Suggested Topics within your search.
Suggested Topics within your search.
- Etiology 2
- Genetics 2
- History and criticism 2
- Academic writing 1
- Adaptations 1
- Adaptive control systems 1
- Adjustment (Psychology) 1
- Board books 1
- Children with disabilities 1
- Climate change mitigation 1
- Climatic changes 1
- Cognitive Therapy 1
- Courtship 1
- Cultural Diversity 1
- Cultural policy 1
- Desertification 1
- Developmental psychology 1
- Diabetes 1
- Diabetes Mellitus, Type 2 1
- Dissertations, Academic 1
- Ebiragiro by'okuhandika Runyankole -Rukiga 1
- Ebisaakuzo/ebishaakuzo 1
- Education 1
- Ethnicity 1
- Ethnoscience 1
- European cooperation 1
- Exercise 1
- Farmers 1
- Film adaptations 1
- Genanalyse 1
-
13141
Spatiotemporal changes in the congestion index of streets and roads in the armed conflict conditions
Published 2024-12-01“…The paper explores the dynamics of these changes and ways to adapt urban transportation systems to war conditions. …”
Get full text
Article -
13142
Drought Tolerance in Modern and Wild Wheat
Published 2013-01-01“…Drought tolerance is crucial to stabilize and increase food production since domestication has limited the genetic diversity of crops including wild wheat, leading to cultivated species, adapted to artificial environments, and lost tolerance to drought stress. …”
Get full text
Article -
13143
Research on strong robustness watermarking algorithm based on dynamic difference expansion
Published 2023-10-01“…A surge in the amount of information comes with the rapid development of the technology industry.Across all industries, there is a need to collect and utilize vast amounts of data.While this big data holds immense value, it also poses unprecedented challenges to the field of data security.As relational databases serve as a fundamental storage medium for data, they often contain large-scale data rich in content and privacy.In the event of a data leak, significant losses may occur, highlighting the pressing need to safeguard database ownership and verify data ownership.However, existing database watermarking technologies face an inherent tradeoff between improving watermark embedding capacity and reducing data distortion.To address this issue and enhance watermark robustness, a novel robust database watermarking algorithm based on dynamic difference expansion was introduced.The QR code was employed as the watermark, the SVD decomposition of the low frequency part of the image was utilized after Haar wavelet transform.By extracting specific feature values and using residual feature values as the watermark sequence, it was ensured that the same-length watermark sequence contains more information and the embedded watermark length can be reduced.Furthermore, by combining the adaptive differential evolution algorithm and the minimum difference algorithm, the optimal embedding attribute bits were selected to alleviate the problems of low computational efficiency, high data distortion and poor robustness of traditional difference expansion techniques in embedding watermarks, and to improve the embedding capacity of watermarks while reducing the distortion of data.Experimental results demonstrate that the proposed algorithm achieves a high watermark embedding rate with low data distortion.It is resilient against multiple attacks, exhibiting excellent robustness and strong traceability.Compared to existing algorithms, it offers distinct advantages and holds great potential for broad application in the field of data security.…”
Get full text
Article -
13144
Determination of Leisure Time Orientations in University Students, The Relationship Between Leisure Time Boredom Perceptions and Social Network Sites Usage Purposes
Published 2018-08-01“…As a means of data collection in the study that personal information form, activity preference form and "Social Network Sites Usage Scale" developed by Karal and Kokoç (2010) and "Leisure Time Boredom Perception Scale" (LTBPS) developed by Iso-Ahola and Weissinger and adapted to Turkish by Kara et al. (2014) was used. …”
Get full text
Article -
13145
From Victorian Buildings to the Victorian Built Heritage: Victorian studies and the Re-interpretation of 19th-century architecture
Published 2016-05-01“…Studying Victorian architecture therefore necessarily implies engaging physically with the Victorian architectural and industrial heritage and, as a consequence, with its interpretation, renovation and possibly its adaptive reuse. One can wonder what is lost and what is found in that coming and going from the 19th-century reality of Victorian buildings to the numerous issues and challenges set by the Victorian architectural heritage in the 21st century. …”
Get full text
Article -
13146
The Role of Kinesiotherapy in Enhancing Physical Performance and Self-Esteem: A Prospective Observational Study in Obese Adolescents
Published 2025-12-01“…Regression analysis revealed strong correlations between body composition, physical performance, and self-esteem improvements, particularly in girls and rural participants, highlighting the intervention's adaptability and effectiveness. Although limited by a relatively small sample size, short duration, and variability in adherence tracking, the study highlights the essential role of individualized physical activity programs in improving health outcomes. …”
Get full text
Article -
13147
Autonomous security analysis and penetration testing model based on attack graph and deep Q-learning network
Published 2023-12-01“…With the continuous development and widespread application of network technology, network security issues have become increasingly prominent.Penetration testing has emerged as an important method for assessing and enhancing network security.However, traditional manual penetration testing methods suffer from inefficiency,human error, and tester skills, leading to high uncertainty and poor evaluation results.To address these challenges, an autonomous security analysis and penetration testing framework called ASAPT was proposed, based on attack graphs and deep Q-learning networks (DQN).The ASAPT framework was consisted of two main components:training data construction and model training.In the training data construction phase, attack graphs were utilized to model the threats in the target network by representing vulnerabilities and possible attacker attack paths as nodes and edges.By integrating the common vulnerability scoring system (CVSS) vulnerability database, a “state-action”transition matrix was constructed, which depicted the attacker’s behavior and transition probabilities in different states.This matrix comprehensively captured the attacker’s capabilities and network security status.To reduce computational complexity, a depth-first search (DFS) algorithm was innovatively applied to simplify the transition matrix, identifying and preserving all attack paths that lead to the final goal for subsequent model training.In the model training phase, a deep reinforcement learning algorithm based on DQN was employed to determine the optimal attack path during penetration testing.The algorithm interacted continuously with the environment, updating the Q-value function to progressively optimize the selection of attack paths.Simulation results demonstrate that ASAPT achieves an accuracy of 84% in identifying the optimal path and exhibits fast convergence speed.Compared to traditional Q-learning, ASAPT demonstrates superior adaptability in dealing with large-scale network environments, which could provide guidance for practical penetration testing.…”
Get full text
Article -
13148
Project Approach to the Implementation of Individual Educational Paths in Modern University
Published 2020-09-01“…The results of the study were used by the authors to develop and implement an adaptive model for constructing individual educational trajectories at the Yaroslav-the-Wise Novgorod State University.…”
Get full text
Article -
13149
Intratumor heterogeneity: models of malignancy emergence and evolution
Published 2023-12-01“…Evolutionary dynamics plays a crucial role in the emergence and development of tumors, shaping the heterogeneity and adaptability of cancer cells. From the perspective of evolutionary theory, tumors are complex ecosystems that evolve through a process of microevolution influenced by genetic mutations, epigenetic changes, tumor microenvironment factors, and therapyinduced changes. …”
Get full text
Article -
13150
Phenotypic and genetic variability of a tetraploid wheat collection grown in Kazakhstan
Published 2020-10-01“…New cultivars adapted to major durum wheat growing environments are essential for the cultivation of this crop. …”
Get full text
Article -
13151
L’apport de la gestion intégrée des zones côtières (GIZC) à la gestion de l’érosion côtière : intérêt et exemple en Méditerranée française
Published 2006-12-01“…This depicts the significance of combining the analysis of sediment cells and territory scales, as well as defining several areas for integrating local particularisms and adapting scenarios to the diversity of issues and zones.…”
Get full text
Article -
13152
Introducing the spectral characteristics index: A novel method for clustering solar radiation fluctuations from a plant-ecophysiological perspective
Published 2025-03-01“…While long-term data collection across various climatic zones could improve the validity and adaptability of SCIs to different geographical locations, the current model demonstrates high accuracy and efficiency. …”
Get full text
Article -
13153
A UAV perspective based lightweight target detection and tracking algorithm for intelligent transportation
Published 2024-12-01“…Firstly, the performance of detecting small targets in occluded scenes is enhanced by adding a MODConv to the small-target detection head and increasing its size; In addition, excessive deletion of prediction boxes is prevented by utilizing LSKAttention mechanism to adaptively adjust the target sensing field at the downsampling stage and combining it with the Soft-NMS strategy. …”
Get full text
Article -
13154
Improved printed circuit board defect detection scheme
Published 2025-01-01“…First, we incorporate the Efficient Channel Attention Network (ECANet) attention mechanism into the backbone network of YOLOv8, which improves the performance of small-target detection by adaptively enhancing the expressiveness of key features, so that the network possesses higher sensitivity and focus on tiny details in PCB images. …”
Get full text
Article -
13155
The co-occurrence of the SAVA syndemic, depression and anxiety as barriers to antiretroviral therapy adherence among sub-Saharan Africa population groups: A scoping review protocol...
Published 2022-01-01“…Data charting will follow an adapted version of Trico and colleagues' PRISMA-ScR and results will be mapped descriptively and in tabular format. …”
Get full text
Article -
13156
Study on Calculation of Bearing Capacity of Axially Loaded CFRP-Strengthened Cold-Formed Thin-Walled Lipped Channel Steel Columns
Published 2020-01-01“…The equation modified in this work has excellent accuracy and adaptability. Predicting the bearing capacity of reinforced members is necessary to give full play to the performance of CFRP accurately. …”
Get full text
Article -
13157
-
13158
Dealing with post-excavation data: the Omeka S TiMMA web-database
Published 2024-01-01“…Despite these limitations, the TiMMA project contributes to showing that, without being a complete archaeological system recording, Omeka S is adapted to post-excavation projects. …”
Get full text
Article -
13159
Le tourisme à moto : les géographies renouvelées d'un phénomène marginal
Published 2016-07-01“…Ils représentent dès lors une clientèle touristique à fort potentiel qu'il convient d'attirer en lui proposant des produits et services adaptés à ses besoins et spécificités. Ces prestations, portées par les collectivités, les professionnels ou le monde associatif, prennent surtout la forme d'itinéraires dédiés ou d'hébergements identifiés voire labellisés à destination des motards. …”
Get full text
Article -
13160
A New Evaluation Method for Water Blocking Performance of Coal Seam Floor: Model Construction, Case Application, and Water-Preserved Strategy
Published 2022-01-01“…Research has shown that in the water hazard threat area of No. 10 coal seam floor in Jiegou Coal Mine, Anhui Province, the performance of system vulnerability elements is weak, the performance of system recoverability elements is better, and the performance of system adaptability elements is extremely poor. From the perspective of the whole life cycle, determining the treatment target area, optimizing the rock formation modification and repairing materials, and enhancing the water resources carrying capacity can improve the water resistance toughness of the coal seam floor. …”
Get full text
Article