Suggested Topics within your search.
Suggested Topics within your search.
- Law reports, digests, etc 4
- Electric wiring, Interior 3
- MATHEMATICS / Mathematical Analysis 3
- Study and teaching 3
- Electric wiring 2
- Insurance requirements 2
- Law 2
- Mathematical analysis 2
- Methodology 2
- Moral and ethical aspects 2
- Research 2
- Tourism 2
- Analysis 1
- Buildings 1
- Children 1
- Communication 1
- Communication in rehabilitation 1
- Corporations 1
- Curricula 1
- Curriculum evaluation 1
- Curriculum planning 1
- Data processing 1
- Education 1
- Educational technology 1
- Electric apparatus and appliances 1
- Electric equipment 1
- Electric power systems 1
- Electrical engineering 1
- Emotions 1
- Emotions (Philosophy) 1
-
5061
Improving Environmental Permitting Systems: Integrated Permits in the Netherlands
Published 2014-10-01“…The first part of this article contains a brief overview of the concept of an integrated process for the granting of environmental permits. …”
Get full text
Article -
5062
The impact of human resources policies and practices on organizational citizenship behaviors
Published 2017-01-01“…The theoretical basis contains Milkovich and Boudreau (1994), Dessler (2002), Demo et al. (2012), among others, to address PPHR and Handy (1978), Organ (1990) and Siqueira (2003) to OCB. …”
Get full text
Article -
5063
Scheme of extending elliptic curve method to three phases
Published 2018-12-01“…Elliptic curve method for integer factorization (ECM) is one of the most popular integer factorization algorithms,and it was firstly proposed by Lenstra in 1985.The original ECM contained just first phase.Since its invention,researches about the algorithm and implementation emerged up,among which the most important improvement is the extension to two phases proposed by Brent and Montgomery.This improvement tremendously strengthened ECM's capacity and efficiency.Elliptic curve method was extended to three phases.Extension method is kind of like “mixing together” the first phase and second phase.Compared to the best current two phases ECM,the new algorithm shows 2 advantages.First,under the same factorization parameters,the proposed algorithm improves the probability of finding out prime factor at the expense of negligible increasement of time.Second,when searching the same prime factor,the proposed algorithm can utilize smaller “smoothness parameters”.…”
Get full text
Article -
5064
The Electronic guidance as a new technology for teaching in educational institutions
Published 2025-01-01“… Abstract: E-learning has become at the present time a necessity, as it has become one of the education techniques that are used in educational institutions and is inevitable in all educational institutions because it contains an integrated educational content, as the content provided by traditional education has become no longer meets the need. …”
Get full text
Article -
5065
Deer Flies, Yellow Flies and Horse Flies, Chrysops, Diachlorus, and Tabanus spp.
Published 2003-12-01“… The family Tabanidae, commonly known as horse flies, and deer flies, contains pests of cattle, horses and humans. In Florida there are 35 species of Tabanidae that are classed as economically important. …”
Get full text
Article -
5066
A survey on key technologies of privacy protection for machine learning
Published 2020-11-01“…With the development of information and communication technology,large-scale data collection has vastly promoted the application of machine learning in various fields.However,the data involved in machine learning often contains a lot of personal private information,which makes privacy protection face new risks and challenges,and has attracted more and more attention.The current progress of the related laws,regulations and standards to the personal privacy protection and data safety in machine learning were summarized.The existing work on privacy protection for machine learning was presented in detail.Privacy protection algorithms usually have influence on the data quality,model performance and communication cost.Thus,the performance of the privacy protection algorithms should be comprehensively evaluated in multiple dimensions.The performance evaluation metrics for the privacy protection algorithms for machine learning were presented,given with the conclusion that the privacy preservation on machine learning needs to balance the data quality,model convergence rate and communication cost.…”
Get full text
Article -
5067
A flexible continuous-wave quantum cryptography scheme with zero-trust security for Internet of Things
Published 2022-11-01“…In this configuration, the IoT controller contains a narrow linewidth laser as a real local oscillator. …”
Get full text
Article -
5068
A class of rings which are algebric over the integers
Published 1979-01-01“…(See [3]) In this paper we develop a structure theory for a class of rings which properly contains the periodic rings. In particular, an associative ring R is said to be a quasi-anti-integral (QAI) ring if for every a≠0 in R there exist a positive integer k and integers n1,n2,…,nk (all depending on a), so that 0≠n1a=n2a2+…+nkak. …”
Get full text
Article -
5069
Entre humour noir et réflexivité : écouter la voix de Moss dans No Country for Old Men
Published 2023-02-01“…The latter slows down the rhythm by introducing discontinuity in the sequence of dramatic actions and combines wisecracking and philosophical reflections; it is also endowed with a special status as it contains Moss’s last words in the text. Lastly, it is worth observing how the film adapts these theatrical or incongruous moments and what it achieves by reducing Moss’s spoken presence, replacing it by visual reflexivity and an increased dramatic tension.…”
Get full text
Article -
5070
Professional Disease Management Guide for Ornamental Plants
Published 2004-10-01“…Management tactics are outlined under the following key components of an IPM program: prevention, cultural control, scouting, physical control, biological control, and chemical control. Tables 1 - 4 contain important information on commercial products currently available for the management of diseases in ornamental plants. …”
Get full text
Article -
5071
The Perceived Usefulness of Patient Narrative Feedback in Primary Care Settings
Published 2024-08-01“…Research suggests that insights from patient narratives – stories about care experiences in patients' own words – contain information that can be used to improve care. …”
Get full text
Article -
5072
Delta Flower Beetle Trigonopeltastes delta (Forster 1771) (Insecta: Coleoptera: Scarabaeidae : Cetoniinae : Tribe, Trichiini)
Published 2018-07-01“…Trigonopeltastes delta belongs to the tribe Trichiini, which contains mostly flower-frequenting species. Although this species is commonly encountered where it occurs, many details of its life cycle and its potential economic importance remain poorly studied. …”
Get full text
Article -
5073
Manufacture and Characterisation of Silicalite Monoliths
Published 2000-03-01“…Multichannel monoliths containing up to 90% silicalite by weight and with cell densities up to 28 cells/cm 2 , wall thicknesses down to 0.6 mm and an overall diameter of 40 mm have been prepared from silicalite powder and sodium bentonite (as a binder) by the unit operations of paste preparation, extrusion, drying and firing. …”
Get full text
Article -
5074
Analysis of Field Modulated Magnetic Gear with Halbach Permanent Magnet Array
Published 2017-01-01“…The field modulated magnetic gear is a kind of non- contact magnetic drive device,and the Halbach permanent magnet array is a new permanent magnet structure which contains permanent magnets with variable magnetizing directions. …”
Get full text
Article -
5075
The Neolithic layer of the Maryeva Gora archaeological complex near the village of Kulbakovo, Rostov region: materials for the Collection of sites
Published 2024-12-01“…Limestones, marls and chalk of the Upper Cretaceous age are massively exposed on the slopes of rivers and gullies within the Southern Donbass. They contain layers of flint, which in ancient times served as a source for the production of stone tools. …”
Get full text
Article -
5076
Noninvasive in Vivo Imaging of Protein Kinase a Activity
Published 2008-01-01“…The model uses luciferase, which has been mutated to contain a target sequence of PKA, thus making luminescence from the enzyme dependent on its state of phosphorylation. …”
Get full text
Article -
5077
STRESS-REGULATED PROTOCOLS FOR FAST CHARGING IN LITHIUM-ION BATTERIES (MT)
Published 2023-01-01“…Furthermore, the constant-current stress-regulation(CCSR) protocol which contains an initial constant current stage and a following stress-regulated stage is proposed to resolve the issue of the theoretically infinite current at the beginning of the SR protocol. …”
Get full text
Article -
5078
Xerosis: from pathogenesis to solving practical problems
Published 2024-12-01“…Xerosis is a widespread symptom of dermatoses of various etiologies and pathogenetic mechanisms, which is recorded in people of different ages with a wide range of frequency and severity. The article contains the most current data on the features of the development and clinical manifestations of xerosis in terms of its connection with various factors of endo- and exogenous nature. …”
Get full text
Article -
5079
Synthesis of Novel Crosslinked Chitosans with a Higher Fatty Diacid Diglycidyl and Their Adsorption Abilities towards Acid Dyes
Published 2003-06-01“…On the other hand, CI Acid Red 138, which contains a dodecyl group in the chemical structure, was adsorbed to a considerable extent even at higher pH values, suggesting hydrophobic interaction between the alkyl group in the dye molecule and the hydrophobic crosslinker.…”
Get full text
Article -
5080
The Possibility of Balancing VOC Concentration Fluctuations by a Flow through an Activated Carbon Bed
Published 2011-02-01“…Waste gases from periodic processes often contain VOC concentrations which fluctuate significantly. …”
Get full text
Article