Suggested Topics within your search.
Suggested Topics within your search.
- History 11
- Management 6
- Purchasing 5
- Social conditions 5
- Philosophy 4
- Politics and government 4
- Business logistics 3
- Civilization 3
- History and criticism 3
- Information technology 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Marketing 3
- Methodology 3
- Nutrition 3
- Social life and customs 3
- Sociolinguistics 3
- Tourism 3
- Colonial influence 2
- Common law 2
- Diet Therapy 2
- Diet therapy 2
- Economic conditions 2
- Health 2
- Industrial procurement 2
- Internet in public administration 2
- Interpretation and construction 2
- Juvenile literature 2
-
11701
Examination of Far-Field Mathematical Absorber Reflection Suppression through Computational Electromagnetic Simulation
Published 2012-01-01“…Preliminary results of computational electromagnetic range simulations that replicate typical MARS measurement configurations are presented and discussed which, for the first time, confirm through simulation many of the observations that have previously been noted using purely empirical techniques.…”
Get full text
Article -
11702
Second thoughts on digital first: Exploring the development of election campaigning among Swedish political parties, 2010–2022
Published 2024-03-01“…This article offers a longitudinal perspective on communications during election campaigns from a political-party perspective, where strategic considerations about digital media are compared across time. Our analysis is grounded on the concepts of hybridisation and data-driven campaigning, where digital technology tends to play a central role without replacing all traditional campaign features. …”
Get full text
Article -
11703
Effective Transmission Coverage Area-Based Link Dynamics Characterization of VANET in Highway Scenario
Published 2015-10-01“…This paper uses the concept of effective transmission coverage area as a model for the derivation of analytic expressions in order to characterize the dynamic statistics of link lifetime, new link arrival rate, new link interarrival time, link breakage interarrival time, and so forth. …”
Get full text
Article -
11704
PENGUKURAN MODULUS YOUNG SENAR PANCING DENGAN METODE ANALISIS FREKUENSI DAWAI
Published 2020-12-01“…The fishing line vibration events ware displayed on the graph of the relationship between pressure and time in the Logger pro program. The graph of the relationship between pressure and time was then transformed into an FFT graph of the amplitude relationship to frequency. …”
Get full text
Article -
11705
A model for operational risk of industrial facilities including ageing/test degradation effects and maintenance effectiveness
Published 2025-02-01“…The proposed methodology considers the time dependency of standby failure probabilities through instantaneous unavailability models, depending on the specific standby time for each component at the given moment, instead of using the same constant values. …”
Get full text
Article -
11706
Multiobjective Fuzzy Mixed Assembly Line Sequencing Optimization Model
Published 2014-01-01“…The primary goal is to minimize the make-span, setup time, and cost simultaneously in mixed-model assembly lines. …”
Get full text
Article -
11707
Research on the Construction of Intelligent Media Ideological and Political Learning Platform Based on Artificial Intelligence Technology
Published 2022-01-01“…Aiming at the problems of slow teaching resource sharing rate, long platform response time, and low student learning efficiency in traditional ideological and political learning platforms, a research on the construction of intelligent media ideological and political learning platforms based on artificial intelligence technology is proposed. …”
Get full text
Article -
11708
Analytically Simple and Computationally Efficient Results for the GIX/Geo/c Queues
Published 2019-01-01“…This method works well even for the case when the inter-batch-arrival times follow heavy-tailed distributions. The roots of the underlying characteristic equation form the basis for all distributions of queue-lengths at different time epochs.…”
Get full text
Article -
11709
Improving learning experience through process re-engineering: Khan Academy localization into Azerbaijani
Published 2025-01-01“…Nonetheless, it demands time and capital resources to localize any content. …”
Get full text
Article -
11710
Monte Carlo Simulation of Static and Dynamic Properties of Linear Polymer in a Crowded Environment
Published 2022-01-01“…Our current research shows that the escape time τ increases as ϕ increases. Moreover, in the power-law relation of escape time τ as a function of polymer length N, the scaling exponent (α) changes with ϕ. …”
Get full text
Article -
11711
Multi-source data security protection of smart grid based on combination key
Published 2020-01-01“…As an important infrastructure of power system,power communication network has deployed a large number of widely distributed business terminals and communication terminals,whose data security is related to the safe and stable operation of the entire power network.In order to avoid the situation that the information cannot be safely exchanged due to the shortage of keys.The sharding and combination technology based on keys was proposed to realize the expansion of limited keys,so as to solve the problem of a large number of keys needed for multi-node and mul-ti-service.Firstly,a sharding scheme was obtained according to different conditions.A key was divided into several dif-ferent sub-key pieces,and then a new key was generated by combining these key pieces and distributed to different ter-minals in the system.A large number of combined keys generated were conducive to update key ,which could ensure the data service “one at a time” and effectively enhance the communication system's ability to resist damage and invasion.Through analysis and calculation,the effectiveness of this method in realizing real-time update of a large number of ter-minal business keys with limited keys was further verified,and data secure communication was realized.…”
Get full text
Article -
11712
Strategies for preventing the decline of peripheral areas
Published 2012-07-01“…It would be considered highly ineffective to avoid such a subject, as this decline has been progressing for a long time, silently, quite invisibly, and in a totally disorganized manner until now.…”
Get full text
Article -
11713
An In-depth Analysis of Rendered Models using Blender : A Research Result
Published 2024-12-01“…It also achieved a remarkable average processing time of 15 seconds and a high user rating of 4.5. …”
Get full text
Article -
11714
“The Workshop for the Nation’s Soul” vs. “A Rabbi Factory”—Contrasting the Lithuanian Yeshiva with the Rabbinical Seminary
Published 2024-12-01“…However, until World War II, they saw the Orthodox rabbinical seminary as an institute suitable to its time and place—Germany, most of whose Jews were liberal—and did not consider it able to produce a Torah scholar worthy of his name. …”
Get full text
Article -
11715
Research on Wireless Sensor Network Security Location Based on Received Signal Strength Indicator Sybil Attack
Published 2020-01-01“…It conducts an analysis between two receiving nodes, compares RSSI ratios to tickle the problem of time inconsistency of RSSI, and sets a threshold to detect Sybil by the emulation results. …”
Get full text
Article -
11716
Review: trends in nanotherapeutics to manage Helicobacter pylori
Published 2024-09-01“…Further, the drug’s short residence time and low bioavailability in the gastric environment (low pH, presence of digestive enzymes, and difficulty in crossing the mucus layer) also challenge the treatment. …”
Get full text
Article -
11717
INVESTIGASI LAJU REGANGAN CREEP BAJA TAHAN KARAT FERRITIC PADA TEMPERATUR 570 °C
Published 2024-12-01“…The curve of strain to time was recorded from each constant load condition. …”
Get full text
Article -
11718
A Fast Identification Method for Seismic Responses of Bridge Structures by Integrating Digital Signal Features and Deep Learning
Published 2025-01-01“…A method of bridge structure seismic response identification combining signal processing technology and deep learning technology is proposed. The short-time energy method is used to intelligently extract the non-smooth segments in the sensor acquired signals, and the short-time Fourier transform, continuous wavelet transform, and Meier frequency cestrum coefficients are used to analyze the spectrum of the non-smooth segments of the response of the bridge structure, and the response feature matrix is extracted and used to classify sequences or images in the LSTM network and the Resnet50 network. …”
Get full text
Article -
11719
Spontaneous Reattachment of a Posteriorly Dislocated Endothelial Graft: A Case Report
Published 2013-01-01“…The nature of his previous operations was unknown to the surgeon at the time of transplant. On postoperative day one, the graft was not present in the anterior chamber. …”
Get full text
Article -
11720
Dynamic superframe adaptation using group-based media access control for handling traffic heterogeneity in wireless body area networks
Published 2020-08-01“…This leads to inefficient use of superframe time duration because of fixed time phases for different types of data traffic. …”
Get full text
Article