Suggested Topics within your search.
Suggested Topics within your search.
-
1941
Network analysis of childhood maltreatment and internet addiction in adolescents with major depressive disorder
Published 2024-11-01“…Abstract Background Childhood maltreatment (CM) is closely linked to internet addiction (IA), especially in adolescents with Major Depressive Disorder (MDD). Previous studies have shown that adolescents who experience CM are more likely to develop IA and other psychological problems. …”
Get full text
Article -
1942
An efficient network for object detection in scale-imbalanced remote sensing images
Published 2025-05-01“…Remote sensing images contain complex scene information and have multi-scale characteristics after being imaged by remote sensing equipment because the target instances in natural scenes are different sizes. …”
Get full text
Article -
1943
Bioinformatics-Driven Optimization of Wheat Breeding by Integrating Genomic Data Analysis with Phenotypic Traits
Published 2025-01-01“…By applying Principal Component Analysis (PCA) to reduce the dimensionality of highly complex datasets and utilize Linear Mixed Models (LMM) to solve the complex traits problem with the consideration of the fixed and random effects, respectively, we have successfully improved trait prediction and QTL identification. …”
Get full text
Article -
1944
-
1945
A Consensus Framework for Evaluating Dispute Resolution Alternatives in International Law Using an Interval-Valued Type-2 Fuzzy TOPSIS Approach
Published 2024-11-01“…The results of this study ultimately contribute to improved decision-making outcomes and greater efficiency in multidisciplinary problem solving. The assessments of experts in international law, international relations, and political science in their respective fields of expertise have been gathered to form a consensus. …”
Get full text
Article -
1946
Application of Laplace Transform For Solving Population Growth and Decay Models.
Published 2024“…Laplace can be used to convert complex differential equations to a simpler form having polynomials, convert derivatives into multiple domain variables, and then convert the polynomials back to the differential equation using the Inverse Laplace transform, telecommunication field to send signals to both sides of the medium. …”
Get full text
Thesis -
1947
Creation and Establishment of the State Emergency Medical Services and Disaster Medicine Services in Russia (to the 100th Anniversary of the N.V. Sklifosovsky Research Institute fo...
Published 2023-11-01“…The Institute’s departments are being actively specialized, making it possible to obtain fundamentally new scientific and practical results for widespread implementation.Since 2011, “Scientific achievements in the field of emergency medical care in the Russian Federation” - collections of research works - have been published annually. The information presented in them can be used throughout the country.The experience in treatment for the novel coronavirus infection COVID-19 allowed the Institute to begin a new page in the history of emergency medical services.The recent opening of an emergency inpatient complex at the Institute contributed to optimizing the work of the hospital’s resuscitation and intensive care units and expanding their treatment and diagnostic capabilities.For more than 10 years, the public and consolidating activities of the scientific and practical society of emergency medicine specialists have been effective. …”
Get full text
Article -
1948
Enhanced Multi-Criteria DNA Sequence Analysis Using Neutrosophic Logic and Deep Learning: An Integrated Approach for Comparison and Classification
Published 2025-07-01“…This paper presents a comprehensive approach for analyzing DNA sequences and attempts to find a practical solution to the problems of comparing and classifying genomic data, which have become increasingly complex and noisy. …”
Get full text
Article -
1949
Overview of Applications and Research Directions of Deep Learning Methods for Wind Power Prediction
Published 2025-03-01“…In recent years, deep learning methods have demonstrated significant advantages in the field of wind power prediction, and by constructing complex nonlinear models, deep learning models can effectively capture the intrinsic laws and changing trends of wind power data. …”
Get full text
Article -
1950
Enhancing Biotechnology Education through BioVate Competition: Increasing Conceptual Understanding and Science Communication in Science Education
Published 2025-04-01“…The major premise of the BioVate model, the ability to tackle real problems (for example, the use of CRISPR technology for developing pest-resistant crops), was reported to have fostered intrinsic motivation and closed the theoretical-practical gap. …”
Get full text
Article -
1951
Probabilistic photonic computing with chaotic light
Published 2024-12-01“…Abstract Biological neural networks effortlessly tackle complex computational problems and excel at predicting outcomes from noisy, incomplete data. …”
Get full text
Article -
1952
Identifying patterns differing between high-dimensional datasets with generalized contrastive PCA.
Published 2025-02-01“…High-dimensional data have become ubiquitous in the biological sciences, and it is often desirable to compare two datasets collected under different experimental conditions to extract low-dimensional patterns enriched in one condition. …”
Get full text
Article -
1953
Personal Data Management against Identity Theft: Analysis of Cases Filed at the Consumers League from Universidad Pontificia Bolivariana Monteria (2019 - 2021)
Published 2022-12-01“…The main objective of this paper is to build a diagnosis of the current state of the local legal reality (Monteria and the department of Cordoba) regarding consumer law (identification of the most urgent and complex problems and the type of solutions they are currently subject to) in order to define lines of work in strategic litigation. …”
Get full text
Article -
1954
Review on security risks of key components in industrial control system
Published 2022-06-01“…With the rapid development of modern information technology and communication technology, industrial control system has become an important part of national key infrastructure, whose security is related to national strategic security and social stability.The close connection between modern industrial control system and Internet promotes the rapid progress of industrial control technology, meanwhile it brings serious security risks.Since the“Stuxnet” virus incident, attacks on industrial control systems have occurred frequently, which causes huge economic losses to global production enterprises.Besides, it also poses significant impact on the social stability and security to many countries and regions, which has aroused people’s great concern about the security of industrial control systems.Due to the wide variety of automation equipment and proprietary protocols, complex data flow and rapid development in modern industrial control system, it is very difficult to summarize the safety of key components of industrial control.There are few literatures related to this area, and most of them are old and incomplete.To solve the above problems, the mainstream architecture and related components of the current industrial control system were introduced.Then the security vulnerabilities and potential threats in the key industrial control components were analyzed.The attack methods of SCADA control center, programmable logic controller and field equipment were summarized.Furthermore, the preconditions, objects, steps and hazards of the attack in the literature in recent years were also analyzed.The attacks against industrial control network were classified from the perspective of integrity and confidentiality.Finally, the possible development trend of industrial control system attack was given.…”
Get full text
Article -
1955
Transfer learning-enhanced physics informed neural network for accurate melt pool prediction in laser melting
Published 2025-01-01“…Physics informed neural network (PINN) method is proposed to address challenges in various science and engineering problems when traditional numerical calculations are time-consuming, or deep learning (DL) methods have high demand for data. …”
Get full text
Article -
1956
Conclusions on the Way Forward for Evaluation in Difficult Times
Published 2025-05-01“… Background: The evaluation profession faces unprecedented challenges in an era of global uncertainty, with shifting political climates, rising populism, and complex societal problems requiring innovative evaluation approaches. …”
Get full text
Article -
1957
Computational Fluid Dynamics Investigation on Transplantation Anastomoses
Published 2025-07-01“…It is known that ANSYS is appropriate to simulate complex geometries (Papadimitriou et al., 2011). Solutions are obtained over a span of at least three flow pulses. …”
Get full text
Article -
1958
Speech Behavior of British Politicians in Discussion of Brexit: Pragmatics, Gender and Communicative Dominance in Political Media Discourse
Published 2020-10-01“…The novelty and purpose of the study is to identify and analyze the complex linguistic gender specificity of the speech behavior of British politicians in political media discourse. …”
Get full text
Article -
1959
Mind Theory and the Role of Financial Decision and Process Role of Optogenetics
Published 2020-04-01“…These results are obtained from the study of a small number of participants in the experiment, but give an objective assessment and understanding of the complexity of the research and the guidance that include a scientific basis in the process of solving problems in the financial sphere (as an example: when trading in the financial market).…”
Get full text
Article -
1960
CONFLICT OF REALITY AND FANTASTIC FICTION IN THE STORY OF ALEXEY N. TOLSTOY “COUNT CALIOSTRO”
Published 2024-06-01“…At first glance, the complex vicissitudes of life should have determined the preference of fantasy over reality, but in “Count Cagliostro” fantastic fiction enters into a conflicting relationship with the world of reality, proof of this thesis becomes the purpose of the article. …”
Get full text
Article