Suggested Topics within your search.
Suggested Topics within your search.
- Education 2
- Evaluation 2
- Research 2
- Biodiversity conservation 1
- Business-to-Business-Marketing 1
- Children 1
- Conservation biology 1
- Data processing 1
- Educational evaluation 1
- Educational technology 1
- Industrial marketing 1
- Language 1
- Language disorders in children 1
- Linguistics 1
- MEDICAL / Audiology & Speech Pathology 1
- Management 1
- Marketing 1
- Mass media 1
- Moral and ethical aspects 1
- Natural resources 1
- Nursing 1
- Nursing Research 1
- Policy sciences 1
- Political planning 1
- Prosodic analysis (Linguistics) 1
- Schools 1
- Study and teaching 1
- Teacher educators 1
- Teachers 1
- Training of 1
-
5721
Operating Thermal Power Plants Efficiency Improvement under Current Conditions
Published 2022-12-01“…In the present-day conditions, the issue of energy saving is becoming increasingly acute and permanently relevant. …”
Get full text
Article -
5722
Social Justice, Human Rights, Deliberate Action: An Analytical Review of the Literature in Seven Social Justice Thematic Areas
Published 2025-06-01“…It further identifies key thematic issues, their normative foundations, and the principles of social justice, exploring how these are elaborated across different issue areas where social justice is a core concern. …”
Get full text
Article -
5723
Evaluating English Oral Production in University Students through Google Meet Using Neutrosophic Z-Numbers
Published 2025-05-01“…The relevance of this issue lies in the growing dependence of higher education institutions of virtual and hybrid environments, as well as the strategic importance of the English domain in a globalized world. …”
Get full text
Article -
5724
Comparative Analysis of Mechanisms of Schumpeterian Evolution
Published 2018-01-01Get full text
Article -
5725
Criminalization of Social Protest: Future research
Published 2014-01-01“… This Special Issue of the Oñati Socio-Legal Series is dedicated to an exploration of particular features of and analytical approaches to the criminalization of social protest about natural resources. …”
Get full text
Article -
5726
A Comparative Bibliometric Analysis of Global Research on Adaptation Interventions for Healthy Aging at Home
Published 2025-01-01“…Researchers from different countries and institutions came into this scientific field, the dynamic research process can be divided into three stages. Housing adaptation is a public issue in need of expanded interdisciplinary research worldwide. …”
Get full text
Article -
5727
Changes in Romania’s Foreign Policy from the Perspective of NATO and EU Membership
Published 2010-03-01“…The goal is therefore to identify the possible changes in the decision-making process as far as Romanian foreign policy is concerned, in the context of its accession to the European Union and the major topics that may involve an adaptation to the European Foreign and Security Policy. …”
Get full text
Article -
5728
GENESIS AND CONCEPTUAL FOUNDATIONS OF MUSLIM LAW
Published 2023-06-01“…The author, in general terms, reveals the issue of the genesis of Muslim law, in particular, the periodization of Muslim law is mentioned as a generalization of the historical stages of its existence, the role of legal schools (madhabs) in the process of the development of Muslim law is noted. …”
Get full text
Article -
5729
Russia's contribution to the establishment of a limited monarchy in Serbia (1808-1838)
Published 2025-01-01“…This paper is dedicated to the role and views of official Russia in the process of establishing the system of government in Serbia, from the Erfurt Convention of 1808 to the Hatt-i-Sharif of 1838. …”
Get full text
Article -
5730
Soviet-American Scientific and Technical Cooperation in 1960s - Early 1970s: Science Diplomacy as a Factor of Détente
Published 2023-04-01“…It was noted that an important role in the process of reaching consensus was assigned to the participants of the exchange programs themselves, among whom there were many world-famous scientists. …”
Get full text
Article -
5731
Enhancing cloud security and deduplication efficiency with SALIGP and cryptographic authentication
Published 2025-08-01“…This dual-layered approach effectively resolves the issue of redundant data in dynamic, distributed cloud environments. …”
Get full text
Article -
5732
A contrast enhanced representation normalization approach to knowledge distillation
Published 2025-04-01“…We observe that the existence of a large number of negative sample pairs in the knowledge transfer process leads to the issue of information redundancy. …”
Get full text
Article -
5733
Probability, Statistics and Estimation
Published 2025-01-01“…This Special Issue of <i>Axioms</i>, entitled “Probability, Statistics and Estimation”, comprises 15 papers that were accepted for publication after a rigorous review process [...]…”
Get full text
Article -
5734
Communicative Philosophies: Editor’s Introduction
Published 2025-02-01“…This Special Issue of <i>Philosophies</i>, entitled “Communicative Philosophies”, intends to push our philosophical reflections into the direction of the embodied realities lived and enacted as we engage in the communicative processes of thinking, feeling, and acting [...]…”
Get full text
Article -
5735
Malicious code within model detection method based on model similarity
Published 2023-08-01“…The privacy of user data in federated learning is mainly protected by exchanging model parameters instead of source data.However, federated learning still encounters many security challenges.Extensive research has been conducted to enhance model privacy and detect malicious model attacks.Nevertheless, the issue of risk-spreading through malicious code propagation during the frequent exchange of model data in the federated learning process has received limited attention.To address this issue, a method for detecting malicious code within models, based on model similarity, was proposed.By analyzing the iterative process of local and global models in federated learning, a model distance calculation method was introduced to quantify the similarity between models.Subsequently, the presence of a model carrying malicious code is detected based on the similarity between client models.Experimental results demonstrate the effectiveness of the proposed detection method.For a 178MB model containing 0.375MB embedded malicious code in a training set that is independent and identically distributed, the detection method achieves a true rate of 82.9% and a false positive rate of 1.8%.With 0.75MB of malicious code embedded in the model, the detection method achieves a true rate of 96.6% and a false positive rate of 0.38%.In the case of a non-independent and non-identically distributed training set, the accuracy of the detection method improves as the rate of malicious code embedding and the number of federated learning training rounds increase.Even when the malicious code is encrypted, the accuracy of the proposed detection method still achieves over 90%.In a multi-attacker scenario, the detection method maintains an accuracy of approximately 90% regardless of whether the number of attackers is known or unknown.…”
Get full text
Article -
5736
Target sample mining with modified activation residual network for speaker verification.
Published 2025-01-01“…It is also important to notice the issue of the disparity in the number of positive and negative samples in the sampling process of a binary classification problem. …”
Get full text
Article -
5737
Analysis of implementing the Ukrainian healthcare reform in 2023
Published 2023-12-01“…The main research task is to study the issue of effectiveness of implementing the healthcare reform in Ukraine using the main levers of influence on the most significant items of expenditure in the medical industry itself. …”
Get full text
Article -
5738
DEVELOPMENT OF SPATIAL THINKING BASED STUDENT WORKSHEET IN GEOGRAPHY SUBJECT AT SMA NEGERI 1 RANDANGAN
Published 2024-04-01“…This research is based on the issue of the lack of teaching materials in the form of spatial thinking-based student worksheets to assist students' learning process. …”
Get full text
Article -
5739
Language Policy of Ukraine as a Source of Ethno-Political Destabilization
Published 2018-07-01“…The authors have analyzed recent trends in the development of language policy, which are a source of destabilization in modern Ukraine.The problem of ethno-political stability becomes one of the key problems for the modern Ukrainian state. This issue was on a par with socio-economic issues and foreign policy interaction. …”
Get full text
Article -
5740
A Data Protection Method for the Electricity Business Environment Based on Differential Privacy and Federal Incentive Mechanisms
Published 2025-06-01“…The indicators are weighted using the Sequence Relation and Entropy Weight Method. To address the issue of sensitive data protection, we first use federated learning technology to build a distributed modeling framework, ensuring that raw data never leaves the local environment during the collaborative modeling process. …”
Get full text
Article