-
61
Examining the degree to which paranormal belief and conspiracy endorsement influence meaning in life: sequential mediating effects of creativity and self-esteem
Published 2025-05-01“…Overall, higher scorers in PB, CT, and schizotypy were less driven to search and more likely to possess presence as a function of possessing confidence in their ability to find solutions to problems and self-esteem.…”
Get full text
Article -
62
Life After Invasive Meningococcal Disease: Insights from Survivors and Their Caregivers
Published 2024-10-01“…Survivors described extensive physical, neurological, and systemic sequelae, including difficulty walking (11/11), repeat secondary infections (9/11), and numbness (6/11), among others, which were echoed by caregivers. Survivors shared that IMD had negatively impacted their long-term quality of life, citing long-term impacts including emotional impacts (11/11), social impacts (10/11), memory (7/11) and attention (5/11) problems, and difficulty with functional (10/11), self-care (7/11), and physical (6/11) activities. …”
Get full text
Article -
63
African New Towns
Published 2020-08-01“…This is done by addressing four main research questions: (1) What are the spatial problems of African New Towns caused by the application of common planning approaches? …”
Get full text
Article -
64
La gauche uruguayenne et la nécessaire imagination radicale
Published 2014-10-01“…This seems to be the problem that the Uruguayan left wing shares with other leftist governments in the region, which makes it necessary to restore the ability to represent and imagine substantive changes in society, in absence of which the left will continue losing its historical commitments and will just be assimilated to a prosperous centre-left government. …”
Get full text
Article -
65
Research on Vehicle Target Detection Method Based on Improved YOLOv8
Published 2025-05-01“…This method improves the feature extraction aggregation network by introducing an Adaptive Downsampling module, which can dynamically adjust the downsampling method, thereby increasing the model’s attention to key features, especially for small objects and occluded objects, while maintaining a lightweight structure, effectively reducing the model complexity while improving detection accuracy. A Lightweight Shared Convolution Detection Head was designed. By designing a shared convolution layer through group normalization, the detection head of the original model was improved, which can reduce redundant calculations and parameters and enhance the ability of global information fusion between feature maps, thereby achieving the purpose of improving computational efficiency. …”
Get full text
Article -
66
Developing a use-inspired school and community-based 6th through 12th-grade research and invention ecosystem leading to STEM careers: an ethnographic study of the Science Coach Pro...
Published 2025-04-01“…This study responds to the need for educational offerings for middle and high school students that develop students’ awareness of STEM degrees and careers and foster positive attitudes, confidence, and students’ ability to see themselves in STEM fields. Theories and methodologies from interactional ethnography guide our examination of ways Science Coach (SC) addresses these needs by educating and supporting 6th–12th-grade science teachers and their students as students identify and solve real problems through authentic research and invention. …”
Get full text
Article -
67
Losing control, learning to fail: leveraging techniques from improvisational theatre for trust and collaboration in transdisciplinary research and education
Published 2025-03-01“…This approach aims to tackle the inherent challenges of ITD research and thus enhance ITD research groups’ ability to address complex societal ‘Grand Challenges’. …”
Get full text
Article -
68
Correlation learning based multi-task model and its application
Published 2023-07-01“…Meanwhile, the proposed multi-task learning model is applied as a new agent model to the Bayesian optimization algorithm to solve expensive optimization problems. A CLL is added behind the traditional multi-task learning network, so that the tasks that have completed the preliminary shared learning can be optimized and carry out the advanced sharing in this layer, so that the knowledge learned from multiple tasks can fully interact with each other. …”
Get full text
Article -
69
Multiradar Collaborative Task Scheduling Algorithm Based on Graph Neural Networks with Model Knowledge Embedding
Published 2025-04-01“…This approach utilizes the spectral features of the random Laplacian matrix from the task’s heterogeneous graph as global features, enhancing the GNN’s ability to extract shared problem features while downplaying individual characteristics. …”
Get full text
Article -
70
Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
Published 2019-05-01“…Attribute-based encryption (ABE) scheme is widely used in the cloud storage due to its fine-grained access control.Each attribute in ABE may be shared by multiple users at the same time.Therefore,how to achieve attribute-level user revocation is currently facing an important challenge.Through research,it has been found that some attribute-level user revocation schemes currently can’t resist the collusion attack between the revoked user and the existing user.To solve this problem,an attribute-based encryption scheme that supported the immediate attribute revocation was proposed.The scheme could achieve attribute-level user revocation and could effectively resist collusion attacks between the revoked users and the existing users.At the same time,this scheme outsourced complex decryption calculations to cloud service providers with powerful computing ability,which reduced the computational burden of the data user.The scheme was proved secure based on computational Diffie-Hellman assumption in the standard model.Finally,the functionality and efficiency of the proposed scheme were analyzed and verified.The experimental results show that the proposed scheme can safely implement attribute-level user revocation and has the ability to quickly decrypt,which greatly improves the system efficiency.…”
Get full text
Article -
71
Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
Published 2019-05-01“…Attribute-based encryption (ABE) scheme is widely used in the cloud storage due to its fine-grained access control.Each attribute in ABE may be shared by multiple users at the same time.Therefore,how to achieve attribute-level user revocation is currently facing an important challenge.Through research,it has been found that some attribute-level user revocation schemes currently can’t resist the collusion attack between the revoked user and the existing user.To solve this problem,an attribute-based encryption scheme that supported the immediate attribute revocation was proposed.The scheme could achieve attribute-level user revocation and could effectively resist collusion attacks between the revoked users and the existing users.At the same time,this scheme outsourced complex decryption calculations to cloud service providers with powerful computing ability,which reduced the computational burden of the data user.The scheme was proved secure based on computational Diffie-Hellman assumption in the standard model.Finally,the functionality and efficiency of the proposed scheme were analyzed and verified.The experimental results show that the proposed scheme can safely implement attribute-level user revocation and has the ability to quickly decrypt,which greatly improves the system efficiency.…”
Get full text
Article -
72
SmoothDectector: A Smoothed Dirichlet Multimodal Approach for Combating Fake News on Social Media
Published 2025-01-01“…These platforms often lack rigorous editorial scrutiny, exacerbating this problem. Although recent studies have explored multimodal fake news detection to learn shared representations of textual and visual information, they often learn discrete latent representations, merely concatenations of multimodal features. …”
Get full text
Article -
73
Comparison of zero-shot approach and retrieval-augmented generation for analyzing the tone of comments in the Ukrainian language
Published 2024-12-01“…Therefore, the development of tools for analyzing the tonality of texts can provide the ability to accurately recognize people's emotions, identify problems, and determine ways to solve them. …”
Get full text
Article -
74
Unified Visual-Aware Representations for Data Analytics
Published 2025-01-01“…The desired property of the visualizations is the ability to visually encode the semantic features of the original data. …”
Get full text
Article -
75
Automatic construction of global cloud sample database based on Landsat imagery
Published 2025-06-01“…Moreover, the UAC-CSD sample database was freely shared and could support the training and verification of various machine learning models. …”
Get full text
Article -
76
Collision Tolerance: Improving Channel Utilization with Correlatable Symbol Sequences in Wireless Networks
Published 2015-05-01“…According to our investigation, however, collision avoidance causes time delay, which also hurts channel utilization, especially in the dense networks or intensive traffic. Discovering the ability to tolerate collisions with the correlatable preamble at the physical layer implementations of wireless networks, we propose CWM in this paper, a MAC protocol that advocates simultaneous accesses from multiple senders to a shared channel, allowing collisions instead of avoiding them. …”
Get full text
Article -
77
Traceable attribute-based encryption scheme with key-delegation abuse resistance
Published 2020-04-01“…Aiming at the problem that the traceability of a traceable attribute-based encryption (ABE) scheme was not sufficient to address the key abuse completely,a traceable ABE scheme against key-delegation abuse was proposed.A secret parameter was be shared to all user private key components corresponding to attributes,and the decryption was completed by using all these components together,such that only parts of them could not realize the decryption and the real key-delegation abuse resistance ability was be obtained consequently.A short signature technique was employed to prevent the tracing parameter embedded in a user private key from being forged,so as to achieve the traceability of the user who leaked his user private key.Supporting both key-delegation abuse resistance and user tracing enhances the security of the proposed scheme.And compared with related schemes,the proposed scheme has better advantage in terms of the parameters size and the computation cost.…”
Get full text
Article -
78
Traceable attribute-based encryption scheme with key-delegation abuse resistance
Published 2020-04-01“…Aiming at the problem that the traceability of a traceable attribute-based encryption (ABE) scheme was not sufficient to address the key abuse completely,a traceable ABE scheme against key-delegation abuse was proposed.A secret parameter was be shared to all user private key components corresponding to attributes,and the decryption was completed by using all these components together,such that only parts of them could not realize the decryption and the real key-delegation abuse resistance ability was be obtained consequently.A short signature technique was employed to prevent the tracing parameter embedded in a user private key from being forged,so as to achieve the traceability of the user who leaked his user private key.Supporting both key-delegation abuse resistance and user tracing enhances the security of the proposed scheme.And compared with related schemes,the proposed scheme has better advantage in terms of the parameters size and the computation cost.…”
Get full text
Article -
79
THE DEVELOPMENT OF TRITICALE PRODUCTION IN TURKEY: THE CASE OF CORUM PROVINCE
Published 2021-01-01“…In this study, socio-economic structure and producing problems of triticale cultivation farms in Corum province were analysed. …”
Get full text
Article -
80
Competence and competency of high school teacher as the components of his innovative development
Published 2013-10-01“…Moreover important are ability to creativity, solving of problem’s tasks, ingenuity, flexibility and criticality mind, intuition, originality and self-confidence; ability to formulate and solve non-standard tasks; ability to analyse, synthesis and combination, to share experiences, predictions, etc.. …”
Get full text
Article