Showing 12,781 - 12,800 results of 14,284 for search 'function construction', query time: 0.22s Refine Results
  1. 12781

    Categorical Frailty Phenotype and Continuous Frailty Index: A Conceptual Overview of Frailty and Its Components among Older Persons in India by Ankit Anand, T.S. Syamala, Md Illias Kanchan Sk

    Published 2022-01-01
    “…Two frailty model was constructed. Education and wealth quintile was used as socio economic indicators. …”
    Get full text
    Article
  2. 12782

    The Relationship between Benthic Macroinvertebrate Assemblages and Water Quality Parameters in the Sanyati Basin, Lake Kariba, Zimbabwe by Peter Makumbe, Artwell Kanda, Tambudzai Chinjani

    Published 2022-01-01
    “…We computed macroinvertebrate metrics and classified them into functional feeding groups (FFGs). A canonical correspondence analysis (CCA) triplot was constructed to assess species-physicochemical relations. …”
    Get full text
    Article
  3. 12783

    Care ‘going market’: Finnish elderly-care policies in transition by Anneli Anttonen, Liisa Häikiö

    Published 2011-06-01
    “…The article evaluates marketization and its effects on elderly-care policies in Finland, where the welfare state has been the most important mechanism in mitigating failures caused by the functioning of market. In addition, since the 1960s the public sector has been regarded as the guarantee for citizens' social rights and the common good. …”
    Get full text
    Article
  4. 12784

    Identification and validation of TSPAN13 as a novel temozolomide resistance-related gene prognostic biomarker in glioblastoma. by Haofei Wang, Zhen Liu, Zesheng Peng, Peng Lv, Peng Fu, Xiaobing Jiang

    Published 2025-01-01
    “…Functional enrichment and mutation analyses were conducted to explore the underlying mechanisms of the risk score and its relationship with immune cell infiltration levels in GBM. …”
    Get full text
    Article
  5. 12785

    Enhanced-Similarity Attention Fusion for Unsupervised Cross-Modal Hashing Retrieval by Mingyong Li, Mingyuan Ge

    Published 2025-01-01
    “…This fused matrix guides the learning of hash functions by preserving the most relevant information from each modality. …”
    Get full text
    Article
  6. 12786

    The controller-first constraint beyond the Basic Variety: how do instructed learner varieties solve contexts of competition? by Repiso Isabel

    Published 2025-05-01
    “…Our analysis shows that the controller-first constraint overlaps with two key concepts of the description of L1 functional grammars – i.e., control asymmetry and the Actor-Undergoer Hierarchy – suggesting that it does not only pertain to the Basic Variety but broadly speaking to the human language capacity. …”
    Get full text
    Article
  7. 12787

    Análise da percepção sobre assentos de trabalho utilizando técnicas estatísticas multivariadas Analysis of work seats user's perception by means of statistical multivariate tools... by Liane Werner, Júlio Carlos de Souza van der Linden, José Luis Duarte Ribeiro

    Published 2003-01-01
    “…Thus, Analysis of Variance, Cluster Analysis, and Factorial Analysis were used to explain the selection based on the obtained constructs: Well-being, Functionality, and Discomfort.…”
    Get full text
    Article
  8. 12788

    Software diversity evaluation method based on the properties of ROP/JOP gadgets by Yuning CHI, Yunfei GUO, Yawen WANG, Hongchao HU

    Published 2022-12-01
    “…In order to reduce the risk of rapid spread of homogeneous attacks in network systems, and enhance network and software security, software diversification technologies are applied widely nowadays.Software diversification aims to generate functionally equivalent but internally changed program variants, thereby alter a single operating environment and mitigating homogenization attacks.The existing diversified technical evaluation index ROP gadgets survival rate is difficult to directly reflect the safety impact and the evaluation method is single.In order to evaluate the effectiveness of the diversification method more comprehensively and effectively, a software diversification evaluation method based on the properties of ROP/JOP gadgets is proposed, by analyzing common code reuse attacks, and turns abstract quantification into concrete indicators evaluates the security gain and effect of diversified methods from three aspects of space, time and quality.The method first discusses how diversification techniques affect ROP/JOP attacks according to the three properties of gadgets similarity, damage degree and availability.Nine kinds of diversification methods, such as instruction replacement, NOP insertion, and control flow flattening, are used to diversify the GNU coreutils assembly to generate diversification assembly.Experiments based on the property of gadgets are carried out on the diverse assemblies, and the effectiveness of different diversification methods and the impact on attacks are evaluated according to the experimental results.The experimental results show that this method can accurately evaluate the security gain of software diversification methods, the diversification technology will lead to the increase of the attack chain space required by the ROP/JOP attack, the longer time to construct the attack chain and the lower the attack success rate.The effects of different diversification methods are different, it has a guiding role for the follow-up research on diversified technologies with higher safety gains.…”
    Get full text
    Article
  9. 12789

    Interpreting repetition expressions in the writing of Trump’s addresses during the Covid-19 pandemic by Mister Gidion Maru, Gin Gin Gustine, Slamet Setiawan, Julio Juniver Tadete, Tirza Kumajas

    Published 2023-01-01
    “…Its practical contribution goes toward defining and exemplifying language expressions and functions in communicative text writing.…”
    Get full text
    Article
  10. 12790

    Meta-analysis of probiotics metabolites in gastrointestinal tract and metabolic health by Xiangning Ma, Hongjun Zhang

    Published 2025-06-01
    “…Utilizing curated interaction data, it is about to construct metabolite-host protein network and prioritised genes using centrality metrics. …”
    Get full text
    Article
  11. 12791

    Cross-cultural adaptation and validation of Dysphagia Handicap Index in Bangladesh by Mehrin Sultana, Md. Muid Hossain Reshad, Md. Shohidul Islam Mridha

    Published 2025-01-01
    “…Abstract The Dysphagia Handicap Index (DHI) is commonly utilized for evaluating how dysphagia impacts the quality of life (QoL) of patients across physical, functional, and emotional dimensions. The primary aim of the research was to linguistically validate and culturally adapt the DHI to the Bangla version. …”
    Get full text
    Article
  12. 12792

    Infant brain atlases from neonates to 1- and 2-year-olds. by Feng Shi, Pew-Thian Yap, Guorong Wu, Hongjun Jia, John H Gilmore, Weili Lin, Dinggang Shen

    Published 2011-04-01
    “…<h4>Conclusions</h4>We expect that the proposed infant 0-1-2 brain atlases would be significantly conducive to structural and functional studies of the infant brains. These atlases are publicly available in our website, http://bric.unc.edu/ideagroup/free-softwares/.…”
    Get full text
    Article
  13. 12793

    Algorithm for finding subcritical paths on network diagrams by M. A. Аnfyorov

    Published 2023-02-01
    “…Numerically, the algorithm was implemented by the dynamic programming method extended by means of an additional functional relationship, implying the presence of suboptimal policies.Conclusions. …”
    Get full text
    Article
  14. 12794

    Narration as Characterization in First-Person Realist Fiction: Complicating a Universally Acknowledged Truth by James Phelan

    Published 2025-07-01
    “…At the macro level, I note the importance of (1) the tacit knowledge, shared by both authors and audiences, of the fictionality of character narration, which means authors write and readers read with an interest in its payoffs; and of (2) the recognition that character narration functions simultaneously along two tracks of communication: that between the character narrator and their narratee, and that between the author and their audience. …”
    Get full text
    Article
  15. 12795

    Sustainable Development Assessment of Commercial banks based on the Analytic Hierarchy Process by N. N. Semenova, I. A. Ivanova, A. A. Vasil’kina

    Published 2021-08-01
    “…At the same time, commercial banks operate under the influence of various factors of the internal and external environment, digital transformation and the transition to the fourth industrial revolution, which significantly changes the conditions of their functioning. The time lag in which a credit institution can be in a relatively static, stable state is reduced. …”
    Get full text
    Article
  16. 12796

    Polynomially computable Σ-specifications of hierarchical models of reacting systems by V. N. Glushkova, K. S. Korovina

    Published 2020-12-01
    “…A constant model is constructed for theories from ∆0T-quasiidentities with Noetherian and confluence properties. …”
    Get full text
    Article
  17. 12797

    Tax incentive to overhaul apartment buildings by N. S. Beskorovainaia

    Published 2024-04-01
    “…Analysis of the provisions of the legislation on taxation issues made it possible to conclude that tax preferences for management organizations and the regional operator are not stimulating. They are constructive elements of value added tax and corporate income tax, allowing them to perform their functions. …”
    Get full text
    Article
  18. 12798

    Covariant analysis of electromagnetic current on the light cone: exposition with scalar Yukawa theory by Wenyu Zhang, Yang Li, James P. Vary

    Published 2025-07-01
    “…The light-front Hamiltonian is constructed and renormalized using a Fock sector dependent scheme. …”
    Get full text
    Article
  19. 12799

    The gene signature linked to lactate metabolism predicts the prognosis and correlates with the immune status of head and neck squamous cell carcinoma by Jian Xiao, Wei Li, Guolin Tan, Ru Gao

    Published 2025-04-01
    “…This study addresses the limited understanding of lactate metabolism-related genes in head and neck squamous cell carcinoma (HNSC) by constructing a prognostic risk model centered on these genes to enhance prediction and treatment strategies for HNSC. …”
    Get full text
    Article
  20. 12800

    Investigating the Concept of Authenticity in Restoration in Light of Archive Documents: Kayseri Sahabiye Madrasah by Ayşegül Akşehirlioğlu

    Published 2024-08-01
    “…Sahabiye Madrasah, constructed in 1267-1268 by Sahip Ata Fahreddin Ali in Kayseri, is one of the significant structures of the Seljuk Period, and it owes its current presence mainly to the conservation activities it has undergone over time. …”
    Get full text
    Article