Suggested Topics within your search.
Suggested Topics within your search.
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 2
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 2
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 2
- Language and languages 2
- Sociolinguistics 2
- ART / Digital 1
- Computer animation 1
- Digital cinematography 1
- Electric circuit analysis 1
- Electric network analysis 1
-
1941
Tremor and its duration‐amplitude distribution at Popocatépetl volcano, Mexico
Published 2016-09-01“…Abstract The duration‐amplitude distribution was calculated for the tremor observed at Popocatépetl volcano during episodes of activity in 2000 and 2012–2014. An exponential function was used to obtain a good fit for the duration‐amplitude distribution, and the source of volcanic tremor is probably generated by the transportation of magmatic fluids and its coupling with the host rock within the volcanic conduit. …”
Get full text
Article -
1942
Design of smart agriculture based on big data and Internet of things
Published 2020-05-01“…The algorithm in this article can realize the functions of real-time data communication and information processing more efficiently, and has a significant role in promoting agricultural informatization and improving the level of agricultural modernization.…”
Get full text
Article -
1943
Multipotent Mesenchymal Stem Cell Treatment for Discogenic Low Back Pain and Disc Degeneration
Published 2016-01-01“…Low back pain with resultant loss of function, decreased productivity, and high economic costs is burdensome for both the individual and the society. …”
Get full text
Article -
1944
DCW-YOLO: Road Object Detection Algorithms for Autonomous Driving
Published 2025-01-01“…Finally, the deleterious gradients generated by low-quality examples are reduced using the Wise-IoU v3 bounding box loss function in conjunction with a dynamic non-monotonic focusing mechanism utilizing an anchor box gradient gain assignment strategy. …”
Get full text
Article -
1945
Integer programming‐based non‐uniform window decoding schedules for spatially coupled low‐density parity‐check codes
Published 2022-10-01“…Our design is more flexible than the previous design, because the integer programming‐based design allows reduction of update numbers and performance losses through the constraints function, whereas the previous design requires observation of variable node update behaviour. …”
Get full text
Article -
1946
Design of the optimal groundwater quality monitoring network using a genetic algorithm based optimization approach
Published 2020-06-01“…In this paper, two conflicting objective functions are simultaneously solved. The first objective function is the maximization of the match between the interpolated EC distributions obtained from data of the all available monitoring wells and the wells from the newly generated network. …”
Get full text
Article -
1947
The relationship between protein-energy wasting and cognitive impairment in patients receiving maintenance hemodialysis
Published 2025-07-01“…Those combined with PEW were more likely to develop CI, and to suffer from more severe CI. …”
Get full text
Article -
1948
Rapid mutation of endogenous zebrafish genes using zinc finger nucleases made by Oligomerized Pool ENgineering (OPEN).
Published 2009-01-01“…<h4>Methodology/principal findings</h4>Here we show that OPEN can also be used to generate ZFNs that function efficiently in zebrafish. …”
Get full text
Article -
1949
Hardcoded vulnerability detection approach for IoT device firmware
Published 2022-10-01“…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
Get full text
Article -
1950
PERHITUNGAN NUMERIK RAPAT KEADAAN GRAPHENE BILAYER DENGAN MODEL TIGHT-BINDING MENGGUNAKAN METODE RAMBATAN WAKTU TROTTER-SUZUKI
Published 2023-08-01“…The number of atoms (sites) reviewed affects the regularity of the DOS calculation results. The more atoms that are reviewed, the more orderly the DOS calculations will be generated. …”
Get full text
Article -
1951
Halogencarbene-free Ciamician-Dennstedt single-atom skeletal editing
Published 2024-11-01“…Herein, we report a general methodology for the Ciamician-Dennstedt reaction using α-halogen-free carbenes generated in situ from N-triftosylhydrazones. …”
Get full text
Article -
1952
-
1953
Exploring public sector workforce attitudes toward AI competence and its impact on AI competence self-assessment
Published 2025-01-01“…Additionally, more than half of the respondents expressed limited trust in AI-generated information, with only seven participants fully trusting AI. …”
Get full text
Article -
1954
Do TFEU provisions on free movement of goods apply to private parties: Expanded vertical or horizontal direct effect?
Published 2018-01-01“…Finally, based on the case law analysis, the conclusion is offered that in terms of the recent developments in the field of free movement of goods the CJEU has opted for further expansion of the concept of vertical direct effect in order to both avoid establishing the horizontal direct effect of the freedom of movement of goods and safeguard the functioning of internal market against certain impediments generated by private parties.…”
Get full text
Article -
1955
Advances in the study of the role of high-frequency mutant subunits of the SWI/SNF complex in tumors
Published 2024-12-01“…As a catalytic subunit of the SWI/SNF complex, SMARCA4 has ATPase activity that catalyzes the hydrolysis of ATP to produce energy and power the chromatin remodeling complex, which is critical to the function of the SWI/SNF complex. The study data indicate that approximately 25% of cancers have one or more SWI/SNF subunit genetic abnormalities, and at least nine different SWI/SNF subunits have been identified as having repeated mutations multiple times in various cancers, suggesting that mutations affecting SWI/SNF subunits may introduce vulnerabilities to these cancers. …”
Get full text
Article -
1956
Public security patrol path planning recommendation method based on wolf-pack optimization algorithm using DAF and BRS
Published 2025-06-01“…Firstly, an optimization objective function regarding the public security patrol path planning (S3P-Function) was abstracted from the actual situation; Moreover, this paper proposed an improved wolf-pack optimization algorithm named DAF-BRS-CWOA using Dynamic-Adjustment-Factor(DAF) and Balanced-Raid-Strategy (BRS), and DAF devoted to adjust the overall wolf-pack running strategy by dynamically adjusting the number of airdropped wolves during the stage of Summon-Raid while BRS with symmetric property was to improve both the algorithm’s global exploration as well as the local development capabilities by increasing the number of checking locations, that means not only checking the reverse position of the current wolf, but also the positions generated according to certain rules between the reverse position of the current wolf and the current optimal wolf during the stage of Summon-Raid; Finally, DAF-BRS-CWOA was adopted to optimize S3P-Function, forming a public security patrol path planning recommendation method based on DAF-BRS-CWOA (S3PRM-DAF-BRS-CWOA). 30 independent numerical experiments were conducted on 20 public classical datasets by DAF-BRS-CWOA compared with GA, PSO, WDX-WPOA. …”
Get full text
Article -
1957
Large Language Model-Guided SARSA Algorithm for Dynamic Task Scheduling in Cloud Computing
Published 2025-03-01“…Nowadays, more enterprises are rapidly transitioning to cloud computing as it has become an ideal platform to perform the development and deployment of software systems. …”
Get full text
Article -
1958
Constructing a web recommender system using web usage mining and user’s profiles
Published 2014-12-01“…Date is of importance since it is more possible for users to request new pages more than old ones and old pages are less probable to be viewed, as users mostly look for new information. …”
Get full text
Article -
1959
The “What” of Athletes’ Goal Pursuit and Its Relationships to Goal-Related Processes and Well- and Ill-Being
Published 2025-05-01“…The results showed that intrinsic goals, assessed in an open-ended format, were more heterogeneous in terms of content, and more common among athletes than extrinsic goals. …”
Get full text
Article -
1960
Deformation anisotropy and lamellar α re-orientation of TC17 alloy under the different slip modes of HCP structure
Published 2024-11-01“…Therein, the variation of the rotation factor with tilt angle conforms to the quadratic function, reaching a maximum value around 45°. When the rotation factor is small, the ratio of (01–11) [1–210] slip system with small Burgers vector at the phase boundary is large, the rotation tendency is poor, and the intragranular dislocation slip replaces the grain rotation as the strain accommodation mechanism, the lamella is more prone to globularization. …”
Get full text
Article