Suggested Topics within your search.
Suggested Topics within your search.
- Economic development 5
- Economic conditions 4
- Economic policy 4
- Information technology 4
- Women 4
- Study and teaching 3
- Women in economic development 3
- Civil war 2
- Communication 2
- Economic aspects 2
- Education 2
- Educational leadership 2
- Feminism 2
- Hospitality industry 2
- Internet in public administration 2
- Management 2
- Mass media 2
- Philosophy 2
- Political activity 2
- Political aspects 2
- Political leadership 2
- Politics and government 2
- Public administration 2
- Social aspects 2
- Social justice 2
- Technological innovations 2
- Women's rights 2
- methods 2
- Administration 1
- Agriculture 1
-
12201
Currencies Come and Go, But Employment Always Takes Root: Rethinking External Constraints and Monetary Sovereignty in the Periphery
Published 2025-01-01“…The proposed approach prioritizes full employment, the mobilization of domestic resources, and structural transformation through policies like import substitution. …”
Get full text
Article -
12202
CELLULOSIC MEMBRANES SUPPORTED WITH SILICA FROM RICE HUSK AND RICE HUSK ASH FOR SLOW RELEASE
Published 2025-02-01“…Characterization of the impregnated membranes was conducted by Fourier transformed infrared spectrometry (FTIR), microstructural (scanning electron microscopy (SEM)) and mechanical resistance analyses. …”
Get full text
Article -
12203
Log-Driven Behavior Discrimination of Process Robots Using Entropy Similarity
Published 2025-01-01“…Specifically, using the concept of log entropy, event logs are transformed to probability distributions of trace multisets and activity pairs multisets, respectively. …”
Get full text
Article -
12204
Diagnosis and Management of Atypical Chronic Myeloid Leukemia with a t(2;13)(q33;q12) Translocation
Published 2022-01-01“…Challenges of this diagnosis include clinical and biologic heterogeneity, the high risk of transformation to acute myeloid leukemia, and the lack of standard treatment options. …”
Get full text
Article -
12205
Intelligent control algorithms for posture and height control of four-leg hydraulic supports
Published 2025-01-01“…By conducting meticulous kinematic analysis of the hydraulic supports, a skeleton model of the main structural parameters of the hydraulic support was constructed. This approach transforms the traditional geometric relationship solutions of the main structure of the hydraulic supports into solutions based on the coordinate relationships of the main hinge points of the support, resulting in a mathematical expression for solving the support posture and height of the hydraulic supports. …”
Get full text
Article -
12206
MAD-Onto: an ontology design for mobile app development
Published 2025-02-01“…IntroductionMobile app development has rapidly evolved into a crucial aspect of modern technology, driving innovation across various industries and transforming user experiences globally. The dynamic nature of mobile technology requires developers to navigate a complex landscape of platforms, devices, and user requirements. …”
Get full text
Article -
12207
TockyPrep: data preprocessing methods for flow cytometric fluorescent timer analysis
Published 2025-02-01“…The package includes a trigonometric transformation method to elucidate the dynamics of Fluorescent Timer proteins. …”
Get full text
Article -
12208
Mongolia’s assertive and pragmatic role in India’s Connect Central Asia Policy: Current trajectory and Future Ahead
Published 2021-07-01“…However, the achievement or failure of India's Connect Asia Policy will depend upon India's political as well as its diplomatic will to transform India's interest in regional integration in reality.…”
Get full text
Article -
12209
The Importance of Ecosystem/Watershed Management Knowledge in Environmental Engineering Education
Published 2018-07-01“…The areas of engineering expertise, in line with changing technological approaches and social needs, are undergoing change and transformation over the years. Environmental problems are beyond local boundaries and it is necessary to understand the holistic (integrated) interactions of the effects of engineering applications over ecosystems on a global scale. …”
Get full text
Article -
12210
The Internal Recycle Reactor Enhances Porous Calcium Silicate Hydrates to Recover Phosphorus from Aqueous Solutions
Published 2017-01-01“…The modified P-CSHs were characterized by X-ray diffraction (XRD), N2 adsorption-desorption isotherms, and Fourier transform infrared spectroscopy (FT-IR). After compared with different samples, the modified P-CSHs-PEG2000 sample had larger specific surface area of 87.48 m2/g and higher pore volume of 0.33 cm3/g, indicating a high capacity for phosphorus recovery. …”
Get full text
Article -
12211
The influence of prenatal environmental conditions on the weight of newborn domestic pigs
Published 2017-11-01“…In principle, it can be assumed that when a population reaches a certain level, when the mean value of the trait and the gene pool are optimal (the selection pressure vectors are mutually balanced), selection becomes less effective in transforming the average phenotype than changing environmental conditions. …”
Get full text
Article -
12212
A core-shell magnetic layered double hydroxide composite material for the effective decolorization of phenol red
Published 2022-06-01“…The characterization of Fe3O4/NiMn-LDH were recognized by Fourier transform infrared (FTIR) spectroscopy and scanning electron microscopy (SEM). …”
Get full text
Article -
12213
Prediction method of 0day attack path based on cyber defense knowledge graph
Published 2022-02-01“…To solve the difficulty of attack detection caused by the 0day vulnerability, a prediction method of 0day attack path based on cyber defense knowledge graph was proposed.The cyber defense knowledge graph was constructed to refine the discrete security data such as threat, vulnerability and asset into the complete and high-related knowledge format by extracting concepts and entities related to network attack from cyber security ontology research finds and databases.Based on the knowledge integrated by the knowledge graph, assumed and restricted the unknown attributes such as the existence, availability and harmfulness of 0day vulnerabilities, and model the concept of "attack" as a relationship between attacker entities and device entities in the knowledge graph to transform the attack prediction to the link prediction of knowledge graph.According to this, apply path ranking algorithm was applied to mine the potential 0day attack in the target system and construct the 0day attack graph.Predicted the 0day attack path by utilizing the scores output by classifiers as the occurrence probabilities of single step attack and computing the occurrence probabilities of different attack paths.The experimental result shows that with the help of complete knowledge system provided by knowledge graph, the proposed method can reduce the dependence of prediction analysis on expert model and overcome the bad influence of 0day vulnerability to improve the accuracy of 0day attack prediction.And utilizing the characteristic that path ranking algorithm reasons based on the structure of graph can also help to backtrack the reasons of predicting results so as to improve the explainability of predicting.…”
Get full text
Article -
12214
Reimagining Counterstruggle as a Comprehensive Theoretical Framework for Policy Design and Implementation: Dimensions and Factors of Struggle and Resistance
Published 2024-12-01“…In this context, political assets can quickly transform into liabilities, and ignored liabilities can become invaluable assets. …”
Get full text
Article -
12215
Optimization of the Fabrication of Sustainable Ceramsite Adsorbent from Coal Fly Ash/Waterworks Sludge/Waste Glass for Decolorization of Malachite Green
Published 2023-01-01“…Synchronous fluorescence, two-dimensional correlation spectroscopy (2D-COS), and Fourier transform infrared spectroscopy (FT-IR) proved that the sensitivity of the C-O/C-O-O functional groups of the carbohydrates on the surface of the X-Com-ceramsite has a higher binding affinity toward MG as the initial concentration of MG changes.…”
Get full text
Article -
12216
Morphological and Molecular study of Seven New Recorded of Ostracod in - Kurdistan Region, Iraq
Published 2024-12-01“…., Nerium oleander and Nasturtium officinale), algal municipal (Anabaena and Chlorella vulgaris), were also collected zooplanktonic net was used in the sampling mesh-size (55 μm pore size).Samples placed in an oxygen instrument for about one week after being transformed into the laboratory to allow the ostracod species to grow. …”
Get full text
Article -
12217
A text classification method by integrating mobile inverted residual bottleneck convolution networks and capsule networks with adaptive feature channels
Published 2025-01-01“…Integrating the advantages of Mobile Inverted Bottleneck Convolutional Networks and Capsule Networks, this model comprehensively considers text sequence information, word embeddings, and contextual dependencies to capture both local and global information about the text effectively. It transforms from the original text matrix to a more compact and representative feature representation. …”
Get full text
Article -
12218
Jan Václav Michna z Vacínova a emblematická výzdoba kostela sv. Jakuba Většího v Kratonohách
Published 2007-01-01“…The originally gothic object was markedly rebuilt within the years 1710-1711 in baroque style. The building transformation and a new interior decoration were iniciated by Jan Václav, Count Michna of Vacínov to whom the landed estate of Kratonohy belonged in the years 1701-1716. …”
Get full text
Article -
12219
Effective dipole model for electrostatic interactions between polarizable spherical particles in particle scale simulations
Published 2025-01-01“…Abstract Despite their widespread adoption, particle-scale simulation methods, such as the Discrete Element Method (DEM), for electrically charged particles in several natural processes and industrial transformations do not include realistic polarization effects. …”
Get full text
Article -
12220
A Multi-Index Generative Adversarial Network for Tool Wear Detection with Imbalanced Data
Published 2020-01-01Get full text
Article