Showing 2,581 - 2,600 results of 99,603 for search '"analysis"', query time: 0.19s Refine Results
  1. 2581
  2. 2582
  3. 2583

    Governance of Relationship Risks in Megaprojects: A Social Network Analysis by Linlin Xie, Ting Han, Martin Skitmore

    Published 2019-01-01
    “…Based on a case study of the Zhuhai Port, which connects Hong Kong, Zhuhai, and Macao, this paper analyzes the relationship risk between stakeholders and corresponding risk management strategies using social network analysis (SNA). The findings show that stakeholders with a lower density and higher centrality in the network have comparatively a lower relationship risk. …”
    Get full text
    Article
  4. 2584
  5. 2585

    Finite Element Vibration and Dynamic Response Analysis of Engineering Structures by Jaroslav Mackerle

    Published 2000-01-01
    “…This bibliography lists references to papers, conference proceedings, and theses/dissertations dealing with finite element vibration and dynamic response analysis of engineering structures that were published from 1994 to 1998. …”
    Get full text
    Article
  6. 2586
  7. 2587

    Novice nurses’ professional competence: A qualitative content analysis by Zahra Mehri, Ladan Zarshenas, Mahnaz Rakhshan, Zahra Khademian, Manoosh Mehrabi, Zahra Jamshidi

    Published 2025-01-01
    “…Results: Following data analysis, 2570 initial codes were extracted forming four subcategories, two categories, and one theme. …”
    Get full text
    Article
  8. 2588
  9. 2589
  10. 2590

    2RPS/2SPS Parallel Mechanism and Kinematics Analysis by Zhou Yijun, Chen Yefu, Su Ronghai

    Published 2020-06-01
    “…The inverse positional solution equation is established by the space coordinate transformation equation and the closed vector method,and the forward position problem is performed by Newton iteration method in numerical analysis based on inverse solution. The first-order influence coefficient matrix is established by the fictitious mechanism method,and the numerical example is verified by the differential method based on Matlab. …”
    Get full text
    Article
  11. 2591

    Indian research on transcranial magnetic stimulation: A bibliometric analysis by Sangha Mitra Godi, Sai Krishna Tikka

    Published 2023-04-01
    “…Aims: We aimed to assess the existing and emerging trends of research on TMS as a diagnostic or therapeutic tool in India using bibliometric analysis. Results: A total of 146 publications, retrieved from various databases, were analyzed using Microsoft Excel and VOSviewer. …”
    Get full text
    Article
  12. 2592

    Dynamic Analysis of Flexible Rotor Based on Transfer Symplectic Matrix by Hao Deng, Xi Fang, Huachun Wu, Yiming Ding, Jinghu Yu, Xiaoyu Zhang, Hong Li, Chenwei Liu

    Published 2019-01-01
    “…To verify the proposed method in rotor critical speed, a numerical analysis is adopted. The simulation experiment results show that, in the calculation of high-order critical speed, especially when exceeding the sixth critical speed, the numerical accuracy of the transfer symplectic matrix method is obviously better than that of the reference method. …”
    Get full text
    Article
  13. 2593
  14. 2594
  15. 2595
  16. 2596

    The macroeconomics of abortion: A scoping review and analysis of the costs and outcomes. by Yana van der Meulen Rodgers, Ernestina Coast, Samantha R Lattof, Cheri Poss, Brittany Moore

    Published 2021-01-01
    “…Quantitative and qualitative data were extracted for descriptive statistics and thematic analysis. Of the 189 data extractions with macroeconomic evidence, costs at the national level are the most frequently reported economic outcome (n = 97), followed by impacts (n = 66), and benefits/value (n = 26). …”
    Get full text
    Article
  17. 2597
  18. 2598
  19. 2599

    Analysis on Potential Network Security Risk of LTE Scalable Deployment by Guorong Liu, Dongxin Liu, Jun Shen, Huamin Jin

    Published 2015-12-01
    “…Based on the introduction of the security design of LTE/SAE, a deep analysis of security risk was made including control plane's congestion, abnormal traffic attack, network convergence which might be brought during the LTE deployment. …”
    Get full text
    Article
  20. 2600