Suggested Topics within your search.
Suggested Topics within your search.
- Grammar, Comparative and general 6
- History 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 4
- General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Microbiology 3
- Sociolinguistics 3
- methods 3
- Anesthesia 2
- BUSINESS & ECONOMICS / General 2
- Criminal law 2
- Functionalism (Linguistics) 2
- LITERARY CRITICISM / General 2
- Law 2
- Medicine 2
- Moral and ethical aspects 2
- Philosophy 2
- Phonology 2
- Public relations 2
- Study and teaching 2
- Syntax 2
- ARCHITECTURE / Design, Drafting, Drawing & Presentation 1
- ARCHITECTURE / General 1
- ARCHITECTURE / Reference 1
- ARCHITECTURE / Urban & Land Use Planning 1
- Academic writing 1
- Accueil (Tourisme) 1
- Act of the general application 1
-
30321
Analytical Solutions of Black-Scholes Partial Differential Equation of Pricing for Valuations of Financial Options using Hybrid Transformation Methods
Published 2022-06-01“… Black–Scholes partial differential equation is a generally acceptable model in financial markets for option pricing. …”
Get full text
Article -
30322
Concevoir une médiation par le paysage comme outil d’appropriation des enjeux alimentaires par les habitants
Published 2024-06-01“…By mobilising the results of a diachronic cartographic analysis and a field survey, this contribution shows that a better knowledge of gardening practices at the communal level can provide keys for an appropriation of the stakes of self-production and, more generally, of food by local actors, including the inhabitants.…”
Get full text
Article -
30323
Method of botnet network nodes detection base on communication similarity
Published 2018-10-01“…At present,the botnet detection method mostly relies on the analysis of the network communication activity or the communication content.The former carries on the statistical analysis to the characteristic of the data flow,does not involve the content in the data flow,has the strong superiority in the detection encryption type aspect,but the accuracy is low.The latter relies on the prior knowledge to examine,has the strong accuracy,but the generality of detection is low.The communication similarity was defined according to Jaccard similarity coefficient,and a method of calculating communication similarity based on user request DNS (domain name system) was proposed,which was used for botnet node detection based on network traffic.Finally,based on the spark framework,the experimental results show that the proposed method can be used in the detection of botnet nodes effectively.…”
Get full text
Article -
30324
“To us the war is a spectacle”: Domestic Consumption of the Crimean War in Victorian Britain
Published 2007-12-01“…Not only did her book reinforce confidence in the individual soldier and the army more generally, but she demonstrated forcefully that a woman could find a place for herself in the masculine preserve of war.…”
Get full text
Article -
30325
Imitations in Higher Education as a Social Problem
Published 2021-06-01“…The third section deals with the generalization of the experience of studying students’ imitation practices in a wide range – from academic fraud to the consumption of educational symbols. …”
Get full text
Article -
30326
Two-Stage Humanitarian Logistics Deprivation Model for the Planning of Scarce KN-95 Facemask Supplies under Agent’s Cooperation
Published 2021-01-01“…In this article, through the approach to an emergency such as COVID-19, we propose a two-stage model capable of considering human suffering, the cost of humanitarian logistics, and the benefit obtained by the interaction of suppliers that generally behave as oligopolies through a mathematical programming model and one of the cooperative games. …”
Get full text
Article -
30327
The Log-Asset Dynamic with Euler–Maruyama Scheme under Wishart Processes
Published 2021-01-01“…This article deals with Wishart process which is defined as matrix generalization of a squared Bessel process. We consider a single risky asset pricing model whose volatility is described by Wishart affine diffusion processes. …”
Get full text
Article -
30328
SAFETY ASSESSMENT OF THE TANK WITH DIFFERENTIAL SETTLEMENT
Published 2015-01-01“…Generally the settlement of spherical tank’s foundation is difficult to ensure complete uniformity. …”
Get full text
Article -
30329
Rapid Multiorgan Dissemination of Low-Grade Myxofibrosarcoma: A Case Report
Published 2012-01-01“…In contrast, the overall risk of distant metastases is generally low. This makes the prognosis for the patients with myxofibrosarcoma definitely good. …”
Get full text
Article -
30330
APPLICATION OF HARMONIC FUNCTION’S THEORY IN TWO-DIMENSION OPTIMIZATION PROBLEM
Published 2018-01-01“…The mathematical models of many engineering problems can often come down to two-dimensional optimization problems,it has been one of the hot issues of seeking the high effective and precision optimizing method.The characteristics of harmonic function and Green theory were used to study the relations between the values of harmonic function and its boundary values,and demonstrate the non-locality of its extreme value.When the objective function of the optimization is harmonic function,the two-dimensional optimization can be simplified as a one-dimensional optimization on the boundary of its feasible region.At last,three examples were given to show the feasibility of the method here.The research ideas and the conclusions can be generalized to the solution of the three-dimensional optimization problems.…”
Get full text
Article -
30331
Diffusion coefficients in multiphase Ni80Cr20-Ti system
Published 2021-01-01“…In the two phase zones the approximation was based on the generalized Darken and Wagner methods. The presented methods allowed for determination of the effective diffusion coefficients in each presented phase.…”
Get full text
Article -
30332
Immediate Experience – Contradictio in Adjecto? Strategies for Reflecting on the Immediacy of Experience by M. Henry and T. Sodeika
Published 2024-10-01“…This raises the question not only about the limitations of phenomenology, but also, more generally, about the limitations of philosophy itself. …”
Get full text
Article -
30333
Internet traffic classification method based on behavior feature learning
Published 2016-06-01“…The connection graph based internet traffic classification method can reflect the connectivity behavior between hosts.Thus,it has high stability.But the heuristic rules summarized for traffic classification are generally incomplete,and they difficultly obtain high classification accuracy.Host communication behavior model and BOF method was researched,and a set of host connection related behavior features (HCBF)was extracted from the multiple flows with the same {destination IP,destination port and transport protocol}.To evaluate the performance of HCBF,it was compared with the existing feature set on the respect of basic classification performance and classification stability.The experiments were carried out on the traffic collected in the traditional and mobile networks.Results show that HCBF out performs existing feature sets.…”
Get full text
Article -
30334
Physiologically structured populations with diffusion and dynamicboundary conditions
Published 2011-03-01“…Individuals are recruited into the population at arbitrary sizes.We equip the model with generalized Wentzell-Robin (or dynamic) boundaryconditions. …”
Get full text
Article -
30335
Effect of Variable Properties and Moving Heat Source on Magnetothermoelastic Problem under Fractional Order Thermoelasticity
Published 2016-01-01“…A one-dimensional generalized magnetothermoelastic problem of a thermoelastic rod with finite length is investigated in the context of the fractional order thermoelasticity. …”
Get full text
Article -
30336
Photodegradation of Sulfadiazine in Aqueous Solution and the Affecting Factors
Published 2016-01-01“…This study suggested that sulfadiazine photodegradation under UV light is generally favored by the attack of hydroxyl radicals.…”
Get full text
Article -
30337
Cuban Subterranean Termite (proposed), Florida Dampwood Termite (old unofficial name), Prorhinotermes simplex (Hagen) (Insecta: Isoptera: Rhinotermitidae)
Published 2004-12-01“…Species of Prorhinotermes generally live in or near coastal habitats and on islands. …”
Get full text
Article -
30338
Approximate Analytical Solution for a Coupled System of Fractional Nonlinear Integrodifferential Equations by the RPS Method
Published 2020-01-01“…The proposed algorithm is based on the concept of residual error functions and generalized power series formula. The fractional derivative is described under the Caputo concept. …”
Get full text
Article -
30339
Evaluation of Library Services Circular Principles in the Scope of Public Library Services in Ankara
Published 2016-12-01“…As a result of the research, it was found that public libraries sustain their traditional library services and mandatory administrative transactions generally related to public institutions in accordance with the Circular of Library Service Principles but the library services requiring more strategy, innovation and quality do not comply with the Circular due to several reasons. …”
Get full text
Article -
30340
Floer homology and non-fibered knot detection
Published 2025-01-01“…These include a proof that $0$ -surgery characterizes infinitely many knots, generalizing results of Gabai from his 1987 resolution of the Property R Conjecture.…”
Get full text
Article