Suggested Topics within your search.
Suggested Topics within your search.
- Employment 3
- Moral and ethical aspects 3
- Economic conditions 2
- Equality 2
- Government policy 2
- Income distribution 2
- Information technology 2
- Labor laws and legislation 2
- Labor market 2
- Labor policy 2
- Law and legislation 2
- Legal ethics 2
- Management 2
- Minorities 2
- Online social networks 2
- Pay equity 2
- Personnel management 2
- Sexual division of labor 2
- Social aspects 2
- Social media 2
- Women 2
- Advertising 1
- Automobiles 1
- College graduates 1
- College students 1
- Communication 1
- Diversity in the workplace 1
- Entrepreneurship 1
- Executive coaching 1
- Fashion design 1
-
4861
Object Detection Techniques in Autonomous Driving
Published 2025-01-01“…The review emphasizes the importance of developing more robust and adaptive models, and it outlines future directions such as enhancing sensor fusion methods, optimizing model architectures, and employing open-world learning to prepare for unexpected scenarios, ultimately aiming to improve the reliability and safety of autonomous driving technologies.…”
Get full text
Article -
4862
Performance optimization of active RIS-assisted near-shore dual-function radar communicaiton system
Published 2025-01-01“…In order to align with the characteristics of maritime channels, a three-path loss model and a two wave with diffuse power (TWDP) channel considering the evaporative duct over the sea was employed. An alternating optimization algorithm based on fractional programming theory and the Lagrangian operator method was proposed. …”
Get full text
Article -
4863
Gut Microorganism-Mediated Neutralization of Mycotoxins: A Promising Approach to Combat Fungal Toxicity
Published 2024-01-01“…Various chemical and physical methodologies are employed to mitigate the toxicity associated with these toxins. …”
Get full text
Article -
4864
Serangan Kumbang Badak pada Tanaman Kelapa di Desa Jati Mulya Kecamatan Wonosari Kabupaten Boalemo
Published 2024-11-01“…A safe method for controlling a rhinoceros is by employing pheromone traps. This research aims to determine the population and infestation intensity of O. rhinoceros pests. …”
Get full text
Article -
4865
Euphemistic strategies in Algerian Arabic and American English
Published 2021-10-01“…Regarding the topic of lying, the Americans employ strategies of understatement and deletion, whereas the Algerians use understatement and metaphor. …”
Get full text
Article -
4866
Affective Management and its Effects on Management Performance
Published 2012-01-01“…Our questionnaire based on the Affective Management Scorecard was employed to assess top managers’ recognition of the importance, as well as the actual practices of affective management. …”
Get full text
Article -
4867
Research on wireless coverage area detection technology for 5G mobile communication networks
Published 2017-12-01“…To overcome the human subjectivity of the traditional model fitting when performing the variation function fitting in the interpolation estimation, a support vector regression algorithm is employed. The simulation results indicate that the algorithm can rapidly and correctly detect the coverage area of a 5G mobile communication network.…”
Get full text
Article -
4868
A Discontinuous Galerkin Method for Two-Dimensional Shock Wave Modeling
Published 2011-01-01“…The HLL approximate Riemann solver is employed to calculate the mass and momentum flux. A slope limiting procedure that is suitable for incompressible two-dimensional flows is presented. …”
Get full text
Article -
4869
The feasibility of conducting compressed air energy storage system
Published 2025-01-01“…Utilizing these data points, this paper employs both qualitative and quantitative analysis to thoroughly evaluate the viability of implementing CAES systems. …”
Get full text
Article -
4870
Comparative analysis of career aspirations among STEM college students: social-cognitive model across college years
Published 2025-12-01“…Conducted at a four-year research university in Taiwan, the study targeted sophomore to senior students from four STEM-related departments to control for institutional influences. Employing a survey method and multi-group path analysis, the study found consistent pathways that influenced career aspirations across all stages of college learning, with interest and outcome expectations emerging as the primary determinants. …”
Get full text
Article -
4871
Best Management Practices in the Everglades Agricultural Area: Fertilizer Spill Prevention
Published 2005-12-01“…This EDIS document is part of a series of publications that provide current implementation guidelines for commonly employed farm-level BMPs designed to reduce P loads from farms located within the EAA basin. …”
Get full text
Article -
4872
CARING FOR WOMEN ON THE FRONTLINES: ENHANCING WOMEN WORKERS’ CAPABILITIES AND BUILDING SOCIAL FRIENDSHIP
Published 2023-04-01“… This article examines the vulnerability of frontline cleaning workers and domestic helpers during the COVID-19 pandemic and how they empower themselves by joining a community in which they can support each other. Employing surveys by non-governmental organisations, particularly those in Hong Kong, as well as my own interviews and observations, I examine the situation of the frontline workers and discuss the moral principles and conditions for upholding women’s dignity and well-being, based on the capability approach of feminist philosopher Martha Nussbaum. …”
Get full text
Article -
4873
Texture mapping of warp knitted shoe upper based on ARAP parameterization method
Published 2025-01-01“…Additionally, discrete harmonic and parametric optimization unfolding algorithms are employed to enhance texture mapping quality. To reduce mesh distortion, the results of discrete harmonic parameterization are used as inputs for ARAP parameterization, making the mapping effect more natural and reducing the number of required optimizations. …”
Get full text
Article -
4874
Heavy Metal Detoxification by Different Bacillus Species Isolated from Solar Salterns
Published 2015-01-01“…The biosorption mechanism is an alternative for chemical precipitation and ultrafiltration which have been employed to treat heavy metal contamination with a limited success. …”
Get full text
Article -
4875
Literary Translation Techniques in Professor Pamela Smith’s Translation of Akinwumi Is̩ola’s Ogun Omode to Treasury of Childhood Memories
Published 2022-07-01“…This study, therefore, examined the literary techniques adopted by the translator in the Target Language (TL). The study employed a qualitative research design with a close reading and content analysis of both the Second Language (SL) and Target Language (TL) texts using the Hutardo’ (2002, 498) model of literary techniques for data analysis. …”
Get full text
Article -
4876
Overall Efficiency of Four-Stage Structure with Undesirable Outputs: A New SBM Network DEA Model
Published 2022-01-01“…The proposed model was employed to benchmark cement factories listed on the Tehran Stock Exchange.…”
Get full text
Article -
4877
Appropriateness of learning environments in preprimary educational institutions: the case of preschools in Bahir Dar city, Ethiopia
Published 2025-01-01“…To achieve this, a mixed-methods research approach was employed, guided by an adapted framework for assessing learning environments. …”
Get full text
Article -
4878
An Efficient Semianalytical Modal Analysis of Rectangular Waveguides Containing Metamaterials with Graded Inhomogeneity
Published 2021-01-01“…The proposed method has been employed to calculate the eigenvalues, including the cutoff wavenumbers and dispersion relations, for metamaterials with various graded refractive-index profiles. …”
Get full text
Article -
4879
Characteristics of Generating Carbon Oxides at Low-temperature Oxidation Stages of Low-Rank Coal
Published 2022-01-01“…To better investigate the stage characteristics of generating carbon oxide gases in the low-temperature oxidation process of coal, this study adopts STA-FTIR to experimentally determine the coal weight variation and exothermic condition and the generation law during the low-temperature oxidation process of coal (30–350°C). And, by employing the DFT method, the study determines the chemical reaction and activation energy generated by carbon oxide gases in coal molecules and ascertains the reaction characteristics at different temperatures. …”
Get full text
Article -
4880
Attacks on One Designated Verifier Proxy Signature Scheme
Published 2012-01-01“…However, most of them were proven secure in the random oracle model, which has received a lot of criticism since the security proofs in the random oracle model are not sound with respect to the standard model. Recently, by employing Water's hashing technique, Yu et al. proposed a new construction of designated verifier proxy signature. …”
Get full text
Article