Showing 11,161 - 11,180 results of 13,067 for search '"That Face"', query time: 0.10s Refine Results
  1. 11161

    30 anos de dinâmica espaço-temporal (1984-2015) da região de influência do Parque Nacional da Chapada dos Veadeiros – Goiás by Mariana Santos da Silva, Helen Gurgel, Anne-Elisabeth Laques, Bruna Drumond Silveira, Rogério Vidal de Siqueira

    Published 2018-08-01
    “…In the last decades, the Cerrado, considered a hotspot of biodiversity, has faced hard anthropic transformations. An example of this dynamism is the region of Chapada dos Veadeiros, located in the north of the state of Goiás. …”
    Get full text
    Article
  2. 11162

    Drivers and barriers to adoption of regenerative agriculture: cases studies on lessons learned from organic by Shawna Lemke, Nathan Smith, Christian Thiim, Katie Stump

    Published 2024-12-01
    “…Five case studies of professional growers, representing a total of 100,000 acres of production, were collected to identify reasons for choosing to grow or stop growing organic, challenges faced and attitudes around regenerative agriculture. …”
    Get full text
    Article
  3. 11163

    Analysis of International Competitiveness of Multinational Corporations Based on Rough Sets by Jing Zhao, Ning Qi

    Published 2021-01-01
    “…Modern business judgment is mostly faced with complex, unclear nature, and not fully confirmed research objects and needs a lot of relevant data investigation, inherent contradiction retrieval, and the discovery and extraction of potential laws. …”
    Get full text
    Article
  4. 11164

    Techniques of recycling end-of-life wind turbine blades in the pavement industry: A literature review by Shuwen Zhang, Noah Kirumira

    Published 2024-09-01
    “…As a green energy source, wind power has gained recent popularity due to its low cost and lower carbon footprint; but with a short blade life span, the industry faces a blade waste issue. Wind turbine blade recyclability is challenging due to factors such as blade sheer size, material complexity, low economic feasibility, and a lack of suitable recycling policies; yet, many blades are still being constructed and others are being decommissioned. …”
    Get full text
    Article
  5. 11165

    Small target detection in UAV view based on improved YOLOv8 algorithm by Xiaoli Zhang, Guocai Zuo

    Published 2025-01-01
    “…Abstract The main challenges faced when detecting targets captured by UAVs include small target image size, dense target distribution, and uneven category distribution.In addition, the hardware limitations of UAVs impose constraints on the size and complexity of the model, which may lead to poor detection accuracy of the model. …”
    Get full text
    Article
  6. 11166

    Afetividade institucional: reflexões sobre as contribuições da psicologia na gestão do afetivo nas organizações de trabalho by Regina Lúcia Moura Araújo

    Published 2010-07-01
    “…Ilustra suas observações mediante uma análise das práticas dos psicólogos do trabalho no marco das “faces da Psicologia do Trabalho”. Associa as possibilidades de solução para os problemas dos trabalhadores a atuação dos psicólogos do trabalho no campo da saúde do trabalhador. …”
    Get full text
    Article
  7. 11167

    Elevated few-shot network intrusion detection via self-attention mechanisms and iterative refinement. by Congyuan Xu, Yong Zhan, Guanghui Chen, Zhiqiang Wang, Siqing Liu, Weichen Hu

    Published 2025-01-01
    “…However, traditional NIDS relies on a large volume of samples for training, which exhibits insufficient adaptability in rapidly changing network environments and complex attack methods, especially when facing novel and rare attacks. As attack strategies evolve, there is often a lack of sufficient samples to train models, making it difficult for traditional methods to respond quickly and effectively to new threats. …”
    Get full text
    Article
  8. 11168

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article
  9. 11169

    Evaluation of novel fungicides (FRAC groups 7, 9, 12) for managing cranberry fruit rot by Leela Saisree Uppala, Salisu Sulley

    Published 2025-02-01
    “…Additionally, the cranberry industry faces increasing restrictions on the use of broad-spectrum fungicides, such as chlorothalonil and mancozeb, necessitating the exploration of alternative management strategies. …”
    Get full text
    Article
  10. 11170

    Optimization of ESP performance through chemical treatment using a single capillary in the Apiay field by Adriana Marcela Duran Pabón, José Alberto Murcia Navas

    Published 2024-06-01
    “…This successful application is innovative and unique in Colombia, and it sets an example for other fields facing similar challenges in the couuntry, offering a promising approach to leverage heavy crude oil production and transform the future of these fields…”
    Get full text
    Article
  11. 11171

    Protéger et guérir : la mission du gouvernement et des associations d’aide aux détenues en Angleterre entre 1856 et 1914 by Alice Bonzom

    Published 2016-05-01
    “…But their efforts led to female empowerment: reformers played an active part in the management of relief societies, challenging their traditionally domestic positions. They also faced obstacles, embodied by people who believed that guilty deviants were being unfairly ‘pampered’. …”
    Get full text
    Article
  12. 11172

    Natural dynamics and watershed approach incorporation in urban water management: A scoping review. by Marcelo Canteiro, Helena Cotler, Marisa Mazari-Hiriart, Nadjeli Babinet, Manuel Maass

    Published 2024-01-01
    “…Several cities are facing water emergencies related to urbanization impact and amplified by climate change. …”
    Get full text
    Article
  13. 11173

    Research Progress on the Relationship between Ischemic Stroke and Immunoinflammatory Factors by Qiang TANG, Huilin HUANG, Luwen ZHU, Hongyu LI, Jiyao ZHANG, Ping QIN, Xia YIN, Jiashuai LI

    Published 2020-02-01
    “…At present, the problem of ischemic stroke has aroused wide public concern. China is facing an increasingly severe situation of prevention and treatment, and the disease has brought a heavy burden to patients, families and even the whole society, which has become one of the focuses and difficulties of modern medical research. …”
    Get full text
    Article
  14. 11174

    Relevance and Adaptation of Sorogan Method in Modern Islamic Boarding Schools: Opportunities and Challenges by Muhammad Miftah Ulhaq, Rizal Nurzain, Melinda Koestanti, Taufiqurrahman, Tarsono

    Published 2024-12-01
    “…However, the challenges faced include time constraints due to the tight schedule combining formal and diniyah curricula and the need to adapt to technology. …”
    Get full text
    Article
  15. 11175

    Development for a concept mapping multicultural education program for Mother and Baby Unit nurses: a quasi-experimental study in South Korea by Dahae Kang, Soonyoung Shon

    Published 2025-01-01
    “…This study offers a practical framework for integrating multicultural education into nursing training, ultimately improving care for foreign mothers and reducing the challenges faced by MBU nurses.…”
    Get full text
    Article
  16. 11176

    Analysis of Transient Voltage Stability in a Low Voltage Distribution Network Using SST for the Integration of Distributed Generations by Sheng Li, Zhihao Zhou, Qiqi Shan, Jiani An

    Published 2018-01-01
    “…The results show that, comparing with the conventional system, the SST has apparent advantages on enhancing the transient voltage stability of load bus while facing different disturbances, even though SST has to regulate the voltage passively. …”
    Get full text
    Article
  17. 11177

    The Diplomacy of Small States: Exploring Opportunities and Limitations in the Case of Timor-Leste by O. A. Krasnyak, P. S. Shaternikov

    Published 2023-07-01
    “…Strategies such as imitation and balancing, participation in coalitions, promotion of international initiatives, provision of expertise, and adherence to the principles of international law are utilized to cultivate a positive image of small states as responsible actors in international relations and reliable partners.The article concludes that Timor-Leste has been successful in maintaining bilateral and multilateral relations and actively participating in international organizations. However, it faces systemic challenges in effectively employing public diplomacy mechanisms. …”
    Get full text
    Article
  18. 11178

    Development and preliminary testing of Health Equity Across the AI Lifecycle (HEAAL): A framework for healthcare delivery organizations to mitigate the risk of AI solutions worseni... by Jee Young Kim, Alifia Hasan, Katherine C Kellogg, William Ratliff, Sara G Murray, Harini Suresh, Alexandra Valladares, Keo Shaw, Danny Tobey, David E Vidal, Mark A Lifson, Manesh Patel, Inioluwa Deborah Raji, Michael Gao, William Knechtle, Linda Tang, Suresh Balu, Mark P Sendak

    Published 2024-05-01
    “…To address these gaps and tackle a common challenge faced by healthcare delivery organizations, a case-based workshop was organized, and a framework was developed to evaluate the potential impact of implementing an AI solution on health equity. …”
    Get full text
    Article
  19. 11179

    Analisis Implementasi Pola Pengelolaan Keuangan Badan Layanan Umum Daerah pada Rumah Sakit Umum Daerah Dr. RM. Djoelham Binjai by Bambang Azis Silalahi, Marlon Sihombing, Isnaini Isnaini

    Published 2021-12-01
    “…In its implementation, there are several obstacles faced, especially the understanding of other sections and fields of PPK-BLUD in RSUD Dr. …”
    Get full text
    Article
  20. 11180

    Trust evaluation optimization mechanism for cloud user behavior based on FANP by Yi ZHANG, Liqin TIAN, Zenan WU, Wenxing WU

    Published 2022-04-01
    “…The open cloud computing environment is facing security challenges and the traditional user behavior evaluation mechanism cannot guarantee the security of the cloud.In order to scientifically and quantitatively evaluate the user’s behavior trust, ensure the scientific and reasonable weight assignment, improve the security and credibility of user behavior under the cloud platform, a trust evaluation optimization mechanism combined with fuzzy analytic network process (FANP) was designed.In the proposal, user behavior trust evaluation based on one control target was extended to include two control target modules which were historical access behavior and current access environment.At the same time, the historical access behavior module was divided into two aspects: conventional behavior and gray behavior, and the current access environment module was divided into two directions: information integrity and access security.The corresponding control criteria was divided to construct the analytic network process (ANP) model under different control objectives.The limit hypermatrix under each target module was calculated to obtain the final stability weight of each element with the help of network analytic hierarchy process software.And the real user behavior data under the development platform was selected to comprehensively calculate the trust degree under different modules as the final behavior evaluation result.The expansion of the user behavior evaluation module refined the evaluation granularity, which makes the evaluation results more objective and accurate.In the cloud environment with the same malicious ratio, the optimization mechanism has better recognition effect, and it can identify cloud users with low trust efficiently and effectively, so as to improve the security and legitimacy of the cloud.At the same time, it also provids new research direction for solving the problem of user security and credibility, and effective risk control in the cloud environment.…”
    Get full text
    Article