Suggested Topics within your search.
Suggested Topics within your search.
- Economic policy 2
- Beauty operators 1
- Bibliotheken 1
- Celebrities 1
- Coming of Age 1
- Critical Care 1
- Critical care medicine 1
- Designing water 1
- Diagnostic ultrasonic imaging 1
- Economic Policy 1
- Economics 1
- Economics, Mathematical 1
- Economics, Medical 1
- Electronic books 1
- Elektronische boeken 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Environmental Economics 1
- Environmental economics 1
- FICTION 1
- Fashion 1
- Humorous 1
- Image consultants 1
- Industrial Organization 1
- Industrial organization 1
- Industrial policy 1
- Labor economics 1
- Libraries and electronic publishing 1
- Mass media 1
-
6761
URBAN GREEN INFRASTRUCTURE FOR CLIMATE RESILIENCE: A REVIEW
Published 2018-06-01“…Some strategies based on the current literature and projects are also recommended including managing flood risk, building resiliency to drought, reducing the urban heat island effect, lowering building energy demands, improving coastal resiliency, and reducing energy needed to manage water. …”
Get full text
Article -
6762
Topology design and capacity planning of wide-area network based on delay constraint
Published 2021-06-01“…In order to optimize network performance and reduce construction cost, the topology design and dimensioning problems in wide-area network planning were investigated based on delay constraint with the use of linear programming (LP) and heuristic greedy-drop algorithm.Firstly, demands’ weights were considered and LP was exploited with given paths to solve the capacity expansion problems of minimum delay and minimum delay with minimum cost.Secondly, greedy-drop algorithm was applied and candidate edges were removed from full mesh topology according to the global normalized delay increments.Thus, new added edges to satisfy the delay constraint were determined.Moreover, the combination of LP and greedy-drop algorithm was proposed to determine new added edges and capacity expansion of the delay-constraint scenario with minimum cost.The results turn out that the proposed algorithms are effective to solve the problems of topology design and capacity planning in wide-area network planning targeting delay optimization.…”
Get full text
Article -
6763
The Rise of English and the Space for Modern Languages
Published 2024-12-01“…It is reasonable to surmise that the global popularity of English – demanded by the Outer and Expanding Circle and mainly supplied by the Inner Circle countries will leave limited instrumental value for learning other languages. …”
Get full text
Article -
6764
Entre los marcos jurídicos y las cartografías indígenas
Published 2016-07-01“…This paper explores the political dimension of indigenous territorial demands and the process of land demarcation and indigenous cartographies in relation to national legal frameworks and the notion of national sovereignty in Venezuela. …”
Get full text
Article -
6765
Fast assessment of the critical principal stress direction for multiple separated multiaxial loadings
Published 2015-07-01“…The critical plane calculation for multiaxial damage assessment is often a demanding task, particularly for large FEM models of real components. …”
Get full text
Article -
6766
EVALUATION OF COMPETENCES: METHODOLOGY AND TECHNOLOGIES (EXPERIENCE OF KURSK STATE MEDICAL UNIVERSITY)
Published 2016-12-01“…The competence approach in the Russian educational sphere not only changes the goal paradigm and the content of education but demands revising the position of a higher educational institution and that of a student in the process of his professional acquisition. …”
Get full text
Article -
6767
Toward a reinterpretation of sacramental theology in the context of pandemics: The case of the Methodist Church in Zimbabwe
Published 2023-12-01“…Unfortunately, sacraments that demanded face to face administration remained a theological dilemma. …”
Get full text
Article -
6768
E-invoice authenticity verification scheme based on signature verification
Published 2019-12-01“…With the rapid development of network and information technology,paperless and electronic have become the development trend of today's economic life.As a consumption certificate,electronic invoices have become more and more demanding in e-commerce.The existing electronic invoice verification method is to inquire the invoice information in the national electronic account base according to the invoice number,invoice code,billing date,and amount,and realize the function of comparison inquiry,and can not detect the fraudulent behavior of issuing invoices by non-issuing institutions,and cannot guarantee the full legality and authenticity of electronic invoices.Aiming at the above problems,a verification scheme for electronic invoice authenticity based on signature authentication was proposed.By verifying the signature of the tax agency,the legality verification of the blank electronic invoice is verified,and the digital signature of the seller is verified to determine the authenticity of the invoiced content.Ensure that the electronic invoices passed for verification are true and reliable.…”
Get full text
Article -
6769
De l’occidentalisation du soufisme à la réislamisation du New Age ? Sufi Order International et la globalisation du religieux
Published 2014-07-01“…Conversely, this Western Sufism has started to fertilize the Muslim lands by fulfilling the demands of a liberal and Westernized bourgeoisie, generally opposed to the religious offers available at home and that has found in this universalist Sufi discourse an acceptable way to Islam, transformed by religious modernity. …”
Get full text
Article -
6770
Sustainable Mobility in the Cities and Agglomeration Areas
Published 2022-10-01“…The article consists of a brief introduction, background on the latest regulations in the field of sustainable urban mobility, and a comparative analysis of environmental demands, along with actual trends observed in the transport sector in urbanised areas. …”
Get full text
Article -
6771
Néomuralisme et militantisme féministe dans l’Argentine du XXIe siècle
Published 2021-07-01“…As a place for meetings and demands, urban spaces are being coloured, projecting a political renewal in favour of female emancipation. …”
Get full text
Article -
6772
Real-time image matching for navigation system based on genetic algorithm
Published 2008-01-01“…Simulation results show that, the proposed image matching algo- rithm combined with genetic algorithm and weighted Hausdorff distance can satisfy the real-time and accuracy demands of the scene aided navigation system.…”
Get full text
Article -
6773
Analysis on 5G XR and enhancement on media service
Published 2022-03-01“…5G XR and enhancement on media service are very important business scenarios in 5G-Advanced network.With the increasing user demands for emerging new media services, 5G network needs to make corresponding enhancements for media services such as XR.The main business scenarios of XR and augmented multimedia were mainly introduced, including immersive virtual reality, augmented reality, remote control technology based on mixed reality, virtual factory, remote unmanned aerial vehicle control, etc.For the typical business scenarios of XR, there were already some specifications and on-going studies in 3GPP.Based on these existing activities, 5G network need further enhancements including 5G QoS framework for XR service, coordination between network and application, synchronization of flows of multi-user and multi-stream, power saving of terminals and network etc., so that the 5G network could provide better support to 5G XR and enhanced media services leveraging the above enablers.…”
Get full text
Article -
6774
Women’s struggle and media reform: The Swedish Women’s Associations’ Radio Committee, 1933–1940
Published 2024-09-01“…The committee was a joint effort by many established women’s organisations in Sweden, formed with the goal of strengthening the role of women in the developing public service radio, and especially providing a platform for women to raise demands on influence in the decision-making around the development of this new media form. …”
Get full text
Article -
6775
Psychotropes et hystérie à la Salpêtrière, le cas de Célina Marcil (1870-1879)
Published 2023-12-01“…Within a coercive institution and under the libidinous glance of the medical staff, Celina Marcil nevertheless showed a certain capacity for action. Demanding to the point of violence that her doctors provide her with the desired quantities of ether or morphine, using them to intensify her voluptuous reactions, using ether to achieve the sexual pleasure impossible to reach with her lover, the young woman managed for a time to adapt to her condition.…”
Get full text
Article -
6776
Fast surface reconstruction algorithm with adaptive step size.
Published 2025-01-01“…Numerical experiments indicate that, for equivalent reconstruction errors, the adaptive step size algorithm demands substantially fewer iterations and less computation time than the fixed step size approach. …”
Get full text
Article -
6777
METHODOLOGICAL UNCERTAINTIES OF A NEW PROFESSIONAL TEACHER’S STANDARD AND PROPOSALS FOR ITS IMPROVEMENT
Published 2015-03-01“…The author has developed (on the basis of the system-activity approach) the structure and content of the teacher’s personnel administration plan that allows realizing demands of the teacher’s (tutor’s) professional standards and solving its main methodological uncertainties. …”
Get full text
Article -
6778
Biopsychosocial Approach for Conservative Management of Abdominal Pregnancy in Previously Infertile Mother
Published 2022-01-01“…Abdominal pregnancy is a rare and highly morbid form of ectopic pregnancy. It demands a skilled approach in management. A comprehensive and holistic approach is required to deliver the best outcome for the patient and her family.…”
Get full text
Article -
6779
An Efficient Biometric Authentication Protocol for Wireless Sensor Networks
Published 2013-05-01“…Wireless sensor networks (WSNs) are spreading rapidly due to their flexibility to communicate which demands a secure environment. The most important requirements of WSN security are confidentiality, authentication, and integrity. …”
Get full text
Article -
6780
Integração regional fronteiriça entre Argentina e Brasil: atores educacionais, políticas territoriais e governança
Published 2022-12-01“…As partial results, it is noteworthy that the mechanisms of regional integration are supported by Law 26.523 / 2009 (Argentina) and Decree 8636/2016 (Brazil), where the processes are linked to CIF and its sectoral commissions, which act through three strategic processes : survey of demands and referrals; diplomatic and paradiplomatic actions; and decision-making and power bodies (raising awareness among elected actors). …”
Get full text
Article