Suggested Topics within your search.
Suggested Topics within your search.
- History 61
- English language 32
- Management 23
- Research 23
- methods 22
- Politics and government 20
- Rhetoric 19
- Study and teaching 19
- Methodology 17
- Report writing 17
- Social aspects 17
- Moral and ethical aspects 15
- Social conditions 15
- Economic conditions 14
- Economic development 14
- Economic policy 14
- Law 14
- Philosophy 14
- Grammar 13
- History and criticism 12
- Anesthesia 11
- Mass media 11
- Constitutional court 10
- Biochemistry 9
- Court of Appeal 9
- Handbooks, manuals, etc 9
- Law reports, digests, etc 9
- Psychological aspects 9
- Education 8
- Medicine 8
-
308641
Two accelerated gradient-based iteration methods for solving the Sylvester matrix equation AX + XB = C
Published 2024-12-01Get full text
Article -
308642
La pala della Visitazione di Raffaello e la committenza Branconio. Documenti inediti
Published 2018-11-01“…This article is an excerpt from a more extensive research project carried out by the author as part of his undergraduate dissertation on the topic. …”
Get full text
Article -
308643
How Do I Legally Sell Meat from My Own Livestock and Poultry in the State of Florida?
Published 2014-12-01“…This 5-page fact sheet is a “one-stop-shop” for Florida residents who want to sell meat from their own livestock and poultry. …”
Get full text
Article -
308644
‘We are all Àmọ̀tẹ́kùn’: Insecurity, Ethno-regional Hegemony and Resistance in Southwest Nigeria
Published 2022-01-01“…This article offers an interpretation of Àmọ̀tẹ́kùn, a security outfit established by the governors of Southwest Nigeria to tackle rising cases of insecurity in the region. …”
Get full text
Article -
308645
Location privacy protection for mobile social network
Published 2015-12-01“…Given its high utility value,mobile social network services(MSNS),however,has raised serious concerns about users’ location privacy.The location privacy requirements of users in MSNS are personal and dynamic,thus a metric called confidence was proposed to quantify the privacy risks.To avoid the adversary inferring users’ privacy,a method of legation privacy protection was designed to calculate the correlation between the locations through lo-cation information,social relation and personal information.Then the correlation and the space-time background were used to evaluate whether the users’ published geo-content meet the user’s privacy requirement.Eventually,our experimental results demonstrate the validity and practicality of the proposed strategy.…”
Get full text
Article -
308646
On the Stability of L4,5 in the Relativistic R3BP with Oblate Secondary and Radiating Primary
Published 2015-01-01“…We consider a version of the relativistic restricted three-body problem (R3BP) which includes the effects of oblateness of the secondary and radiation of the primary. …”
Get full text
Article -
308647
-
308648
Upper and Lower Bounds for the Kirchhoff Index of the n-Dimensional Hypercube Network
Published 2020-01-01Get full text
Article -
308649
-
308650
Postmodern and Natural Myth: Points of Contact and Conflict Situations Постмодерн и природный миф: точки соприкосновения и конфликтные ситуации Постмодерн і природний міф: точки до...
Published 2012-06-01“…The article is devoted to the structures features of a modern myth and its natural capacity for national revival. …”
Get full text
Article -
308651
Performance analysis of antenna correlation on land mobile satellite based MIMO systems
Published 2014-10-01Get full text
Article -
308652
-
308653
Semi-Fredholm Solvability in the Framework of Singular Solutions for the (3+1)-D Protter-Morawetz Problem
Published 2014-01-01“…It is known that for smooth right-hand side functions the unique generalized solution may have a strong power-type singularity at only one point. …”
Get full text
Article -
308654
LOS GRUPOS DE INVESTIGACIÓN COMO ESPACIO PARA LA ENSEÑANZA Y APRENDIZAJE DEL DERECHO
Published 2010-01-01Get full text
Article -
308655
Optimal Design of Genetic-fuzzy Control Strategy for Plug-in Parallel Hybrid Electric Vehicle
Published 2016-01-01“…Taking the plug- in hybrid electric vehicle as the research object,in order to improve the fuel economy and emission performance,a fuzzy control strategy which can realize the reasonable distribution of demand torque between the engine and the drive motor is designed,and the method of genetic algorithm to optimize fuzzy control rules is introduced in detail. …”
Get full text
Article -
308656
Le nahualli-tlahuipuchtli dans le monde nahuatl
Published 2006-06-01“…One of the least known characters in Lopez Austin’s (1967) article « Forty magician classes in the nahuatl world », is the tlahuipuchtli, a name given actually to some kind of bloodsucking witches. …”
Get full text
Article -
308657
Research of Reachable Workspace of 2-RPR+RRP Spherical Hybrid Mechanism
Published 2017-01-01“…The correctness of the positive solution model is proved,a theoretical basis for the further analysis and optimization of the mechanism is provided.…”
Get full text
Article -
308658
Research on Smart Scaling Mechanism and Structure for Big Data Network Server Groups
Published 2015-03-01“…The principle and construction of the structure of smart telescopic on big data network server groups were elaborated.The key technologies involved in the smart scaling of big data network server groups were discussed.After investigating key technologies,including the monitoring of the workload of the server group,the smart control of the number of servers,and the scheduling of access loads,the principle and realization method for the smart scaling of big data network server groups were proposed and technical supports were provided for the smart scaling and effective energy conservation of big data network server groups.According to the proposed construction method and key technologies,a smart scaling model for big data network server groups was provided as well.…”
Get full text
Article -
308659
Public Diplomacy in ASEAN Youth Interfaith Camp (AYIC) to Develop Indonesia’s Image in ASEAN
Published 2023-11-01“…The study examines the ASEAN Youth Interfaith Camp (AYIC) as a public diplomacy tool aimed at enhancing Indonesia's image. …”
Get full text
Article -
308660
Deployment strategy for static chargers in WRSN
Published 2017-10-01“…The traditional deployment strategy of static chargers in wireless rechargeable sensor networks (WRSN) covers all the area.The basic idea is to cover all the positions of nodes.A mathematical model of distance between a charger and the farthest node was established,the relationship between the number of nodes and the mathematical expectation of minimum radius of charging was analyzed,and deployment strategy for static chargers was proposed.The method based on the locations of all nodes that need to be charged in the area,used the smallest enclosing circle (SEC) algorithm and finds the optimal location of the charger through Euclidean delivery boy algorithm.It will decrease charging radius,reduce the minimum required transmitted power,thereby saving the average charging energy consumption.The experimental results demonstrated that the less the number locations that the nodes existed,the more energy will be saved.…”
Get full text
Article