Suggested Topics within your search.
Suggested Topics within your search.
- English language 17
- Law reports 13
- Report writing 12
- Rhetoric 11
- Grammar 8
- Law 8
- Politics and government 7
- Psychology 7
- College readers 6
- Constitutional law 6
- History 6
- Management 6
- Social conditions 6
- methods 6
- Accounting 5
- Anesthesia 5
- Criminal law 5
- Nursing 5
- Philosophy 5
- Physiology 5
- Problems, exercises, etc 5
- Research 5
- Study and teaching 5
- Civilization 4
- English 4
- Evaluation 4
- Finance 4
- Geography 4
- Health 4
- Human physiology 4
-
261881
Mismatch Based Diagnosis of PV Fields Relying on Monitored String Currents
Published 2017-01-01“…The reliability of the approach was experimentally verified by analyzing the performance of two medium size solar fields that were monitored over a period of four years. Results allowed quantifying energy losses attributable to underperforming solar strings and precisely locating their position in the field.…”
Get full text
Article -
261882
Lightweight detection system of shared spam attacks
Published 2015-07-01“…Spam is one of the most serious attacks against online social networks (OSN).Recently a new type of spam attack occurs,which named shared spam attack.The shared spam attack can separate the storage and dissemination of spam content,making the existing detection systems no longer effective.To address this problem,an empirical analysis of the process and properties of this new spam attack is performed.A novel lightweight iterative detection algorithm (LIDA) is proposed to detect spam accounts in OSN with these properties.LIDA contains two steps:target filter and content detection.It also noteworthy that LIDA is a lightweight algorithm to infer more spam accounts by exploiting spam accounts’ sharing instead of scanning or analyzing all accounts.Experimental results in RenRen,which has successfully detected 9 568 spam accounts,30 732 spam albums and 2 626 780 spam URL in four round iterations,indicate that LIDA is effective and efficiency in detecting shared spam accounts.…”
Get full text
Article -
261883
Emergent limit cycles, chaos, and bistability in driven-dissipative atomic arrays
Published 2025-02-01“…We find that depending on the system parameters, the underlying mean-field model allows four different types of dynamics at late times: a single monostable steady state solution, bistability (where two stable steady state solutions exist), limit cycles and chaotic dynamics. …”
Get full text
Article -
261884
Guide méthodologique pour l'analyse spatiale du covid-19 dans les zones urbaines non métropolitaines du Brésil
Published 2024-12-01“…Surface implementation with maps using the Kernel Estimator; IV - spatial statistics maps and, finally, combination and synthesis maps, seeking to aggregate various pieces of information into a synthetic cartographic product. …”
Get full text
Article -
261885
Didactical design to overcome learning obstacles in cuboid volume
Published 2024-06-01“…The results of this study show that through three stages of analysis, an empirical didactic design was obtained that contains four didactic situations: action situations, formulation situations, validation situations, and institutionalisation situations. …”
Get full text
Article -
261886
Characterization of Air-Based Photovoltaic Thermal Panels with Bifacial Solar Cells
Published 2013-01-01“…This paper examines the performance of air-based bifacial PVT panels with regard to the first and second laws of thermodynamics. Four air-based bifacial PVT panels were designed. …”
Get full text
Article -
261887
A Unique Case of Mycophenolate Induced Colitis after 10 Years of Use
Published 2016-01-01“…A 31-year-old female with a history of lupus nephritis on Hydroxychloroquine, Prednisone, and Mycophenolate Mofetil (MMF) for 10 years presented to the hospital for ankle swelling. On day four, she started to have severe, nonbloody, watery diarrhea with abdominal distension and tenderness. …”
Get full text
Article -
261888
Approaching fuzzy sliding mode strategy for automotive suspension based on the view of enhancing ride comfort and vehicle stability
Published 2025-02-01“…Simulations are performed in the MATLAB-Simulink interface, with four cases corresponding to different road types. …”
Get full text
Article -
261889
Extranodal natural killer/T cell lymphoma nasal type simulating osteoradionecrosis with metachronic B lymphoma in the pelvis: Case report
Published 2022-11-01“…This neoplasm mainly affects the paranasal sinuses, nasopharynx, oropharynx, oral cavity, palate, and rarely intestinal, gastric and skin regions. 50-year-old female with a history of lymphoma in nasal and pelvic region. At four years of tumors-free, has facial asymmetry, accompanied by sub-palpebral, nasal and lip edema. …”
Get full text
Article -
261890
THE INFERENCE METHOD OF WHEEL LOAD BASED ON THE ACCELERATION OF AXLE HEAD
Published 2016-01-01“…The wheel vertical load and axle head vertical acceleration calibrated was conducted by four pillars road simulation test bed,and the skid pad load spectrum was acquisitioned. …”
Get full text
Article -
261891
基于层次分析—模糊评价的云计算安全评估与对策
Published 2016-10-01“…With the rapid development of information technology,cloud computing has become a hot topic.More and more companies and individuals will be their computing needs and storage needs to be delivered to the cloud,so the security problem of cloud computing can not be ignored.First,the security requirements of the four key technologies,such as multi tenant,node communication,remote storage and virtualization in the cloud computing environment were analyzed,the necessity of the construction of cloud computing security was expounded.Then,according to the security requirements of cloud computing,fuzzy comprehensive evaluation model based on ana-lytic hierarchy process was established,and taking a cloud service platform as an example to evaluate its security,get the security level of the service platform is "good".Finally,according to the security requirements of cloud computing environment and the results of model evaluation,some suggestions in in virtualization security,applica-tion security and data security was put forward,in order to strengthen the cloud computing security,some direction was provided.…”
Get full text
Article -
261892
Values of the Land: Kinships as Climate Solutions in ‘The Honorable Harvest’ and ‘Land as Pedagogy.’
Published 2025-01-01“…I centre my analysis of these essays around four values: care, consent, respect, and reciprocity. …”
Get full text
Article -
261893
The Relationships between Parental Involvement, Students’ Basic Psychological Needs and Students’ Engagement in Science: A Path Analysis
Published 2018-06-01“…Parental involvement was addressed with four dimensions: parents’ educational aspiration, parental communication, parents’ participation, and parental autonomy support. …”
Get full text
Article -
261894
Application of the HeWuTong System in the Practice of the “River Chief System”
Published 2020-01-01“…HeWuTong application system is a modern information management platform built on the premise of fully integrating the needs of river management in the practice of “River Chief System” in Shenzhen.Through the system,the circulating water information resource base and multi-level linkage intelligent control platform shared by cities and districts are built with means of “system + responsibility + technology” and technologies of Internet of Things (IOT),GIS,big data,microservices,etc.;and a four-level “River Chief System”,regulatory system and technical system for the city,district,street and community are developed to realize the “full supervision,separated patrol and treatment,and intelligent management and control” of river channel in Shenzhen.HeWuTong system is the first intelligent management system for river patrol and management in China,which completely realizes the transformation from “River Chief System” to “river chief rule”,and plays innovative and demonstration role in the management of “River Chief System” in Guangdong Province and even the whole country.…”
Get full text
Article -
261895
A Critique on the Book The Secret of Khaghani’s Poetry
Published 2021-11-01“…This book consists of four volumes, two of which have been published so far. …”
Get full text
Article -
261896
Flavonoid-Deficient Mutants in Grass Pea (Lathyrus sativus L.): Genetic Control, Linkage Relationships, and Mapping with Aconitase and S-Nitrosoglutathione Reductase Isozyme Loci
Published 2012-01-01“…Linkage studies and primary trisomic analysis mapped Aco 1 and fld 1 loci on extra chromosome of trisomic-I and Aco 2, fld 2, and Gsnor 2 on extra chromosome of trisomic-IV in linked associations.…”
Get full text
Article -
261897
The Spectrum of Fundus Autofluorescence Findings in Birdshot Chorioretinopathy
Published 2009-01-01“…Eighteen eyes with HLA-A29 associated BSCR were included. Four eyes presented with active inflammation. Correspondence of the lesions noted in the colour fundus photograph was observed in 3 eyes which were more easily identified with the FAF. …”
Get full text
Article -
261898
Insemination Capability of Male Pteromalus Venustus (Hymenoptera: Pteromalidae), a Gregarious Parasitoid of Megachile Rotundata (Hymenoptera: Megachilidae)
Published 1993-01-01“…Most males did not reach the upper limits of their inseminative abilities: Three-quarters of the males inseminated at least four females, twice the ratio of females-to-males in an average brood (2:1). …”
Get full text
Article -
261899
The land left behind: a systematic review of transnational migration-induced change and its implication for rural sustainability in Nepal
Published 2025-01-01“…Employing a thematic analysis approach, the study constructs a schematic representation delineating four key themes: the use effect of remittance income on individuals, the offset effect on land, the substitution effect on people due to a reduced workforce, and the neglect effect on land stemming from decreased working members in households and communities. …”
Get full text
Article -
261900
Utility of σ and π-Acceptors for the Spectrophotometric Determination of Gemifloxacin Mesylate in Pharmaceutical Formulations
Published 2008-01-01“…In this study, four simple, fast, accurate and sensitive spectrophotometric methods have been developed for the determination of gemifloxacin mesylate in pharmaceutical formulations. …”
Get full text
Article