Suggested Topics within your search.
Suggested Topics within your search.
- Philosophy 11
- History 9
- Moral and ethical aspects 8
- Economic development 7
- Social service 7
- Research 6
- Economic policy 5
- History and criticism 5
- Management 5
- Mass media 5
- Social aspects 5
- Study and teaching 5
- Economic conditions 4
- Education 4
- Quantum theory 4
- methods 4
- Chemistry, Physical and theoretical 3
- Communication 3
- Criticism 3
- Culture 3
- Economic aspects 3
- Economics 3
- Educational leadership 3
- Globalization 3
- Information theory 3
- Jurisprudence 3
- Law 3
- Literature 3
- MATHEMATICS / Mathematical Analysis 3
- Number theory 3
-
30421
Primary metabolomics and transcriptomic techniques were used to explore the regulatory mechanisms that may influence the flavor characteristics of fresh Corylus heterophylla × Cory...
Published 2025-01-01“…This study provides the theoretical basis for breeding excellent food functional hazelnut varieties.…”
Get full text
Article -
30422
Numerical Simulation Analysis of Different Excavation Parameters for TBM 3D Disc Cutters Based on the Discrete Element Method
Published 2024-12-01“…This study provides a theoretical foundation for optimizing tunnel boring machine (TBM) excavation parameters under diverse geological conditions, offering significant engineering value by enhancing construction efficiency and reducing costs. …”
Get full text
Article -
30423
Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain
Published 2022-08-01“…Currently, there is no data exchanging and sharing between different hospitals, and it is easy to form data islands.At the same time, regional medical data contains a large amount of sensitive information of patients.The public acquisition, sharing and circulation of these data will lead to malicious tampering, theft, abuse and loss of ownership, thereby revealing patient privacy.In addition, the size of medical data is enormous and the data is unstructured, then it is more difficult to prevent and hold accountable some highly targeted malicious attacks, such as malicious attacks on medical data theft, tampering, and extortion.In view of the above problems, a blockchain-based on multi-authority attribute hidden electronic medical record sharing scheme was proposed to achieve fine-grained access to shared electronic medical records while ensuring patient privacy.The Multi-Authorization Attribute Encryption (MA-ABE) algorithm was introduced, which used multi-authority organizations to manage decentralized attributes.It also used hash functions to identify different users, in order to effectively resist collusion attacks between users with different authorizations.Besides, the linear secrets sharing scheme (LSSS) was used to realize partial hiding of attributes, and the attributes were divided into two parts:attribute name and attribute value.In addition, combined with the characteristics of blockchain openness, transparency and tamper-proof, the design of access policy can update the algorithm.Based on the access policy update algorithm, the policy block was added.The new access policy was uploaded to the blockchain to form a policy update traceability chain, which can realize distributed and reliable access control management under the condition of hidden policy.It can also support data privacy protection at the same time, and traceability of user behavior.The theoretical proof and experimental analysis have proved that this scheme protect attribute privacy effectively, while reduces computational overhead.…”
Get full text
Article -
30424
Kemampuan Sosial Anak Usia Dini: Sebuah Tinjauan Etnoparenting pada Lembaga Pendidikan Anak Usia Dini
Published 2025-01-01“…Research Implications – This study contributes to the theoretical understanding of ethnoparenting by demonstrating its practical application in early childhood education. …”
Get full text
Article -
30425
Inter-Agency Analysis of EU Specialised Administrative Services: Insights from the Republic of Cyprus
Published 2024-05-01“…Academic contribution to the field: This study offers a theoretical contribution by providing a comprehensive understanding of moderate Europeanisation effects on EU specialised structures within the Cypriot administrative framework. …”
Get full text
Article -
30426
Real-Time Warning Model of Highway Engineering Construction Safety Based on Internet of Things
Published 2021-01-01“…Therefore, the creation of a more active, smarter, and more effective real-time early warning model for construction safety is a strong complement to current research and has important theoretical and practical implications. The Internet of Things is the third wave of the information industry after computers, the Internet, and mobile communication networks. …”
Get full text
Article -
30427
Teachers’ pedagogical improvement who participate in the training and specialization of doctors in Venezuela
Published 2023-03-01“…<br /><strong>Methods:</strong> a descriptive, pedagogical research was carried out. The theoretical and empirical level methods were applied: analytical-synthetic, inductive-deductive, historical-logical, group interview, participant observation and documentary analysis. …”
Get full text
Article -
30428
La Paille, un matériau pour transmettre
Published 2021-05-01“…The very first condition for this is thus the introduction of alternative theoretical and practical techniques in architecture schools. …”
Get full text
Article -
30429
EDUCATIONAL BUILDING PERFORMANCE EVALUATION PRACTICES AND PERCEPTIONS: A CASE OF FEDERAL UNIVERSITIES IN SOUTH EAST NIGERIA
Published 2012-12-01“…The exploratory nature of this research clarifies the problems that need to be addressed in future studies and so raised a number of theoretical and conceptual issues that must be explored in the performance evaluation of educational buildings. …”
Get full text
Article -
30430
Exploring Customary Law: Perspectives of Hazairin and Cornelis Van Vollenhoven and its Relevance to the Future of Islamic Law in Indonesia
Published 2023-10-01“…This research provides a conceptual historical-theoretical narrative related to customary law in Indonesia. …”
Get full text
Article -
30431
SOME CONSIDERATIONS ON THE TYPOLOGY OF PHILOSOPHICAL-ANTHROPOLOGICAL MODELS (TO THE PROBLEM OF VALUE IDENTIFICATIONS OF UKRAINIANS)
Published 2018-12-01“…It is about certain models that fulfill the worldview-semantic modes of a person. Theoretical basis. The authors cover (O. Polishchuk – Thesis I; V. …”
Get full text
Article -
30432
ECONOMIC ASPECTS OF ORGANIC SOY PRODUCTION IN UKRAINE
Published 2024-12-01“…The research methodology is based on European experience, taking into account the theoretical and methodological provisions of the scientific aspects of organic soybean production in Ukraine. …”
Get full text
Article -
30433
“Diversity’s good unless you have a Southern accent, then you’re a hick”: Self-evaluation, linguistic insecurity and symbolic domination in Middle Tennessee
Published 2022-11-01“…In this context, we draw upon on the notion of symbolic domination, that is a lack of awareness regarding the inherently arbitrary nature of a linguistic standard which leads speakers of less prestigious varieties to judge their own linguistic productions through the prism of dominant criteria (Bourdieu, 2001; Bourdieu & Boltanski, 1975).Our study is based on the results of sociolinguistic fieldwork data from Murfreesboro (Middle Tennessee), which was collected in accordance with the theoretical and methodological framework of the PAC research programme and within the scope of the LVTI-Language, Urban Life, Work, Identity sociophonological project (Durand & Przewozny, 2012; Przewozny et al. 2020). …”
Get full text
Article -
30434
Role of homeostatic plasticity in critical brain dynamics following focal stroke lesions
Published 2024-12-01“…The present study tackles this controversy and provides evidence that the theoretical framework proposed by Janarek et al. cannot explain the anomalous cluster dynamics observed in our patients. …”
Get full text
Article -
30435
The performance of cylindrical solar still with hemispherical dome using circular fins in basin
Published 2025-01-01“…The evaluation was conducted theoretically and experimentally in Najaf, Iraq (at the geographical coordinates of 31.590°N and 44.190°E). …”
Get full text
Article -
30436
Toward efficient authentication for space-air-ground integrated Internet of things
Published 2019-07-01“…MASIT exploits the natural broadcast property of space-air-ground integrated Internet of things to speed up authentication process, and leverage the distinguished feature of IPv6 to support concurrent numerous nodes. Theoretically, we prove that MASIT is existential unforgeable secure under adaptively chosen message and identity Attacks. …”
Get full text
Article -
30437
LeaData a novel reference data of leather images for automatic species identification
Published 2025-02-01“…This big data spans leather images with theoretically ideal and practically non-ideal grain patterns. …”
Get full text
Article -
30438
Preference learning based deep reinforcement learning for flexible job shop scheduling problem
Published 2025-01-01“…Abstract The flexible job shop scheduling problem (FJSP) holds significant importance in both theoretical research and practical applications. Given the complexity and diversity of FJSP, improving the generalization and quality of scheduling methods has become a hot topic of interest in both industry and academia. …”
Get full text
Article -
30439
Solar model independent constraints on the sterile neutrino interpretation of the Gallium Anomaly
Published 2025-03-01Get full text
Article -
30440
Stability Study of Shield Tunnel Excavation Face Induced by Shield Chamber Pressure Entering in Shallow-Buried Sand Stratum
Published 2025-01-01“…[Method] The limit support pressure during the shield tunneling pressurized chamber entry operation is studied by combining numerical simulation, theoretical analysis and engineering verification methods. …”
Get full text
Article