Suggested Topics within your search.
Suggested Topics within your search.
- Law reports, digests, etc 4
- Electric wiring, Interior 3
- MATHEMATICS / Mathematical Analysis 3
- Study and teaching 3
- Electric wiring 2
- Insurance requirements 2
- Law 2
- Mathematical analysis 2
- Methodology 2
- Moral and ethical aspects 2
- Research 2
- Tourism 2
- Analysis 1
- Buildings 1
- Children 1
- Communication 1
- Communication in rehabilitation 1
- Corporations 1
- Curricula 1
- Curriculum evaluation 1
- Curriculum planning 1
- Data processing 1
- Education 1
- Educational technology 1
- Electric apparatus and appliances 1
- Electric equipment 1
- Electric power systems 1
- Electrical engineering 1
- Emotions 1
- Emotions (Philosophy) 1
-
5581
Insect and Mite Integrated Pest Management in Florida Cotton
Published 2017-01-01“…The guide includes links to additional UF/IFAS EDIS articles, as well as external sources of information on arthropod management. The guide also contains a searchable table of registered insecticides, herbicides, and fungicides for Florida cotton.edis.ifas.ufl.edu/in1111 …”
Get full text
Article -
5582
“Unnatural, unnatural, unnatural, unnatural unnatural” . . . but real? The Toolbox Murders (Dennis Donnelly, 1978) and the Exploitation of True Story Adaptations
Published 2016-07-01“…This comes at the conclusion of a film which contains a number of narratological incoherencies and ideological incongruities, as is typical of exploitation films of the period. …”
Get full text
Article -
5583
THE ANALYSIS OF INFORMATION TECHNOLOGIES USAGE FOR ACADEMIC PURPOSES IN ENGLISH LANGUAGE TEACHING AND LEARNING AT UNIVERSITAS BANGKA BELITUNG
Published 2019-08-01“…The study seeks to find out the frequency and the purposes of IT usage by students and lecturers in the English learning environment. A questionnaire containing questions about the frequency and the use of IT in the teaching and learning process was disseminated to the students and the lecturers of the English Literature department at the University of Bangka Belitung. …”
Get full text
Article -
5584
PERAMALAN PERGERAKAN LALU LINTAS UDARA DI BANDARA INTERNASIONAL I GUSTI NGURAH RAI MENGGUNAKAN ANALISIS INTERVENSI
Published 2024-11-01“…The aim of this research is to model and forecast air traffic movements at I Gusti Ngurah Rai International Airport that contains an intervention. The intervention analysis consisted of two functions, namely the step function and the pulse function. …”
Get full text
Article -
5585
Viscosity model for fully liquid silicate melt
Published 2012-01-01“…A model for estimating the viscosity of silicate melt as derived in our previous paper is extended to the system containing MgO, CaO, SrO, BaO, Li2O, Na2O, K2O, which can express the nonlinear variation of activation energy of viscosity with the composition. …”
Get full text
Article -
5586
Prediction and evaluation of residual life of casing with corrosion defects
Published 2024-01-01“…Therefore, there is an urgent need to conduct residual life and safety evaluations of old oil field casings.MethodsBased on the von Mises equivalent stress yield criterion, a three-dimensional finite element calculation model of casings containing corrosion defects was established to analyze the influence law of corrosion pit depth and angle on casing stress distribution. …”
Get full text
Article -
5587
A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing
Published 2012-01-01“…Oblivious transfer (OT) protocols mainly contain three categories: 1-out-of-2 OT, 1-out-of-n OT, and k-out-of-n OT. …”
Get full text
Article -
5588
THE INFLUENCE OF CHRISTIAN EDUCATION IN CURBING RELIGIOUS CONFLICTS AND TERRORISM IN NORTHERN NIGERIA
Published 2023-12-01“…There is a loss of values and effective Christian Education could really curb religious conflict and terrorism in the northern Nigeria and Christian Religious Education curriculum which contains Character formation would be an instrument to educate and give an orientation that enhances curbing conflicts and terrorism. …”
Get full text
Article -
5589
Taking Note: Challenges of Dealing with Graphical Content in TEI
Published 2020-01-01“…This paper describes the ongoing development of a TEI-conformant model for the encoding of hybrid primary sources containing text and graphical components on a similar level of semantic meaning. …”
Get full text
Article -
5590
Une cachette d’objets de valeur des années 260 apr. J.-C. dans une villa de la cité des Nerviens (Merbes-le-Château, Belgique)
Published 2010-12-01“…It consists of two copper-allied caldrons and of a small casket containing two silver spoons, a purse with 122 silver antoniniani, a glass flask and four worn sestertii deposited on a plaque dedicated to the Danubian Riders. …”
Get full text
Article -
5591
Contaminants in the Urban Environment: Pharmaceuticals and Personal Care Products (PPCPs)—Part 1
Published 2015-05-01“… Pharmaceuticals and personal care products contain a variety of chemical substances that enter household wastewater from bath and shower, sinks, and washers and ultimately find their way into the environment. …”
Get full text
Article -
5592
Selected Topics on Business Information Systems Research: Editorial Introduction to Issue 26 of CSIMQ
Published 2021-04-01“…Business Information Systems research deals with the conceptualization, development, introduction, maintenance and utilization of systems for computer-assisted information processing within companies and enterprise-wide networks. This CSIMQ issue contains five articles that deal with various information system (IS) issues, including IS security, product-related ISs, blockchain technology and sensor technology. …”
Get full text
Article -
5593
Cuban Agriculture Before 1959: The Social Situation
Published 2004-09-01“…Díaz-Briquets (1983; 1986) contain useful information on several of the variables discussed in this fact sheet. …”
Get full text
Article -
5594
Propagation Properties of Airy Beam through Periodic Slab System with Negative Index Materials
Published 2018-01-01“…As to losses slab system contained DNMs, the smaller the collision frequencies are, the better the Airy beam quality is formed. …”
Get full text
Article -
5595
Integrated risk governance in the Yungui Plateau, China: The 2008 ice-snow storm disaster
Published 2012-05-01“…Yungui Plateau in Southwestern China is regarded as one of the major bio- and cultural diversity centers in the world because it contains a remarkable variety of ecological niches and ethnic groups. …”
Get full text
Article -
5596
mVulSniffer: a multi-type source code vulnerability sniffer method
Published 2023-09-01“…Given the problem that the code slice used by existing deep learning-based vulnerability sniffer methods could not comprehensively encompass the subtle characteristics between vulnerability classes, and a single deep learning sniffer model had insufficient ability to learn long context-dependent information between cross-file and cross-function code statements, a multi-type source code vulnerability sniffer method was proposed.Firstly, fine-grained two-level slices containing the types of vulnerabilities were extracted based on the control dependency and data dependency information in program dependency graph.Secondly, the two-level slices were transformed into initial feature vector.Finally, a fusion model of deep learning vulnerability sniffer suitable for two-level slices was constructed to achieve accurate vulnerability detection of multi-type source code.The experimental results on multiple synthetic datasets and two real datasets show that the proposed method outperforms the existing multi-type source code vulnerability sniffer methods.…”
Get full text
Article -
5597
Research and implementation of reputation-based inter-domain routing selection mechanism
Published 2023-06-01“…To solve the problem of lack of validation for exchanging messages in BGP, a inter-domain routing mechanism, which consisted of a reputation evaluation mechanism and a reputation-based BGP optimal routing algorithm, was proposed.The reputation evaluation mechanism used a distributed autonomous system (AS) alliance architecture, which divided node routing behavior in detail.The service domain and observation weight were used as indicators to quantify the impact of node behavior.By designing a feedback mechanism, the reputation value not only reflected the good and bad of nodes, but also reflected the node’s resistance to malicious attacks.The reputation-based BGP routing selection algorithm adds a “security” policy to the existing routing selection algorithm by filtering routes containing low-reputation nodes and selecting the best route among high reputation routes.The experimental results show that the proposed mechanism outperform most existing reputation mechanisms by avoiding routes with vulnerable nodes and restraining the propagation of illegal routes, thereby providing a more secure inter-domain routing environment.…”
Get full text
Article -
5598
Spatial Complexity of a Predator-Prey Model with Holling-Type Response
Published 2014-01-01“…We focus on a spatially extended Holling-type IV predator-prey model that contains some important factors, such as noise (random fluctuations), external periodic forcing, and diffusion processes. …”
Get full text
Article -
5599
Pedagogical reflections from a transnational PhD course in ageing
Published 2025-02-01“…It was inspired by three collaborative learning theories and contained a number of non-traditional learning activities. …”
Get full text
Article -
5600
Public politicians electoral potential in social media
Published 2022-03-01“…Feedback in the accounts of current politicians was assessed, including containing critical discourse. According to the results of the study, the author concluded that the creation of a full-fledged feedback channel with a potential electorate positively affects the image of a public politician, allows reducing the feedback amount with negative comments, is a successful interaction form between a politician and the electorate and increases his electoral potential. …”
Get full text
Article