Suggested Topics within your search.
Suggested Topics within your search.
- Management 5
- Economic development 3
- Economic policy 3
- History 3
- Leadership 3
- MATHEMATICS / Mathematical Analysis 3
- Academic writing 2
- Economic conditions 2
- Entrepreneurship 2
- Mathematical analysis 2
- Personnel management 2
- Photography 2
- Psychological aspects 2
- Quality of life 2
- Research 2
- Social conditions 2
- Social problems 2
- Study and teaching 2
- Archaeological expeditions 1
- Archeology 1
- Arthritis 1
- Arthritis, Rheumatoid 1
- Authors and publishers 1
- Authorship 1
- Automobiles 1
- Business and Management 1
- Business communication 1
- Business ethics 1
- Cave ecology 1
- Children 1
-
15121
Prediction of Truck Fuel Consumption Based on Crossformer-LSTM Characteristic Distillation
Published 2024-12-01“…With the increasing number of heavy-duty trucks and their high fuel consumption characteristics, reducing fuel costs has become a primary challenge for the freight industry. …”
Get full text
Article -
15122
The Main Ionization Sources of Gas in Several Nearby Star Forming Galaxies
Published 2021-03-01“…In intermediate cases, when the contributions of radiation from OB stars and from shock waves mix, the identification becomes uncertain. As an extra parameter, the gas velocity dispersion in the line-of-sight can be added to classical diagnostic diagrams (i.e., "BPT-σ" relations) to help finding an appropriate solution. …”
Get full text
Article -
15123
Modern trends of digitalization of innovation process
Published 2018-03-01“…Digital technologies are becoming an increasingly important component of the various functional areas of the organization, and in some situations, the success of a business project. …”
Get full text
Article -
15124
Frequency, Prevalence, Interaction, and Gender Differences of Six Psychosocial Factors in Patients Presenting to a Psychiatric Emergency Service
Published 2021-05-01“…# INTRODUCTION The psychiatric emergency service (PES) has become an increasingly utilized patient care approach over the past 50 years. …”
Get full text
Article -
15125
Effect of Wind Loading Pattern on Shear Lag Phenomenon in Framed-Tube Building
Published 2024-02-01“…Due to loading on half of the face, axial force distribution becomes unsymmetrical, and a minimum axial force in corner columns is observed. …”
Get full text
Article -
15126
Exploring safety at mass gathering events through the lens of three different stakeholders
Published 2025-02-01“…Through prioritising safety at mass gathering events, organisers enhance the quality of the event, protect individual and promote the long-term success of the event. Questions were centred on their understanding of safety at events, based on their experiences in MGEs.ResultsParticipants in this study identified many risks to event safety, including lack of risk assessment, communication, lack of ownership of risk and poor planning. …”
Get full text
Article -
15127
Influence of We Media Information Dissemination on Public Emotional Cognition and Behavior under Government Responsibility Constraint
Published 2021-01-01“…How to properly supervise We Media and effectively manage its violations has become an urgent problem in the process of national governance system and governance capacity building. …”
Get full text
Article -
15128
Apport de diverses sources de données à la réalisation d’une intervention ergonomique
Published 2007-05-01“…The ergonomic diagnosis must therefore be considered as progressively becoming more precise through the different data sources by a gradual construction of the information throughout the intervention. …”
Get full text
Article -
15129
Communicating with Extension Clients about Water
Published 2017-09-01“…As the U.S. and Florida populations continue to increase and the demand for fresh, clean water rises, water quality and quantity issues will become increasingly important. Extension faculty should understand public opinion surrounding water issues and identify the information that needs to be communicated to the public about water issues, as well as the best mode for this communication. …”
Get full text
Article -
15130
CONDITIONS OF SKIN AND INTESTINE MICROBIOTES IN PATIENTS WITH PSORIASIS
Published 2022-04-01“…Disorders in the regulation of skin microbiota may become a new therapeutic target in patients with psoriasis, and the restoration of symbiosis may increase the effectiveness of existing treatments. …”
Get full text
Article -
15131
Freemium Business Models as the Foundation for Growing an E-business Venture: A Multiple Case Study of Industry Leaders
Published 2015-01-01“…In e-business freemium business models have become legitiate. However, current research provides litte insight on how the free and premium offring should be employed to lead to growth and success in the long run. …”
Get full text
Article -
15132
Changes in the Order of Family Life Events in 20th-Century Europe: A Cross-Regional Perspective
Published 2017-03-01“…In Eastern Europe where family event sequences have become less standardized and where a particular sequence characterized by the reversal of the traditional order between leaving home and family formation has been observed, the hypothesized transition is still in its very beginning. …”
Get full text
Article -
15133
Academic Literacy Development among Master’s Degree Students in the Process of Studying a Foreign Language in Professional Communication
Published 2022-05-01“…However, it is necessary to note that the level of academic literacy is low, because students lack the academic writing skills needed to become successful professionals after graduation. …”
Get full text
Article -
15134
IT GOVERNANCE IN THE BANKING SECTOR: EVIDENCE FROM ITALY, GERMANY, FRANCE AND SPAIN
Published 2017-11-01“…IT and data architectures are also becoming even more necessary to improve banks’ risk management process, and support the broad management of financial risks. …”
Get full text
Article -
15135
Diplomatic History of the Great Patriotic War and the New World Order
Published 2015-06-01“…But the allies in the war did not become allies in the organization of the postwar world. …”
Get full text
Article -
15136
Consumer Protection of Girls from Cybercrime in a Gender Perspective
Published 2024-12-01“…Using protective technologies such as antivirus software and parental monitoring apps can help reduce the risk of girls becoming victims of cybercrime. Psychological and social support is crucial in helping girls who are victims to cope with the negative impact of cybercrime. …”
Get full text
Article -
15137
Java deserialization vulnerability defense technologybased on run-time detection
Published 2024-04-01“…Consequently, developing strategies to counter Java deserialization vulnerability attacks has become a critical aspect of network security. Following an examination of numerous publicly known Java deserialization vulnerabilities, a runtime detection-based defense technology solution for Java deserialization vulnerabilities was proposed. …”
Get full text
Article -
15138
Effect of Expanded Graphite on Mechanical and Tribological Properties of Polyamide 6/Glass Fibre Composites
Published 2022-01-01“…The quality of plastic gears, especially their durability, is becoming increasingly important due to advances in electric mobility. …”
Get full text
Article -
15139
Information security vulnerability scoring model for intelligent vehicles
Published 2022-02-01“…More and more electronic devices are integrated into the modern vehicles with the development of intelligent vehicles.There are various design flaws and vulnerabilities hidden in a large number of hardware, firmware and software.Therefore, the vulnerabilities of intelligent vehicles have become the most important factor affecting the vehicle safety.The safety of vehicles is seriously affected by the disclosure of a large number of vulnerabilities, and the wide application of smart cars is also restricted.Vulnerability management is an effective method to reduce the risk of vulnerabilities and improve vehicle security.And vulnerability scoring is one the important step in vulnerability management procedure.However, current method have no capability assessing automotive vulnerabilities reasonably.In order to handle this problem, a vulnerability scoring model for intelligent vehicles was proposed, which was based on CVSS.The attack vector and attack complexity were optimized, and property security, privacy security, functional safety and life safety were added to characterize the possible impact of the vulnerabilities according to the characteristics of intelligent vehicles.With the machine learning method, the parameters in CVSS scoring formula were optimized to describe the characteristics of intelligent vehicle vulnerabilities and adapt to the adjusted and new added weights.It is found in case study and statistics that the diversity and distribution of the model are better than CVSS, which means the model can better score different vulnerabilities.And then AHP is used to evaluate the vulnerability of the whole vehicle based on the vulnerability score of the model, a score is given representing the risk level of whole vehicle.The proposed model can be used to evaluate the severity of information security vulnerabilities in intelligent vehicles and assess the security risks of the entire vehicle or part of the system reasonably, which can provide an evidence for fixing the vulnerabilities or reinforcing the entire vehicle.…”
Get full text
Article -
15140
The effectiveness of moodle-based e-learning in enhancing digital literacy among village owned enterprises
Published 2023-10-01“…This decision has affected the dynamics of education and training, prompting an increase in the use of E-Learning applications. E-Learning has become a crucial method in creating a supportive learning environment and enhancing learners' performance. …”
Get full text
Article