Showing 13,081 - 13,100 results of 15,549 for search '"adaptation"', query time: 0.10s Refine Results
  1. 13081

    A macro-transection model of brain trauma for neuromaterial testing with functional electrophysiological readouts by Jessica Wiseman, Raja Haseeb Basit, Akihiro Suto, Sagnik Middya, Bushra Kabiri, Michael Evans, Vinoj George, Christopher Adams, George Malliaras, Divya Maitreyi Chari

    Published 2025-12-01
    “…The patho-mimicry and adaptability of this simplified model of brain injury could benefit the testing of biomaterial therapeutics in regenerative neurology, with the option for functional electrophysiological readouts.…”
    Get full text
    Article
  2. 13082

    Digital marketing in mountain tourism: Challenges of the new time and development priorities by Purhani Safar Hasan, Mamedova Sevda Binyat, Mamatkulova Shoira, Shodieva Gulnoza

    Published 2025-01-01
    “…The territorial marketing tools proposed by the author, aimed at attracting tourists and developing the tourism industry as part of territorial economies as a whole, take into account modern trends in the development of commercial marketing and are adapted to the conditions and capabilities of individual destinations. …”
    Get full text
    Article
  3. 13083

    Propaganda as a system-forming element of education in authoritarian countries: problems of understanding by Микита Шпильовий

    Published 2024-11-01
    “…Today, we often analyze certain challenges and in some sense society has already adapted to them and learned to respond to new challenges according to a certain system. …”
    Get full text
    Article
  4. 13084

    Scenario-aware access control model by Dibin SHAN, Xuehui DU, Wenjuan WANG, Na WANG, Aodi LIU

    Published 2024-02-01
    “…Dynamic access control model is the theoretical basis for constructing a dynamic access control system for big data.However, most existing access control models can only fulfill dynamic access control in a single scenario and are unable to adapt to access control in multiple types of dynamic scenarios.These scenarios include changes in the contextual environment of big data, changes in entity relationships, and changes in the state of objects.To address these issues, an analysis was conducted based on the research of existing access control models and the dynamic factors of big data.Subsequently, scenario-aware access control (SAAC) model was proposed, which was based on dynamic factor conversion and scenario unified modeling.All types of dynamic factors were converted into basic elements such as attributes and relationships.Then, scene information was incorporated to model the various types of constituent elements in a unified manner.A big data dynamic access control model was constructed based on scene information to support multi-type dynamic factors and extended dynamic factors.The working framework of the SAAC model was designed, and the SAAC rule learning algorithm and SAAC rule execution algorithm were proposed corresponding to the workflow of the framework.This enabled the automatic learning of access control rules and dynamic access control decision-making.The security of the proposed model was analyzed and verified by introducing the non-transitive non-interference theory.To validate the effectiveness of the access control policy mining method of the proposed model, experimental comparisons were conducted between the SAAC model and baseline models such as ABAC-L, PBAC-X, DTRM, and FB-CAAC using four datasets.The experimental results demonstrate that the SAAC model and its strategy mining method outperforms the baseline models in terms of metrics such as area under the curve AUC, monotonicity, and steepness of the ROC curve.This verification confirms that the proposed model can support multiple types of dynamic factors and dynamic factor extensions, and that the combined effect of the access control rules obtained from its mining algorithm is relatively high.…”
    Get full text
    Article
  5. 13085

    Research on IoT security situation awareness method based on evidence theory by Jian LI, Tinglu DONG, Jie LI

    Published 2022-04-01
    “…The security problem of IoT became more and more serious with its rapid development.Considering that the current IoT security situation awareness system lacks generality and excessively relies on expert knowledge, a IoT security situation awareness method based on improved D-S evidence theory was proposed in this paper.Fuzzy Gaussian membership function was used to calculate the vulnerability information membership matrix, which was normalized as evidence distribution matrix.The improved Topsis method was used to measure the evidence credibility.In order to fully restrain the credibility of conflicting evidence and improve the credibility of mutually supporting evidence, local credibility between two evidence was aggregated and the expected positive and negative solution vectors were improved according to the situation assessment scenario.And the weighted average method was used for vulnerability information fusion, to obtain the result of situational assessment.The result of situational awareness was fused with the time discount and high-risk vulnerability information discount evidence theory.At the same time, the IoT vulnerability information at different moments was considered comprehensively, the evidence was adaptively and dynamically weighted with the ratio information of high-risk vulnerability.The experimental results show that in the fusion of different numbers of evidence bodies and four common conflicting evidence, the improved Topsis method has higher fusion probability on credible proposition.In the aspect of situation assessment, the risk degree of current system is accurately assessed.And in the aspect of situational awareness, this discount evidence theory can predict the probability of high risk and critical risk, which is more effective than the traditional D-S evidence theory.According to this theory, a IoT security situational awareness method process was proposed, which would be used to guide engineering practice.In the future, the relationship between vulnerabilities can be considered and richer information between vulnerabilities can be extracted for vulnerability exploiting, so that the result of situation assessment is more accurate and reasonable.On the other hand, for situational awareness, game theory can be adopted in the process of dynamic game between the attacker and defender.…”
    Get full text
    Article
  6. 13086

    Ten years of collaboration between France and Japan - Studies on reproduction in Japanese macaques by Cécile Garcia, Fred Bercovitch, Takeshi Furuichi, Michael A Huffman, Andrew MacInstosh, Lucie Rigaill, Rafaela S C Takeshita, Keiko Shimizu

    Published 2016-12-01
    “…Our research interests are focused on the evolution of mating systems in primates and we aim at providing a better understanding of the adaptive signification of reproductive processes in female primates, using a comparative approach. …”
    Get full text
    Article
  7. 13087

    Characteristics of chicken production systems in rural Burkina Faso: A focus on One Health related practices and food security. by Michel Dione, Guy Ilboudo, Abdoul Aziz Ouedraogo, Sidonie Aristide Ima, Brice Ouedraogo, Theodore Knight-Jones, Assèta Kagambèga, Robyn Alders

    Published 2025-01-01
    “…While men consider high disease burden, lack of finance, and poor chicken housing as the major constraints, women prioritized the lack of adequate chicken housing, lack of feeds and limited access to veterinary services. With locally adapted interventions that build one a One Health approach, village chicken keeping has the potential to secure and greatly improve smallholder livelihoods and household food security, while preserving public health in Burkina Faso.…”
    Get full text
    Article
  8. 13088

    Learning to Listen to Non-spoken Voices. Including Young People With Intellectual Disabilities Who are Non-speaking as Primary Participants in Qualitative Research by Beverley Samways, Pauline Heslop

    Published 2025-01-01
    “…The paper concludes with some brief learnings and reflections on the research journey. Through this adapted methodology, the participants were able to contribute significant insights into the research inquiry, resulting in a dataset which reflected the rich, nuanced and overlaid emotional experiences, including significant emotional overwhelm and distress which could be understood as a factor for their self-injury. …”
    Get full text
    Article
  9. 13089

    The Impact of Domestic Violence and Sexual Assault on Family Dynamics and Child Development: A Comprehensive Review by Matthias Brockstedt, Serpil Uğur Baysal, Kadir Daştan

    Published 2025-01-01
    “…Emergent studies reveal a rise in domestic abuse occurrences and a decline in urgent care and support pursuit, emphasizing the need for adapted intervention strategies. The review offers evidence-based recommendations for policymakers, healthcare providers, and community organizations, stressing the necessity of persistent and collaborative efforts to address and prevent domestic violence. …”
    Get full text
    Article
  10. 13090

    Design, Multiperspective Investigations, and Performance Analysis of Multirotor Unmanned Aerial Vehicle for Precision Farming by Darshan Kumar Jayaram, Vijayanandh Raja, Beena Stanislaus Arputharaj, Hussein A. Z. AL-bonsrulah

    Published 2024-01-01
    “…Farming and agriculture are the oldest professions, but they are adapting to the technology revolution to accommodate the world’s growing population. …”
    Get full text
    Article
  11. 13091

    Student negotiated syllabus and students' engagement and academic procrastination: A mixed-method study by Xiao Liang, Oscar O. Bautista

    Published 2025-02-01
    “…It can be concluded that learners' participation in the syllabus promotes student autonomy, engagement, and adaptive learning behaviours. Findings have theoretical implications for educational psychologists and applied linguists and practical consequences for EAP teachers and learners.…”
    Get full text
    Article
  12. 13092

    Automatic Scaling Mechanism of Intermodal EDI System under Green Cloud Computing by Qiang Huang, Lin Sun, Furong Jia, Jiaxin Yuan, Yao Wu, Jinshan Pan

    Published 2022-01-01
    “…However, its high cost, large system coupling degree and low performance threshold cannot adapt to mass data exchange in high concurrent environment. …”
    Get full text
    Article
  13. 13093

    Numerical Analysis of the Seismic Response of Tunnel Composite Lining Structures across an Active Fault by Zude Ding, Mingrong Liao, Nanrun Xiao, Xiaoqin Li

    Published 2021-01-01
    “…A series of 3D dynamic-response numerical models considering the composite structure-surrounding rock-fault interaction were established to explore the seismic response characteristics and aseismic performance of the composite structures. The adaptability of the structures to the seismic intensity and direction was also discussed. …”
    Get full text
    Article
  14. 13094

    Synthesis and evaluation of amino acid ionic liquid for enhanced oil recovery: experimental and modeling simulation studies by E. M. Mansour, R. Hosny, Ammona S. Mohamed, Fatma M. Abdelhafiz

    Published 2025-01-01
    “…Ionic liquids, known for their adaptability, are emerging as promising agents in EOR, improving oil displacement by reshaping fluid properties and interacting with reservoir rocks. …”
    Get full text
    Article
  15. 13095

    Gorilla Troops Optimizer Combined with ANFIS for Wire Cut EDM of Aluminum Alloy by Elango Natarajan, V. Kaviarasan, Wei Hong Lim, S. Ramesh, K. Palanikumar, T. Sekar, V. H. Mok

    Published 2022-01-01
    “…Collected 27 datasets were further used in Adaptive Neuro Fuzzy Inference System (ANFIS) to produce about 500 datasets. …”
    Get full text
    Article
  16. 13096

    Mechanisms of corporate digital transformation on asymmetric capital structure adjustment—the mediating role of information asymmetry and financial stability by Jin Li, Zijian Li

    Published 2025-02-01
    “…To address market risks caused by information asymmetry and to ensure the flexibility and adaptability of their capital structure, firms must strike a balance between short-term financial demands and long-term strategic objectives. …”
    Get full text
    Article
  17. 13097

    Biochemical profile and milk fat/protein in Saanen and Nubian goats by R.O.F. Prado, M.F. Valencia, R.J.A. Hernández, B.J.L. Zepeda, C.A.C. García

    Published 2025-01-01
    “…Results provide insight into metabolic adaptations in lactation and identify links between key analytes and milk fat/protein in goats.…”
    Get full text
    Article
  18. 13098

    The effect of low vision rehabilitation on the quality of life and caregiver burden of low vision patients – a randomized trial by Chunling Cai, Yuwei Shuai, Gonghui Li

    Published 2025-01-01
    “…Conclusion Implement a low vision rehabilitation nursing plan, provide rehabilitation intervention and support to low vision patients, help patients find new ways to adapt to low vision conditions, and improve their quality of life. …”
    Get full text
    Article
  19. 13099

    Climate sensitivity and attribution analysis of water resources in China by Youzhu Zhao, Qiuxiang Jiang, Zilong Wang

    Published 2025-01-01
    “…By comprehensively considering the complex interactions among climate, vegetation, and human activities on water storage in China, this research enhances our understanding of the complex response mechanisms of water resource systems to climate change and provides a scientific basis for developing more adaptive and sustainable water resource management strategies.…”
    Get full text
    Article
  20. 13100