Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 2
- Internet in public administration 2
- Moral and ethical aspects 2
- Public administration 2
- Communication policy 1
- Government policy 1
- Internet 1
- Photography 1
- Prevention 1
- Psychological aspects 1
- Psychology 1
- Social aspects 1
- Technological innovations 1
- Telecommunication policy 1
- Terrorism 1
- Terrorists 1
- Visual communication 1
-
5861
Geodesics of Finsler Hayward black hole surrounded by quintessence
Published 2024-12-01“…Our analysis delves into the effective potential, providing insights into null geodesics for various energy levels and examining the behavior of horizons by utilizing the definition of the effective potential. …”
Get full text
Article -
5862
Psychosemantic Peculiarities of Promotional Videos Perception
Published 2019-04-01“…The modern advertising is seen as a societal and socio-psychological phenomenon that models not only the behavior but also the values, standards and mindsets of the younger generation. …”
Get full text
Article -
5863
Theory and simulations of few-photon Fock state pulses strongly interacting with a single qubit in a waveguide: Exact population dynamics and time-dependent spectra
Published 2025-06-01“…Numerically, we also present matrix product state (MPS) simulations, which allow us to compute more general photon correlation functions for arbitrary quantum pulses, and we use this approach to also show results for Gaussian quantum pulses and to confirm the accuracy of our analytical solutions. …”
Get full text
Article -
5864
Abordagem adaptativa aplicada ao planejamento agregado da produção sob incertezas Adaptive approach applied to aggregate production planning under uncertainties
Published 2010-03-01“…An example, where the inventory balance system is subject to weak and strong variability in actual demand, is employed to analyze the behavior of the proposed approach. Finally, the results provided by the proposed approach are compared with another suboptimal approach, the main characteristic of which is not allowing periodic reviews.…”
Get full text
Article -
5865
Research on the Causes of the Concave Shapes of Traditional Chinese Building Roofs from the Construction Perspective
Published 2025-07-01“…Through a systematic review of historical literature (especially Yingzao fashi (Treatise on Architectural Methods)); the empirical investigation and analysis of typical architectural examples; detailed research on the structural practices, material properties (especially the creep behavior of timber), and construction techniques of key timber components such as flying rafters, hip rafters, and rafters; and mechanical principles and computational simulation, this study found that the concave curved forms of different parts of the roof, such as the eaves (flying rafters), corners (corner upturn), and main body (Ju zhe), are not purely esthetic choices but are, to a large extent, technical responses or inevitable results stemming from objective construction constraints of the time, including limitations on timber length, component connection methods, structural load distribution, and long-term deformation. …”
Get full text
Article -
5866
Development of a Non-Uniform Heat Source Model for Accurate Prediction of Wheel Tread Temperature on Long Downhill Ramps
Published 2025-05-01“…Accurately simulating the thermal behavior of wheel–brake shoe friction on long downhill ramps is challenging due to the complexity of modeling appropriate heat source models. …”
Get full text
Article -
5867
Synthetic Biology – Friend or Foe? What Kind of Threats Should We Expect?
Published 2023-06-01“…Basic tools and techniques of synthetic biology are: DNA synthesis and DNA sequencing; «chassis», i.e. host system harboring the genetic toolbox for expression of the desired genes, delivered by suitable vectors, of the engineered biological pathway; engineering of transcription systems that do not deplete the resources of the cell (synthetic promotors and transcription factors); genome modification tools (CRISPR/Cas9 nuclease, zinc finger nucleases, TALE nucleases, meganucleases); computer-aided tools (involved in basic structural design and synthesis; in network design; in prediction of behavior/function/response). …”
Get full text
Article -
5868
Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain
Published 2022-08-01“…Currently, there is no data exchanging and sharing between different hospitals, and it is easy to form data islands.At the same time, regional medical data contains a large amount of sensitive information of patients.The public acquisition, sharing and circulation of these data will lead to malicious tampering, theft, abuse and loss of ownership, thereby revealing patient privacy.In addition, the size of medical data is enormous and the data is unstructured, then it is more difficult to prevent and hold accountable some highly targeted malicious attacks, such as malicious attacks on medical data theft, tampering, and extortion.In view of the above problems, a blockchain-based on multi-authority attribute hidden electronic medical record sharing scheme was proposed to achieve fine-grained access to shared electronic medical records while ensuring patient privacy.The Multi-Authorization Attribute Encryption (MA-ABE) algorithm was introduced, which used multi-authority organizations to manage decentralized attributes.It also used hash functions to identify different users, in order to effectively resist collusion attacks between users with different authorizations.Besides, the linear secrets sharing scheme (LSSS) was used to realize partial hiding of attributes, and the attributes were divided into two parts:attribute name and attribute value.In addition, combined with the characteristics of blockchain openness, transparency and tamper-proof, the design of access policy can update the algorithm.Based on the access policy update algorithm, the policy block was added.The new access policy was uploaded to the blockchain to form a policy update traceability chain, which can realize distributed and reliable access control management under the condition of hidden policy.It can also support data privacy protection at the same time, and traceability of user behavior.The theoretical proof and experimental analysis have proved that this scheme protect attribute privacy effectively, while reduces computational overhead.…”
Get full text
Article -
5869
Stress distribution by parafunctional loading on tooth–implant, implant–implant, and tooth–tooth-supported prosthesis: A comparative three-dimensional finite element analysis
Published 2024-10-01“…Meterials and Methods: Cone-beam computed tomography data was used by Mimics software (Materialize Mimics 19) to create a three-dimensional finite element simulation of the jaw. …”
Get full text
Article -
5870
Features of gifted teenagers’ representations of a person in a digital society
Published 2024-12-01“…Subjective representations mediate people’s perception and comprehension of the world, influencing their activity and behavior. The study analyzes the subjective representations of modern teenagers about a person in a digital society, which are of great importance for their socialization and life plans. …”
Get full text
Article -
5871
Structural, electronic, and optical properties of (2D)MXenes Zr₂CT₂(T = O and F) studied using the (DFT + U) method
Published 2025-07-01“…These findings provide a deeper understanding of the electronic and optical behavior of the Zr₂CO₂ and Zr₂CF₂ (2D) monolayers and pave the way for developing novel applications in electronic and optical technologies.…”
Get full text
Article -
5872
Simulation of direct mapped, k-way and fully associative cache on all pairs shortest paths algorithms
Published 2019-12-01“…When the processor accesses memory, the cache behavior depends on if the data is in cache: a cache hit occurs if it is, and, a cache miss occurs, otherwise. …”
Get full text
Article -
5873
Dynamics of link formation in networks structured on the basis of predictive terms
Published 2023-06-01“…The exploratory data analysis carried out in the STATISTICA software package indicates the correlation of the behavior of the introduced MADSTA keyword integrator with basic terms including periods of extremes, confirming the correctness of the choice of the methodology for detailing the study by year.Conclusions. …”
Get full text
Article -
5874
Gaze Synchrony between Mothers with Mood Disorders and Their Infants: Maternal Emotion Dysregulation Matters.
Published 2015-01-01“…The mothers' and infants' gaze behaviors were coded using microanalysis with the Maternal Regulatory Scoring System and Infant Regulatory Scoring System, respectively. …”
Get full text
Article -
5875
MODELING THE FORMATION OF FLUORIDE NITROGEN-RICH HOT SPRINGS IN THE WATER – CRYSTALLINE ROCK SYSTEM
Published 2020-06-01“…Differences are hardly noticeable in the behavior of cations, fluorine, chlorine, and sulfates, but are strongly manifested in changes in the quantities of carbon and silicon compounds and transformations of their forms. …”
Get full text
Article -
5876
Comparative Study of the Nonlinear Fractional Generalized Burger-Fisher Equations Using the Homotopy Perturbation Transform Method and New Iterative Transform Method
Published 2025-06-01“…Maple is used to derive the approximate series solution’s behavior, which is graphically displayed for a number of fractional orders. …”
Get full text
Article -
5877
Development of an imitation learning method for a neural network system of mobile robot’s movement on example of the maze solving
Published 2024-09-01“…The work uses the method of computer modeling in the MATLAB/Simulink environment.Results. …”
Get full text
Article -
5878
An automated approach to identify sarcasm in low-resource language.
Published 2024-01-01“…However, this task is challenging due to the influence of the user's behavior and attitude and their expression of emotions. …”
Get full text
Article -
5879
Modeling Porosity Distribution Strategies in PEM Water Electrolyzers: A Comparative Analytical and Numerical Study
Published 2025-06-01“…These functions are integrated into a three-dimensional multi-domain COMSOL simulation to assess their impact on electrochemical performance and transport behavior. The results reveal that although porosity variations have minimal effect on polarization at low voltages, they significantly influence internal pressure, species distribution, and gas evacuation at higher loads. …”
Get full text
Article -
5880
Determining Energy Production and Consumption Signatures Using Unsupervised Clustering
Published 2025-05-01“…The analyses conducted were subjected to expert validation aimed at explaining the nature of the behavior of the power generation and consumption systems. …”
Get full text
Article