Experiment on the access router flow records from the main pointof CERNET network to demonstrate the proposed method.…”
Get full text
Article -
4468
IPv6 based SD-WAN deployment
Published 2019-12-01“…The development background of SD-WAN and the current SD-WAN scheme based on IPv4 was introduced,the scheme of applying IPv6 to SD-WAN scenario was put forward,the changes that need to be made at the existing underlay and overlay levels to realize the SD-WAN scheme based on IPv6 were analysed,and the feasibility of using IPv6 technology to realize SD-WAN was discussed.…”
Get full text
Article -
4469
Emerging Paradigms in Genomics-Based Crop Improvement
Published 2013-01-01“…Furthermore, rapid generation of genome-wide marker data coupled with easy access to precise and accurate phenotypic screens enable large-scale exploitation of LD not only to discover novel QTLs via whole genome association scans but also to practise genomic estimated breeding value (GEBV)-based selection of genotypes. …”
Get full text
Article -
4470
Social network model based on the transmission of information
Published 2013-04-01“…The topology modeling of the social network is propitious to understanding the transmission process of information and the topology characteristic of the real friendship network.Considering the directed characteristic of information spread,the dynamic process of information dissemination was simulated,and moreover,the weighted directed topology model in order to well emulate the topology structure of the social network was constructed.Simulation results show the degree and strength distribution as well as the correlation between degree and strength of the network generate by the topology model embody obvious power-law characteristic,and meanwhile,through analyzing the clustering coefficient,coreness and Gini coefficient of the network,the generated network has the characteristics of clustering,layer and heterogeneity which are shown in the real friendship network is verified.…”
Get full text
Article -
4471
An Emerging Theory of School-Based Participatory Science
Published 2025-01-01“…Despite these benefits and others, school-based participatory science (SBPS) is not widespread. …”
Get full text
Article -
4472
Board voting system based on the consortium blockchains
Published 2017-12-01“…The board voting is a scenario of anonymous voting on a particular group of individuals,which is strict with the identities of the participants.A board e-voting protocol based on the consortium blockchains was presented,which replaced the traditional trusted third party with the smart contract so as to reduce the system trust cost.It adopt a digital certificate-based identity mechanism to ensure that the voter's identity is legal.It adopt the blind signature based on elliptic curve technology to achieve the anonymity of voting.The security analysis shows that the proposed protocol can meet the requirements of unforgeability,anonymity and security etc,which is convenient and flexible to use.…”
Get full text
Article -
4473
Bases of audit of receivables in the organizations of the telecommunication sector
Published 2019-04-01“…The significance of checking receivables in organizations of the telecommunication sector has been considered in the article. The main tasks, which are set during the audit of receivables, have been examined. …”
Get full text
Article -
4474
Network-Based Protein Biomarker Discovery Platforms
Published 2016-03-01“…The advances in mass spectrometry-based proteomics technologies have enabled the generation of global proteome data from tissue or body fluid samples collected from a broad spectrum of human diseases. …”
Get full text
Article -
4475
Analysis of a Chaotic Memristor Based Oscillator
Published 2014-01-01“…A chaotic oscillator based on the memristor is analyzed from a chaos theory viewpoint. …”
Get full text
Article -
4476
Effects of rhythmic-based exercise program in children
Published 2024-12-01“…Various exercise modalities have been studied for their impact on children's PF, but rhythmic-based exercises have received less attention. Hence, we structured the rhythmic-based exercise program to provide an approach to developing children's PF over ten months. …”
Get full text
Article -
4477
An Algorithm to Compute the H-Bases for Ideals of Subalgebras
Published 2021-01-01“…The concept of H-bases, introduced long ago by Macauly, has become an important ingredient for the treatment of various problems in computational algebra. …”
Get full text
Article -
4478
Deep Learning Based DDoS Attack Detection
Published 2025-01-01“…On the CICDDoS2019 dataset, which included several DDoS attack versions, the suggested model was trained and evaluated. The hybrid CNN-LSTM has extraction capabilities regarding both the spatial and temporal features of network traffic data, showing highly efficient performance. …”
Get full text
Article -
4479
Digital twin-based applications in crop monitoring
Published 2025-01-01“…The review identifies various modeling methods for digital twin development in crop monitoring, including physics-based, agent-based, data-driven, hybrid, and spatial models. …”
Get full text
Article -
4480
PROFESSIONAL TEACHER TRAINING BASED ON SOCIAL PARTNERSHIP
Published 2016-12-01Get full text
Article