Suggested Topics within your search.
Suggested Topics within your search.
- Sustainable development 2
- computer 2
- Agriculture 1
- Biotechnology 1
- Calculus 1
- Chemistry Techniques, Analytical 1
- Children 1
- Climate change mitigation 1
- Economic Policy 1
- Economic policy 1
- Education 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Enterprise application integration (Computer systems) 1
- Environmental Economics 1
- Environmental economics 1
- Ethnoscience 1
- Hospitality industry 1
- Immune System 1
- Immunity 1
- Industrial Organization 1
- Industrial organization 1
- Information technology 1
- Language 1
- Language disorders in children 1
- Linguistics 1
- MEDICAL / Audiology & Speech Pathology 1
- MEDICAL / Biotechnology 1
- Management 1
-
17101
Sensual Environmental Robots: Entanglements of Speculative Realist Ideas with Design Theory and Practice
Published 2025-01-01“…Speculative Realist ideas provide reasoning for design approaches to metaphorise sensed environmental data into multi-sensorial performances that the devices embody. …”
Get full text
Article -
17102
The Factors Influencing Banks' Risk-Taking Behavior: Evidence from The Turkish Banking Industry
Published 2025-06-01“…Inverse Z score was utilized as a measure of bank risk taking in the developed panel data regression models, while various bank-level and macro-level variables were employed as independent variables. …”
Get full text
Article -
17103
BRIDGING THE GAP: OPPORTUNITIES, CHALLENGES AND STRATEGIES FOR AI DEPLOYMENT IN PUBLIC SERVICE DELIVERY
Published 2025-06-01“…By conducting a thorough analysis of existing research, the study uncovers significant opportunities, including enhanced accessibility, data-driven insights, and streamlined operations. …”
Get full text
Article -
17104
EXTENDED CYBEREASON’S SOC MATURITY MODEL
Published 2025-02-01“…When assessing the maturity level of a SOC, it is also necessary to take into account a comprehensive approach to the application of advanced technological solutions (SIEM, SOAR, XDR, UEBA systems), international standards (NIST CSF 2.0, ISO/IEC 27001), principles of long-term data storage, as well as generally accepted approaches (MITRE ATT&CK, Threat Intelligence), artificial intelligence, machine learning and large language models (LLM). …”
Get full text
Article -
17105
Cross-Layer Stream Allocation of mMIMO-OFDM Hybrid Beamforming Video Communications
Published 2025-04-01“…Unlike most previous studies that focus on the downlink scenario, our proposed scheme optimizes the uplink transmission while also addressing the limitation of prior works that only consider single-data-stream users. A key distinction of our approach is the integration of cross-layer resource allocation, which jointly considers both the physical layer channel state information (CSI) and the application layer video rate-distortion (RD) function. …”
Get full text
Article -
17106
The Use of Text Mining in New Media Studies: A Systematic Review
Published 2023-12-01Get full text
Article -
17107
International Law Issues of Cyber Defense
Published 2022-07-01“…While most frequently the specific problems of application of International Law to the traditional cyber warfare situations become subject for academic debates and discussions, we stress the necessity to also analyze the legal and practical implications of further advancement of cyber weapons, as well as the necessity to consider the role of Big Data management in changing the nature of war and, consequently, also the applicable legal solutions.MATERIALS AND METHODS. …”
Get full text
Article -
17108
Gravitational model: analysis of mutual trade of the Eurasian Economic Union countries
Published 2023-12-01“…This study presents the aggregative data analysis concerning foreign trade of the Eurasian Economic Union (hereinafter referred to as EAEU) countries. …”
Get full text
Article -
17109
Current Application and Meta-analysis of Traditional Chinese Medicine emotional nursing for colorectal cancer patients' psycho-somatic rehabilitation after radical surgery (中医情志护理在...
Published 2023-05-01“…The literatures met the inclusion and exclusion criteria were selected for data extraction and quality evaluation. Meta-analysis was conducted through RevMan5. 3 statistical software. …”
Get full text
Article -
17110
Сlustering method for quality verification of experts’ Unified State Examination checking
Published 2016-09-01Get full text
Article -
17111
OPTIMIZING ROAD SAFETY: THE ROLE OF GEOGRAPHIC INFORMATION SYSTEMS (GIS) IN TRAFFIC ACCIDENT ANALYSIS AND PREDICTION
Published 2025-03-01“…This study investigates the application of Geographic Information Systems (GIS) in traffic accident analysis and prediction. …”
Get full text
Article -
17112
Stratum P- and S-Wave <italic>Q</italic> Factors Estimation via Improved Spectral Envelope Matching Method
Published 2024-01-01“…The successful application of ISENVM to field zero-offset three-component VSP data validates its effectiveness, contributing to a continuous model for the P- and S-wave Q factors. …”
Get full text
Article -
17113
Improving internet of vehicles research: A systematic preprocessing framework for the VeReMi datasetZenodo
Published 2025-06-01“…This preprocessing pipeline effectively maintains data integrity and preserves the representativeness of malicious patterns. …”
Get full text
Article -
17114
Three-three-three network architecture and learning optimization mechanism for B5G/6G
Published 2021-04-01“…Aiming at the problem that the future B5G/6G network is a complex intelligent network with large connections, coupled with the comprehensive application of 3G, 4G, 5G and even 6G, the future networks will inevitably become extremely complex, a three-three-three network architecture was proposed that was a network that includes three types of networks (core network, access network and terminal network), three resources (frequency band, power and time consumptions) and three requirements (active, work and service), which was a three-dimensional comprehensive optimization system architecture, referred to as the three-three-three network.Furthermore, the mathematical basic formulas of the three-dimensional complex network were analyzed, the knowledge + data-driven learning model and the optimization method of intelligent processing using the knowledge learning mechanism were presented.Finally, the numerical example and reachable performance of the three-three-three network were given.Those results demonstrate that the proposed network architecture and the learning optimization mechanism are beneficial for designing future large-connected complex intelligent networks.…”
Get full text
Article -
17115
Three-three-three network architecture and learning optimization mechanism for B5G/6G
Published 2021-04-01“…Aiming at the problem that the future B5G/6G network is a complex intelligent network with large connections, coupled with the comprehensive application of 3G, 4G, 5G and even 6G, the future networks will inevitably become extremely complex, a three-three-three network architecture was proposed that was a network that includes three types of networks (core network, access network and terminal network), three resources (frequency band, power and time consumptions) and three requirements (active, work and service), which was a three-dimensional comprehensive optimization system architecture, referred to as the three-three-three network.Furthermore, the mathematical basic formulas of the three-dimensional complex network were analyzed, the knowledge + data-driven learning model and the optimization method of intelligent processing using the knowledge learning mechanism were presented.Finally, the numerical example and reachable performance of the three-three-three network were given.Those results demonstrate that the proposed network architecture and the learning optimization mechanism are beneficial for designing future large-connected complex intelligent networks.…”
Get full text
Article -
17116
Advanced IoT-based monitoring system for real-time photovoltaic performance evaluation: Conception, development and experimental validation
Published 2025-06-01“…One of its notable features is its intuitive user interface, which allows for real-time graphical representation of monitored parameters through a desktop application. This newly developed device is anticipated to function as a comprehensive solution for collecting data from photovoltaic system installations in developing nations, specifically targeting Cameroon. …”
Get full text
Article -
17117
-
17118
Urodynamics tests for the diagnosis and management of male bladder outlet obstruction: long-term follow-up of the UPSTREAM non-inferiority RCT
Published 2025-07-01“…Methods The Proportionate Review Sub-Committee of the South Central – Berkshire Research Ethics Committee reviewed and approved UPSTREAM Phase II (REC reference 19/SC/0578, Integrated Research Application System ID 264738). Participants of UPSTREAM Phase I were recontacted for one questionnaire, and routine NHS data were extracted. …”
Get full text
Article -
17119
Urodynamics tests for the diagnosis and management of male bladder outlet obstruction: long-term follow-up of the UPSTREAM non-inferiority RCT
Published 2025-07-01“…Methods The Proportionate Review Sub-Committee of the South Central – Berkshire Research Ethics Committee reviewed and approved UPSTREAM Phase II (REC reference 19/SC/0578, Integrated Research Application System ID 264738). Participants of UPSTREAM Phase I were recontacted for one questionnaire, and routine NHS data were extracted. …”
Get full text
Article -
17120
Selected Topics on Business Informatics Research: Editorial Introduction to Issue 6 of CSIMQ
Published 2016-04-01Get full text
Article