Showing 33,701 - 33,720 results of 38,018 for search '"general"', query time: 0.13s Refine Results
  1. 33701

    A Systematic Literature Review on Robust Swarm Intelligence Algorithms in Search-Based Software Engineering by Alam Zeb, Fakhrud Din, Muhammad Fayaz, Gulzar Mehmood, Kamal Z. Zamli

    Published 2023-01-01
    “…This study may act as a guideline for researchers in improving the current state-of-the-art on generally adopting these metaheuristics in software engineering.…”
    Get full text
    Article
  2. 33702

    Socio-Economic and Regional Determinants of EU Ignorance in Turkiye by Mücahit Aslan

    Published 2023-12-01
    “…Nevertheless, it has been well documented in research conducted over the years that EU citizens are generally ignorant of the EU. This study aims to investigate the factors underpinning the lack of EU knowledge. …”
    Get full text
    Article
  3. 33703

    Effect of Lorazepam on the Development of the Hairy Maggot Blow Fly, Chrysomya rufifacies (Macquart): Implication for Forensic Entomology by Sarika Annasaheb Bansode, Vitthal Ramrao More

    Published 2023-01-01
    “…Lorazepam is an antidepressant generally used to treat anxiety. Larvae of Chrysomya rufifacies were fed on the beef liver mixed with lorazepam to study the effect of lorazepam on the developmental rate of larvae and to count delay in postmortem interval. …”
    Get full text
    Article
  4. 33704

    Historical Memory and the Representation of History: Forging Connections Between National Historic Sites and Gender History by Brittney Ann Bos

    Published 2011-04-01
    “…Historical memory is a significant methodology employed within gender history in order to examine complex questions surrounding the formation of memories and history more generally. It builds upon the feminist methodology of oral history but presents a more complex set of questions that examines the construction of the memory itself. …”
    Get full text
    Article
  5. 33705

    A SYSTEM DYNAMICS MODEL TO DETERMINE THE VALUE OF INVENTORY HOLDING COST by BABATUNDE OMONIYI ODEDAIRO, EMILOLA HELEN ALABA, INYENEOBONG EDEM

    Published 2020-07-01
    “…However, due to the absence of a generally acceptable methodology, many practitioners still determine this percentage based on estimates, benchmarks and intuition. …”
    Get full text
    Article
  6. 33706

    The Relevance of the Practice of Ifá Divination in Ola Rotimi’s The Gods are not to Blame by Olusegun Olu-Osayomi, Babatunde Adebua

    Published 2023-05-01
    “… The custom of Ifá divination is common among the Yorùbá of Western Nigeria, and among Africans generally. This paper attempts an evaluation of the relevance of the practice of Ifá divination in the selected play of Ola Rotimi to Yorùbá culture and metaphysics. …”
    Get full text
    Article
  7. 33707

    Measuring Brain Tumor Growth: Combined Bioluminescence Imaging–Magnetic Resonance Imaging Strategy by Sarah C. Jost, Lynne Collins, Sarah Travers, David Piwnica-Worms, Joel R. Garbow

    Published 2009-09-01
    “…Bioluminescence imaging (BLI) identifies tumors early, monitors tumor growth, and efficiently measures response to therapeutic intervention. Generally, BLI signals have been found to correlate well with magnetic resonance measurements of tumor volume. …”
    Get full text
    Article
  8. 33708

    The Information-Structural Status of Adjuncts: A Question-under-Discussion-Based Approach by Lisa Brunetti, Kordula De Kuthy, Arndt Riester

    Published 2021-10-01
    “…The analysis relies on the approach by Riester et al. (2018), which identifies the (generally implicit, sometimes overt) QUD preceding each utterance of a text by means of pragmatic principles, and derives from it the information structure of the utterance. …”
    Get full text
    Article
  9. 33709

    Metrics for code obfuscation based on symbolic execution and N-scope complexity by Yuqiang XIAO, Yunfei GUO, Yawen WANG

    Published 2022-12-01
    “…Code obfuscation has been well developed as mitigated endogenous security technology, to effectively resist MATE attacks (e.g.reverse engineering).And it also has important value for the reasonable metrics of code obfuscation effect.Since symbolic execution is widely used in anti-obfuscation attacks, metrics for code obfuscation resilience can refer to the efforts of generating input test set for executing all program paths.However, some adversarial techniques could reduce the symbol execution efficiency significantly based on the nested structure of the program and increase the error of the resilience reference.To solve the above problems, a metrics for code obfuscation was proposed based on symbolic execution and N-scope complexity.The obfuscation resilience was defined with symbolic execution time and obfuscation potency was defined based on the proposed N-scope complexity for better robustness in measuring the resilience of multi-nested structure programs.Furthermore, the correlation analysis of obfuscation effect was proposed and the effect was quantified by symbolic execution and control flow diagram extraction of programs.Over 4000 obfuscated programs from 3 open-sourced assemblies were evaluated with proposed metrics in the experiment, which indicated the generalization performance and practicality of the metrics.And an example of this metrics application was presented in a simulated obfuscation scenario which provided references of obfuscation technology metrics and obfuscation configuration for obfuscation users.…”
    Get full text
    Article
  10. 33710

    Conceptual approaches to definition of the category «management сitizens’ savings» by Yu. V. Indychenko

    Published 2018-12-01
    “…On the base of the generalized material the author’s definition «management of savings of citizens» has given. …”
    Get full text
    Article
  11. 33711

    Clarifications needed concerning the new Article 59 dealing with pleomorphic fungi by Walter Gams, Hans-Otto Baral, Walter M. Jaklitsch, Roland Kirschner, Marc Stadler

    Published 2012-12-01
    “…We recommend that individual authors and committees establishing lists of protected names should generally not recombine older epithets from a demoted genus into the accepted genus, when another one from pre-2013 is available in that genus. (2) Because the concepts of correlated teleomorph and anamorph genera are often incongruent, enforced congruence leads to a loss of information. …”
    Get full text
    Article
  12. 33712

    On the estimation of inverse-probability-of-censoring weights for the evaluation of survival prediction error. by Thomas Prince, Andrea Bommert, Jörg Rahnenführer, Matthias Schmid

    Published 2025-01-01
    “…We found that it is generally of little importance which dataset is used to model the censoring distribution. …”
    Get full text
    Article
  13. 33713

    Être internationaliste dans une société coloniale : le cas des grecs de gauche en Égypte (1914-1960) by Katérina Trimi-Kirou

    Published 2008-07-01
    “…Cet article étudie un échantillon particulier de la population qui résidait en Égypte et appartenait aux catégories suivantes : à la gauche, à la nation hellénique, à la population étrangère et privilégiée d’Égypte et, en règle générale, aux couches moyennes. L’identité politique, internationaliste de ces Égyptiotes (Grecs d’Égypte) de gauche, s’oppose idéologiquement, et dans une certaine mesure objectivement, à leur identité social-colonialiste, mais aussi à leur identité nationale, des identités acquises inconsciemment, non choisies mais très tôt assimilées et fortes. …”
    Get full text
    Article
  14. 33714

    Deep Domain Adaptation Approach Using an Improved Parallel Residual Network for Cross-Domain Bearing Fault Diagnosis by Jiezhou Huang

    Published 2024-01-01
    “…However, existing research suffer from low diagnosis efficiency and poor generalization capabilities. Therefore, an improved parallel residual network-domain adaptation (IPRN-DA) method for bearing fault diagnosis is proposed in this paper, which is to address these challenges. …”
    Get full text
    Article
  15. 33715

    Iberoamérica y la Corte Penal Internacional: logros y retos de una interacción compleja e inacabada by Magdalena M. Martín

    Published 2014-01-01
    “…De ahí la idoneidad y oportunidad de nuestra contribución, en la que, al objeto de verificar esta hipótesis, repasaremos primero la aportación iberoamericana a la CPI, desde la ratificación e implementación del ERhasta la Conferencia de Revisión de Kampala de 2010, para a continuación abordar la otra dimensión de esta interacción recíproca, analizando cuales han sido las principales aportaciones que el ER ha supuesto para la región, así como los retos y desafíos pendientes, finalizando nuestro examen con algunas reflexiones generales.…”
    Get full text
    Article
  16. 33716

    Connectivism, Chaos and Chaoids by Peter Shukie

    Published 2019-07-01
    “…It seems no part of society, culture, economy and human life generally has been untouched as a new sense of chaos emerges. …”
    Get full text
    Article
  17. 33717

    Organization of minors’ protection from destructive information environment: Russian federal cities case study by S. E. Titor

    Published 2023-04-01
    “…The article uses the comparative legal method, the method of analysis, the formal legal method, the sociological method, the method of generalization. Cities of federal significance have been studied from the standpoint of the criminalization of minors. …”
    Get full text
    Article
  18. 33718

    Projected entangled pair states with flexible geometry by Siddhartha Patra, Sukhbinder Singh, Román Orús

    Published 2025-01-01
    “…Projected entangled pair states (PEPS) are a class of quantum many-body states that generalize matrix product states for one-dimensional systems to higher dimensions. …”
    Get full text
    Article
  19. 33719

    L’accommodation dans le débat politique britannique Question Time. Quelle modélisation pour quelles stratégies ? by Laurent Rouveyrol

    Published 2017-11-01
    “…This article explores the notion of accommodation in a corpus composed of transcripts of the panel debate Question Time. Accommodation is generally considered as a multi-faceted notion, originating from sociolinguistics and psychology. …”
    Get full text
    Article
  20. 33720

    Cross-attention swin-transformer for detailed segmentation of ancient architectural color patterns by Lv Yongyin, Yu Caixia

    Published 2024-12-01
    “…The results highlight the model's ability to generalize well across different tasks and provide robust segmentation, even in challenging scenarios. …”
    Get full text
    Article