Showing 1,081 - 1,100 results of 18,083 for search '"Theory"', query time: 0.09s Refine Results
  1. 1081
  2. 1082
  3. 1083

    La théorie économique à l’épreuve de la covid-19 by Philippe Batifoulier, Bruno Boidin, Jean-Paul Domin, Amandine Rauly

    Published 2021-07-01
    “…Health issues must be seen as social issues and the fundamental right to health cannot be reduced to a mere application of the usual categories of neoclassical theory.…”
    Get full text
    Article
  4. 1084

    Game-Theory-Based Approach for Energy Routing in a Smart Grid Network by June S. Hong, Mihui Kim

    Published 2016-01-01
    “…In this paper, we present an approach utilizing the game theory for effective and efficient energy routing, which is a novel and challenging procedure for a smart microgrid network. …”
    Get full text
    Article
  5. 1085
  6. 1086
  7. 1087

    Separation effectiveness of ideal ion exchange membranes: Application of the Gibbs-Donnan theory. by Jacek Waniewski, Leszek Pstras, Mauro Pietribiasi

    Published 2025-01-01
    “…Based on the extended Debye-Hückel theory, we also provide analogous equations (general and for specific cases) for systems with non-ideal ionic mixtures. …”
    Get full text
    Article
  8. 1088

    Statistical Investigation of Bearing Capacity of Pile Foundation Based on Bayesian Reliability Theory by Zuolong Luo, Fenghui Dong

    Published 2019-01-01
    “…In order to improve the estimation accuracy of bearing capacity of pile foundation, a new forecast method of bearing capacity of pile foundation was proposed on Jeffrey’s noninformative prior using the MCMC (Markov chain Monte Carlo) method of the Bayesian theory. The proposed approach was used to estimate the parameters of Normal distribution. …”
    Get full text
    Article
  9. 1089
  10. 1090
  11. 1091

    Research on distributed multi-access edge computing based on mimic defense theory by Hongyi ZHU, Xiaoyuan LU, Yi LI

    Published 2019-09-01
    “…The highly efficient network resources are provided by multi-access edge computing at the edge of the network,but high security capability is required also due to its distributed position and organization.Based on mimic defense theory,mimic defense structure for distributed multi-access edge computing was proposed.By segmenting data,padding check data and processing data at multiple edge node,dynamic scheduling and decision-making functions according to checksum were implemented.The simulation results show that with the increase of delay cost,the data manipulation and leak rates can be reduced effectively by the proposed structure.The edge node scheduling strategy based on trust and cost is proposed to improve the efficiency and security of the system.…”
    Get full text
    Article
  12. 1092

    Effective Thermal Conductivity of Open Cell Polyurethane Foam Based on the Fractal Theory by Kan Ankang, Han Houde

    Published 2013-01-01
    “…Based on the fractal theory, the geometric structure inside an open cell polyurethane foam, which is widely used as adiabatic material, is illustrated. …”
    Get full text
    Article
  13. 1093

    Research on the Traffic Flow Control of Urban Occasional Congestion Based on Catastrophe Theory by Yang Xu, Duo Jia Zhang, Xin Zhang, Kin Keung Lai, Bing Su

    Published 2021-01-01
    “…Aimed at the problem of occasional congestion control, the cusp catastrophe theory is used to establish the catastrophe model of the urban road system under occasional congestion, finding breakpoints and analyzing stability after urban road system catastrophes by constructing the energetic function; based on the catastrophe characteristics of the urban road system, the feasibility method of congestion control is discussed. …”
    Get full text
    Article
  14. 1094
  15. 1095
  16. 1096
  17. 1097

    Exact Solution of Modified Veselov–Novikov Equation and Some Applications in the Game Theory by Damir Kurmanbayev

    Published 2020-01-01
    “…An exact solution of the mVN equation is found on the example of a higher order Enneper surface, and given transformations are applied in the game theory via Kazakh proverbs in terms of trees.…”
    Get full text
    Article
  18. 1098

    Phenomenological construction of metal photonic topological insulators based on theory of characteristic modes by Lili Dai, Jie Meng, Weiwen Li

    Published 2025-01-01
    “…The mode crossing avoidance in the theory of characteristic modes corresponds to the mode reversal at degeneracy points. …”
    Get full text
    Article
  19. 1099
  20. 1100