Showing 8,801 - 8,820 results of 12,472 for search '"Theory"', query time: 0.08s Refine Results
  1. 8801

    A Fast and Efficient Markov Chain Monte Carlo Method for Market Microstructure Model by Sun Yapeng, Peng Hui, Xie Wenbiao

    Published 2021-01-01
    “…Using the presented modeling method to make analysis of daily income of the S&P 500 index through the point forecast and the density forecast, we find clear support for time-varying volatility, volatility feedback effect, market microstructure theory, and Student-t heavy tails in the financial time series. …”
    Get full text
    Article
  2. 8802

    Native Centric Ethics Constraining Illegal Migration in Nigeria by Osebor Ikechukwu Monday, Alumona Nicholas Onyemechi, Uchena Chukwuka Obed

    Published 2024-11-01
    “…The Indigenous Moral Theory of Native-Centric Ethics (togetherness) will be applied to advance and comprehend the causes of illegal immigration as well as potential solutions. …”
    Get full text
    Article
  3. 8803

    Global existence and uniqueness of classical solutions for a generalized quasilinear parabolic equation with application to a glioblastoma growth model by Zijuan Wen, Meng Fan, Asim M. Asiri, Ebraheem O. Alzahrani, Mohamed M. El-Dessoky, Yang Kuang

    Published 2017-03-01
    “…This local solution can be continuedfor all positive time by employing the methods of energy estimates, $ L^{p} $-theory, and Schauder estimate of linear parabolic equations. …”
    Get full text
    Article
  4. 8804

    Evolution of Biotechnology and Information Technology and Its Impact on Human Security by E. S. Zinovieva, Y. I. Vojtenko

    Published 2015-10-01
    “…The article analyzes the consequences of widespread usage biotechnology and information technology in the foreign policy practice on the basis of the human security theory. The detailed description of the main directions of the use of biometric technology in the foreign policy and consular practices is provided, the challenges and threats to information security associated with biometrics are analyzed, arising from widespread biotechnology are the main challenges and threats to as well as human security threats arising at the present stage of development and application of these technologies. …”
    Get full text
    Article
  5. 8805

    Multisorted Tree-Algebras for Hierarchical Resources Allocation by Erick Patrick Zobo, Marcel Fouda Ndjodo

    Published 2015-01-01
    “…The research presented here is not yet an in-depth descriptive research study of the mathematical theory of multisorted tree-algebra, but a formal study on modelling hierarchical multiresource allocation problems.…”
    Get full text
    Article
  6. 8806

    A Consequence-Based Response Framework for More Resilient Shipping Amidst Growing Uncertainty by Helen Thanopoulou, Siri Pettersen Strandenes

    Published 2025-01-01
    “…In the context of preparedness theory, the authors propose the adoption by shipping businesses, in parallel to any other risk approaches and tools, of the Assessment-reaction-Recovery-Conversion (ArRC) framework for managing risk and of relevant key recovery indicators which may assist in (a) increasing resilience through focusing the recovery planning on consequence-oriented, root-neutral reactions and (b) in promoting a “bounce-back-better” frame of mind and action plan, contributing to faster and easier recovery after a shock of any type.…”
    Get full text
    Article
  7. 8807

    First-year hemp farmers’ motives and resources to cultivate hemp by Blake Colclasure, Jason Caldwell, Tyler Granberry, Christine Rost, Bailey Gasseling

    Published 2025-01-01
    “…The findings of this study align with components of Rogers’ Diffusion of Innovation Theory and recent research related to hemp and hemp-based prod­ucts. …”
    Get full text
    Article
  8. 8808

    Research on Immersion Teaching Method Based on 5G +XR Technology and Reinforcement Learning Model by Xueqing Xie

    Published 2022-01-01
    “…In addition, based on the analysis of XR teaching theory and its significance, an immersive XR teaching design method based on reinforcement learning model was proposed, and the working principle of immersive XR teaching system and the architecture method of teaching space were given. …”
    Get full text
    Article
  9. 8809

    Assessment of Chronic Pain in Children: Current Status and Emerging Topics by Tonya Mizell Palermo

    Published 2009-01-01
    “…Opportunities exist for further measurement validation in most domains, and further theory-driven treatment research to match goals of the treatment with specific interventions and outcomes.…”
    Get full text
    Article
  10. 8810

    Exploring behavioral determinants of residents’ ecological conservation in rural tourism development by Xizhou Tian, Yiling Jiang

    Published 2025-01-01
    “…Abstract This study explores the residents’ behavioral determinants of ecological conservation in rural tourism development, focusing on resident participation to promote sustainable development in the tourism industry. By integrating the Theory of Planned Behavior (TPB) and the Norm Activation Model (NAM), it examines the roles of subjective norm, responsibility attribution, ecological environmental risk perception, and human capital in shaping ecological conservation behavior. …”
    Get full text
    Article
  11. 8811

    Carbon emissions reduction in shipping based on four-party evolutionary game by Suyong Zhang, Xiyan Song

    Published 2025-02-01
    “…In order to realize a win-win situation between economic development and environmental benefits, this paper constructs a four-party evolutionary game model including the government, two homogeneous ports and shipping companies based on evolutionary game theory. By calculating the payoff matrices of the four parties and replicating the dynamic equations, according to the Jacobi matrix, we study and discuss the possible stabilization points of the model under five different scenarios. …”
    Get full text
    Article
  12. 8812

    Integrity of Best-Answer Assignments in Large Enrollment Classes; the role of Compulsory Attribution by Kurt Schmitz, Veda Storey

    Published 2024-12-01
    “…This study, grounded in Routine Activities Theory, describes a compulsory attribution method, called StartHere, that activates perceived guardianship in the form of interpersonal technical controls and social ties controls for offline digital assignments. …”
    Get full text
    Article
  13. 8813

    DYNAMICS OF AFRICAN TRADITIONAL AND CULTURAL PRACTICE AS A SOCIAL CONTROL MECHANISM: A DETERRENT THEORETICAL ANALYSIS ON THE ALEKWU BELIEF SYSTEM AMONG THE IDOMA PEOPLE IN NIGERIA by Daniel, Rosemary Onchi

    Published 2023-08-01
    “…This paper is anchored on deterrence theory of punishment as a framework to analyze the Alekwu belief system's deterrent effects on behavior within the Idoma community and provide a theoretical analysis of the Alekwu belief system as a deterrent mechanism that influences social norms, values, and behavior among the Idoma people. …”
    Get full text
    Article
  14. 8814

    Research on the Classification of Traditional Building Materials in Southern Fujian Using the Reflection Intensity Values of Ground-Based LiDAR by Tsung-Chiang Wu, Neng-Gang Kuan, Wei-Cheng Lu

    Published 2025-01-01
    “…This study addresses these challenges by using the laser reflectance intensity (I-value) for automated classification. Boxplot theory is applied to calibrate the data, remove noise, and establish polynomial regression equations correlating intensity with scanning distances. …”
    Get full text
    Article
  15. 8815

    Effects of Rapid Water-Level Fluctuations on the Stability of an Unsaturated Reservoir Bank Slope by Jin-Zhu Mao, Jia Guo, Yong Fu, Wei-Peng Zhang, Ya-Nan Ding

    Published 2020-01-01
    “…The stability analysis is based on the theory of unsaturated soil mechanics and saturated-unsaturated seepage and accounts for the hydromechanical coupling effect. …”
    Get full text
    Article
  16. 8816

    How does education and mindfulness matter to high school student’s pro-environmental behaviour? by Mariani Chandra, Partono Nyanasuryanadi, Burmansah Burmansah, Tjhia Khie Khiong, Julia Surya

    Published 2023-09-01
    “…The intervention given to the experimental group was built on social learning theory and adapted to the environment and socio-culture of Jakarta, Indonesia. …”
    Get full text
    Article
  17. 8817

    SOCIAL MEDIA APPROACH TO PEACE BUILDING IN KAJURU LOCAL GOVERNMENT by Abduljalil Abdulmumini, Babatunde Joseph AYODELE, Aleyomi Timileyin Paul

    Published 2023-09-01
    “…The research is guided by the Technological Determinism Theory, which posits that technology, including social media, shapes and influences societal behaviour and outcomes. …”
    Get full text
    Article
  18. 8818

    Rockburst Prediction Model Based on Entropy Weight Integrated with Grey Relational BP Neural Network by Yuchao Zheng, Heng Zhong, Yong Fang, Wensheng Zhang, Kai Liu, Jing Fang

    Published 2019-01-01
    “…The entropy weight method is used to calculate the objective weight of the characteristic factors, and the similarity between the samples is calculated by the combination of grey relational theory and the entropy method. The training sample of the BP neural network is selected by threshold determination. …”
    Get full text
    Article
  19. 8819

    CRISIS OF DEMOCRACY, POLITICAL DISTRUST AND AFRO-PESSIMISM IN NIGERIA POLITICS; THE FOURTH REPUBLIC IN FOCUS by LAMBE EMMANUEL OYEWOLE

    Published 2023-12-01
    “…Further, the constructive theory of idea was employed to show the relationship between the crisis of democracy, distrust and afro-pessimism. …”
    Get full text
    Article
  20. 8820

    Vibration Control by Means of Piezoelectric Actuators Shunted with LR Impedances: Performance and Robustness Analysis by M. Berardengo, A. Cigada, S. Manzoni, M. Vanali

    Published 2015-01-01
    “…Some of these algorithms derive from the theory of the tuned mass dampers. First a performance analysis is provided, comparing the attenuation achievable with these algorithms. …”
    Get full text
    Article