Suggested Topics within your search.
Suggested Topics within your search.
- Philosophy 11
- History 9
- Moral and ethical aspects 8
- Economic development 7
- Economic policy 5
- History and criticism 5
- Mass media 5
- Social aspects 5
- Social service 5
- Economic conditions 4
- Management 4
- Marketing 4
- Quantum theory 4
- Research 4
- Advertising 3
- Business communication 3
- Communication 3
- Criticism 3
- Culture 3
- Economics 3
- Education 3
- Hospitality industry 3
- Information technology 3
- Information theory 3
- Jurisprudence 3
- Law 3
- Literature 3
- MATHEMATICS / Mathematical Analysis 3
- Number theory 3
- Problems, exercises, etc 3
-
981
A Hesitant Fuzzy Set Approach to Ideal Theory in Γ-Semigroups
Published 2018-01-01“…We apply the hesitant fuzzy sets theory to Γ-semigroups and provide some characterizations of hesitant fuzzy left (right and bi-) ideals. …”
Get full text
Article -
982
A Dynamic Modeling Approach: Simplifying DFIG Theory, Simulation, and Analysis
Published 2025-01-01“…As pioneering examples, several effective simulations are carried out, aiming to provide new researchers in this field with a more practical, in-depth, and intuitive understanding of the theory and operating principle of DFIGs in both stand-alone and grid-connected operations. …”
Get full text
Article -
983
Reasons and solutions for the disconnect between transfusion medicine theory and clinical practice
Published 2025-01-01Subjects: Get full text
Article -
984
Game theory-based malware propagation model for wireless sensor network
Published 2018-11-01“…Malware propagation is an important security problem faced by wireless sensor network (WSN).From the perspective of game theory,the microscopic mechanism of malware propagationin WSN was analyzed.The attack-defense game model of WSN was built,and the mixed Nash equilibrium solution of the model was obtained.With the solution,the infection probability of malware was determined and the theoretical model for the malware propagation in WSN was established.Meanwhile,a cellular automata model was proposed to simulate malware propagation process in WSN.Simulation experiments reveal the relationship between the propagation speed and the game parameters.The results of this study are of significance for people to formulate measures to reduce the propagation speed of malware.…”
Get full text
Article -
985
Fault Diagnosis Method for Rolling Element Bearing by Using Quantum Theory
Published 2018-01-01“…In order to overcome the disadvantages of traditional denosing method always reduces useful information while it removes noise,a fault diagnosis method combining quantum superposition and probability statistic applied to rolling element bearing is proposed,which uses the specific expression in quantum theory. This method utilizes Laplace mathematics statistics models to describe the dual-tree complex wavelet transform coefficient distribution of vibration signal. …”
Get full text
Article -
986
Resource allocation based on optimal transport theory in IoT edge computing
Published 2021-06-01Subjects: Get full text
Article -
987
Théorie comptable de la monnaie et de la finance
Published 2022-08-01Subjects: Get full text
Article -
988
Bound states of massive complex ghosts in superrenormalizable quantum gravity theories
Published 2025-01-01“…Already in the simplest superrenormalizable case, the theory has a six-derivative Lagrangian, admitting either a real or complex spectrum of masses. …”
Get full text
Article -
989
Violence on street children: Looking through Erikson’s psychosocial development theory
Published 2020-03-01Subjects: “…global health; missing stage; psychosocial development theory; street children; violence.…”
Article -
990
Spherically Symmetric Solution in (1+4)-Dimensional f(T) Gravity Theories
Published 2014-01-01“…A nondiagonal spherically symmetric tetrad field, involving four unknown functions of radial coordinate r plus an angle Φ, which is a generalization of the azimuthal angle ϕ, is applied to the field equations of (1+4)-dimensional f(T) gravity theory. A special vacuum solution with one constant of integration is derived. …”
Get full text
Article -
991
Adapting the Middle Section of Verse 4 of Surah Maryam to Order Theory
Published 2019-06-01Subjects: “…order theory…”
Get full text
Article -
992
Determining substitutability of cloud services supported by semantically extended type theory
Published 2016-02-01Subjects: Get full text
Article -
993
The theory of critical distances applied to problems in fracture and<br />fatigue of bone
Published 2013-04-01“…The theory of critical distances (TCD) has been applied to predict notch-based fracture and fatigue in a wide range of materials and components. …”
Get full text
Article -
994
Invariant manifolds and alternative approaches to reductive perturbation theory: dissipative systems
Published 1984-01-01Subjects: “…reductive perturbation theory…”
Get full text
Article -
995
CALCULATION OF GROWTH OF SKELETON DENDRITES AT ALLOYS SOLIDIFICATION USING THEORY OF FRACTALS
Published 2008-05-01Get full text
Article -
996
Basic Views of School-Based Management Theory in Improving Education Quality
Published 2023-06-01Get full text
Article -
997
Analysis of Sustainable Development in Local Spaces: The Application of the Theory of Fuzzy Sets
Published 2016-01-01“…In order to undertake this study, an Index of Sustainable Local Development (IDSL) was created drawing on the theory of fuzzy logic. This index permits us to analyze and compare sustainable development in three dimensions of the environmental system at the local level: social, environmental and economic. …”
Get full text
Article -
998
Plato’s Theory of Mimesis in the Cratylus: from Ideal Language to Ordinary Language
Published 2024-10-01Subjects: Get full text
Article -
999
Some Applications of Bayes' Rule in Probability Theory to Electrocatalytic Reaction Engineering
Published 2011-01-01Get full text
Article -
1000
Some invariant theorems on geometry of Einstein non-symmetric field theory
Published 1983-01-01Get full text
Article