Suggested Topics within your search.
Suggested Topics within your search.
- literature 25
- History and criticism 18
- Juvenile literature 15
- kiswahili literature 12
- History 11
- Literature 10
- English literature 8
- American literature 6
- Criticism 4
- Politics and government 4
- Academic writing 3
- Civilization 3
- Fiction 3
- Philosophy 3
- Study and teaching 3
- Appreciation 2
- Biography 2
- Colonial influence 2
- Criticism and interpretation 2
- Dissertations, Academic 2
- East African literature 2
- Economics 2
- Education 2
- English drama 2
- Experimental fiction 2
- French literature 2
- German literature 2
- In literature 2
- Jews 2
- LITERARY CRITICISM / General 2
-
22661
KAYITDIŞI EKONOMİ VE GEÇİŞ ÜLKELERİ
Published 2009-12-01“…Bu amaçla geçiş ülkelerindeki kayıtdışı ekonomi büyüklüğünü tahmin etmeye yönelik literatür taraması yapılmış ve çalışmada elde edilen sonuçlara yer verilmiştir.…”
Get full text
Article -
22662
Vectorial Ekeland Variational Principles and Inclusion Problems in Cone Quasi-Uniform Spaces
Published 2012-01-01“…The results of this paper extend, generalize, and improve the corresponding results for Ekeland's variational principles of the directed vectorial perturbation type and other generalizations of Ekeland's variational principles in the setting of F-type topological space and quasi-metric spaces in the literatures. Even in usual real metric spaces, some of our results are new.…”
Get full text
Article -
22663
Numerical Solutions for the Eighth-Order Initial and Boundary Value Problems Using the Second Kind Chebyshev Wavelets
Published 2015-01-01“…Numerical results obtained by the present method are in good agreement with the exact solutions available in the literatures.…”
Get full text
Article -
22664
3D Simulation of Self-Compacting Concrete Flow Based on MRT-LBM
Published 2018-01-01“…Two numerical examples of the slump test and enhanced L-box test were performed, and the calculated results are compared with available experiments in literatures. The numerical results demonstrate the capability of the proposed MRT-LBM in modeling of self-compacting concrete flows.…”
Get full text
Article -
22665
A checklist of insects, mites and rodents affecting stored products in Iran
Published 1989-02-01“…It been compiled from personal observations and 1014 reports and published literatures concerning pests of stored products in Iran since 1943, particularly reports of Farah -bakhsh 1961 (89), Freeman 1958, 1977 (90,91) Gentry 1965 (93).More than 190 species have been grouped under 3 categories of Insects, Mites and Rodents, with reference to their scientific names, products attacked and local distributions in Iran. …”
Get full text
Article -
22666
Prognostic Factors for the Development of Biochemical Recurrence after Radical Prostatectomy
Published 2011-01-01“…Medline review of the literatures was done followed by a group discussion on the chosen publications and their valuable influence. …”
Get full text
Article -
22667
İŞLETMELERDE STRATEJİK TEKNOLOJİ YÖNETİMİ VE SÜRDÜRÜLEBİLİR REKABET ÜSTÜNLÜĞÜ İLİŞKİSİNİN BELİRLENMESİ VE OTOMOTİV YAN SANAYİ İŞLETMELERİ ÜZERİNE BİR ARAŞTIRMA...
Published 2010-06-01“…Bu teorilerle ilgili literatür incelendiğinde, işletme stratejilerinin ne olması gerektiğinin yanı sıra, işletme stratejilerinin uygulanabilirliğinde ve başarısında, teknolojinin potansiyel bir güç olduğu işaret edilmektedir. …”
Get full text
Article -
22668
Research progress of sensor-cloud security
Published 2018-03-01“…Through consulting lots of domestic and international literatures about sensor-cloud security,a series of security problems are found,such as reputation problem of service provider,the coupling problem of physical nodes,the leak of authority management,et al,which seriously hinders the further development of sensor-cloud.The secure problems occurring in sensor-cloud were analyzed,the current secure technologies were contrasted ,similarities and differences of various types solutions were discussed and summarized.After that,several future challenges of sensor-cloud security were concluded.Finally,a fog-based structure was proposed to solve the security problems,which would bring new ideas to the sensor-cloud security research.…”
Get full text
Article -
22669
Estimation of Congestion in Free Disposal Hull Models Using Data Envelopment Analysis
Published 2014-01-01“…There are several approaches in data envelopment analysis (DEA) literatures which discuss the theory and application of congestion. …”
Get full text
Article -
22670
A Brief Review on Dynamics of a Cracked Rotor
Published 2009-01-01“…It is not the intention of the authors to provide all literatures related with the cracked rotor. However, the main emphasis is to provide all the methodologies adopted by various researchers to investigate a cracked rotor. …”
Get full text
Article -
22671
REPRODUKSI PEMAHAMAN DAN DINAMIKA PSIKOLOGIS PAHAM RADIKAL: ANALISIS TERHADAP SIKAP ‘MENYALAHKAN’ KELOMPOK LAIN
Published 2017-06-01“…Based on the observation method to the individual that having religious radical understanding (especially to the individual/group that usually blaming the other group that having different understanding, as heresy (bid’ah), syirik, infidel (kafir), and deviate) on the range year of 2008 – 2017, which then comprehend with the various literatures correlated to the main problem of research, the study revealed that Islamic radical group having psychological problem in term of their mindset and perception, which then affected to their attitudes and behaviors. …”
Get full text
Article -
22672
İŞLETMELERDE STRATEJİK TEKNOLOJİ YÖNETİMİ VE SÜRDÜRÜLEBİLİR REKABET ÜSTÜNLÜĞÜ İLİŞKİSİNİN BELİRLENMESİ VE OTOMOTİV YAN SANAYİ İŞLETMELERİ ÜZERİNE BİR ARAŞTIRMA...
Published 2010-06-01“…Bu teorilerle ilgili literatür incelendiğinde, işletme stratejilerinin ne olması gerektiğinin yanı sıra, işletme stratejilerinin uygulanabilirliğinde ve başarısında, teknolojinin potansiyel bir güç olduğu işaret edilmektedir. …”
Get full text
Article -
22673
Performance analysis of multi-user detection of 5G overloaded sporadic system
Published 2016-08-01“…Currently,MTC has two main characteristics:massive connectivity and sporadic transmission.Massive connectivity makes the access behavior non-orthogonal and the sporadic characteristic makes the user activity sparsity.Based on those characteristics,some literatures introduce a corresponding detection technique called compressive sensing based multi-user detection.Performance of multi-user detection technique was analyzed by evaluating the user activity detection performance and the user data detection performance.The simulation results conclude that the detection performance will be influenced by the cross correlation between the non-orthogonal spreading sequences,but CS-MUD can still support the massive connection scenario in which the user activity is sparse.…”
Get full text
Article -
22674
TELAAH ARSITEKTUR HERITAGE TRAIL KOTA ISTANBUL, TURKI
Published 2023-06-01“… Abstrak_Tulisan ini merupakan studi literatur dan studi preseden yang bertujuan untuk menelaah heritage trail Kota Istanbul, Turki. …”
Get full text
Article -
22675
Türkiye’de Öğretmen Yetiştirmenin Genel Kültür Meselesi
Published 2020-02-01“…Çalışmadan elde edilen bulgular ilgili literatür ile tartışılmış ve bazı öneriler geliştirilmiştir. …”
Get full text
Article -
22676
Pengorganisasian Guru dalam Mendukung Program Projek Penguatan Profil Pelajar Pancasila
Published 2025-01-01“…Penelitian ini menggunakan metode studi kepustakaan atau studi literatur yang dilakukan dengan memahami dan mempelajari berbagai teori dari sumber-sumber literatur yang relevan dengan penelitian ini. …”
Get full text
Article -
22677
-
22678
Yellow wattle (Acacia) - Three versions - English, Spanish, Indonesian
Published 2025-01-01Get full text
Article -
22679
GENEALOGI DAN PENYEBARAN THARIQAH QADIRIYAH WA NAQSHABANDIYAH DI JAWA
Published 2016-11-01“…Based on the previous literatures (Dhofier, Martin van Bruinessen, Zulkifli, and Mulyati), it was found out that in Java the genealogy of the thariqah formed by Syekh Ahmad Khatib Sambas directed to the three primary khalifah, i.e. …”
Get full text
Article -
22680
Verifiable outsourced attribute-based encryption with access update
Published 2019-02-01“…In order to meet the secure and reliable access requirements for the encrypted data stored in the public cloud,a verifiable outsourced attribute-based encryption scheme with access update was proposed.Based on a standard KP-ABE scheme,verifiable outsourced decryption and verifiable access update for a ciphertext through novel constructions for the scheme were obtained.The verifiability of the outsourced computation ensures that the third-party service may perform algorithms honestly.The scheme has selective IND-CPA security for the original and updated ciphertexts,weak master private key security,and verification soundness in the standard model were proved,respectively.Compared with similar schemes from literatures,the proposed scheme can achieve tradeoff in the optimization of functionality,security and efficiency.…”
Get full text
Article