-
3881
Comparative Evaluation of Occlusion with and Without Finishing and Detailing Post Orthodontic Treatment Using T-Scan: A Prospective Follow-Up Study
Published 2024-07-01“…Introduction: The phases of orthodontic treatment include Initial Leveling and aligning, space closure, finishing detailing, settling, and retention. …”
Get full text
Article -
3882
Java deserialization vulnerability defense technologybased on run-time detection
Published 2024-04-01“…For each type, the entry function within the exploitation process was identified and summarized. Utilizing Java's runtime protection technology, the solution monitored sensitive behaviors, such as command execution at the Java level, and captured the current runtime context information of the system. …”
Get full text
Article -
3883
SURGICAL TACTICS FOR THE INFLOW VARICOTHROMOPHLEBITIS
Published 2022-12-01“…Following an active surgical tactics for the inflow varicothrombophlebitis have permitted to prevent effectively the spread of thrombtotic process on the large subcutaneous vein trunk and insufficient perforant veins, as well as to prevent the development of thrombosis in deep veins and venous thromboembolism morbidity. …”
Get full text
Article -
3884
Design of Satellite Attitude Control Algorithm Based on the SDRE Method Using Gas Jets and Reaction Wheels
Published 2013-01-01“…The SDRE controller design takes into account the effects of the plant nonlinearities and system noise which represents uncertainty. …”
Get full text
Article -
3885
Key-customizable encrypted deduplication with access control for cloud storage
Published 2024-08-01“…Experimental and analytical results indicate that it effectively meets the practical needs of cloud service providers and users, and also achieves acceptable efficiency.…”
Get full text
Article -
3886
Mechanisms of Public Administration to Ensure Investment and Innovation Security of Territories
Published 2024-06-01“…For the rapid and successful regeneration of the Ukrainian economy against the background of crisis political and social phenomena and conditions of uncertainty, as well as its effective transformation in the European integration aspect, it is necessary to intensify security processes in the investment sphere. …”
Get full text
Article -
3887
Use of Extra-judicial Technical Surveillance in Criminal Decision-making: European Limitations and National Challenges
Published 2024-12-01“…Beyond the essential issue of the admissibility of the use of information obtained by officers (bodies) specializing in national security activities as evidence in criminal proceedings, the analysis aims to identify controversies and offer solutions on other issues of interest: the ability of non-judicial bodies to become involved in the conduct of criminal investigations, the effectiveness of the mechanisms for controlling these intrusive methods, the conformity with the European law of national regulations allowing such participation, the way in which information gathered by extrajudicial bodies can influence the criminal decision-making process. …”
Get full text
Article -
3888
The major integration features of banking system
Published 2025-01-01“…Studies show that the influence of foreign banks is ambiguous and depends on the level of economic development of the country. When assessing the effects of globalization, it is important to consider the differences between developed and developing countries. …”
Get full text
Article -
3889
Utilization of Jhama brick dust as a sustainable alternative for fine aggregate in concrete
Published 2024-12-01“…The tensile strength also improved by 5% at the same replacement level. However, higher replacements of 30% and 40% showed a decline in both strength and workability. …”
Get full text
Article -
3890
Soft Skills: Rankings in the Assessment of Entrepreneurs and the Participation of HEIs in Their Formation
Published 2024-04-01“…They show the undeniable importance for entrepreneurs of developing soft skills and, in most cases, their underdevelopment at the proper level. The paper presents the results of a survey demonstrating the proportion of entrepreneurs who have developed a particular skill in the process of self-education (19-38%), as well as the proportion of entrepreneurs who received an education at a university (0-22%) or in additional education programs in other organizations ( 1-13%). …”
Get full text
Article -
3891
A Science of Diplomacy
Published 2014-10-01“…Its members conducted research in the theory and practice of negotiation process. MGlMO produced the first Russian textbook "Theory and Methodology of analysis of international negotiations" by A.V. …”
Get full text
Article -
3892
How to Alleviate Rent-Seeking Behaviour in Performance Appraisal of Government-Paid PPP Projects? Tripartite Evolutionary Game Approach
Published 2021-01-01“…However, driven by economic rent, the private investor has the incentive to seek rent from the third party in the performance appraisal process, leading to the low overall performance level of PPP projects and the inability to achieve the PPP performance appraisal goal effectively. …”
Get full text
Article -
3893
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01“…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
Get full text
Article -
3894
Construction of a 5G Wireless Semantic Web-Assisted English Digital Learning Resource Query System
Published 2021-01-01“…Through the questionnaire survey and data analysis of the users of this system, it is found that the system is well used and effectively enhances students’ interest in learning English and improves learning efficiency. …”
Get full text
Article -
3895
LEGAL ACTIVITY AS A TYPE OF LEGAL WORK
Published 2022-06-01“…As a result of the analysis of the work of lawyers and scientists, it was concluded that legal work is an organizational process that ensures the correct and effective implementation of current legislation at every stage of both economic activity and state administration. …”
Get full text
Article -
3896
Making Things Right: Nurses' Experiences with Workplace Bullying—A Grounded Theory
Published 2012-01-01Get full text
Article -
3897
Consequences of changing regional integration on environmental development, agricultural markets, and food security
Published 2023-10-01“…The adoption of urgent measures to improve food security, on the one hand, is a necessary condition for the development of the Republic of Kazakhstan, but on the other hand, it can lead to a decrease in the level of environmental security in the country if the possible consequences in the reintegration process are not considered. …”
Get full text
Article -
3898
The Bioethics-CSR Divide
Published 2024-03-01“…The transformation would unravel the effort to take effective action against scandal and turn bioethical discourse into governance practices,[11] such as bioethics and research ethics committees. …”
Get full text
Article -
3899
Compound lactic acid bacteria enhance the aerobic stability of Sesbania cannabina and corn mixed silage
Published 2025-02-01“…Abstract Background The strategic delay of aerobic deterioration in Sesbania cannabina and corn (SC) mixed silage, coupled with effective fermentation, could increase the protein-rich silage utilization by ruminants. …”
Get full text
Article -
3900
Development of sustained-release extemporaneous moxifloxacin loaded commercial soft hydrogel contact lenses
Published 2025-02-01“…Amongst them, three contact lenses (Acuvue, Biomedics, and Maxim) showed high drug loading of ∼2 mg and adequate controllable drug release for 24 h with Maxim possessing the highest release rate, and maintained the effective drug therapeutic level for at least 12 h. …”
Get full text
Article