Showing 22,661 - 22,680 results of 23,329 for search '"Literature"', query time: 0.17s Refine Results
  1. 22661

    KAYITDIŞI EKONOMİ VE GEÇİŞ ÜLKELERİ by Ayla Yazıcı

    Published 2009-12-01
    “…Bu amaçla geçiş ülkelerindeki kayıtdışı ekonomi büyüklüğünü tahmin etmeye yönelik literatür taraması yapılmış ve çalışmada elde edilen sonuçlara yer verilmiştir.…”
    Get full text
    Article
  2. 22662

    Vectorial Ekeland Variational Principles and Inclusion Problems in Cone Quasi-Uniform Spaces by Jiang Zhu, Lei Wei, Yeol Je Cho, Cheng Cheng Zhu

    Published 2012-01-01
    “…The results of this paper extend, generalize, and improve the corresponding results for Ekeland's variational principles of the directed vectorial perturbation type and other generalizations of Ekeland's variational principles in the setting of F-type topological space and quasi-metric spaces in the literatures. Even in usual real metric spaces, some of our results are new.…”
    Get full text
    Article
  3. 22663

    Numerical Solutions for the Eighth-Order Initial and Boundary Value Problems Using the Second Kind Chebyshev Wavelets by Xiaoyong Xu, Fengying Zhou

    Published 2015-01-01
    “…Numerical results obtained by the present method are in good agreement with the exact solutions available in the literatures.…”
    Get full text
    Article
  4. 22664

    3D Simulation of Self-Compacting Concrete Flow Based on MRT-LBM by Liu-Chao Qiu, Yu Han

    Published 2018-01-01
    “…Two numerical examples of the slump test and enhanced L-box test were performed, and the calculated results are compared with available experiments in literatures. The numerical results demonstrate the capability of the proposed MRT-LBM in modeling of self-compacting concrete flows.…”
    Get full text
    Article
  5. 22665

    A checklist of insects, mites and rodents affecting stored products in Iran by M.J. Shahhosseini, K. Kamali

    Published 1989-02-01
    “…It been compiled from personal observations and 1014 reports and published literatures concerning pests of stored products in Iran since 1943, particularly reports of Farah -bakhsh 1961 (89), Freeman 1958, 1977 (90,91) Gentry 1965 (93).More than 190 species have been grouped under 3 categories of Insects, Mites and Rodents, with reference to their scientific names, products attacked and local distributions in Iran. …”
    Get full text
    Article
  6. 22666

    Prognostic Factors for the Development of Biochemical Recurrence after Radical Prostatectomy by Ahmed F. Kotb, Ahmed A. Elabbady

    Published 2011-01-01
    “…Medline review of the literatures was done followed by a group discussion on the chosen publications and their valuable influence. …”
    Get full text
    Article
  7. 22667

    İŞLETMELERDE STRATEJİK TEKNOLOJİ YÖNETİMİ VE SÜRDÜRÜLEBİLİR REKABET ÜSTÜNLÜĞÜ İLİŞKİSİNİN BELİRLENMESİ VE OTOMOTİV YAN SANAYİ İŞLETMELERİ ÜZERİNE BİR ARAŞTIRMA... by Mahmut Teki̇n, Ramazan Göral

    Published 2010-06-01
    “…Bu teorilerle ilgili literatür incelendiğinde, işletme stratejilerinin ne olması gerektiğinin yanı sıra, işletme stratejilerinin uygulanabilirliğinde ve başarısında, teknolojinin potansiyel bir güç olduğu işaret edilmektedir. …”
    Get full text
    Article
  8. 22668

    Research progress of sensor-cloud security by Tian WANG, Yang LI, Weijia JIA, Guojun WANG, Shaoliang PENG

    Published 2018-03-01
    “…Through consulting lots of domestic and international literatures about sensor-cloud security,a series of security problems are found,such as reputation problem of service provider,the coupling problem of physical nodes,the leak of authority management,et al,which seriously hinders the further development of sensor-cloud.The secure problems occurring in sensor-cloud were analyzed,the current secure technologies were contrasted ,similarities and differences of various types solutions were discussed and summarized.After that,several future challenges of sensor-cloud security were concluded.Finally,a fog-based structure was proposed to solve the security problems,which would bring new ideas to the sensor-cloud security research.…”
    Get full text
    Article
  9. 22669

    Estimation of Congestion in Free Disposal Hull Models Using Data Envelopment Analysis by M. Abbasi, G. R. Jahanshahloo, M. Rostamy-Malkhlifeh, F. Hosseinzadeh Lotfi

    Published 2014-01-01
    “…There are several approaches in data envelopment analysis (DEA) literatures which discuss the theory and application of congestion. …”
    Get full text
    Article
  10. 22670

    A Brief Review on Dynamics of a Cracked Rotor by Chandan Kumar, Vikas Rastogi

    Published 2009-01-01
    “…It is not the intention of the authors to provide all literatures related with the cracked rotor. However, the main emphasis is to provide all the methodologies adopted by various researchers to investigate a cracked rotor. …”
    Get full text
    Article
  11. 22671

    REPRODUKSI PEMAHAMAN DAN DINAMIKA PSIKOLOGIS PAHAM RADIKAL: ANALISIS TERHADAP SIKAP ‘MENYALAHKAN’ KELOMPOK LAIN by Ahmad Saifuddin

    Published 2017-06-01
    “…Based on the observation method to the individual that having religious radical understanding (especially to the individual/group that usually blaming the other group that having different understanding, as heresy (bid’ah), syirik, infidel (kafir), and deviate) on the range year of 2008 – 2017, which then comprehend with the various literatures correlated to the main problem of research, the study revealed that Islamic radical group having psychological problem in term of their mindset and perception, which then affected to their attitudes and behaviors. …”
    Get full text
    Article
  12. 22672

    İŞLETMELERDE STRATEJİK TEKNOLOJİ YÖNETİMİ VE SÜRDÜRÜLEBİLİR REKABET ÜSTÜNLÜĞÜ İLİŞKİSİNİN BELİRLENMESİ VE OTOMOTİV YAN SANAYİ İŞLETMELERİ ÜZERİNE BİR ARAŞTIRMA... by Mahmut TEKİN, Ramazan GÖRAL

    Published 2010-06-01
    “…Bu teorilerle ilgili literatür incelendiğinde, işletme stratejilerinin ne olması gerektiğinin yanı sıra, işletme stratejilerinin uygulanabilirliğinde ve başarısında, teknolojinin potansiyel bir güç olduğu işaret edilmektedir. …”
    Get full text
    Article
  13. 22673

    Performance analysis of multi-user detection of 5G overloaded sporadic system by Guoyu MA, Bo AI, Xian’an HU, Xiaobing JIANG

    Published 2016-08-01
    “…Currently,MTC has two main characteristics:massive connectivity and sporadic transmission.Massive connectivity makes the access behavior non-orthogonal and the sporadic characteristic makes the user activity sparsity.Based on those characteristics,some literatures introduce a corresponding detection technique called compressive sensing based multi-user detection.Performance of multi-user detection technique was analyzed by evaluating the user activity detection performance and the user data detection performance.The simulation results conclude that the detection performance will be influenced by the cross correlation between the non-orthogonal spreading sequences,but CS-MUD can still support the massive connection scenario in which the user activity is sparse.…”
    Get full text
    Article
  14. 22674

    TELAAH ARSITEKTUR HERITAGE TRAIL KOTA ISTANBUL, TURKI by Ari Widyati Purwantiasning, Saeful Bahri

    Published 2023-06-01
    “… Abstrak_Tulisan ini merupakan studi literatur dan studi preseden yang bertujuan untuk menelaah heritage trail  Kota Istanbul, Turki. …”
    Get full text
    Article
  15. 22675

    Türkiye’de Öğretmen Yetiştirmenin Genel Kültür Meselesi by Mustafa Sağdıç

    Published 2020-02-01
    “…Çalışmadan elde edilen bulgular ilgili literatür ile tartışılmış ve bazı öneriler geliştirilmiştir. …”
    Get full text
    Article
  16. 22676

    Pengorganisasian Guru dalam Mendukung Program Projek Penguatan Profil Pelajar Pancasila by Nur Ikhlas, Nunuk Hariyati, Amrozi Khamidi

    Published 2025-01-01
    “…Penelitian ini menggunakan metode studi kepustakaan atau studi literatur yang dilakukan dengan memahami dan mempelajari berbagai teori dari sumber-sumber literatur yang relevan dengan penelitian ini. …”
    Get full text
    Article
  17. 22677
  18. 22678
  19. 22679

    GENEALOGI DAN PENYEBARAN THARIQAH QADIRIYAH WA NAQSHABANDIYAH DI JAWA by Aly Mashar

    Published 2016-11-01
    “…Based on the previous literatures (Dhofier, Martin van Bruinessen, Zulkifli, and Mulyati), it was found out that in Java the genealogy of the thariqah formed by Syekh Ahmad Khatib Sambas directed to the three primary khalifah, i.e. …”
    Get full text
    Article
  20. 22680

    Verifiable outsourced attribute-based encryption with access update by Suqing LIN

    Published 2019-02-01
    “…In order to meet the secure and reliable access requirements for the encrypted data stored in the public cloud,a verifiable outsourced attribute-based encryption scheme with access update was proposed.Based on a standard KP-ABE scheme,verifiable outsourced decryption and verifiable access update for a ciphertext through novel constructions for the scheme were obtained.The verifiability of the outsourced computation ensures that the third-party service may perform algorithms honestly.The scheme has selective IND-CPA security for the original and updated ciphertexts,weak master private key security,and verification soundness in the standard model were proved,respectively.Compared with similar schemes from literatures,the proposed scheme can achieve tradeoff in the optimization of functionality,security and efficiency.…”
    Get full text
    Article