Suggested Topics within your search.
Suggested Topics within your search.
- Employment 3
- Moral and ethical aspects 3
- Economic conditions 2
- Equality 2
- Government policy 2
- Income distribution 2
- Information technology 2
- Labor laws and legislation 2
- Labor market 2
- Labor policy 2
- Law and legislation 2
- Legal ethics 2
- Management 2
- Minorities 2
- Online social networks 2
- Pay equity 2
- Personnel management 2
- Sexual division of labor 2
- Social aspects 2
- Social media 2
- Women 2
- Advertising 1
- Automobiles 1
- College graduates 1
- College students 1
- Communication 1
- Diversity in the workplace 1
- Entrepreneurship 1
- Executive coaching 1
- Fashion design 1
-
3981
Effect of variety and nutrient on insect pest infestation of <i>Amaranthus spp</i>
Published 2015-07-01“…These results can be employed as part of cultural control methods in the management of insect pests of Amaranths.…”
Get full text
Article -
3982
Representation of Traumatic Memory in the Film Drishyam: A Barthesian Reading
Published 2024-12-01“…Enhanced by various cinematographic techniques, the depiction of trauma is magnified within the visual narrative. This article employs “Drishyam”, a Malayalam film presented in two parts, to analyze the impact of trauma stemming from a singular event. …”
Get full text
Article -
3983
Monkeypox: A resurfacing threat and global public health challenge in India
Published 2025-01-01“…Adopting a multidisciplinary approach, it reviews available data and literature on the spread and control of monkeypox, examining current surveillance systems, public health preparedness measures, and strategies employed to contain the disease. The review indicates that while efforts are underway to manage the outbreak, significant gaps remain in global surveillance and preparedness. …”
Get full text
Article -
3984
Business use of the World-Wide Web
Published 1995-01-01“…Two methods were employed in this study of the use of the World Wide Web by business: first, a sample of 300 businesses with Web sites, across a wide range of industry types, was examined, by selecting (rather than sampling) companies from the Yahoo! …”
Get full text
Article -
3985
Concept development assessment game – suitable collecting framework in scientific military research
Published 2025-01-01“…Moreover, it ensures a mechanism for employing a wide range of data collection methods, such as observation, focus groups, or questionnaires, thereby enabling the triangulation of collected data and, consequently, the foundation for valuable outcomes in the effort to transform military structures. …”
Get full text
Article -
3986
Exploring Development Challenges in Uganda Using Modernization Theory
Published 2024-10-01“…Methodologically, it employs a comprehensive review of scholarly literature and theoretical analysis. …”
Get full text
Article -
3987
Modelling of Creep and Stress Relaxation Test of a Polypropylene Microfibre by Using Fraction-Exponential Kernel
Published 2016-01-01“…The proposed analytical model can be employed for simulating the mechanical behaviour of composite materials with embedded viscoelastic fibres.…”
Get full text
Article -
3988
Online Parameter Estimation in Digital Twins for Real-Time Condition Monitoring
Published 2025-01-01“…This paper introduces innovative online parameter estimation algorithms that employ both deterministic and stochastic methodologies in digital twins for real-time condition monitoring. …”
Get full text
Article -
3989
EXCHANGE RATE VOLATILITY AND STOCK MARKET DEVELOPMENT: AN EMPIRICAL EVIDENCE FROM NIGERIA
Published 2023-11-01“…This study re-examines exchange rate volatility and stock market development in Nigeria using annual data from 1985-2020. The study employed multivariate regression analysis as well as granger causality test to model the variables. …”
Get full text
Article -
3990
Bloom's Taxonomy and Reading Comprehension in English Teaching: Evaluating Teacher's Questioning
Published 2023-11-01“…Using qualitative methods such as observation, interviews, and documentation, the researcher reveals various question types employed by these teachers, ranging from literal to appreciation questions. …”
Get full text
Article -
3991
Revolutionary Climatology: Rings of Saturn, Ringed by Red Lightning
Published 2016-04-01“…Benjamin’s mode of media archaeology is then employed to map the arcades architecture onto the train stations and libraries in Berlin and Paris, sites that informed The Arcades Project. …”
Get full text
Article -
3992
The Digitalisation of Swedish Housing
Published 2023-09-01“…Instead of speaking of a digital turn in housing, we would be better served by employing the plural: digital turns. In fact, once we begin to unravel the history of how the idea of what we today call smart technology has been implemented in multi-household rental dwellings since the early 1980s, a pattern emerges. …”
Get full text
Article -
3993
Helicobacter pylori: Genomic Insight into the Host-Pathogen Interaction
Published 2015-01-01“…Infectious disease research in particular has experienced an explosion of bacterial genomic, transcriptomic, and proteomic data complementing the phenotypic methods employed in traditional bacteriology. Together, these techniques have revealed novel virulence determinants in numerous pathogens and have provided information for potential chemotherapeutics. …”
Get full text
Article -
3994
What is the Value of an Existing Forest Stand?
Published 2019-12-01“… Traditionally, the land expectation value (LEV) formula, the present value of perpetual cash inflows of timber revenues minus the present value of cash outflows of costs, has been employed as the main indicator of the value of a forest investment. …”
Get full text
Article -
3995
An Underdetermined Blind Source Separation Method with Application to Modal Identification
Published 2019-01-01“…Moreover, the TF coefficients of each modal are employed to reconstruct all monotone signals, which can benefit to individually identify the modal parameters. …”
Get full text
Article -
3996
Numerical Simulation of Effective Properties of 3D Piezoelectric Composites
Published 2014-01-01“…Linear interpolation of displacement field is employed to establish constraint equations of nodal displacements between two adjacent elements.…”
Get full text
Article -
3997
Information Diffusion Model of Social Bots: An Analysis of the Spread of Coverage of China Issues by The New York Times on Twitter
Published 2022-01-01“…Based on the analysis of bots' posting frequency, influence, and retweeting relationship, we take the diffusion of The New York Times' coverage of Xinjiang issue on the overseas social platform Twitter as an example and employ the two-step flow model. It is found that in the role of second-step diffusion, unlike posting news indiscriminately in first-step diffusion, social bots are more inclined to postcontroversial information in second-step diffusion; in terms of diffusion patterns, although social bots are more engaged in first-step diffusion than in second-step diffusion and can trigger human users to retweet, they are still inferior to humans in terms of influence.…”
Get full text
Article -
3998
“Blackboxing Whiteness”
Published 2022-10-01“…This paper reveals that whiteness, and in particular madamhood, is blackboxed within middle-class homes. Domestic workers employed by these households, on the other hand, were largely absent from such narratives and conversations, and were marginalised within networks. …”
Get full text
Article -
3999
Numerical Treatment of a Modified MacCormack Scheme in a Nondimensional Form of the Water Quality Models in a Nonuniform Flow Stream
Published 2014-01-01“…A modified MacCormack method is subsequently employed in the second model. This paper proposes a simply remarkable alteration to the MacCormack method so as to make it more accurate without any significant loss of computational efficiency. …”
Get full text
Article -
4000
Writing under the 'Auto/biographical Demand' in Deborah Feldman’s Unorthodox (2012) and Exodus (2015)
Published 2025-01-01“…It argues that Feldman writes under the 'auto/biographical demand' as the grandchild of Hungarian Holocaust survivors and redeploys the inherited story of gendered suffering during the Holocaust in order to reconfigure her own Jewish American identity. I employ Gilmore’s concept to reflect upon the writing of the self in Feldman’s memoir sequel in terms of narrative entanglement, postmemory, and third generation transmission of collective trauma. …”
Get full text
Article