Suggested Topics within your search.
Suggested Topics within your search.
- English language 19
- Law 19
- Management 19
- Information technology 17
- History 14
- Research 11
- methods 11
- Philosophy 10
- Economic development 9
- Economic policy 9
- English 9
- Methodology 9
- Anesthesia 8
- Biochemistry 8
- Grammar 8
- History and criticism 8
- Study and teaching 8
- Contracts 7
- Criminal law 7
- Economic conditions 7
- Entrepreneurship 7
- Moral and ethical aspects 7
- Politics and government 7
- Social service 7
- Administrative law 6
- Human anatomy 6
- Mass media 6
- Psychological tests 6
- Social aspects 6
- literature 6
-
66621
Prediction method of gas emission in working face based on feature selection and BO-GBDT
Published 2024-12-01“…Dimensionality reduction methods, such as Principal Component Analysis, can reduce computational resources but may alter the original feature structure, leading to a loss of some detailed information in the dataset. To address this issue, a gradient boosting decision tree (GBDT) model for gas emission prediction was developed. …”
Get full text
Article -
66622
-
66623
Frameworks for measuring population health: A scoping review.
Published 2024-01-01“…The results in this review serve as a useful resource for governments and healthcare organizations for informing their population health measurement efforts.…”
Get full text
Article -
66624
Knowledge and attitude towards ankle sprain management among primary care physicians in the department of family medicine, King Fahad Armed Forces Hospital, Jeddah, Saudi Arabia
Published 2025-01-01“…A total of 55 (62.5%) of the study physicians utilize the Ottawa Ankle Rules to guide the need for X-ray imaging in ankle sprains, and 52 (59.1%) routinely provide information on preventive measures to patients diagnosed with an ankle sprain. …”
Get full text
Article -
66625
-
66626
Capable design or designing capabilities? An exploration of service design as an emerging organizational capability in Telenor – Martinkenaite
Published 2017-01-01“…This study thus contributes by informing how service design can evolve into an organizational capability, as well as by bridging the emerging literature on service design and design thinking with established strategy theory. …”
Get full text
Article -
66627
Research on network risk assessment based on attack graph of expected benefits-rate
Published 2022-08-01“…As Internet applications and services become more and more extensive, the endless network attacks lead to great risks and challenges to the security of information systems.As a model-based network security risk analysis technology, attack graph is helpful to find the vulnerability between network nodes and the harm of being attacked.It has been proved to be an effective method to find and prevent network security risks.Attack graph is mainly divided into state-based attack graph and attribute-based attack graph.Due to the problem of state explosion in state-based attack graph, most researchers prefer the attribute-based attack graph for network risk assessment.In view of the existing researches on attribute-based attack graph, they excessively rely on the vulnerability of network nodes and the essential attributes of atomic attack.However, they ignore that rational attackers usually choose specific attack paths by maximizing attack benefits.Then, a network risk assessment framework and a quantification method of attack benefits-rate based on expected benefits-rate attack graph were proposed.The network risk assessment framework took the open vulnerability resource database, the new vulnerabilities found by the vulnerability mining system and the big data related to network attack and defense as the basic data source.The network risk assessment framework also took the open source big data platform as the analysis tool to mine and calculate the elements related to attack cost and attack benefit.Using the concepts of cost, benefit and benefit-rate in economics, the calculation model of expected benefit-rate of atomic attack was constructed.By constructing the attribute-based attack graph of the target network, the expected benefit-rate of atomic attack on the attack path was calculated, and the expected benefit-rate list of all possible attack paths was generated.Furthermore, taking the expected goal as the starting point, the search was carried out according to the specific optimization strategy (backtracking method, greedy algorithm, dynamic programming).And the complete attack path with the maximum benefit-rate was obtained, which provided the basis for network risk assessment.The simulation results show the effectiveness and rationality of the proposed expected benefit-rate attack graph network risk assessment method, which can provide support for discovering and preventing network security problems.…”
Get full text
Article -
66628
ESD-YOLOv8: An Efficient Solar Cell Fault Detection Model Based on YOLOv8
Published 2024-01-01Get full text
Article -
66629
Decode Brain System: A Dynamic Adaptive Convolutional Quorum Voting Approach for Variable-Length EEG Data
Published 2020-01-01“…However, current approaches either fix the length of EEG recordings in each trial which would lose information hidden in the data or use the sliding window which would consume large computation on overlapped parts of slices. …”
Get full text
Article -
66630
A universal panel of STR loci for the study of polymorphism of the species <i>Canis lupus</i> and forensic identification of dog and wolf
Published 2024-03-01“…Commercial panels of microsatellite (STR) loci are intended for DNA analysis of the domestic dog (Canis lupus familiaris) and, therefore, when genotyping the Grey wolf (Canis lupus lupus), most markers reveal significant deviations from the Hardy–Weinberg equilibrium and have a low informative value, which complicates their use in a forensic examination. …”
Get full text
Article -
66631
An observation-based method to estimate carbonate system variations in the Labrador Sea
Published 2025-01-01“…Interior ocean observations are minimal for some of these variables, however, connections between the variables rooted in chemistry were used to create pseudo-observations using CO2SYS, increasing the information available. A state space model was designed that combined GLODAP and SOCAT observations along with pseudo-observations in a time series estimate of the carbonate system. …”
Get full text
Article -
66632
-
66633
Adversarial examples defense method based on multi-dimensional feature maps knowledge distillation
Published 2022-04-01“…The neural network approach has been commonly used in computer vision tasks.However, adversarial examples are able to make a neural network generate a false prediction.Adversarial training has been shown to be an effective approach to defend against the impact of adversarial examples.Nevertheless, it requires high computing power and long training time thus limiting its application scenarios.An adversarial examples defense method based on knowledge distillation was proposed, reusing the defense experience from the large datasets to new classification tasks.During distillation, teacher model has the same structure as student model and the feature map vector was used to transfer experience, and clean samples were used for training.Multi-dimensional feature maps were utilized to enhance the semantic information.Furthermore, an attention mechanism based on feature map was proposed, which boosted the effect of distillation by assigning weights to features according to their importance.Experiments were conducted over cifar100 and cifar10 open-source dataset.And various white-box attack algorithms such as FGSM (fast gradient sign method), PGD (project gradient descent) and C&amp;W (Carlini-Wagner attack) were applied to test the experimental results.The accuracy of the proposed method on Cifar10 clean samples exceeds that of adversarial training and is close to the accuracy of the model trained on clean samples.Under the PGD attack of L2 distance, the efficiency of the proposed method is close to that of adversarial training, which is significantly higher than that of normal training.Moreover, the proposed method is a light-weight adversarial defense method with low learning cost.The computing power requirement is far less than that of adversarial training even if optimization schemes such as attention mechanism and multi-dimensional feature map are added.Knowledge distillation can learn the decision-making experience of normal samples and extract robust features as a neural network learning scheme.It uses a small amount of data to generate accurate and robust models, improves generalization, and reduces the cost of adversarial training.…”
Get full text
Article -
66634
Challenges for funders in monitoring compliance with policies on clinical trials registration and reporting: analysis of funding and registry data in the UK
Published 2020-02-01“…Identifying trials from grant management and grant monitoring systems was challenging therefore funders should ensure investigators reliably provide trial registries with information and regularly update entries with details of trial publications and protocols.…”
Get full text
Article -
66635
Ability of pulse oximetry-derived indices to predict hypotension after spinal anesthesia for cesarean delivery: A systematic review and meta-analysis.
Published 2025-01-01“…We searched MEDLINE, Embase, Web of Science, Cochrane Central Register of Controlled Trials, Cochrane Database of Systematic Reviews, ClinicalTrials.gov, European Union Clinical Trials Register, World Health Organization International Clinical Trials Registry Platform, and University Hospital Medical Information Network Clinical Trials Registry databases from inception until June 15, 2023. …”
Get full text
Article -
66636
Multimodal fluorescence-optoacoustic in vivo imaging of the near-infrared calcium ion indicator NIR-GECO2G
Published 2025-02-01Get full text
Article -
66637
Identification and characterization of CONSTANS-like (COL) gene family in upland cotton (Gossypium hirsutum L.).
Published 2017-01-01“…Flowering time in wild cotton (Gossypium spp.) has strict photoperiod sensitivity, but domesticated cotton is day-neutral. Information on the molecular characterization of the CO and CO-like (COL) genes in cotton is very limited. …”
Get full text
Article -
66638
Heat exchange processes in volume of fire-tube boiler with non-water heat transfer fluid
Published 2018-09-01Get full text
Article -
66639
The analysis of operability of dilatometric microthruster with polymer working components
Published 2023-12-01Get full text
Article -
66640
Previous Intestinal Resection Is Associated with Postoperative Complications in Crohn’s Disease: A Cohort Study
Published 2020-01-01“…Data on patients with CD undergoing surgery in our department from January 2016 through December 2019 were retrospectively reviewed. Information collected included demographic details, surgical data, and postoperative outcome. …”
Get full text
Article