-
3441
Quality Attributes of Fresh-Cut Coconut after Supercritical Carbon Dioxide Pasteurization
Published 2013-01-01“…The study confirms the feasibility of SC-CO2 process for the pasteurization of fresh fruits with a firm structure and opens the door to the possibility of exploiting such a technology at industrial level.…”
Get full text
Article -
3442
Proteostasis and Mitochondrial Role on Psychiatric and Neurodegenerative Disorders: Current Perspectives
Published 2018-01-01“…Proteostasis involves processes that are fundamental for neural viability. …”
Get full text
Article -
3443
Hardware-accelerated real-time IP flow measurement method for multi-core architecture
Published 2008-01-01“…Experiments show that this method can accelerate IP flow analysis effectively. With the input of 75 bytes packets, the system is able to process at wire speed of OC-192 links. …”
Get full text
Article -
3444
المکتبات الخضراء ودورها فى مواجهة تحدیات الاستدامة البیئیة : دراسة تحلیلیة مقارنة
Published 2020-04-01“…Environmental sustainability is an integral part of themarketing policies of libraries as a central social entity. The least effective stepsfor sustainability can have a significant impact on the overall picture of libraries.With a small funding, the library gets significant returns as a result of marketing.Achieving environmental awareness does not necessarily require significant effortor substantial funds, but also effective activities in developing joint relationshipswith other institutions, library friend groups, school projects, suppliers and librarybeneficiaries.The problem of the study lies in, the spread of the phenomenon of greenlibraries at the level of many developed countries in the Western world, andactivates its components at the level of the Arab world, which calls forextrapolation of the elements of environmental sustainability and therequirements of their application to various categories of libraries. …”
Get full text
Article -
3445
Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain
Published 2022-08-01“…To solve the security hazards of identity information and transaction data and the time-consuming problem of traditional single-level encryption methods in the current application scenarios of consortium blockchain, a privacy protection scheme of consortium blockchain based on fair blind signature and hierarchical encryption was proposed.Considering the strong centrality and poor security of the existing fair blind signature scheme, it was redesigned with zero-knowledge proof technology to be applicable for consortium blockchain application scenario.Based on the Paillier homomorphic encryption algorithm, a supervisable hierarchical encryption method was designed, and the method realized the supervision of encrypted transaction data information and reduced the time cost of the encryption and decryption process.The security analysis and simulation results show that the proposed scheme can effectively resist malicious attacks such as tampering and eavesdropping and significantly improve the encryption efficiency.…”
Get full text
Article -
3446
TOWARDS THE ISSUE ON DEMAND GENERATION IN THE SERVICE MARKET
Published 2020-07-01“…An economic assessment of the effectiveness of the proposed measures in the form of an expected increase in revenue and payback periods has been given. …”
Get full text
Article -
3447
DEVELOPMENT OF COMMUNICATIVE COMPETENCES IN STUDENTS BY TRAINING PROGRAMS
Published 2013-10-01“…During the training group work all the participants demonstrated all the stages of group dynamic, high level of performance and emotional involvement into the process. …”
Get full text
Article -
3448
The Impact of Family Setting and Local Opportunities on Leaving Home and Migration Destinations of Rural Youths, The Netherlands 1860-1940
Published 2015-11-01“…To do this, we propose a multi-level competing risk analysis of migration destinations. …”
Get full text
Article -
3449
The Impact of Family Setting and Local Opportunities on Leaving Home and Migration Destinations of Rural Youths, The Netherlands 1860-1940
Published 2015-11-01“…To do this, we propose a multi-level competing risk analysis of migration destinations. …”
Get full text
Article -
3450
Body Percussion: Active and inclusive teaching oriented to disciplinary knowledge and transversal skills
Published 2025-01-01“…The present contribution aims to outline and validate a teaching like Body Percussion, a practical activity that has theoretical foundations in Embodied Cognition; this can be a creative and effective addition to education, contributing in different ways to the learning of students, which is no longer understood as the organization of organized and pre-existing data but is an active process of building knowledge that is realized both at the individual and intra-individual level.…”
Get full text
Article -
3451
The influence of communication on project success
Published 2022-06-01“…This study highlights some of the areas in the project communications processes. The practical importance of the study shows that communication is the key to effective project management. …”
Get full text
Article -
3452
The Impact of Family Setting and Local Opportunities on Leaving Home and Migration Destinations of Rural Youths, The Netherlands 1860-1940
Published 2015-11-01“…To do this, we propose a multi-level competing risk analysis of migration destinations. …”
Get full text
Article -
3453
A Study on the Dynamic Behaviour of Lightweight Gears
Published 2017-01-01“…Nonlinear contact effects and influence of material discontinuities due to lightweighting are taken into account by FE simulations with high level of detail. …”
Get full text
Article -
3454
Image recognition technology for bituminous concrete reservoir panel cracks based on deep learning.
Published 2025-01-01“…This study introduces a novel deep learning-based anomaly model for effective crack detection. A large dataset of panel images was collected and processed using denoising, standardization, and data augmentation techniques, with crack areas labeled via LabelImg software. …”
Get full text
Article -
3455
DEVELOPMENT OF THE TECHNIQUE OF FORMATION OF THE CONTOUR OF LIMITING ALLOWABLE INDICATORS
Published 2016-07-01“…Genesis of techniques of carrying out creation of a contour of limiting allowable indicators in coordination with the theoretical concepts chosen by authors which promoted emergence of the special tools allowing without difficult analytical calculations objectively to diagnose level of the established interrelations which are formed taking into account and interdependence of indicators is considered, to reveal tendencies of their change and to operate effectively this process. …”
Get full text
Article -
3456
NATO and Energy Security: 25 Years in the Making
Published 2024-12-01“…The analysis follows the chronological and descriptive examination of NATO’s high-level decision-making processes, declarations, institutional structures, and critical activities related to energy security. …”
Get full text
Article -
3457
Deep Neural Network Model Forecasting for Financial and Economic Market
Published 2022-01-01“…In view of the Internet financial market dynamic (volume and daily trading), it is proposed based on a deep neural network for fusion level time series prediction model. First, the proposed model processes the input of characteristic variables of multiple series (market macrodynamic series and multiseed series) and uses an attention mechanism to fuse the input variables in two dimensions of time and sequence feature. …”
Get full text
Article -
3458
Analysis of the Noise Characteristic of Automotive Engine Timing Chain System
Published 2016-01-01“…The research shows that it can effectively reduce the overall noise level of the timing drive system by changing tensioner hydraulic and lubricating oil temperature,which is of great reference value to the research and development of timing drive system.…”
Get full text
Article -
3459
Rule-defect oriented browser XSS filter test method
Published 2018-11-01“…In order to alleviate XSS (cross-site scripting) attacks,modern browsers use XSS filters for defense.It is difficult to effectively test and evaluate the security of browser XSS filters.The rule-defect is the defect and security problem in the implementation process of browser XSS filter.The formal definition,design test sample and scene generation algorithm were presented for browser XSS filter rule-defects.In order to quantitatively test and evaluate the filtering level of different browser XSS filters,combined with filtering success rate,false positive rate,input loss calculation filtering ability.Based on the proposed method,the prototype system is designed to automate the testing of several mainstream browser XSS filters,and the XSS filtering capabilities of different browsers are obtained.Further,after actual testing,the system also has the ability to discover undisclosed vulnerabilities.…”
Get full text
Article -
3460
Heavy Metals Pollution and Pb Isotopic Signatures in Surface Sediments Collected from Bohai Bay, North China
Published 2014-01-01“…The Geoaccumulation Index was used to assess the level of heavy metal pollution. Pb isotopic compositions in sediments were also measured to effectively identify the potential Pb sources. …”
Get full text
Article