Showing 13,141 - 13,160 results of 15,549 for search '"adaptation"', query time: 0.10s Refine Results
  1. 13141

    Spatiotemporal changes in the congestion index of streets and roads in the armed conflict conditions by Anna Sotnikova, Moeid Qurashi, Steven Travis Waller

    Published 2024-12-01
    “…The paper explores the dynamics of these changes and ways to adapt urban transportation systems to war conditions. …”
    Get full text
    Article
  2. 13142

    Drought Tolerance in Modern and Wild Wheat by Hikmet Budak, Melda Kantar, Kuaybe Yucebilgili Kurtoglu

    Published 2013-01-01
    “…Drought tolerance is crucial to stabilize and increase food production since domestication has limited the genetic diversity of crops including wild wheat, leading to cultivated species, adapted to artificial environments, and lost tolerance to drought stress. …”
    Get full text
    Article
  3. 13143

    Research on strong robustness watermarking algorithm based on dynamic difference expansion by Tianqi WANG, Yingzhou ZHANG, Yunlong DI, Dingwen LI, Linlin ZHU

    Published 2023-10-01
    “…A surge in the amount of information comes with the rapid development of the technology industry.Across all industries, there is a need to collect and utilize vast amounts of data.While this big data holds immense value, it also poses unprecedented challenges to the field of data security.As relational databases serve as a fundamental storage medium for data, they often contain large-scale data rich in content and privacy.In the event of a data leak, significant losses may occur, highlighting the pressing need to safeguard database ownership and verify data ownership.However, existing database watermarking technologies face an inherent tradeoff between improving watermark embedding capacity and reducing data distortion.To address this issue and enhance watermark robustness, a novel robust database watermarking algorithm based on dynamic difference expansion was introduced.The QR code was employed as the watermark, the SVD decomposition of the low frequency part of the image was utilized after Haar wavelet transform.By extracting specific feature values and using residual feature values as the watermark sequence, it was ensured that the same-length watermark sequence contains more information and the embedded watermark length can be reduced.Furthermore, by combining the adaptive differential evolution algorithm and the minimum difference algorithm, the optimal embedding attribute bits were selected to alleviate the problems of low computational efficiency, high data distortion and poor robustness of traditional difference expansion techniques in embedding watermarks, and to improve the embedding capacity of watermarks while reducing the distortion of data.Experimental results demonstrate that the proposed algorithm achieves a high watermark embedding rate with low data distortion.It is resilient against multiple attacks, exhibiting excellent robustness and strong traceability.Compared to existing algorithms, it offers distinct advantages and holds great potential for broad application in the field of data security.…”
    Get full text
    Article
  4. 13144

    Determination of Leisure Time Orientations in University Students, The Relationship Between Leisure Time Boredom Perceptions and Social Network Sites Usage Purposes by Nazlı Deniz Öz, Metin Özlü, Erdal Taşgın

    Published 2018-08-01
    “…As a means of data collection in the study that personal information form, activity preference form and "Social Network Sites Usage Scale" developed by Karal and Kokoç (2010) and "Leisure Time Boredom Perception Scale" (LTBPS) developed by Iso-Ahola and Weissinger and adapted to Turkish by Kara et al. (2014) was used. …”
    Get full text
    Article
  5. 13145

    From Victorian Buildings to the Victorian Built Heritage: Victorian studies and the Re-interpretation of 19th-century architecture by Isabelle Cases

    Published 2016-05-01
    “…Studying Victorian architecture therefore necessarily implies engaging physically with the Victorian architectural and industrial heritage and, as a consequence, with its interpretation, renovation and possibly its adaptive reuse. One can wonder what is lost and what is found in that coming and going from the 19th-century reality of Victorian buildings to the numerous issues and challenges set by the Victorian architectural heritage in the 21st century. …”
    Get full text
    Article
  6. 13146

    The Role of Kinesiotherapy in Enhancing Physical Performance and Self-Esteem: A Prospective Observational Study in Obese Adolescents by Cristina Popescu, Daniela Matei, Rodica Trăistaru

    Published 2025-12-01
    “…Regression analysis revealed strong correlations between body composition, physical performance, and self-esteem improvements, particularly in girls and rural participants, highlighting the intervention's adaptability and effectiveness. Although limited by a relatively small sample size, short duration, and variability in adherence tracking, the study highlights the essential role of individualized physical activity programs in improving health outcomes. …”
    Get full text
    Article
  7. 13147

    Autonomous security analysis and penetration testing model based on attack graph and deep Q-learning network by Cheng FAN, Guoqing HU, Taojie DING, Zhanhua ZHANG

    Published 2023-12-01
    “…With the continuous development and widespread application of network technology, network security issues have become increasingly prominent.Penetration testing has emerged as an important method for assessing and enhancing network security.However, traditional manual penetration testing methods suffer from inefficiency,human error, and tester skills, leading to high uncertainty and poor evaluation results.To address these challenges, an autonomous security analysis and penetration testing framework called ASAPT was proposed, based on attack graphs and deep Q-learning networks (DQN).The ASAPT framework was consisted of two main components:training data construction and model training.In the training data construction phase, attack graphs were utilized to model the threats in the target network by representing vulnerabilities and possible attacker attack paths as nodes and edges.By integrating the common vulnerability scoring system (CVSS) vulnerability database, a “state-action”transition matrix was constructed, which depicted the attacker’s behavior and transition probabilities in different states.This matrix comprehensively captured the attacker’s capabilities and network security status.To reduce computational complexity, a depth-first search (DFS) algorithm was innovatively applied to simplify the transition matrix, identifying and preserving all attack paths that lead to the final goal for subsequent model training.In the model training phase, a deep reinforcement learning algorithm based on DQN was employed to determine the optimal attack path during penetration testing.The algorithm interacted continuously with the environment, updating the Q-value function to progressively optimize the selection of attack paths.Simulation results demonstrate that ASAPT achieves an accuracy of 84% in identifying the optimal path and exhibits fast convergence speed.Compared to traditional Q-learning, ASAPT demonstrates superior adaptability in dealing with large-scale network environments, which could provide guidance for practical penetration testing.…”
    Get full text
    Article
  8. 13148

    Project Approach to the Implementation of Individual Educational Paths in Modern University by Yu. V. Daneykin, O. E. Kalpinskaya, N. G. Fedotova

    Published 2020-09-01
    “…The results of the study were used by the authors to develop and implement an adaptive model for constructing individual educational trajectories at the Yaroslav-the-Wise Novgorod State University.…”
    Get full text
    Article
  9. 13149

    Intratumor heterogeneity: models of malignancy emergence and evolution by R. A. Ivanov, S. A. Lashin

    Published 2023-12-01
    “…Evolutionary dynamics plays a crucial role in the emergence and development of tumors, shaping the heterogeneity and adaptability of cancer cells. From the perspective of evolutionary theory, tumors are complex ecosystems that evolve through a process of microevolution influenced by genetic mutations, epigenetic changes, tumor microenvironment factors, and therapy­induced changes. …”
    Get full text
    Article
  10. 13150

    Phenotypic and genetic variability of a tetraploid wheat collection grown in Kazakhstan by A. Zatybekov, S. Anuarbek, S. Abugalieva, Y. Turuspekov

    Published 2020-10-01
    “…New cultivars adapted to major durum wheat growing environments are essential for the cultivation of this crop. …”
    Get full text
    Article
  11. 13151

    L’apport de la gestion intégrée des zones côtières (GIZC) à la gestion de l’érosion côtière : intérêt et exemple en Méditerranée française by Hélène Rey-Valette, Philippe Carbonnel, Sébastien Roussel, Alexandre Richard

    Published 2006-12-01
    “…This depicts the significance of combining the analysis of sediment cells and territory scales, as well as defining several areas for integrating local particularisms and adapting scenarios to the diversity of issues and zones.…”
    Get full text
    Article
  12. 13152

    Introducing the spectral characteristics index: A novel method for clustering solar radiation fluctuations from a plant-ecophysiological perspective by Amila Nuwan Siriwardana, Atsushi Kume

    Published 2025-03-01
    “…While long-term data collection across various climatic zones could improve the validity and adaptability of SCIs to different geographical locations, the current model demonstrates high accuracy and efficiency. …”
    Get full text
    Article
  13. 13153

    A UAV perspective based lightweight target detection and tracking algorithm for intelligent transportation by Quan Wang, Guangfei Ye, Qidong Chen, Songyang Zhang, Fengqing Wang

    Published 2024-12-01
    “…Firstly, the performance of detecting small targets in occluded scenes is enhanced by adding a MODConv to the small-target detection head and increasing its size; In addition, excessive deletion of prediction boxes is prevented by utilizing LSKAttention mechanism to adaptively adjust the target sensing field at the downsampling stage and combining it with the Soft-NMS strategy. …”
    Get full text
    Article
  14. 13154

    Improved printed circuit board defect detection scheme by Lufeng Bai, Wen Hao Xu

    Published 2025-01-01
    “…First, we incorporate the Efficient Channel Attention Network (ECANet) attention mechanism into the backbone network of YOLOv8, which improves the performance of small-target detection by adaptively enhancing the expressiveness of key features, so that the network possesses higher sensitivity and focus on tiny details in PCB images. …”
    Get full text
    Article
  15. 13155

    The co-occurrence of the SAVA syndemic, depression and anxiety as barriers to antiretroviral therapy adherence among sub-Saharan Africa population groups: A scoping review protocol... by Anton Delport, Hanani Tabana, Lucia Knight, Edwin Wouters

    Published 2022-01-01
    “…Data charting will follow an adapted version of Trico and colleagues' PRISMA-ScR and results will be mapped descriptively and in tabular format. …”
    Get full text
    Article
  16. 13156

    Study on Calculation of Bearing Capacity of Axially Loaded CFRP-Strengthened Cold-Formed Thin-Walled Lipped Channel Steel Columns by Yanan Sun, Pengfei Li, Guojin Qin

    Published 2020-01-01
    “…The equation modified in this work has excellent accuracy and adaptability. Predicting the bearing capacity of reinforced members is necessary to give full play to the performance of CFRP accurately. …”
    Get full text
    Article
  17. 13157
  18. 13158

    Dealing with post-excavation data: the Omeka S TiMMA web-database by Rueff, Bastien

    Published 2024-01-01
    “…Despite these limitations, the TiMMA project contributes to showing that, without being a complete archaeological system recording, Omeka S is adapted to post-excavation projects. …”
    Get full text
    Article
  19. 13159

    Le tourisme à moto : les géographies renouvelées d'un phénomène marginal by Jean Scol

    Published 2016-07-01
    “…Ils représentent dès lors une clientèle touristique à fort potentiel qu'il convient d'attirer en lui proposant des produits et services adaptés à ses besoins et spécificités. Ces prestations, portées par les collectivités, les professionnels ou le monde associatif, prennent surtout la forme d'itinéraires dédiés ou d'hébergements identifiés voire labellisés à destination des motards. …”
    Get full text
    Article
  20. 13160

    A New Evaluation Method for Water Blocking Performance of Coal Seam Floor: Model Construction, Case Application, and Water-Preserved Strategy by Baobin Gao, Chuangnan Ren, Shaopeng Song

    Published 2022-01-01
    “…Research has shown that in the water hazard threat area of No. 10 coal seam floor in Jiegou Coal Mine, Anhui Province, the performance of system vulnerability elements is weak, the performance of system recoverability elements is better, and the performance of system adaptability elements is extremely poor. From the perspective of the whole life cycle, determining the treatment target area, optimizing the rock formation modification and repairing materials, and enhancing the water resources carrying capacity can improve the water resistance toughness of the coal seam floor. …”
    Get full text
    Article