Suggested Topics within your search.
Suggested Topics within your search.
- Academic writing 1
- Agriculture 1
- Autonomy and independence movements 1
- Calculus 1
- Curricula 1
- Curriculum planning 1
- Decolonization 1
- Dissertations, Academic 1
- Economic policy 1
- Education 1
- Electric circuit analysis 1
- Electric network analysis 1
- Electronic Health Records 1
- English language 1
- Entrepreneurship 1
- Film adaptations 1
- Foreign economic relations 1
- Grammar, Comparative and general 1
- History 1
- History and criticism 1
- International business enterprises 1
- LANGUAGE ARTS & DISCIPLINES / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Syntax 1
- Literary style 1
- MATHEMATICS / Mathematical Analysis 1
- Manufacturing processes 1
- Medical Informatics Applications 1
- Medical informatics 1
- Medical technology 1
-
24361
Reanalysis of 500 hP patterns generating temperatures above 50 ° C in West Asia
Published 2024-03-01“…After identifying days whit above 50° c, HGT data at the level of 500 hp were extracted and WARD clustering was applied. Finally, after identifying the clusters, the days whit the highest temperature that occurred in each cluster were selected for synoptic analysis. …”
Get full text
Article -
24362
Effective optical and treatment zone analysis by means of cross-over differences after lenticule extraction
Published 2025-01-01“…The advantages of this algorithm over existing methods are its objectivity; automation; speed; resolution, accuracy and precision; the free-form boundary determination; and finally its support in determining centration and circularity.…”
Get full text
Article -
24363
Research on the evolution, key technologies, and applications for AI enabled 5G-Advanced core network running
Published 2024-12-01“…Then, five key technologies and capabilities of AI enabled core network running were introduced. Finally, focusing on the typical service requirements of AI enabled core network running, the relevant solutions and their results were analyzed and summarized, thus providing new ideas for the application and implementation of 5G-A core network intelligence.…”
Get full text
Article -
24364
Physical activity, sedentary time and bone tissue: effects of an 8-months interdisciplinary program with overweight/obese children
Published 2019-05-01“…We observed a significant overall effect of the intervention on bone mineral density z-score changes, however after adjustments for changes in sedentary time and moderate to vigorous physical activity, no effect was observed. Finally, variations in sedentary time and in moderate to vigorous physical activity play an important role in bone mass density in those participants of the interdisciplinary program. …”
Get full text
Article -
24365
Le microphone dans la balance : espaces et enjeux sonores des procès historiques des attentats de Paris et de Nice
Published 2024-10-01“…Moreover, the judicial ritual is constrained by the need to remain fixed in front of the microphone. Finally, it is necessary to examine the stages of creation of the web radio, intended for civil parties, characterized in particular by a modification of the law and the code of criminal procedure.These first elements lay the foundations for a reflection on listening to historical terrorism trials without which the analysis of the content of the debates, which will be done elsewhere, would be biased.…”
Get full text
Article -
24366
A Systematic Review of Experimental Studies on STEM Education
Published 2023-01-01“…Then, this number was reduced to 34 by applying the inclusion and exclusion criteria. Finally, the studies were examined in detail, and 12 articles that were not suitable were excluded from the scope. …”
Get full text
Article -
24367
Application of EMD Technology in Leakage Acoustic Characteristic Extraction of Gas-Liquid, Two-Phase Flow Pipelines
Published 2018-01-01“…Upon increases in the leakage aperture sizes, the entropy of the EMD information of the acoustic signals gradually increases. Finally, the method of the normalized energies characteristic value of each IMF component is also applied in leakage signal processing. …”
Get full text
Article -
24368
Comparison of CRISPR-Cas13b RNA base editing approaches for USH2A-associated inherited retinal degeneration
Published 2025-02-01“…We develop and characterize a mouse model of Usher syndrome carrying the c.11840 G > A mutation designed for the evaluation of base editors for inherited retinal disease. Finally, we compare Cas13 effectors delivered via AAV for the repair of Ush2a in photoreceptors. …”
Get full text
Article -
24369
Evaluating Long-Term Strength and Time to Failure of Sandstone with Different Initial Damage
Published 2020-01-01“…The results show that, with the increase in the initial damage, the LTS of rock decreases and the relationship between the initial damage and the LTS of rock can be described as a linear function. Finally, an evaluation method for predicting the creep failure time of rock under a single stress level was proposed. …”
Get full text
Article -
24370
The Issue of Subway Commuters’ Departure Time Choices under the Influence of Bike-Sharing
Published 2024-01-01“…Conversely, during the departure timeframes that lead to late arrival at work, the traditional model overestimates both the departure rate and total number of commuters. Finally, through case analysis, we further revealed the dynamic relationship between commuter departure rates, commuting fatigue, and number of bike-sharing and calculated the actual commuting costs for different proportions of bike-sharing. …”
Get full text
Article -
24371
Risk Prediction Algorithm of Social Security Fund Operation Based on RBF Neural Network
Published 2021-01-01“…Then, put forward the corresponding risk treatment scheme to the warning signal. Finally, the RBF neural network is used for comprehensive risk warning. …”
Get full text
Article -
24372
Field Development Optimization for Low-Productivity Gas Wells under Intermittent Production
Published 2024-12-01“…The test results show that the trained model accurately predicted all selected key cycle parameters, with R2 values ranging from 0.91 to 0.99. Finally, the optimization method was applied to 100 wells in the gas field for real-time validation. …”
Get full text
Article -
24373
Real-Time Return Demand Prediction Based on Multisource Data of One-Way Carsharing Systems
Published 2021-01-01“…Based on these data, a return demand prediction model was used to predict whether the user will return the vehicle in 15 min in real time, and a destination station prediction model was applied to forecast which station the user will park at. Finally, a case study using ten stations’ one-week field data was conducted to test the benefit of the dynamic return demand prediction. …”
Get full text
Article -
24374
Performance Improvement in Pile Anchor System for Deep Foundation Excavation Using Electroosmotic Chemical Treatment
Published 2019-01-01“…In addition, static load tests were conducted on the tested soil to measure the anchoring force. Finally, parametric analyses were performed to investigate effects of several parameters on anchoring force in terms of the ultimate pull-out capacity of the anchor, identifying critical parameters for the field study. …”
Get full text
Article -
24375
Using Intuitionistic Fuzzy TOPSIS in Site Selection of Wind Power Plants in Turkey
Published 2018-01-01“…The IFS are used to reflect approval, rejection, and hesitation of decision makers by dealing with real life uncertainty, imprecision, vagueness, and linguistic human decisions. Finally, a numerical example is applied for wind power plant site selection. …”
Get full text
Article -
24376
Improving panicle blast resistance and fragrance in a high-quality japonica rice variety through breeding
Published 2025-01-01“…Pigm and Pi-ta are two dominant genes known for their stable broad-spectrum resistance against rice blast fungus Magnaporthe oryzae, while badh2 is the crucial gene that regulates rice aroma.MethodsIn this study, we utilized a molecular marker-assisted selection backcrossing strategy to introduce Pigm, Pi-ta, and badh2 into introgressed lines employing re-sequencing for precise genetic background selection.ResultsFinally, we selected three introgressed lines, including two that carry Pigm with the highest background recovery rates, showing eating and cooking qualities similar to those of HR1212, and one line that pyramids Pigm, Pi-ta, and badh2, which features a strong aroma. …”
Get full text
Article -
24377
Improving breaking efficiency of hard rock: Research on the mechanism of impact-shear rock breaking technology
Published 2025-01-01“…Notably, for the impact-shear bit, the fluctuation of drilling force was effectively mitigated, the stick–slip vibration of bit was weakened, the rock-breaking energy consumption was drastically reduced, and the rock-breaking efficiency and bit’s life were finally improved. In terms of rock stress characteristics, the pre-impact effect of the central hammer bit of the impact-shear bit can release the internal stress of the rock well, and the stress of the rock element on the hole wall was relatively reduced, thus making it easier for the external PDC bit to break the rock. …”
Get full text
Article -
24378
Embedding of national cryptographic algorithm in Hyperledger Fabric
Published 2021-02-01“…Hyperledger Fabric is an extensible alliance blockchain platform and provides support for enterprise-level commercial blockchain projects.The cryptographic algorithm is the core technologies of the platform, ensuring the security and non-tampering of the data on the chain.But the original Fabric platform lacks the national cryptographic algorithm support.The embedding and support of the national cryptographic algorithm of the Fabric platform was designed and implemented.Firstly, the interaction logic of between components and the invocation scenario of each type of cryptographic algorithm in the Fabric platform were analyzed, an idea of embedding national cryptographic algorithm support for the platform was proposed.Secondly, the modules and interfaces for SM2, SM3 and SM4 were added to BCCSP of the Fabric platform based on the open source code of national cryptographic algorithm implementation.Thirdly, the interface of cryptographic algorithm invoked by the upper layer of each component is associated to the interface of corresponding national cryptographic algorithms, which realized the invocation support of national cryptographic algorithm for the upper layer applications.Finally, the correctness and effectiveness of the embedded national cryptographic algorithm were verified by creating a fabric-gm test instance.And compared with the performances of the test instance built by the mirror of the native Fabric platform.The experimental results show that the embedded national cryptographic algorithm interfaces are corrected and the generated national cryptographic certificates are effective.Moreover, compared with the native Fabric platform, the network start up time increases by about 3%.In the millisecond unit, the transaction time cost increases by about one time, the dynamic certificate generation time increases by about 9%, and all the performance are within the acceptable range.…”
Get full text
Article -
24379
Hybrid optimization method for optimal site selection and sizing of a hybrid photovoltaic water pumping/diesel/battery system
Published 2025-01-01“…PV/Battery) reveals that the PV/Diesel/Battery hybrid system offers the lowest costs and highest reliability. Finally, a sensitivity analysis is conducted on component prices, interest rates, and fuel prices to examine the results.…”
Get full text
Article -
24380
Development of Space Weather Reasonable Worst‐Case Scenarios for the UK National Risk Assessment
Published 2021-04-01“…We show how these scenarios are also considered as an ensemble so that government officials can prepare for a severe space weather event, during which many or all of the different scenarios will materialize. Finally, we note that this ensemble also needs to include insights into how public behavior will play out during a severe space weather event and hence the importance of providing robust, evidence‐based information on space weather and its adverse impacts.…”
Get full text
Article