Suggested Topics within your search.
Suggested Topics within your search.
- History 14
- English language 8
- Biochemistry 7
- Report writing 7
- methods 7
- Methodology 6
- Research 6
- Rhetoric 6
- Study and teaching 6
- Civilization 5
- Law 5
- Politics and government 5
- Psychology 5
- Anesthesia 4
- Authorship 4
- Child 4
- Education 4
- Emergencies 4
- Management 4
- Nursing 4
- Nursing Care 4
- Psychological tests 4
- Social conditions 4
- Standards 4
- Surgery 4
- Administrative law 3
- Anatomy 3
- Automobiles 3
- Business enterprises 3
- Colonial influence 3
-
981
PEMBELAJARAN SASTRA PADA KELAS V SD DI KOTA LANGSA
Published 2019-08-01“…Sumber data penelitian ini adalah guru yang melaksanakan pembelajaran bahasa Indonesia pada kelas V SD di Kota Langsa, yaitu SD Negeri 5 Langsa, SD Negeri 11 Langsa ,dan SD Negeri 1 Langsa. …”
Get full text
Article -
982
Proctoring v distančním vzdělávání: od provizorních k trvalým řešením
Published 2025-01-01“… Tato studie se zaměřuje na výzkum využití proctoringu v online vzdělávání a na výzkum jeho vlivu na udržení akademické integrity. …”
Get full text
Article -
983
First-trimester 3D fetal neurosonography: five standardised views
Published 2024-12-01Subjects: Get full text
Article -
984
Evolution strategy of 5G network based on cloud-native computing
Published 2018-06-01Subjects: “…5G…”
Get full text
Article -
985
Insight into the Advances in Clinical Trials of SARS-CoV-2 Vaccines
Published 2022-01-01“…Severe acute respiratory syndrome coronavirus-2 (SARS-CoV-2) has thrown a challenge to the scientific community. …”
Get full text
Article -
986
Characterization of Residential Woodsmoke PM2.5 in the Adirondacks of New York
Published 2020-06-01“…Abstract Although woodsmoke from residential wood heating can be the dominant source of winter PM2.5 in rural areas, routine monitoring is done primarily in urban or suburban areas. …”
Get full text
Article -
987
Introduction to Schenkerian Analysis - TU Berlin, 3.–5. Juni 2005
Published 2005-04-01Get full text
Article -
988
Low latency handover scheme for 5G dual-connectivity scenario
Published 2019-04-01“…A novel handover scheme was proposed for the secondary node (SN) unchanged 5G dual-connectivity scenarios.In the proposed novel scheme,the SN connection was maintained for data packet transmission during the handover,however,both the main node (MN) and the SN were completely disconnected in the legacy scheme.The transmission delay during handover was decreased greatly by the proposed scheme.Firstly,the legacy handover scheme was analyzed and its deficiency was figured out.Then,the novel mechanism’s signaling interaction was elaborated and the time sequence models for the novel scheme and the legacy scheme were further established.Finally,based on the time sequence model,the performance evaluation processes were carried out in terms of mathematical modeling and experimental simulations.The analysis results demonstrate that the proposed novel scheme reduces the single packet transmission delay,the average transmission delay and the total transmission delay,and has good performance advantages.…”
Get full text
Article -
989
Surgical Treatment for Profunda Femoris Artery Aneurysms: Five Case Reports
Published 2015-01-01Get full text
Article -
990
State recovery attack on ACORN v3 in nonce-reuse setting
Published 2020-08-01“…Based on differential-algebraic method and guess-and-determine technique,the state recovery attack of ACORN v3 was presented when one pair of key and Nonce was used to encrypt two messages.The time complexity of the attack was 2<sup>122.5</sup>c,where c was the time complexity of solving linear equations.The data complexity and the storage complexity were negligible.Furthermore,according to the analysis on the sense of multiple nonce reuse,it is found that relatively complicated filter function of ACORN v3 makes it infeasible to extract the linear equations about the internal state directly from key streams.Thus,the risk of significantly reducing the attack complexity by increasing the times of nonce reuse can be effectively avoided.…”
Get full text
Article -
991
An Improved C-V Model and Application to the Coal Rock Mesocrack Images
Published 2020-01-01“…In order to accurately and comprehensively obtain information about coal rock mesocrack images, image processing technique based on partial differential equation (PDE) is introduced in order to expound on the active contour model without edges and overcome the deficiency of the C-V model. The improved C-V model is adopted in order to process mesoimages of coal rocks containing single and multiple cracks and obtain high-quality binary images of coal rock mesocracks and the effective characteristic parameters of coal rock mesostructures through quantitative processing, which will lay solid foundations for the follow-up research into coal rock seepage computation and damage calculation. …”
Get full text
Article -
992
The Emerging Role of Rab5 in Membrane Receptor Trafficking and Signaling Pathways
Published 2020-01-01“…Early endosome marker Rab5 GTPase, a key member of the Rab family, plays a crucial role in endocytosis and membrane transport. …”
Get full text
Article -
993
Development and application of a lightweight five-axis parallel machining robot
Published 2021-09-01Subjects: “…five-axis parallel machining robot…”
Get full text
Article -
994
-
995
Risks of 5-100 Project: Perceptions of Academic Staff of Different Ages
Published 2022-03-01Subjects: “…project 5-100…”
Get full text
Article -
996
Jeremiah 29:5-7 reread through the lens of posttraumatic growth
Published 2023-12-01“… Please note: A Corrigenda for this article has been published in Acta Theologica 44(1): https://doi.org/10.38140/at.v44i1.8192 Jeremiah 29:5-7 is well known for exhorting the exiles to settle down and pray for the welfare of Babylon. …”
Get full text
Article -
997
Investigation of rs1746661 Polymorphism in FNDC5 Gene in Obese Patients
Published 2024-12-01Subjects: “…fndc5…”
Get full text
Article -
998
Authentication method in SWIM based on improved Diameter/EAP-MD5
Published 2014-08-01“…Based on the analysis of SWIM architecture and the sub-protocol EAP-MD5 of Diameter, the security vulnerable of authenticating process in standard Diameter/EAP-MD5 is explored, the EAP-MD5 authentication protocol is improved, and the SWIM authentication service based on Diameter is studied, then the SWIM authentication method based on improved Diameter/EAP-MD5 protocol is proposed. …”
Get full text
Article -
999
5G millimeter wave cell search algorithm with beam sweeping
Published 2020-06-01Subjects: “…cell search in 5G mmWave…”
Get full text
Article -
1000
Chaotic Motion of the Underactuation Planar Five-bar Mechanism with Variable Parameter
Published 2015-01-01Subjects: “…Underactuation planar five-bar mechanism…”
Get full text
Article