Suggested Topics within your search.
Suggested Topics within your search.
-
7781
Structural Optimization of Logistics Distribution System Based on Characteristic State Space
Published 2020-01-01“…According to the nature of the characteristic state space, the optimization problem of the logistics distribution system is transformed into a critical path-planning problem, the gradient calculation of the objective function is solved, and an improved genetic algorithm is proposed. …”
Get full text
Article -
7782
Digital technology in the context of social science teaching at secondary schools
Published 2020-12-01“…The text at issue solves the problem of digital technology integration into teaching of social sciences, emphasizes multidisciplinary approach to the humanities, social and technological sciences, presents the need of development of teachers technical thinking relating to social scientific subjects and specifies common features and differences of the pedagogical and technological sciences. …”
Get full text
Article -
7783
Instantaneously Impulsive Stabilization of Mittag–Leffler Numerical Chua’s Oscillator
Published 2025-05-01“…As a case study, the primary outcome is applied to a problem of impulsive stabilization in nonlocal discrete-time Chua’s oscillator. …”
Get full text
Article -
7784
Persian Historiography: A Critique of Julie Scoott Misaimi's Historiographical Approach
Published 2018-03-01“…The present paper, paying attention to the relation between «history» and «historiography» concepts, aims to review the internal and external features of the book "Persian Historiography to the End of the Twelfth Century" which is authored by Julie Scott Meisami. …”
Get full text
Article -
7785
Identification method for malicious traffic in industrial Internet under new unknown attack scenarios
Published 2024-06-01“…Aiming at the problem of traffic data distribution shift caused by new unknown attacks in the industrial Internet, a malicious traffic identification method based on neighborhood filtering and stable learning was proposed to enhance the effectiveness and robustness of the existing graph neural network model in identifying known malicious traffic. …”
Get full text
Article -
7786
Managing the digital transformation of education as part of the Chinese national project of a “Great Unity” society
Published 2023-03-01“…Using the comparative, hermeneutic, historical and philosophical methods, the authors analyse three problem areas – social ideal, forecasting, and national education in China. …”
Get full text
Article -
7787
How Far Can the European Parliament Correct the European Union’s Democratic Deficit?
Published 2008-12-01“…Whatever the definition for democracy and democratic deficit is, the European Union is expected to develop some of the democratic features that member states present in order to compensate for the loss of legitimacy at the national level. …”
Get full text
Article -
7788
Diagnostics of technical university management system on the basis of modern management tools
Published 2015-03-01“…The results of the diagnostics allow describing the problem field of the initial communication situation. …”
Get full text
Article -
7789
Description of the stages and scale of maturity for gonads of female pollock
Published 2017-09-01“…Special stage VI-III is proposed for re-spawning fish because of more viable eggs. Distinctive features between the stages IV-V and V are described. …”
Get full text
Article -
7790
Ethical Traditions of Adyghe: Genre Criteria and Main Motives
Published 2021-07-01“…It is noted that in this regard, the study of ethical traditions is one of the necessary stages in solving this problem. The main goal of the article is to determine genre features and main functions, to identify the main motives and images inherent in ethical legends. …”
Get full text
Article -
7791
Identification method for malicious traffic in industrial Internet under new unknown attack scenarios
Published 2024-06-01“…Aiming at the problem of traffic data distribution shift caused by new unknown attacks in the industrial Internet, a malicious traffic identification method based on neighborhood filtering and stable learning was proposed to enhance the effectiveness and robustness of the existing graph neural network model in identifying known malicious traffic. …”
Get full text
Article -
7792
Use of Levosimendan in Cardiac Anesthesiology
Published 2011-08-01“…It is shown that it is expedient to use levosimendan simultaneously with traditional medical measures, by taking into account the pharmacokinetic features of a calcium sensitizer. The problem of levosimendan readministration in patients operated on the heart as well is stated. …”
Get full text
Article -
7793
Management of patients with atopic dermatitis during pregnancy
Published 2021-07-01“…The problem of the peculiarities of the course of allergic diseases during pregnancy, as well as rational and safe approaches to their treatment, is in the focus of close attention of specialists. …”
Get full text
Article -
7794
Automation and control of the vacuum block
Published 2025-01-01“…Based on a comprehensive study of technological processes occurring in the vacuum block for an installation of the ELOU-AVT type, the features of the complex technological complex under consideration as a control object were analyzed. …”
Get full text
Article -
7795
Chinese medical named entity recognition model based on local enhancement
Published 2024-07-01“…In the medical field, the recognition of medical entities is often influenced by their adjacent context, the current named entity recognition methods typically rely on BiLSTM to capture the global dependency relationships within text, lacking modeling of local dependencies between characters. To resolve this problem, a Chinese medical named entity recognition model LENER based on local enhancement was proposed. …”
Get full text
Article -
7796
Three-Component System of Language Planning: A Case Study Tuvan, Kalmyk and Karelian
Published 2021-04-01“…The review of existing approaches to the study of the problem of language planning is carried out. The features of the implementation of its main aspects are studied. …”
Get full text
Article -
7797
Classification of Chinese cardinal numerals based on the accuracy and integrity of the numbers they denote
Published 2021-10-01“…Beyond that, the article considers the problem of defining words that may be recognized as numerals. …”
Get full text
Article -
7798
Influence of Sliding Time Window Size Selection Based on Heart Rate Variability Signal Analysis on Intelligent Monitoring of Noxious Stimulation under Anesthesia
Published 2021-01-01“…Some researches based on medical signals have failed to provide a general understanding of this problem. This paper presents a feature extraction method for heart rate variability signals, aiming at further improving the evaluation of noxious stimulation. …”
Get full text
Article -
7799
Multithreaded Convolution Implementation Based on Block Methods
Published 2022-12-01“…Convolution is essentially the basis of many methods that solve the problem of determining the degree of similarity or independence of two processes, in other words, when it is necessary to determine the degree of correlation. …”
Get full text
Article -
7800
Hydrology objects monitoring system
Published 2019-12-01“…The formal statement of the problem, models of the monitoring scene and its participants are presented. …”
Get full text
Article