Suggested Topics within your search.
Suggested Topics within your search.
- Law reports, digests, etc 4
- Electric wiring, Interior 3
- MATHEMATICS / Mathematical Analysis 3
- Study and teaching 3
- Electric wiring 2
- Insurance requirements 2
- Law 2
- Mathematical analysis 2
- Methodology 2
- Moral and ethical aspects 2
- Research 2
- Tourism 2
- Analysis 1
- Buildings 1
- Children 1
- Communication 1
- Communication in rehabilitation 1
- Corporations 1
- Curricula 1
- Curriculum evaluation 1
- Curriculum planning 1
- Data processing 1
- Education 1
- Educational technology 1
- Electric apparatus and appliances 1
- Electric equipment 1
- Electric power systems 1
- Electrical engineering 1
- Emotions 1
- Emotions (Philosophy) 1
-
5981
El papel de Suecia en la guerra civil española (1936-1939)
Published 2018-06-01“…In total, around 550 Swedish citizens decided to fight with the International Brigades to contain the pro-Franco troops, a significant number of people for a country with a population of only 6.2 million inhabitants. …”
Get full text
Article -
5982
Fuzzy Diagnostic System for Oleo-Pneumatic Drive Mechanism of High-Voltage Circuit Breakers
Published 2013-01-01“…Simulation results are presented based on an input data set, which contains hourly records of operating points for a time horizon of five years. …”
Get full text
Article -
5983
Efficacy of Lycopene Extracted from Tomato on Liver Enzymes and Tissues of Animal Model Infected with Acrylamide
Published 2025-01-01“…A change was also noted in the liver tissue after treatment with lycopene compared to the infected group, as there was an improvement in the central vein, lobules, hepatic sinusoids, and Coover cells after they were congested, expanded, and contained bloody bleeding. In conclusion, lycopene as an antioxidant phyto-component, can protect liver against damages caused by acrylamide (or acrylic amide). …”
Get full text
Article -
5984
Range of effectiveness of hydraulic diameter model as an analytical solution for rectangular microchannels
Published 2025-01-01“…The exact solution for flow in a rectangular cross-sectional channel has a complex point that contains an infinite sum term. The flow depends on the depth-width ratio of the rectangular channel's cross-section, ε. …”
Get full text
Article -
5985
Hoarding knowledge or hoarding stress? Investigating the link between digital hoarding and cognitive failures among Chinese college students
Published 2025-01-01“…This study aims to explore the impact of digital hoarding on cognitive failures, examining fatigue as a mediator and mindfulness as a moderator.MethodA total of 801 participants were recruited to complete a survey that contained measures of digital hoarding, fatigue, mindfulness, and cognitive failures. …”
Get full text
Article -
5986
Bayesian Inference of Elevation to Reduce Large Interpolation Errors in 2-d Road Features Draped Over Digital Elevation Models
Published 2024-01-01“…The usual approach for adding elevation data to two dimensional (2-d) vector features in a Geographic Information System (GIS) is to infer heights from a Digital Elevation Model (DEM), either through traditional (naïve) interpolation, Kriging, or deep learning. Where the terrain contains steep slopes, however, any of these approaches can generate large errors due to the limited resolution of the DEM, and model error in the DEM concept itself. …”
Get full text
Article -
5987
Study on Influence of Spalling Fault Evolution on Meshing Stiffness of Spur Gear
Published 2021-06-01“…On tooth surface spalling morphology evolution process of the gear pair meshing stiffness,to expand the edge line with the original rectangular flake edge line Angle peel fault evolution,combined with the method of potential energy building containing flaking fault gears meshing stiffness calculation model. …”
Get full text
Article -
5988
Evolution of the C-Type Lectin-Like Receptor Genes of the DECTIN-1 Cluster in the NK Gene Complex
Published 2012-01-01“…The human C-type lectin-like receptors encoded in the DECTIN-1 cluster within the NK gene complex contain prominent receptors with pattern recognition function, such as DECTIN-1 and LOX-1. …”
Get full text
Article -
5989
Possessives with kinship terms in Italian and Italo-Romance dialects
Published 2024-12-01“… This study investigates the acceptability of constructions containing third-person possessives combined with singular and plural kinship terms in adult bilectal speakers of Italian and different Italo-Romance varieties spoken in six different geographic areas in northern, central, and southern Italy. …”
Get full text
Article -
5990
Processed beetroot (Beta vulgaris L.) as a natural antioxidant in mayonnaise: Effects on physical stability, texture and sensory attributes
Published 2016-12-01“…Although no significant differences (P > 0.05) were detected between the mayonnaise samples containing beetroot and the commercial control, the latter was less susceptible to oxidation during storage. …”
Get full text
Article -
5991
Optimization to Hydrothermal Liquefaction of Low Lipid Content Microalgae Spirulina sp. Using Response Surface Methodology
Published 2018-01-01“…Our aim is to evaluate the interaction of different factors on the bio-oil production through HTL using microalgae that contains relatively low lipid content and high protein. …”
Get full text
Article -
5992
Cancer Cell Adhesion and Metastasis: Selectins, Integrins, and the Inhibitory Potential of Heparins
Published 2012-01-01“…Preclinical studies confirm that heparin possesses antimetastatic activities that lead to attenuation of metastasis in various animal models. Heparin contains several biological activities that may affect several steps in metastatic cascade. …”
Get full text
Article -
5993
Enhancing Sentiment Analysis with a CNN-Stacked LSTM Hybrid Model
Published 2025-01-01“…The new model mentioned in this research is a hybrid model containing convolutional neural network (CNN), stacked multi-layer long short-term memory (LSTM) and max pooling layers. …”
Get full text
Article -
5994
Islamic law review on use of Go-Pay in payment of Zakat
Published 2020-04-01“…To achieve the objectives of this study the authors use the method of library research, namely by examining documents both published officially or contained in all printed materials, or in electronic form relating to the topics discussed. …”
Get full text
Article -
5995
Experimental and Theoretical Study of Internal Pressure Loads on Boundary Walls under Gusty Wind Conditions
Published 2022-01-01“…This work contains an acceptable solution to the most practical interest to reduce the internal pressure load variations acting on closed envelops (i.e., inner building walls, fairing of rocket, and missile payloads) under gusty wind conditions. …”
Get full text
Article -
5996
KALIMAT INVERSI DALAM BAHASA INDONESIA
Published 2016-06-01“…Based on the results of data analysis, there are several types of sequence patterns syntactic function contained in the phrase inversion Indonesian namely (1) PS, (2) POS, (3) P-Pel-S, (4) PO-Pel-S, (5) PS with Specification, (6) POS with Description, (7) P-Pel-S with the description, and (8) PO-Pel-S with a description. …”
Get full text
Article -
5997
Synthesis and Characterization of Pine Needles Reinforced RF Matrix Based Biocomposites
Published 2008-01-01“…A thermosetting resin based composite, containing approximately 10, 20, 30 and 40% of natural fiber by weight, has been obtained by adding pine needles to the Resorcinol-Formaldehyde (RF) resin. …”
Get full text
Article -
5998
Application sensors in smart cities deployment
Published 2023-03-01“…Dossier Planes and Control Planes are deflected from each other as an effect of the maneuvers of the data plane acts as the dossier aiding designs and leaving behind the contained conclusion making to the bureaucracy that is to say concentrated that is dubbed as boss. …”
Get full text
Article -
5999
Privacy preserving friend discovery cross domain scheme using re-encryption in mobile social networks
Published 2017-10-01“…In order to guarantee the users’ privacy in the process of making friends in the mobile social networks,a new scheme of proxy re-encryption privacy protection in the cross-domain environment was introduced.The scheme employed the cross-domain multi-authority to sharing secret keys,so as to realize the access and shave of the cross-domain users data.And the secret keys of users’ attributes were re-encrypted,based on the technology of the proxy re-encryption and attribute encryption,to achieve the friends matching under the conditions of extending the access policy.Meanwhile,in purpose of enhancing the privacy of users’ data,the technology which contained the separation of users’ privacy ciphertext and secret keys was adopted.Based on that,problems in the existing system such as user data’s inability to be shared cross-cloud,less matching during the process of making friends and users’ inability to make friends when offline had been addressed.Security and experimental analysis show that this scheme can achieve chosen plaintext attack (CPA) security,ensure the privacy of friend discovery,and that is more effective than existing solutions.…”
Get full text
Article -
6000
Interactions of Cu-substrates with titanium-alloyed Sn-Zn solders
Published 2006-01-01“…The first one consisted in differential thermal analyses of Sn-Zn nearly eutectic alloys containing from 1.3 to 2.2 wt. % Ti. Diffusion couples consisted of Cu-wires and Sn-Zn-Ti liquid solders, produced at 250 and 275 OC have been prepared in the second series,. …”
Get full text
Article