Suggested Topics within your search.
Suggested Topics within your search.
-
1861
Non-parametric correlation structures and their respective embeddings in predictive analysis
Published 2025-05-01Get full text
Article -
1862
-
1863
Plant Stress Detection Using a Three-Dimensional Analysis from a Single RGB Image
Published 2024-12-01Get full text
Article -
1864
An efficient method for predicting the morphology of proppant packs based on a surrogate model
Published 2025-03-01“…Currently, experimental and numerical methods are the main approaches for reproducing the proppant accumulation process and placement patterns in fractures. These methods are still confined by limited simulation scales, time-consuming computations, and high-cost operations. …”
Get full text
Article -
1865
ADDAEIL: Anomaly Detection with Drift-Aware Ensemble-Based Incremental Learning
Published 2025-06-01Get full text
Article -
1866
Cloud Telescope: An Ephemeral, Distributed, and Cloud-Native Architecture for Collecting Internet Background Radiation
Published 2025-01-01“…In addition, what malicious traffic patterns would emerge if we could sample the unsolicited traffic - termed Internet Background Radiation (IBR) - arriving at devices directly connected to the Internet? …”
Get full text
Article -
1867
Stabilization of diastolic calcium signal via calcium pump regulation of complex local calcium releases and transient decay in a computational model of cardiac pacemaker cell with...
Published 2017-08-01“…One major obstacle to study these mechanisms is that LCR exhibit complex Ca release propagation patterns (including merges and separations) that have not been characterized. …”
Get full text
Article -
1868
-
1869
SmartTrust: a hybrid deep learning framework for real-time threat detection in cloud environments using Zero-Trust Architecture
Published 2025-07-01“…Abstract The rapid growth of cloud computing has brought scalability and flexibility to modern organizations, but it has also introduced a new wave of complex and evolving security threats. …”
Get full text
Article -
1870
-
1871
Leadership as a female political characteristic in Serbia
Published 2024-01-01Get full text
Article -
1872
PENCAPAIAN STANDAR KOMPETENSI DALAM KURIKULUM 2006 PADA MATA PELAJARAN EKONOMI MELULUI PENDEKATAN KONTEKSTUAL (CONTEXTUAL TEACHING AND LEARNING) DI SMA NEGERI 11 SEMARANG
Published 2011-06-01“…The result showed that contextual teaching and learning in Economics subject in SMA N 11 Semarang was very effectiveness in achieving the standard of competency based on curriculum 2006. The suggestions are: (1) it is needed a more comtrhensive study by using action research through cycling pattern so the percentage of Contextual Teaching and Learning (CTL) is found. (2) it is needed a preparation for teachers so they are ready to improve and innovate the way of teaching, (3) the implementation of CTL in groups can be tried in a bigger scope to support the implementation of KTSP (4) if three are students’ tasks of activities which do outside or at home, so teacher’s monitoring is needed, (5) it is needed to add individual tasks to decrease students’ dependence on their groups.…”
Get full text
Article -
1873
-
1874
-
1875
Study of the association of distribution pattern of genotypes of C/A polymorphism of COL1A1_1 collagen gene (RS1107946) with indicators of external breathing in children with bronc...
Published 2019-12-01“…The study of the distribution patterns of allelic genes and genotypes of the C/A polymorphism of the collagen COL1A1_1 gene (rs1107946) in children with bronchial asthma, taking into account the indicators of external respiration function. …”
Get full text
Article -
1876
Improving Performance of Motor Imagery-Based Brain–Computer Interface in Poorly Performing Subjects Using a Hybrid-Imagery Method Utilizing Combined Motor and Somatosensory...
Published 2023-01-01“…The Hybrid-condition II paradigm provided high concentration and discrimination to poor performers in the motor imagery-based brain-computer interface and generated the enhanced event-related desynchronization pattern in three modalities corresponding to different types of somatosensory stimuli in motor and somatosensory regions compared to the Control-condition and Hybrid-condition I. …”
Get full text
Article -
1877
Clinical and epidemiological characteristics of registered childhood tuberculosis cases in the North-Western Region of Russia when introducing a tuberculosis diagnosis complex usin...
Published 2015-01-01“…The paper analyzes changes in the pattern of clinical forms of registered tuberculosis cases, in the proportion of detected complications and phases of the specific process in children in 2007 to 2012. …”
Get full text
Article -
1878
Damage toughness assessment method of power backbone communication network based on power big data
Published 2023-05-01“…The damage toughness assessment method of power backbone communication network based on power big data was studied, and the damage toughness assessment results were used to formulate protection strategies and improve the network survivability.The power backbone communication network and the attacker were set as the two sides of the game, and the Nash equilibrium strategy of both sides was determined by the minimax method.The damage probability of nodes was obtained by the Nash equilibrium strategy, and the node damage probability was transformed into the network damage form.According to the network damage pattern, the repair conditions contained in the power big data were obtained by cloud computing technology.According to the importance of each node, the repair resources and repair budget were allocated to the nodes in order.The performance time-history response curve of the power backbone communication network was constructed, and the dynamic evaluation results of the network damage toughness were output.The experimental results show that all operations using cloud computing technology to process massive power big data can not exceed 330 ms.When the repair budget and repair resources are the highest, the damage toughness of the power backbone communication network can reach 0.925 at most, indicating that this method can effectively evaluate the damage toughness of the power backbone communication network.…”
Get full text
Article -
1879
Damage toughness assessment method of power backbone communication network based on power big data
Published 2023-05-01“…The damage toughness assessment method of power backbone communication network based on power big data was studied, and the damage toughness assessment results were used to formulate protection strategies and improve the network survivability.The power backbone communication network and the attacker were set as the two sides of the game, and the Nash equilibrium strategy of both sides was determined by the minimax method.The damage probability of nodes was obtained by the Nash equilibrium strategy, and the node damage probability was transformed into the network damage form.According to the network damage pattern, the repair conditions contained in the power big data were obtained by cloud computing technology.According to the importance of each node, the repair resources and repair budget were allocated to the nodes in order.The performance time-history response curve of the power backbone communication network was constructed, and the dynamic evaluation results of the network damage toughness were output.The experimental results show that all operations using cloud computing technology to process massive power big data can not exceed 330 ms.When the repair budget and repair resources are the highest, the damage toughness of the power backbone communication network can reach 0.925 at most, indicating that this method can effectively evaluate the damage toughness of the power backbone communication network.…”
Get full text
Article -
1880