-
61
Confronting food insecurity through agricultural interventions: the Farmer FIRST program in India
Published 2025-01-01“…Its impact in India was evaluated using the propensity score matching technique with difference-in-difference (D-i-D) measure to estimate the unbiased overall effect on food security. …”
Get full text
Article -
62
Evaluating the impact, implementation experience and political economy of primary care networks in Kenya: protocol for a mixed methods study
Published 2025-01-01“…We shall undertake a preliminary cross-sectional analysis of the data at baseline from October to December 2023, followed by a difference-in-difference analysis at the endline from October to December 2024 to compare the outcome differences between the intervention and control counties over a 12-month period. …”
Get full text
Article -
63
Analysis and Simulation of Engagement Process of Jaw Type Electromagnetic Clutch
Published 2022-02-01“…Through Adams virtual prototype simulation method, the influence of different speed difference on clutch engagement time and impact force is obtained. …”
Get full text
Article -
64
Encrypted and obfuscation WebShell detection for high-speed network traffic
Published 2022-08-01“…With the gradual development of traffic encryption and text obfuscation technologies, it is increasingly difficult to prevent complicated and malicious WebShell attack events in production environment using traditional detection methods based on text content and network flow features, especially for adversarial samples, variant samples and 0Day vulnerability samples.With the established network traffic collection environment, DPDK technology was used to capture network traffic in the high-speed network environment, and a dataset was marked with label.The dataset consisted of more than 24,000 normal traffic and more than 10,000 malicious WebShell traffic under different platforms, different languages, different tools, different encryption and obfuscation methods.Then Asynchronous traffic analysis system framework and lightweight log collection components were used to efficiently parse raw traffic.Expert knowledge was integrated to analyze HTTP data packets during the communication process of several popular WebShell management tools, and the effective feature set for encrypted and obfuscation WebShell was obtained.Support Vector Machine (SVM) algorithm was used to realize offline training and online detection of complicated WebShell malicious traffic based on the effective feature set.Meanwhile, improving the parameter search method with the genetic algorithm promoted the model training efficiency furthermore.The experimental results showed that the detection efficiency can be guaranteed based on the self-built WebShell attack traffic dataset.Besides, the detection model has a precision rate of 97.21% and a recall rate of 98.01%, and it performed well in the comparative experiments of adversarial WebShell attacks.It can be concluded from the results that the proposed method can significantly reduce the risk of WebShell attack, effectively supplement the existing security monitoring system, and be applied in real network environments.…”
Get full text
Article -
65
Epidemiological Research Advances in Vascular Calcification in Diabetes
Published 2021-01-01“…Because basic research on the clinical transformation of vascular calcification has yet to be conducted, this study systematically expounds on the risk factors for vascular calcification, vascular bed differences, sex differences, ethnic differences, diagnosis, severity assessments, and treatments to facilitate the identification of a new entry point for basic research and subsequent clinical transformation regarding vascular calcification and corresponding clinical evaluation strategies.…”
Get full text
Article -
66
A Study on the Impact of Watershed Compensation Policies on Green Technology Innovation Ecosystems
Published 2025-01-01“…By employing a staggered difference-in-differences model and a synthetic control difference-in-differences model, the study investigates how watershed compensation policies influence green technology innovation ecosystems and delves into the underlying mechanisms that are responsible for these impacts. …”
Get full text
Article -
67
Polyethylene Glycol Loxenatide (PEX-168) Reduces Body Weight and Blood Glucose in Simple Obese Mice
Published 2021-01-01“…Compared with HF, the food intake of mice in the intervention groups decreased transiently, but there was no difference between different doses (P>0.05). The body weight of mice in the middle and high dose of PEX-168 intervention groups decreased significantly, and the differences were statistically significant (P<0.05). …”
Get full text
Article -
68
Features of Malevolent Creativity and its Prevention in Adolescents in the Modern Socio-Political Context
Published 2024-12-01“…Hypotheses about differences in different contexts were tested: 1. in the levels of malevolent creativity (MC), 2. in the relationship MC with personal characteristics and between personal characteristics, 3. the presence of age-related characteristics of MC that do not differ in different socio-political conditions. …”
Get full text
Article -
69
Facilitating or Hindering? The Impact of Low-Carbon Pilot Policies on Socio-Ecological Resilience in Resource-Based Cities
Published 2025-01-01“…Focusing on a panel of 114 resource-based cities in China, spanning from 2003 to 2022, this study employs a range of methodologies, including kernel density estimation, the Difference-in-Differences Model, Spatial Difference-in-Differences, Mediation Analysis, K-means Clustering, and Dual Machine Learning to assess the consequences of low-carbon pilot policies on socio-ecological resilience. …”
Get full text
Article -
70
Variété inclusive et vérité morphologique : petite typologie des noms communs de personne abrégés
Published 2022-12-01“…For some years now, abbreviations of French personal nouns have been multiplying in usage, and there is a rich variety of formal realisations (different cuts, different abbreviation signs, etc.). Several issues related to abbreviated common nouns are thematized and exemplified, in particular with the help of the designation « collaborateur(s) / collaboratrice(s) », which presents several morphological particularities. …”
Get full text
Article -
71
East Germany Yesterday and Tomorrow
Published 2021-04-01“…East Germans today vote differently, think differently and feel differently. Germany is a country with two souls.…”
Get full text
Article -
72
Health inequalities for older people from minority ethnic groups receiving palliative care and end of life care: A scoping review protocol.
Published 2023-01-01“…However, it is unclear how these barriers and inequalities differ across different minority ethnic groups in different countries, and across different health conditions within these groups.…”
Get full text
Article -
73
Une chaîne d’extraction pour l’enrichissement de bases de données archéologiques
Published 2020-06-01“…Knowledge transfer and meaning evolution phenomena were observed when thesauri were examined, since the same term can refer to different notions, and the same archaeological site may be categorised differently, at different points in time.…”
Get full text
Article -
74
Narrow-Band Excitation of Hysteretic Systems
Published 1997-01-01“…It is shown that the response is qualitatively different in different ranges of values of the ratio of the excitation central frequency to the natural frequency of the system. …”
Get full text
Article -
75
Research and application of DRM technology in IPTV UHD video
Published 2018-11-01“…The characteristics and differences of different DRM standards such as OMA,Microsoft,Intertrust,and ChinaDRM were compared.The requirements of DRM applications were presented.The key technologies of DRM were analyzed.Based on the high-tech set-top box commonly used in the industry,the architecture of DRM protection in IPTV high-definition video was designed.The hardware trust root of high security set-top box,remote download terminal key,double-encrypted content key and other mechanisms was put forward innovatively.Finally,the business process of decrypting DRM content was formulated and an implementation case was given.…”
Get full text
Article -
76
Les morts qui comptent
Published 2019-07-01“…Clearly, there is a need to bring to bear the differences between different media organizations in general theories of bias in international coverage.…”
Get full text
Article -
77
Does energy-consuming right trading policy achieve a low-carbon transition of the energy structure? A quasi-natural experiment from China
Published 2025-01-01“…IntroductionThe implementation of energy-consuming right trading (ECRT) policy in 2017 is a major measure to promote the construction of ecological civilization and green development, which also aligns with the global trend towards sustainable energy management and carbon emission reduction.MethodsBased on energy consumption data in China from 2010 to 2021, this paper utilizes the Difference-in-Differences (DID) method to assess the extent and process of the impact of energy consuming right trading policy on the low-carbon transition of the energy structure. …”
Get full text
Article -
78
Pobreza objetiva e subjetiva no Brasil
Published 2011-11-01“…Analyses highlight spatial differences, both differences between States and differences between urban and rural areas. …”
Get full text
Article -
79
A Guide to Citrus Nutritional Deficiency and Toxicity Identification
Published 2024-05-01“…Nutritional disorders, particularly those involving micronutrients like zinc, manganese, and iron, can manifest differently on different parts of the tree and may not always match descriptions in publications. …”
Get full text
Article -
80
Effect of Sucrose Spray on some Phytochemical Characteristics of Stevia (Stevia rebaudiana Bertoni) under Field Conditions
Published 2024-11-01“…The amount of flavonoid was significantly different between different concentrations of sucrose and also in different solvents. …”
Get full text
Article