Showing 21 - 40 results of 6,651 for search '"Orientering"', query time: 0.07s Refine Results
  1. 21
  2. 22

    The Associations Between Temperament and Self-Oriented, Other-Oriented, and Dual-Harmful Behaviors in Emerging Adults by Serafine Dierickx, Dirk Smits, Glenn Kiekens, Laurence Claes

    Published 2024-12-01
    “…Self- and other-oriented harmful behaviors are common among emerging adults. …”
    Get full text
    Article
  3. 23

    Rule Acquisition in Formal Decision Contexts Based on Formal, Object-Oriented and Property-Oriented Concept Lattices by Yue Ren, Jinhai Li, Cherukuri Aswani Kumar, Wenqi Liu

    Published 2014-01-01
    “…In order to enrich the existing rule acquisition theory in formal decision contexts, this study puts forward two new types of rules which are called ∨-rules and ∨-∧ mixed rules based on formal, object-oriented, and property-oriented concept lattices. Moreover, a comparison of ∨-rules, ∨-∧ mixed rules, and ∧-rules is made from the perspectives of inclusion and inference relationships. …”
    Get full text
    Article
  4. 24

    An Introduction to Object-Oriented Programming with Java / by Thomas, Wu C.

    Published 2006
    Subjects: “…Object-oriented programming (Computer science) 1557…”
    Table of contents only
    Publisher description
    View in OPAC
    Book
  5. 25
  6. 26
  7. 27
  8. 28
  9. 29

    Industrial IoT oriented petahertz communication by Nuo HUANG, Weijie LIU, Chen GONG

    Published 2022-09-01
    “…Compared with traditional radio frequency communication, petahertz communication (PetaCom) enjoys several distinct advantages including high data rate, low latency and high determinacy, exhibiting essential application potential in industrial internet of things (IIoT).However, IIoT oriented PetaCom suffers issues of link instability and interference in real scenarios.Starting from the basic concepts of IIoT and PetaCom, a comprehensive summary of IIoT oriented PetaCom was presented including channel modeling, physical-layer technologies, user networking, advantages and challenges.The goal is to provide guidance for relevant researches on IIoT oriented PetaCom in the future.…”
    Get full text
    Article
  10. 30
  11. 31
  12. 32
  13. 33

    Creation of problem-oriented data bases by Zenona Atkočiūnienė, Romualdas Broniukaitis

    Published 2024-08-01
    “…The fundamentally new approach to data organization lies in the creation of data banks (DB) representing problem-oriented systems for collective use. The accomplished analysis of practice in creation of oriented DB shows that at present there are possibilities to create DB resting upon information resources either provided or generated on the spot, as well as on information and technological, linguistic, program, and technical supply arranged by the Republican automatic system and technical information. …”
    Get full text
    Article
  14. 34
  15. 35
  16. 36

    Topic-oriented measurement of microblogging network by Wei LIU, Li-hong WANG, Rui-guang LI

    Published 2013-11-01
    “…According to the dynamic and temporal characteristics of the topic-generated network, a method of quantitative calculation was designed, and then the topic-oriented research on the network measurement technology from many aspects such as the features of the content was conducted, as well as the network topology and the characteristics of the user behavior. …”
    Get full text
    Article
  17. 37
  18. 38

    Pengaruh Conversation Orientation, Conformity Orientation, dan Kecerdasan Emosional dengan Sikap terhadap Seksualitas pada Remaja Akhir by Nabila Eka Febriyanti, Ilham Nur Alfian

    Published 2021-06-01
    “…Penelitian ini bertujuan untuk mengetahui apakah terdapat pengaruh antara conversation orientation, conformity orientation, dan kecerdasan emosional dengan sikap terhadap seksualitas pada remaja akhir. …”
    Get full text
    Article
  19. 39
  20. 40

    Novel cyberspace-oriented access control model by Feng-hua LI, Yan-chao WANG, Li-hua YIN, Rong-na XIE, Jin-bo XIONG

    Published 2016-05-01
    “…A novel cyberspace-oriented access control model was proposed,termed as CoAC,which avoided the threats by comprehensively considering vital factors,such as access requesting entity,general tense,access point,device,networks,resource,internet-based interactive graph and chain of resource transmission.By appropriately adjusting these factors,CoAC emulated most of typical access control models and fulfilled the requirements of new information service patterns and dissemination modes.The administrative model of CoAC was also presented and the functions and methods for administrating CoAC were described by utilizing Z-notation.CoAC is flexible and scalable,it can be further refined and expanded to figure out new opportunities and challenges in the upcoming access control techniques.…”
    Get full text
    Article