Suggested Topics within your search.
Suggested Topics within your search.
- Biochemistry 3
- Word processing 3
- Building, Iron and steel 2
- Cytodiagnosis 2
- Domestic relations 2
- Domestic relations courts 2
- Human anatomy 2
- Management 2
- Mathematics 2
- Steel, Structural 2
- 44.83 rheumatology, orthopedics 1
- Accounting 1
- Act of the general application 1
- Agriculture 1
- BASIC (Computer program language) 1
- Blood 1
- Business 1
- Business- finance 1
- Calculus 1
- Chemical reactions 1
- Chemistry 1
- Chemistry, Organic 1
- Child psychology 1
- Civil engineering 1
- Civilization 1
- Coloring books 1
- Communication 1
- Communication policy 1
- Computer networks 1
- Computer programs 1
-
7241
Dialog religijny w turystyce
Published 2012-12-01“…The author introduces the fundamental principles, objectives, and conditions for a dialogue among tourists. He discusses also various types of religious dialogue: within the tourists’ own religious community, the ecumenical dialogue between members of different Christian denominations, philosophical dialogues with non-believers and finally dialogue between members of different religions. …”
Get full text
Article -
7242
Creating Nodes at Selected Locations in a Harmonically Excited Structure Using Feedback Control and Green’s Function
Published 2019-01-01“…Numerical examples demonstrate the applicability of the method in various cases.…”
Get full text
Article -
7243
Exploring Engagement Repetoires in Social Media: the Museum Perspective
Published 2015-06-01“…A multi-dimensional approach to various modes of engagement is proposed in order to involve different visitors in the activities of the museum, and considering different functions of the message. …”
Get full text
Article -
7244
A Critical Examination of Game Theory as Applied to Conflict and Negotiation
Published 2022-11-01“…Although the subject of negotiation has been eclectic in the absorp tion of Insights from other disciplines, it is only fairly recently that communicologists have become interested in the topic. Today there are various theoretical approaches underlying the study of negotiation. …”
Get full text
Article -
7245
ANALYTICAL JOURNEYS IN THREE PIECES FOR CLARINET SOLO BY CORNEL ŢĂRANU
Published 2013-06-01“…The third piece, Cadenza, is based on a nucleous made up of (major and minor) second and augmented fourth, transposed and built on various sounds, serving to an expressivity close to that of the lament, suggestively presented by the descending glissando. …”
Get full text
Article -
7246
Evaluation of Seal Effects on the Stability of Rotating Fluid Machinery
Published 1995-01-01“…The individual contribution of the impellers, bearings and seals to the stability and the dynamic interactions of these fluid elements are examined. Various types of bearings and seals, such as annular smooth, parallel grooved and damper seals, are compared for better rotor stability. …”
Get full text
Article -
7247
Transponder Designs for Harmonic Radar Applications
Published 2015-01-01“…Different applications and operating frequencies of harmonic transponders are presented, along with various tag design aspects. The designer may have to deal with certain tradeoffs during the design with respect to a number of transponder properties, and the role of these tradeoffs is also considered. …”
Get full text
Article -
7248
Le complexe des trois singes. Sur un certain journalisme primatologique
Published 2012-12-01“…It will expose the logic of this discourse, pointing out the various excesses underlying its surface. Ultimately, the aim of this study will be to give, as a possible answer, a non-metaphysical, acceptable version of human specificity within what John MacDowell calls “second nature naturalism.”…”
Get full text
Article -
7249
Teachers under the Third Republic in the constant trap of political manipulation
Published 2023-06-01“… In the analysis of the macropolitics of the educational authorities, the author proves that public school teachers find themselves in a situation of a trap that has various faces. During the first years of the political transformation, they experienced the right to professional autonomy and received decent remuneration. …”
Get full text
Article -
7250
Le canard a-t-il coulé la moule du Québec ? Construire un problème de prédation, dépolitiser un échec économique
Published 2023-12-01“…In the early 2010s, mussels cultivated by Quebec mussel farmers in various parts of the maritime regions of Eastern Quebec were subjected to unprecedented waves of predation. …”
Get full text
Article -
7251
A New Extension of the Exponentiated Weibull Model Mathematical Properties and Modelling
Published 2022-01-01“…Model parameters were estimated using the maximum likelihood technique (ML). The behavior of the various estimators was investigated using a simulated exercise. …”
Get full text
Article -
7252
Decision-level fusion model of multi-source intrusion detection alerts
Published 2011-01-01“…In order to lessen the dependence on training samples significantly and eliminate rigorous constraint conditions,an alert fusion model that supports online incremental training was presented.Firstly,primary alerts vector was mapped to voting pattern,so as to reduce statistical space.Then,the conditional probability distributions of various voting patterns in normal or attack traffic were inferred via training.Afterwards,according to the variation of statistical characteristics,the composition of the traffic being detected was inferred instantly.Finally,fusion decision was made via threshold constraint method and Bayesian inference.Besides extended applicative scope,the model proposed can track and adapt to the traffic being detected well,and improve detection performance significantly only via small scale training.…”
Get full text
Article -
7253
Research and implementation of safety authentication technology in Internet of vehicles
Published 2021-09-01“…Nowadays, safety certification technology for Internet of vehicles (IoV) cannot well defend the various attacks, and there are also many shortcomings when considering the balance between safety and performance.Based on the in-depth analysis of the research status and security threats for IoV, a hierarchical vehicle-to-vehicle (V2V) safety authentication scheme was proposed.Furthermore, an L-type safety authentication scheme which based on more than one trusted third parties was proposed.Aimed at ensuring the information safety of the communication process and preventing the communication data from being stolen, the schemes were more suitable to IoV.…”
Get full text
Article -
7254
University of Florida Potato Variety Trials Spotlight: Snowden
Published 2016-11-01“…Tuber production and quality results provided in this spotlight are summarized from various variety trials conducted by the University of Florida’s Hastings Agricultural and Extension Center from 1998 to 2015. …”
Get full text
Article -
7255
SuperKEKB positron beam tuning using machine learning
Published 2024-01-01“…In the KEK injector linac, four-ring simultaneous top-up injection has been achieved, and beam tuning is always performed in various beam modes. As there are four beam modes, the optimum magnet current and RF phase must be selected for each. …”
Get full text
Article -
7256
Négociation de la distance : les circuits de communication et de représentation des intérêts locaux (monarchie et empire portugais, xviie et xviiie siècles)
Published 2019-01-01“…The first has to do with the main mechanism of political communication between the center of the monarchy and various overseas localities : the letters and complaints submitted by municipal councils to the Crown. …”
Get full text
Article -
7257
Planetary formation and early phases
Published 2023-11-01“…In this review, we describe the structure and properties of such disks, and the various phenomenons that lead to the final product: a planetary system. …”
Get full text
Article -
7258
Vectors of Violence: Legitimation and Distribution of State Power in the _People’s Liberation Army Daily_ (_Jiefangjun Bao_), 1956-1989
Published 2024-05-01“…Combining close reading and historical analysis with quantitative conceptuality and text mining, we demonstrate how the *PLA Daily* legitimizes state violence differently through its representation of various soldier figures, the *zhanshi*, the *junren*, and the *minbing*. …”
Get full text
Article -
7259
Endoscopic Transcolonic Catheter-Free Pelvic Abscess Drainage
Published 2008-01-01“…Natural orifice transluminal endoscopic surgery is a novel therapeutic method in development that uses different routes of surgical approach. The use of various methods, instruments and accessories during this procedure are currently being investigated. …”
Get full text
Article -
7260
EXAMPLE OF DIVIDING LIFE CYCLE MODEL OF INDUSTRIAL CLUSTERS ON STAGES
Published 2020-06-01“…Examples and criteria for distinguishing a different number of stages of the cluster life cycle, various goals pursued by different authors dividing the cluster life cycle in stages have been provided. …”
Get full text
Article