Suggested Topics within your search.
Suggested Topics within your search.
- Biochemistry 3
- Word processing 3
- Building, Iron and steel 2
- Cytodiagnosis 2
- Domestic relations 2
- Domestic relations courts 2
- Human anatomy 2
- Management 2
- Mathematics 2
- Steel, Structural 2
- 44.83 rheumatology, orthopedics 1
- Accounting 1
- Act of the general application 1
- Agriculture 1
- BASIC (Computer program language) 1
- Blood 1
- Business 1
- Business- finance 1
- Calculus 1
- Chemical reactions 1
- Chemistry 1
- Chemistry, Organic 1
- Child psychology 1
- Civil engineering 1
- Civilization 1
- Coloring books 1
- Communication 1
- Communication policy 1
- Computer networks 1
- Computer programs 1
-
1961
IoT-based river water quality monitoring
Published 2023-12-01“…Then, the data we collect using various equipment will be analyzed using the software we have designed. …”
Get full text
Article -
1962
University as an Environment of Innovative Interactions
Published 2021-09-01“…Orenburg State University is presented as an environment of multilevel multidimensional interaction of various subjects. The dynamics of value interaction between students and teachers is revealed. …”
Get full text
Article -
1963
Analysis model of binary code security flaws based on structure characteristics
Published 2017-09-01“…Aiming at the shortcomings of the existing methods to detect the security flaws that have complex structures,a new analysis model and its application method was proposed.First,analysis models based on key information of code structures extracted from path subsets of characteristic element sets that are generated by source code element sets of code security flaws were constructed.Then the analysis model according to the statistical probability of each kind of IR statement was calculated,and the IR code group which matched the feature model was found.Finally,through the translating relation between binary codes and IR codes,various code security flaws of binary program were found out.The analysis models can be applied to both common single-process binary programs and binary parallel programs.Experimental results show that compared with the existing methods,the application of the analysis model can be more comprehensive and in-depth in detecting various types of complex binary code security flaws with higher accuracy.…”
Get full text
Article -
1964
Efficient and secure electronic evidence exchange scheme for internet of things
Published 2025-01-01“…With the rapid development of information technology, Internet of Things (IoT) is profoundly impacting various fields of the socio-economic landscape, driving the transformation of traditional industries towards intelligence. …”
Get full text
Article -
1965
Mapping How Worlds Come to Be
Published 2025-02-01“…Especially in architecture, there is a plethora of studies that often use a cartographic approach to chart various material (trans)formations of planetary spaces, and/or the wider discourses on spatial practices that may serve as the basis for theorising and practicing towards other possible worlds and futures. …”
Get full text
Article -
1966
The use of virtual reality technologies in the process of teaching a foreign language with the game method
Published 2017-06-01“…The means of virtual reality are increasingly being introduced into various spheres of our life, including the educational environment. …”
Get full text
Article -
1967
Neural quantum propagators for driven-dissipative quantum dynamics
Published 2025-01-01“…NQP can handle arbitrary initial quantum states, adapt to various external fields, and simulate long-time dynamics, even when trained on far shorter time windows. …”
Get full text
Article -
1968
Implementation of the online learning process for students of UIN Imam Bonjol Padang
Published 2024-06-01“…In implementing online learning, various types of media are also needed for various aspects of material during online learning to support the learning process with access to the library. …”
Get full text
Article -
1969
Crisis, poverty and hunger. Food sovereignty as an alternative
Published 2013-11-01“…In this context, we examine the alternative possibilities currently offered by food sovereignty, a concept that originates in international social movements and which has been found in the daily life of various rural areas, and is, at the same time, consistent with several critical theories originating from the academic world…”
Get full text
Article -
1970
A Critique on the Book Spinoza in Soviet Philosophy
Published 2022-06-01“…This book is composed of seven articles of Russian thinkers about various aspects of Spinoza’s philosophy which have been written in 1920s, when the Russian Philosophers sought to reconstruct a philosophical system and there is lot of controversy among them about the nature of this system. …”
Get full text
Article -
1971
On the Afterlives of Daphne Du Maurier’s Rebecca: Spinoffs and Transfictions
Published 2021-11-01“…This article discusses very diverse transfictions based on Du Maurier’s novel and examines the workings of the various narrative strategies adopted to reactivate the well-known novel. …”
Get full text
Article -
1972
L-Shaped Coplanar Strip Dipole Antenna Sensor for Adulteration Detection
Published 2025-01-01“…The reflection coefficient of the antenna sensor is found to vary with various concentrations of the samples in the study. …”
Get full text
Article -
1973
OPTIMIZATION RESEARCH OF PREVENTIVE MAINTENANCE STRATEGY ON THE CATENARY SYSTEM BASED ON RELIABILITY CONSTRAINTS
Published 2016-01-01“…Analyzing the catenary system based on fault tree analysis model and using different parameters’ Weibull distribution to describe the device failure probability of the various parts of the catenary system. The optimization function of preventive maintenance strategy on the catenary system based on reliability constraints is deduced.According to three years’ measured fault data of Changsha section,the parameters of Weibull distribution which describe the various parts of the catenary system is fitted,the maintenance costs of the catenary system in Changsha section were calculated according to the model of optimization on preventive maintenance strategy. …”
Get full text
Article -
1974
The development of children's Web searching skills - a non-linear model
Published 2005-01-01“…The aim of this article is to determine the various skills necessary for seeking information on the Internet in educational settings. …”
Get full text
Article -
1975
Hidden Attractors in Chaotic Systems with Nonlinear Functions
Published 2024-06-01“…These attractors can arise in various mathematical models, such as the Lorenz system, Rössler system, or Chua's circuit. …”
Get full text
Article -
1976
Of the teachers, by the teachers, for the teachers - The 7Cs Framework of (English) Grammar for Practical, Pedagogical Purposes
Published 2021-12-01“…The field itself, moreover, has adopted various approaches to teaching grammar as well as variant terminologies both for grammatical notions (such as subject or agent) and for certain grammatical constructions (such as phrasal verb or compound noun). …”
Get full text
Article -
1977
Children’s literature as coupling point between global sustainability concerns and children’s local agency
Published 2025-02-01“…This article argues that various dialogical and creative reading activities based on relevant children’s literature may serve as gateways to developing young children’s agency and understanding related to some of the sustainability concerns that they may have to address when they grow up. …”
Get full text
Article -
1978
Newman polémiste et satiriste
Published 2009-12-01“…The source of these two characteristics is to be sought in the circumstances of the composition of most of his published works, namely the various struggles in which he participated throughout his long life. …”
Get full text
Article -
1979
Influence of Urban Development on Extreme Precipitation in Plateau Lake Basin
Published 2023-01-01“…Studying the influence of urban development on extreme precipitation in the lake basin region is of practical significance for urban flood control and disaster reduction,forecasting and early warning capability increase and emergency response capacity building,“four pres” improvement,and risk tackling of extreme precipitation and waterlogging disasters.Taking Kunming,a city in the Yunnan Plateau Basin,as an example,this paper adopts mathematical statistical methods to analyze the effect of urban development on the extreme precipitation index in the central urban area of the lake basin,the basin edges,and peripheral hilly areas of the city.The results show that urban development exerts different degrees of influence on various extreme precipitation indexes in lake basin areas,basin edges,and peripheral hilly areas of the basin, with the strongest,weakest,and middle effects on the basin edges, hilly areas,and lake basin areas respectively.Due to topography and the urban heat island effect,urban development also causes uneven increase and decrease in the extreme precipitation index in various areas such as lake basin areas,basin edges,and hilly areas.…”
Get full text
Article -
1980
Functionalized Bioadsorbent Application on Methylene Blue Removal From Wastewater—A Review
Published 2024-01-01“…In this present review, various biological wastes and their functionalization were explored. …”
Get full text
Article