Suggested Topics within your search.
Suggested Topics within your search.
- Health 8
- Constitutional court 7
- Court of Appeal 6
- Supreme court 6
- Judgement and orders 5
- Law reports, digests, etc 5
- Physical fitness 5
- Research 5
- methods 5
- Consumers 4
- Conversation analysis 4
- High court 4
- Judgements and orders 4
- Court of appeal 3
- Economic aspects 3
- History and criticism 3
- Mathematics 3
- Agriculture 2
- Anesthesia 2
- Anesthetics 2
- Biochemistry 2
- Chemistry 2
- Chemistry, Clinical 2
- Commercial law 2
- Court Bulletin 2
- Drug Dosage Calculations 2
- English language 2
- French language 2
- Health and Fitness 2
- Information technology 2
-
18961
About the modeling of light beam self-focusing in plasma at the irradiation of the target by power UV laser
Published 2021-03-01“…It was shown on the basis of experimental and calculated data that selffocusing of the laser beam developed in the plasma. …”
Get full text
Article -
18962
A Comprehensive Genetic Analysis of Mycotoxin-Producing Penicillium expansum Isolated from River Water Using Molecular Profiling, DNA Barcoding, and Secondary Structure Prediction
Published 2024-12-01“…Notably, the ribosomal nuclear ITS region displayed significant inter- and intra-specific divergence, manifested in DNA barcodes and secondary structures established via minimum free energy calculations. These findings provide crucial insights into the genetic diversity and potential mycotoxin production of P. expansum isolates, shedding light on the environmental repercussions and health risks associated with river water contamination from agricultural and aquaculture effluents. …”
Get full text
Article -
18963
Left ventricular ejection time: its relation to left ventricular systolic function and functional capacity in cardiomyopathic patients
Published 2024-04-01“…Parameters of LV systolic function were compared in both groups. LVET was calculated, compared, and correlated with LV systolic function, NYHA class, and 6MWT. …”
Get full text
Article -
18964
Optical spectra of conjugated gold nano-colloids; Scattering cross section and effects of solvent and polydispersity
Published 2025-01-01“…To study the optical scattering of Au nano-colloid, the angular dispersion distribution profiles for different hydrodynamic diameters were calculated using the Discrete Dipole Approximation (DDA) model that clearly showed the effect of the hydrodynamic diameter of the target particles on the scattering patterns. …”
Get full text
Article -
18965
Investigation of Growth Performance, Proximate and Fatty Acid Composition of Freshwater (Euglena gracilis, Chlorella vulgaris) and Marine (Pavlova lutheri, Diacronema vlkanium) Mic...
Published 2024-01-01“…The initial concentration of microalgae species was adjusted as 2×106 cells/mL and growth performance was calculated by Neubauer Hemocytometer daily. The maximum growth performance was detected in Diacronema vlkanium culture with 1.78×107 cells/mL. …”
Get full text
Article -
18966
Privacy-preserving data compression scheme for k-anonymity model based on Huffman coding
Published 2023-08-01“…The k-anonymity model is widely used as a data anonymization technique for privacy protection during the data release phase.However, with the advent of the big data era, the generation of vast amounts of data poses challenges to data storage.However, it is not feasible to expand the storage space infinitely by hardware upgrade, since the cost of memory is high and the storage space is limited.For this reason, data compression techniques can reduce storage costs and communication overhead.In order to reduce the storage space of the data generated by using anonymization techniques in the data publishing phase, a compression scheme was proposed for the original data and anonymized data of the k-anonymity model.For the original data of the k-anonymity model, the difference between the original data and the anonymized data was calculated according to the set rules and the pre-defined generalization level.Huffman coding compression was applied to the difference data according to frequency characteristics.By storing the difference data, the original data can be obtained indirectly, thus reducing the storage space of the original data.For anonymized data of the k-anonymity model, the anonymized data usually have high repeatability according to the generalization rules of the model or the pre-defined generalization hierarchy relations.The larger the value of k, the more generalized and repeatable the anonymized data becomes.The design of Huffman coding compression was implemented for anonymous data to reduce storage space.The experimental results show that the proposed scheme can significantly reduce the original data and the anonymous data compression rate of the k-anonymity model.Across five models and variousk-value settings,the proposed scheme reduces the compression rate of raw and anonymized data by 72.2% and 64.2% on average compared to the Windows 11 zip tool.…”
Get full text
Article -
18967
Life support technology of beach glamping using renewable energy of sea waves
Published 2024-04-01“…To achieve this goal, numerical research methods were used using statistical data and long-term observational data, searching for domestic and foreign sources with analysis and comparison of the contained data.Results. Calculations of fresh water productivity are presented, taking into account the unevenness of wave characteristics (heights, periods) throughout the year using the example of the Black sea and the Sea of Japan. …”
Get full text
Article -
18968
Encrypted traffic classification method based on convolutional neural network
Published 2022-12-01“…Aiming at the problems of low accuracy, weak generality, and easy privacy violation of traditional encrypted network traffic classification methods, an encrypted traffic classification method based on convolutional neural network was proposed, which avoided relying on original traffic data and prevented overfitting of specific byte structure of the application.According to the data packet size and arrival time information of network traffic, a method to convert the original traffic into a two-dimensional picture was designed.Each cell in the histogram represented the number of packets with corresponding size that arrive at the corresponding time interval, avoiding reliance on packet payloads and privacy violations.The LeNet-5 convolutional neural network model was optimized to improve the classification accuracy.The inception module was embedded for multi-dimensional feature extraction and feature fusion.And the 1*1 convolution was used to control the feature dimension of the output.Besides, the average pooling layer and the convolutional layer were used to replace the fully connected layer to increase the calculation speed and avoid overfitting.The sliding window method was used in the object detection task, and each network unidirectional flow was divided into equal-sized blocks, ensuring that the blocks in the training set and the blocks in the test set in a single session do not overlap and expanding the dataset samples.The classification experiment results on the ISCX dataset show that for the application traffic classification task, the average accuracy rate reaches more than 95%.The comparative experimental results show that the traditional classification method has a significant decrease in accuracy or even fails when the types of training set and test set are different.However, the accuracy rate of the proposed method still reaches 89.2%, which proves that the method is universally suitable for encrypted traffic and non-encrypted traffic.All experiments are based on imbalanced datasets, and the experimental results may be further improved if balanced processing is performed.…”
Get full text
Article -
18969
Efficacy of ultrasonography and mammography in detecting features of breast cancer
Published 2025-01-01“…The sensitivity and specificity for each feature were calculated, and the receiver operating characteristic curve was used to measure the area under the curve for each feature on both modalities. …”
Get full text
Article -
18970
Mathematical model and its solution for water-altering-gas (WAG) injection process incorporating the effect of miscibility, gravity, viscous fingering and permeability heterogeneit...
Published 2024-11-01“…The total volumetric flux and breakthrough time are calculated from the analytical solution at various times. …”
Get full text
Article -
18971
Efficiency Assessment of Economic International Cooperation in Development of Arctic Offshore Oil and Gas Resources
Published 2015-02-01“…There are five stages of economic modeling: 1) the definition of public benefits and costs associated with the public initiative; 2) monetary valuation of costs and benefits; 3) the definition of discounting period and discounting rate; 4) the calculation of net present value of cash flows; 5) the comparison of initiatives' net present values. …”
Get full text
Article -
18972
Corelation between Machines Assisted Endodontic Irrigant Agitation and Apical Extrusion of Debris and Irrigant: A Laboratory Study
Published 2014-01-01“…Apically extruded irrigant was measured and vials were kept in incubator for 5 days at 68°C for drying for weight calculation. Statistical Analysis. Analysis was done using Student’s t-test, one-way ANOVA, and post-hoc. …”
Get full text
Article -
18973
A new approach to the study of the size and the geometry effect on compressive strength in concrete
Published 2025-03-01“…By analyzing experimental data from previous studies on both vibrated (VC) and self-compacting concrete (SCC) (water-cement ratios ranging from 0.28 to 0.67 for VC, and from 0.35 to 0.43 for SCC), this research proposes a model to calculate the conversion factor between cylinder and cubes.Results show discrepancies between the fib Model Code 2010 predictions and experimental data, emphasizing the importance of incorporating Fracture Mechanics parameters, such as fracture energy, for accurate strength predictions. …”
Get full text
Article -
18974
Research review of network defense decision-making methods based on attack and defense game
Published 2022-02-01“…Game theory studies the optimal decision-making problem under the condition of conflict confrontation.It is one of the basic theories of cyberspace security, and can provide a theoretical basis for solving the problem of network defense decision-making.The six game characteristics of network attack and defense were defined, such as goal opposition, strategy dependence, non-cooperative relationship, incomplete information, dynamic evolution and interest drive.Based on the hypothesis of rational player and limited resources, a 5-tuple network attack and defense game model was formally defined by using player, attack and defense strategy set, attack and defense action set, attack and defense information set and attack and defense income.The existing conditions of game equilibrium were analyzed, and the general process of network defense decision-making based on attack and defense game model was summarized.The applicable scenarios of network defense decision-making methods based on eight different types of game models were analyzed, such as complete information static game, complete information dynamic game, incomplete information static game, incomplete information dynamic game, evolutionary game, differential game, time game and random game, and summarizes their research ideas.The advantages and disadvantages of network defense decision-making methods based on different types of game models were given.The development process of network defense decision-making method based on attack defense game was summarized, and the advantages and characteristics of defense decision-making method was explained.It were pointed out that there were three problems in the research process, such as the relationship between the number of factors considered in game modeling and the complexity of the model, the dependence of game reasoning on information and data, and the generalization and migration of game model.It also looked forward to the next research direction from the description mechanism of normative strategy, the calculation method of optimizing revenue and the integration with other network security technologies.And the problems that should be solved were explained.…”
Get full text
Article -
18975
Structural reliability analysis of steel structural covering based on the theory of evidence
Published 2024-08-01“…When considering the cross-sectional area as a random variable, the reliability of the truss bar on the buckling was 23 % lower (lower reliability bound) than in a similar calculation with a deterministic value.…”
Get full text
Article -
18976
Projected health and economic effects of the increase in childhood obesity during the COVID-19 pandemic in England: The potential cost of inaction.
Published 2024-01-01“…<h4>Methods</h4>Using publicly available annual Body Mass Index (BMI) data from 2006-2022, we calculated the increase in overweight/obesity prevalence (BMI ≥85th reference percentile) during the COVID-19 pandemic among children aged 4-5 and 10-11, and variation by deprivation and ethnicity. …”
Get full text
Article -
18977
Beyond periodicity: tailoring Tamm resonances in plasmonic nanohole arrays for multimodal lasing
Published 2025-01-01“…The dispersion characteristics of the NHA array-based structures are calculated and analyzed to understand better the multiple resonances in the transmission and lasing emission patterns.…”
Get full text
Article -
18978
Spatiotemporal simulation of sustainable development based on ecosystem services under climate change.
Published 2025-01-01“…The study innovatively calculates the sustainable development goals (SDG) index based on ecosystem services (ESs). …”
Get full text
Article -
18979
The Effect of Chronic Inhouse Biomass Fuel Smoke Exposure on Coronary Slow Flow Phenomenon in Women Living in the Eastern Region of Turkey
Published 2022-03-01“…The presence of SCF was calculated based on thrombolysis in myocardial infarction frame count. …”
Get full text
Article -
18980
Reinforced Soft Soil by CSV with/without Polypropylene fibres: Experimental and Numerical analysis.
Published 2021-12-01“…The percentages of soft soils (50%, 75%) are experimentally doable and the remaining percentage (25%) was not successfully experimented; for this exact reason, an empirical formula is established based on the design of experiments (DOE) for calculating the soft soil’s characteristics. Then a numerical study using PLAXIS 3D is developed for studying the embankment building on soil which is reinforced by CSV. …”
Get full text
Article