Suggested Topics within your search.
Suggested Topics within your search.
- History 15
- methods 13
- Philosophy 12
- therapy 12
- Moral and ethical aspects 10
- Research 9
- Study and teaching 9
- Economic development 7
- History and criticism 7
- Mass media 7
- Social service 7
- Management 6
- Psychology 6
- Thermodynamics 6
- Economic policy 5
- English language 5
- Information technology 5
- Pharmacology 5
- Social aspects 5
- diagnosis 5
- Anesthesia 4
- Drug Therapy 4
- Economic conditions 4
- Education 4
- Law 4
- Literature 4
- Marketing 4
- Methodology 4
- Problems, exercises, etc 4
- Public administration 4
-
97701
-
97702
-
97703
Reason Analysis and Countermeasure Study of the Seashell Problem in the Long Distance Water Transport Canal
Published 2007-01-01Get full text
Article -
97704
Distal Radius Fracture Treated by Internal Fixation with Plates, Screws and the RALCA® External Mini-fixator
Published 2016-02-01“…For this reason, we must consider all possible combinations within our power to correct them since most of the time, it is impossible to maintain a fracture reduction using a single technique. …”
Get full text
Article -
97705
Evaluating Producer Welfare Benefits of Whole-Farm Revenue Insurance
Published 2025-01-01“…For example, the welfare benefits of insuring wheat, barley, alfalfa, wheat–barley, wheat–alfalfa, barley–alfalfa, and barley–alfalfa in terms of cost reduction to producers at 75% coverage are 8.8, 1.8, 2.9, 1.2, 0.9, and 1.8, respectively. Therefore, we recommend that the Iranian Agricultural Insurance Fund adopts WFI as a new risk management tool. …”
Get full text
Article -
97706
Decode Brain System: A Dynamic Adaptive Convolutional Quorum Voting Approach for Variable-Length EEG Data
Published 2020-01-01“…In the real world, people react to stimuli differently, and the duration of brain activities varies between individuals. Therefore, the length of EEG recordings in trials gathered in the experiment is variable. …”
Get full text
Article -
97707
-
97708
REVISING THE PROJECT OF MODERNITY HERMENEUTICS
Published 1998-01-01“… The article is intended to argue the fundamental modernity of Habermasian, Gadamerian and, to a considerable extent, Rortian philosophical projects in spite of their "self-limiting" and thereby "transcending" modern metanarrative characteristics. …”
Get full text
Article -
97709
Project portfolio management in an educational organization
Published 2021-07-01“…The methodological justification for the development of a project portfolio management structure is the theory of project management, the project management methodology Scrum. …”
Get full text
Article -
97710
Dirac equation solution in the light front via linear algebra and its particularities
Published 2023-08-01“…The method of this work is deductive. Therefore, one obtains the solution of the Dirac equation for the Free Electron and for the positron in the coordinates in the light front with the particularity of the energy associated with the system being given by , and for moments we have the electron and we have the positron. …”
Get full text
Article -
97711
Comparing the Efficacy of Excitatory Transcranial Stimulation Methods Measuring Motor Evoked Potentials
Published 2014-01-01“…The aim of the present study was to compare the efficacy of three widely applied stimulation methods inducing excitability enhancement in the motor cortex: 1 mA anodal transcranial direct current stimulation (atDCS), intermittent theta burst stimulation (iTBS), and 1 mA transcranial random noise stimulation (tRNS) within one subject group. …”
Get full text
Article -
97712
Childbearing intentions and influencing factors among single young adults in South Korea: a cross-sectional study
Published 2025-01-01“…Purpose To identify the childbearing intentions of young adults in South Korea and examine the factors influencing them using a social-ecological model (SEM). Methods A descriptive cross-sectional study design was used. …”
Get full text
Article -
97713
Research on Protection and Development of Coastal Line and Shoal Resources in Pearl River Estuary
Published 2011-01-01Get full text
Article -
97714
Effect of cisplatin/gold chitosan nanocomposite on oral squamous cell carcinoma and oral epithelial cells
Published 2025-01-01“…Abstract Background Oral squamous cell carcinoma (OSCC) treatment represents a great challenge, since platinum-based therapeutic agents have deleterious effects on normal cells and tissues. …”
Get full text
Article -
97715
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
Get full text
Article -
97716
Distribution and functional significance of KLF15 in mouse cerebellum
Published 2025-01-01“…Knockdown of KLF15 led to loss of Purkinje cells and impaired motility in mice. Therefore, our study aims to elucidate the relationship between KLF15 and Purkinje cells in mice, may provide a new research idea for the developmental mechanism of the mouse cerebellum.…”
Get full text
Article -
97717
The Proviral Reservoirs of Human Immunodeficiency Virus (HIV) Infection
Published 2024-12-01“…The importance of studying the properties of proviral reservoirs is connected with the inaccessibility of integrated HIV proviral DNA for modern anti-retroviral therapies (ARTs) that block virus reproduction. If treatment is not effective enough or is interrupted, the proviral reservoir can reactivate. …”
Get full text
Article -
97718
-
97719
Geografia, Patrimônio e Turismo na Amazônia Brasileira: o Projeto Roteiros Geo-Turísticos em Belém do Pará
Published 2022-04-01“…The project aims to develop knowledge and theoretical and practical foundations for the elaboration of geo-tourist routes, based on the historical and spatial formation in the city of Belém. there they live. …”
Get full text
Article -
97720