Suggested Topics within your search.
Suggested Topics within your search.
- History 24
- Management 19
- English language 15
- Research 15
- Study and teaching 12
- Methodology 11
- Psychology 10
- Economic policy 9
- Social aspects 9
- Social conditions 9
- methods 9
- Economic conditions 8
- History and criticism 8
- Mass media 8
- Moral and ethical aspects 8
- Organizational behavior 8
- Psychological aspects 8
- Philosophy 7
- Anesthesia 6
- Civilization 6
- Economic development 6
- Economics 6
- Grammar 6
- Politics and government 6
- Rhetoric 6
- Sociolinguistics 6
- Animal behavior 5
- Communication 5
- Criminal law 5
- Electric wiring, Interior 5
-
205521
Polydopamine grafting polyether ether ketone to stabilize growth factor for efficient osteonecrosis repair
Published 2025-01-01“…In particular, SPEEK-PDA-VEGF composite materials have the best effect on bone repair.…”
Get full text
Article -
205522
Multiple Scattering of P1 Waves by Arbitrarily Arranged Cavities in Saturated Soils
Published 2018-01-01“…Numerical examples are used to investigate variation of dimensionless displacement amplitude at the back and force of cavities barrier under P1 wave incident, and it is also discussed that the main parameters influenced isolation effect such as scattering orders, separation of cavities, distances between cavity rows, numbers of cavities, and arrangement of barriers. …”
Get full text
Article -
205523
THE SELF IN THE WORLD: OVERCOMING CLASSICAL DUALISM AND SHAPING NEW LANDMARKS
Published 2018-06-01“…There is no more acute opposition between the self and the world, the self and the body, the self and the social life of a person. …”
Get full text
Article -
205524
Evaluation method of snow accretion around train bogie using model vehicle running apparatus
Published 2024-12-01“…Comparison of snow accretion on the end blocking vertical panel downstream of the bogies of an intermediate car between real cars and model running tests confirmed that the general characteristics of the snow distribution adhered on the panel can be reproduced. …”
Get full text
Article -
205525
Network Management System's Data Management Layer Based on Big Data Technology
Published 2015-11-01“…Data management layer is the core of data processing and management in network management system.The current situation and problems of network management system was introduced.To break the isolation between the professional network management system and promote data sharing,data domain should further be subdivided and the data model should be reconstructed,and technical framework of Hadoop+MPP was a better choice.The direction for the planning and design of the network management system was pointed out.Finally,the relation of data management layer platform and enterprise wide data sharing service platform was discussed.…”
Get full text
Article -
205526
Role of Trapping in Non‐Volatility of Electrochemical Neuromorphic Organic Devices
Published 2024-12-01“…Abstract Artificial Neural Networks (ANN) require a better platform to reduce their energy consumption and achieve their full potential. …”
Get full text
Article -
205527
Flow Simulations Using Two Dimensional Thermal Lattice Boltzmann Method
Published 2012-01-01Get full text
Article -
205528
The Effect of Physical Activity on Alzheimer’s Disease - Systematic Review
Published 2025-01-01“…DMI further benefits individuals with AD by improving cognitive function, mood regulation, social interaction, and physical coordination. …”
Get full text
Article -
205529
Molecular characteristics and pathogenicity analysis of infectious laryngotracheitis virus isolated in China from 2015 to 2019
Published 2025-02-01“…The complete genome sequences of seven ILTV strains obtained from China between 2015 and 2019 were determined by high-throughput sequencing. …”
Get full text
Article -
205530
Anatomical variations in Eurasian wolf (Canis lupus lupus) (Carnivora: Canidae) of the salivary glands: A histological and histochemical investigation.
Published 2025-01-01“…These findings emphasize the need for further research on diverse populations of wolves and related species within the Canidae family to better understand the influence of diet on salivary gland morphology.…”
Get full text
Article -
205531
Pengukuran Niat Penggunaan Virtual Reality sebagai Alat Simulasi Pelatihan
Published 2023-08-01“…Partisipan dalam penelitian ini berjumlah 60 orang untuk mengukur variabel yang berpengaruh dalam penggunaan virtual reality. …”
Get full text
Article -
205532
Evaluation of the Efficacy of 3D-Printed Customized Orthodontic Brackets in Reducing Treatment Time and Improving Outcomes
Published 2024-12-01“…These customized brackets are hypothesized to reduce treatment time and improve clinical outcomes by providing better alignment precision and minimizing the need for adjustments. …”
Get full text
Article -
205533
Efficacy and Safety of Recombinant Human Thrombopoietin (rhTPO) on Coagulation Function and Inflammatory Factors in the Treatment of Patients with Sepsis-Related Thrombocytopenia
Published 2025-02-01“…Methods a total of 144 patients with sepsis-associated thrombocytopenia, admitted to our hospital between 2022 and 2023, were selected for the study. …”
Get full text
Article -
205534
Large-Scale Mapping and Predictive Modeling of Submerged Aquatic Vegetation in a Shallow Eutrophic Lake
Published 2002-01-01“…Occurrence of Chara was strongly associated with peat sediments, and maximal depths of occurrence varied between sediment types (mud, sand, rock, and peat). …”
Get full text
Article -
205535
A Multi-Index Generative Adversarial Network for Tool Wear Detection with Imbalanced Data
Published 2020-01-01“…., L2-norm and temporal correlation coefficient (CORT), are put forward to measure the similarity between generated signals and testing signals. Finally, our decision-making function further combines L2-norm and CORT with two discriminator scores to determine the tool conditions. …”
Get full text
Article -
205536
-
205537
A Reward Optimization Method Based on Action Subrewards in Hierarchical Reinforcement Learning
Published 2014-01-01Get full text
Article -
205538
Gender Variations in the Oral Microbiomes of Elderly Patients with Initial Periodontitis
Published 2021-01-01“…Twelve males and twenty females (range 50–68 years old) with initial periodontitis provided subgingival plaque samples. 16S rRNA gene sequencing, QIIME-based data processing, and statistical analyses were carried out using several different analytical approaches to detect differences in the oral microbiome between the two groups. Males had higher Chao1 index, observed species, and phylogenetic diversity whole tree values than females. …”
Get full text
Article -
205539
Il luogo e il senso: creazione e significazione degli spazi nel mondo globale
Published 2024-12-01“…Politically, the old nation-state, the space par excellence of belonging and identity, seems to have been supplanted by a series of supranational agencies who actually make decisions. …”
Get full text
Article -
205540
Matrix computation over homomorphic plaintext-ciphertext and its application
Published 2024-02-01“…Those homomorphic encryption schemes supporting single instruction multiple data (SIMD) operations effectively enhance the amortized efficiency of ciphertext computations, yet the structure of ciphertexts leads to high complexity in matrix operations.In many applications, employing plaintext-ciphertext matrix operations can achieve privacy-preserving computing.Based on this, a plaintext-ciphertext matrix multiplication scheme for matrices of arbitrary dimension was proposed.The resulting ciphertext was computed through steps such as encoding the plaintext matrix, transforming the dimensions of the encrypted matrix, etc.Compared to the best-known encrypted matrix multiplication algorithm for square matrices proposed by Jiang et al., the proposed scheme supported matrix multiplication of arbitrary dimension, and consecutive matrix multiplications.Both theoretical analysis and experimental results show that the proposed scheme requires less rotations on ciphertexts and hence features higher efficiency.When applied to a privacy-preserving Bayesian classifier, the proposed scheme can complete classification tasks with higher security parameters and reduced running time.…”
Get full text
Article