Suggested Topics within your search.
Suggested Topics within your search.
- Academic writing 1
- Agriculture 1
- Autonomy and independence movements 1
- Calculus 1
- Curricula 1
- Curriculum planning 1
- Decolonization 1
- Dissertations, Academic 1
- Economic policy 1
- Education 1
- Electric circuit analysis 1
- Electric network analysis 1
- Electronic Health Records 1
- English language 1
- Entrepreneurship 1
- Film adaptations 1
- Foreign economic relations 1
- Grammar, Comparative and general 1
- History 1
- History and criticism 1
- International business enterprises 1
- LANGUAGE ARTS & DISCIPLINES / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Syntax 1
- Literary style 1
- MATHEMATICS / Mathematical Analysis 1
- Manufacturing processes 1
- Medical Informatics Applications 1
- Medical informatics 1
- Medical technology 1
-
17621
A Framework for Compiling and Reviewing Management Textbooks with a Practical and Skill-Building Approach (Comparative Case Study: Organizational Behavior Management Textbooks)
Published 2022-07-01“…Then, the content of one of these books (as a benchmark) was examined in more detail. Finally, a framework for compiling and reviewing management textbooks in Iran was presented.…”
Get full text
Article -
17622
The Hippo Signaling Pathway Manipulates Cellular Senescence
Published 2024-12-01“…The Hippo pathway, a kinase cascade, coordinates with many intracellular signals and mediates the regulation of the activities of various downstream transcription factors and their coactivators to maintain homeostasis. …”
Get full text
Article -
17623
D2D data sharing partner selection mechanism based on privacy degree and stability degree
Published 2019-12-01“…Device to device (D2D) data sharing has become a promising solution to offload cellular network traffic,but the privacy vulnerability and service instability of data sharing partners affect the quality of shared services.To solve this problem,a D2D data sharing partner selection mechanism based on degree of privacy degree and stability degree (named PSUS) was proposed.Firstly,the privacy information of the provider was abstracted and summarized,and the privacy measurement method was built according to the privacy preferences of the provider and the historical records of shared services,and the privacy degree of the provider in different shared services was obtained.Then,the data sharing process was designed based on privacy degree,and the provider cached data under the constraints of privacy preferences and participates in sharing services with low privacy to meet the provider's privacy requirements.Finally,on the basis of the provider who has satisfied the privacy requirements,a multi-index evaluation method was designed to evaluate the service stability of providers to select stable sharing partners.The feasibility of the proposed mechanism was demonstrated by analysis of performance.…”
Get full text
Article -
17624
A Lightweight AI-Based Approach for Drone Jamming Detection
Published 2025-01-01“…Our approach outperforms the standard Isolation Forest model in the detection of both constant and periodic jamming attacks, while still correctly identifying nominal traffic. Finally, we discuss the potential integration of the proposed solution in 6G-enabled drone networks, as a lightweight edge-based solution for enhancing security against jamming attacks.…”
Get full text
Article -
17625
Identification of Sphingomyelinase on the Surface of Chlamydia pneumoniae: Possible Role in the Entry into Its Host Cells
Published 2014-01-01“…SMase activity was measured in vitro from isolated C. pneumoniae elementary bodies (EB) and in the lysate from E. coli cells transfected with a plasmid expressing CPn0300 protein having sequence similarity to SMase. Finally, pretreatment of host cells with exogenous SMase resulting in loss plasma membrane sphingomyelin attenuated attachment of EB.…”
Get full text
Article -
17626
Early Cracking Risk Prediction Model of Concrete under the Action of Multifield Coupling
Published 2021-01-01“…Based on the coupling effect of “hydration-temperature-humidity,” a prediction model of early cracking risk coefficient of concrete under multifield coupling was proposed. Finally, several groups of slab cracking frame experiments were carried out, and the cracking risk prediction results of concrete were consistent with the actual situation, which indicated the correctness of the early cracking risk prediction model of concrete.…”
Get full text
Article -
17627
Bounds of the Spectral Radius and the Nordhaus-Gaddum Type of the Graphs
Published 2013-01-01“…Then, we give some numerical examples which indicate that the results are better than the mentioned upper bounds in some sense. Finally, an upper bound of the Nordhaus-Gaddum type is obtained for the sum of Laplacian spectral radius of a connected graph and its complement. …”
Get full text
Article -
17628
Model and Stability Analysis of a Flexible Bladed Rotor
Published 2006-01-01“…A stability detection method, bringing coalescence and loci separation phenomena to the fore, in case of an asymmetric rotor, is undertaken in order to determine a parametric domain where turbomachinery cannot encounter damage. Finally, extensive parametric studies including the length and the stagger angle of the blades as well as their flexibility are presented in order to obtain robust criteria for stable and unstable areas prediction.…”
Get full text
Article -
17629
Mobility and gender in vulnerable contexts: The case of the Metropolitan System of Tucumán
Published 2022-05-01“…From the analysis of mobility in relation to productive and reproductive spheres, reflections emerge regarding the concept “care mobility”. Finally, after applying an intersectional perspective, the results show differential patterns according to gender and a high vulnerability in women’s mobility. …”
Get full text
Article -
17630
On the Prediction of Product Aesthetic Evaluation Based on Hesitant-Fuzzy Cognition and Neural Network
Published 2022-01-01“…This method makes data more suitable for the prediction with small samples, obtaining an accuracy improvement of up to 40% compared with traditional approaches. Finally, the importance order of the design elements which affect morphological complexity is acquired. …”
Get full text
Article -
17631
Research and Prospect of Reservoir Landslide Mechanism and Risk Evaluation
Published 2024-08-01“…The research hotspots of early identification, triggering mechanism, chain disaster, and risk assessment of reservoir bank landslide are discussed. Finally, the remaining challenges are discussed, and three urgent research directions are proposed: disaster mechanism and migration mode of reservoir landslide, efficient identification technology of landslide potential danger, and intelligent evaluation system of reservoir landslide risk.…”
Get full text
Article -
17632
Reinforcement learning-based vehicle travel path reconstruction from sparse automatic licence plate recognition data
Published 2025-01-01“…Then, a comprehensive reward function is formulated by integrating destination rewards. Finally, the Q-learning algorithm is utilized to reconstruct vehicle travel paths between adjacent ALPR sensors based on the comprehensive reward function. …”
Get full text
Article -
17633
Transient synchronization stability mechanism of PMSG with additional inertia control
Published 2024-10-01Subjects: Get full text
Article -
17634
Simulation Study on A New Type Inlet Hole of Permanent Magnet Magnetic Coupling
Published 2017-01-01“…The simulation analysis of a new inlet hole of a novel permanent magnet magnetic coupling wing cooling device is carried out. Firstly,the computational fluid dynamics software Fluent is used to simulate thermal field and flow field flow of three inlet opening holes of same area and same location,the optimum solution could be obtained through analyzing its maximum temperature rise and resistance. …”
Get full text
Article -
17635
Tracking algorithm of Siamese network based on online target classification and adaptive template update
Published 2021-08-01“…Aiming at the problem that tracking algorithm of Siamese network learned the embedded features of the tracked target and the object in the offline training stage, and these embedded features often lacked the target-specific context information, which made these tracking algorithms less robust, a tracking algorithm of the Siamese network based on online target classification and adaptive template update was proposed, which used SiamRPN++ as the baseline algorithm.Firstly, a cross-correlation feature map supervision module for classification was designed in the offline training phase to learn more discriminative embedded features.Secondly, an online target classification module that included an attention mechanism in the online tracking phase was designed, and the online update filter strategy in the module was used to filter out the background noise.Finally, an adaptive template update module was designed to update the target template information using the UpdateNet.The results of experiments on VOT2018 and VOT2019 datasets verify the effectiveness of the proposed algorithm, which brings 13.5% and 18.2% (EAO) improvement respectively compared with the baseline algorithm SiamRPN++.…”
Get full text
Article -
17636
Antagonismos en la Europa revolucionaria: de Kant y Fichte a Napoleón y Constant
Published 2025-01-01“…Así las cosas, el objetivo del presente artículo, a través de un enfoque de filosofía de la historia, es sacar a la luz dicha concepción de antagonismo y retratar una panorámica de cómo éste se encontraba presente no sólo durante el periodo revolucionario, sino también previamente a finales de la Ilustración, en pensadores como Kant y Fichte, y más tarde en la época imperial, reflejado en el enfrentamiento entre el establecido y más tarde derrocado Imperio napoleónico y el emergente liberalismo guiado por Benjamin Constant. …”
Get full text
Article -
17637
An Examination of the Application of Polyurethane-Based Hydrophobic Nanocoatings Inspired by Natural Structures in Extracting Water from Air Humidity
Published 2023-06-01“…In this article, many factors of collecting moisture are evaluated, for example, temperature, pattern placement angle, pattern shape, types of surface patterns, and ambient humidity. Finally, are introduced the optimum situation for absorbing water from the fog.…”
Get full text
Article -
17638
Asymptotic quadratic price game mechanism for video stream extensible feedback unloading
Published 2020-01-01“…A progressive quadratic price game mechanism with scalable feedback offloading of video streams was proposed.Firstly,the congestion of cellular network could be alleviated by effectively uninstalling some video traffic from all video streaming services to Wi-Fi network,thus providing seamless video streaming services.Several physi-cal paths were integrated in an economical and efficient way.The fountain coded symbols of compressed video data were transmitted simultaneously through LTE and Wi-Fi network to flexibly control the viewing through Wi-Fi net-work and reduce the video quality degradation caused by wireless channel errors.Secondly,a progressive secondary price auction mechanism was used to allocate limited LTE resources to multiple user devices to maximize social wel-fare and achieve Nash equilibrium.The scalability and convergence of the system were verified theoretically.Finally,the performance advantages of the proposed algorithm in video streaming transmission quality and energy consump-tion were verified by experimental simulation.…”
Get full text
Article -
17639
Deep learning uncovers histological patterns of YAP1/TEAD activity related to disease aggressiveness in cancer patients
Published 2025-01-01“…The robustness of our approach was assessed in seven independent validation cohorts. Finally, we showed that histological markers of disease aggressiveness were associated with dysfunctional Hippo signaling.…”
Get full text
Article -
17640
Detection of sybil attacks based on periodic ultra wide band distance information in WSN
Published 2016-08-01“…Concerning the problem that wireless sensor network is vulnerable to many kinds of network attacks and compromise of nodes,a complete detecting system of sybil attack based on periodic ultra-bandwidth distance information was proposed.Firstly,the distance between the adjacent nodes was ranging and the hello data packet was exchanged.Then,the distance estimation form was constructed by local estimation,and the form was contained in each node.Meanwhile,multiple distance matching check was periodically executed for each node in the network.Finally,when there was the distance matching between the legitimate node at least two different nodes,it would give an alarm and discard the sybil nodes.If there was no distance matching,the node continued normal operations.IEEE 802.15.4 peer to peer sensor networks were adopted in the simulation experiments.Experimental results show that the proposed system not only can tolerate changes in the number of complicated sybil attacks,but also can successfully deal with the occurrence of complicated,malleable sybil attack.In addition,the probability of false alarm is very small,the entire network performance and its consistency are not affected.…”
Get full text
Article