Suggested Topics within your search.
Suggested Topics within your search.
- Law reports, digests, etc 4
- Electric wiring, Interior 3
- MATHEMATICS / Mathematical Analysis 3
- Study and teaching 3
- Electric wiring 2
- Insurance requirements 2
- Law 2
- Mathematical analysis 2
- Methodology 2
- Moral and ethical aspects 2
- Research 2
- Tourism 2
- Analysis 1
- Buildings 1
- Children 1
- Communication 1
- Communication in rehabilitation 1
- Corporations 1
- Curricula 1
- Curriculum evaluation 1
- Curriculum planning 1
- Data processing 1
- Education 1
- Educational technology 1
- Electric apparatus and appliances 1
- Electric equipment 1
- Electric power systems 1
- Electrical engineering 1
- Emotions 1
- Emotions (Philosophy) 1
-
5381
The perceptions of consumers aged 18-30 of “lesbian” appeals in advertising
Published 2022-10-01“…In terms of attracting attention and interest, and being memorable to consumers, advertisements containing clear lesbian interaction are more effective than those with lower levels of homoerotic t …”
Get full text
Article -
5382
Changes in the Alpine environment
Published 2008-12-01“…The first section, on climate change, is based on the following recent reports: the IPCC 2007 summary report (IPCC 2007), the IPCC Europe report (Alcamo et al. 2007), and the ClimChAlp programme summary report (Prudent-Richard et al. 2008). These contain full, detailed bibliographies. The second section analyses recent or current calls for proposals, and projects which have been selected for funding.…”
Get full text
Article -
5383
The Value Chain of Moringa oleifera Plant and the Process of Producing Its Biodiesel in Ghana
Published 2022-01-01“…Furthermore, it requires suitable cultivation schedules that favor the growth of pods containing oil-rich seeds. The present work investigates the availability of land for Moringa cultivation in Ghana to increase the energy production from the plant. …”
Get full text
Article -
5384
Les récréations scientifiques : diffusion et succès de l’œuvre de vulgarisation de Gaston Tissandier en Espagne à la fin du XIXe siècle
Published 2015-07-01“…His writings and the illustrations contained in his books and articles were innovative. …”
Get full text
Article -
5385
Alt Lit, Illuminati Girl Gang and Porn Carnival: A Decade of Online Poetry Communities (2010-2020)
Published 2022-12-01“…The kind of twenty-first-century poetry that contains the language of late capitalism, products and brands, and resembles the syntax of text messaging, Instagram comments and memes, is a result of the collective rhetoric of a Millennial group of writers that came of age on the Internet. …”
Get full text
Article -
5386
Contribution of Cloud Accounting to Employment and Economic Growth: An Evaluation from Nigerian Public Sector
Published 2024-03-01“…The data obtained were analyzed using descriptive statistics and time series data containing ordinary least square technique. The results highlight a positive and statistically significant correlation between the adoption rate of cloud accounting, the number of cloud accounting software providers, and the General Cloud Accounting Metric. …”
Get full text
Article -
5387
Problem of Production of Shale Gas in Germany
Published 2014-02-01“…We discuss external and internal factors which determine position of the German government concerning the shale gas excavation: policy of the USA and the EU, positions of German political parties, influence of the lobbying communities and civic associations. The article contains rich information on vast variety of interests of actors in the domestic discussion. …”
Get full text
Article -
5388
Optimization Method of RFID Reader Antenna Deployment in Obstacle Environment Based on Improved FA
Published 2022-01-01“…The article establishes a new reader antenna constraint model based on the rectangular obstacle RFID antenna deployment optimization environment model and the reader antenna sensing model containing Gaussian distribution noise probability and applies the improved firefly algorithm to find the optimum with coverage rate, interference degree, and load balance function as multiobjective functions. …”
Get full text
Article -
5389
Research on Gearbox Impact Feature Extraction Method Based on the Improved ESMD and Dynamics Model
Published 2023-01-01“…The gearbox vibration signal contains nonlinear impact characteristics, and the significant feature information tends to be overwhelmed with other interference components. …”
Get full text
Article -
5390
Base Composition Characteristics of Mammalian miRNAs
Published 2013-01-01“…For this study, the author explored the base composition characteristics of miRNA genes from the six mammalian species that contain the largest number of known miRNAs. It was found that mammalian miRNAs are evolutionarily conserved and GU-rich. …”
Get full text
Article -
5391
Job crafting as a tool to increase motivation and employee engagement
Published 2023-11-01“…The development perspective of personnel basic skills in the 21st century is shown, which includes, in addition to the traditionally necessary professional hard skills and soft skills, also existential skills containing the ability to self-development and self-learning. …”
Get full text
Article -
5392
Anomaly detection algorithm based on Gaussian mixture variational auto encoder network
Published 2021-04-01“…Anomalous data, which deviates from a large number of normal data, has a negative impact and contains a risk on various systems.Anomaly detection can detect anomalies in the data and provide important support for the normal operation of various systems, which has important practical significance.An anomaly detection algorithm based on Gaussian mixture variational auto encoder network was proposed, in which a variational autoencoder was built to extract the features of the input data based on Gaussian mixture distribution, and using this variational autoencoder to construct a deep support vector network to compress the feature space and find the minimum hyper sphere to separate the normal data and the abnormal data.Anomalies can be detected by the score from the Euclidean distance from the feature of data to the center of the hypersphere.The proposed algorithm was evaluated on the benchmark datasets MNIST and Fashion-MNIST, and the corresponding average AUC are 0.954 and 0.937 respectively.The experimental results show that the proposed algorithm achieves preferable effects.…”
Get full text
Article -
5393
Self-Supervised Deep Hyperspectral Inpainting with Plug-and-Play and Deep Image Prior Models
Published 2025-01-01“…Hyperspectral images are typically composed of hundreds of narrow and contiguous spectral bands, each containing information regarding the material composition of the imaged scene. …”
Get full text
Article -
5394
Research on channel-fixed delay error estimation of wideband digital array radar
Published 2023-03-01“…A channel-fixed delay error estimation method was proposed to tackle the performance degradation of digital beamforming caused by the channel-fixed delay error of wideband digital array radar.First, the integer part of the fixed delay of the channel was estimated through the correlation integral peak of the baseband transmitted signal and the baseband received signal containing unknown delay parameters.Then, the fractional part of the fixed delay of the channel was estimated with parabolic interpolation by using the correlation peak and its adjacent two points.Finally, the multi-channel fixed delay error was calculated and compensated.The simulation results show that the multi-channel fixed delay estimation of wideband digital array radar can be realized on Xilinx xcku115.The estimative precision can reach 0.001~0.014 times the sampling gap when the signal-to-noise ratio of the input signal is 10~30 dB.The proposed method can meet the engineering application requirements and improve the performance of digital beamforming in wideband digital array radar.…”
Get full text
Article -
5395
THREE-DIMENSIONAL FINITE ELEMENT ANALYSIS OF DELAMINATION BUCKLING OF COMPOSITE LAMINATES WITH CONTACT EFFECT AT THE INTERFACES OF DELAMINATION
Published 2019-01-01“…This paper presents a finite-element approach to simulate the buckling process of the composite laminated plate containing a buried delamination. The delaminated composite laminates are analyzed using solid elements. …”
Get full text
Article -
5396
Asymmetrical Equivalence Classification – Cluster Affrication vs. Lenis Stops in the Speech of Polish Learners of English
Published 2023-12-01“…Two groups of speakers, comprising B1 level and C2 level learners, produced word lists containing both initial /tr-dr/ clusters, as well as singleton voiced stops /b, d, g/. …”
Get full text
Article -
5397
Amiodarone Pulmonary Toxicity
Published 2009-01-01“…This drug is an iodine-containing compound that tends to accumulate in several organs, including the lungs. …”
Get full text
Article -
5398
Potential for using sepiolite as dispersing agent in phenolic resin crosslinked natural rubber/silica composites
Published 2025-03-01“…The results clearly indicate that sepiolite clay can be applied as a dispersing agent in silica-containing rubber composites.…”
Get full text
Article -
5399
The Effect of Clay/Multiwall Carbon Nanotube Hybrid Fillers on the Properties of Elastomer Nanocomposites
Published 2018-01-01“…Also, a styrene-butadiene rubber (SBR) nanocomposite containing the hybrid nanofillers was prepared to improve the dispersion of nanofillers with SBR latex. …”
Get full text
Article -
5400
Detection of sybil attacks based on periodic ultra wide band distance information in WSN
Published 2016-08-01“…Concerning the problem that wireless sensor network is vulnerable to many kinds of network attacks and compromise of nodes,a complete detecting system of sybil attack based on periodic ultra-bandwidth distance information was proposed.Firstly,the distance between the adjacent nodes was ranging and the hello data packet was exchanged.Then,the distance estimation form was constructed by local estimation,and the form was contained in each node.Meanwhile,multiple distance matching check was periodically executed for each node in the network.Finally,when there was the distance matching between the legitimate node at least two different nodes,it would give an alarm and discard the sybil nodes.If there was no distance matching,the node continued normal operations.IEEE 802.15.4 peer to peer sensor networks were adopted in the simulation experiments.Experimental results show that the proposed system not only can tolerate changes in the number of complicated sybil attacks,but also can successfully deal with the occurrence of complicated,malleable sybil attack.In addition,the probability of false alarm is very small,the entire network performance and its consistency are not affected.…”
Get full text
Article