-
1561
Preparation and properties of furan-based liquid crystal polymer
Published 2025-01-01“…Moreover, the addition of FDCA led to an increase in the polyester’s viscosity and enhanced melt strength, which imply that the copolyesters have stronger deformation processing ability under the external force. This copolyester demonstrates favorable thermal stability, melt processing characteristics, mechanical performance, and hydrophobic behavior, suggesting substantial promise in medical and packaging applications.…”
Get full text
Article -
1562
Studying the influence of interest groups on non-decisionmaking: challenges and tools in research design
Published 2024-12-01“…Overall, this paper shows that, despite the inherent difficulties in studying interest groups’ ability to keep their ‘nightmare’ issues off the agenda, these challenges can be overcome, providing valuable insights into this crucial aspect of political behavior.…”
Get full text
Article -
1563
Research and practice of blended teaching mode based on smart classroom
Published 2025-01-01“…The results show that the blended teaching under the smart classroom improves students' academic performance, with high satisfaction and enhanced students' hands-on ability. The online learning behavior is proportional to the final score. …”
Get full text
Article -
1564
Toxoplasma on the Brain: Understanding Host-Pathogen Interactions in Chronic CNS Infection
Published 2012-01-01“…Key to parasite prevalence is its ability to form chronic and nonimmunogenic bradyzoite cysts, which typically form in the brain and muscle cells of infected mammals, including humans. …”
Get full text
Article -
1565
The entropy-transformed Gompertz distribution: Distributional insights and cross-disciplinary utilizations
Published 2025-01-01“…A thorough simulation analysis has been done to examine the final behavior of maximum likelihood estimators while estimating model parameters. …”
Get full text
Article -
1566
Factors affecting the decisions of tax compliance selection of Vietnamese enterprises: A mega data analysis
Published 2025-01-01“… The decision to comply with taxes by a business depends on the business's choice of behavior, especially the nature of its operations. …”
Get full text
Article -
1567
A Novel Procedure for Measuring Semantic Synergy
Published 2017-01-01“…We validate this measure by providing evidence for its ability to predict the semantic transparency of linguistic compounds (Experiment 1) and the abstractness rating of nouns (Experiment 2).…”
Get full text
Article -
1568
Dynamical System in Chaotic Neurons with Time Delay Self-Feedback and Its Application in Color Image Encryption
Published 2022-01-01“…The experimental results exhibit that it has a rich dynamic behavior. In addition, the randomness of chaotic series generated by chaotic neurons with time delay self-feedback under different conditions is verified. …”
Get full text
Article -
1569
DYNAMIC CRUSHING PERFORMANCE ANALYSIS FOR AUXETIC HONEYCOMB STRUCTURE
Published 2016-01-01“…The in-plane dynamic crushing behavior of a new honeycomb structure-the multi-re-entrant honeycomb and reentrant honeycomb topology possessing negative Poisson’s ratio was analyzed here. …”
Get full text
Article -
1570
Research on distributed network intrusion detection system for IoT based on honeyfarm
Published 2024-01-01“…To solve the problems that the network intrusion detection system in the Internet of things couldn’t identify new attacks and has limited flexibility, a network intrusion detection system based on honeyfarm was proposed, which could effectively identify abnormal traffic and have continuous learning ability.Firstly, considering the characteristics of the convolutional block attention module, an abnormal traffic detection model was developed, focusing on both channel and spatial dimensions, to enhance the model’s recognition abilities.Secondly, a model training scheme utilizing federated learning was employed to enhance the model’s generalization capabilities.Finally, the abnormal traffic detection model at the edge nodes was continuously updated and iterated based on the honeyfarm, so as to improve the system’s accuracy in recognizing new attack traffic.The experimental results demonstrate that the proposed system not only effectively detects abnormal behavior in network traffic, but also continually enhances performance in detecting abnormal traffic.…”
Get full text
Article -
1571
KONSEP KEPEMIMPINAN MENURUT SYU’BAH ASA
Published 2017-12-01“…A leader must also have the ability over his followers, in term of knowledge and action, religious service, courageous and excellence, character, and behavior. …”
Get full text
Article -
1572
Research of trust evaluation model based on dynamic Bayesian network
Published 2013-09-01“…Trust evaluation model needs to be developed for trusted network.Based on interpersonal trust model in sociology,the trusted relationship between network nodes was researched,and a trust evaluation model based on dynamic bayesian network associating with time factor as proposed.The impact of authentication and network interaction behavior was fully considered,and historical interaction window,timelin factor and penalty factor were introduced.Also,the polymerization method of the direct trust de ee and indirect trust degree was given,and the dynamic adaptive ability of the model was improved as well as the calculation of the sensitivity and accuracy.Furthermore,the threaten of abnormal entity was effectively suppressed.Experimental results show that this model computes the trust degree more sensitively and effecti ly as well as better dynamic adaptivity compared with the traditional bayesian network model.…”
Get full text
Article -
1573
Large Deformation Constitutive Theory for a Two-Phase Shape Memory Alloy
Published 2015-01-01“…The model is based on a standard fractions approach and considers a local multiplicative decomposition of the deformation gradient into elastic and inelastic (transformation induced) parts, as its basic kinematic assumption. We also assess the ability of the model in simulating several patterns of the complex behavior of the material in question, by three representative numerical examples. …”
Get full text
Article -
1574
A trusted IoT architecture model
Published 2017-10-01“…The internet of things (IoT) has been widely concerned and developed in the world,and its security has been paid more and more attention.However,due to the characteristics of the IoT itself,a lot of security measures in the internet field can’t be applied directly.The current security strategy mainly provide solutions according to the threat of the IoT one by one.In face of increasingly intelligent,systematic,integrated security threats,a trusted IoT architecture of two layers and tri-elements,which brought about a whole trusted security mechanism according to the function of IoT.Starting with the integrity and safety inspection of hardware and software of sensor devices,the trusted chain was transmitted until the application layer,and data was processed according to behavior trusted value in application layer.At the same time,the control function and the data function were separated,and the security strategies cooperated and verified with each other,therefore improving the ability of the IoT to deal with security threats effectively.…”
Get full text
Article -
1575
Intrapreneurship as a Driver of Business Innovation
Published 2024-07-01“…The role of key prerequisites such as individual entrepreneurial ability and acquired competencies (strategic thinking and proactive behavior) as well as the art of cultivating a unique innovation-friendly climate is revealed. …”
Get full text
Article -
1576
Role of Wind and Fear on the Dynamic of a Prey and Two Competing Predators
Published 2025-01-01“…An essential tool for studying the web is its ability to show how energy moves through an ecosystem. …”
Get full text
Article -
1577
On Regime Switching Models
Published 2025-03-01“…Regime switching models have been widely studied for their ability to capture the dynamic behavior of time series data and are widely used in economic and financial data analysis. …”
Get full text
Article -
1578
Nursing diagnosis on the Noncompliance to treatment in men with hypertension
Published 2016-06-01“…Results: the diagnosis frequency of occurrence was 56.8%, the most present defining characteristics were the inadequate management of nonpharmacological treatment (p=0.000) and adherence failure of indicative behavior (p=0.000). The most common related factors were deficient knowledge for the monitor of the non-drug treatment regimen (p=0.000) and insufficient teaching ability of health staff (p=0.002). …”
Get full text
Article -
1579
GEOECOLOGICAL ASPECTS OF THE CREATION AND FUNCTIONING OF THE NATURAL-TECHNIC SYSTEMS UNDER THE CONDITIONS OF THE WESTERN SIBERIA CRYOLITHIC ZONE
Published 2017-10-01“…A complexity of the NTGES’s behavior definition is in ability to see all thesystem in a whole, not breaking it in the components, for this it is reasonable to find the measure of its emergence.…”
Get full text
Article -
1580
Nursing diagnosis on the Noncompliance to treatment in men with hypertension
Published 2016-06-01“…Results: the diagnosis frequency of occurrence was 56.8%, the most present defining characteristics were the inadequate management of nonpharmacological treatment (p=0.000) and adherence failure of indicative behavior (p=0.000). The most common related factors were deficient knowledge for the monitor of the non-drug treatment regimen (p=0.000) and insufficient teaching ability of health staff (p=0.002). …”
Get full text
Article