Suggested Topics within your search.
Suggested Topics within your search.
- Research 58
- Methodology 29
- Social sciences 10
- Study and teaching 10
- Mass media 8
- Education 7
- English language 7
- Evaluation research (Social action programs) 7
- Moral and ethical aspects 7
- Psychological aspects 7
- Psychology 7
- Report writing 7
- methods 7
- research 7
- Dissertations, Academic 6
- History 6
- Sociology 6
- Consumers 5
- Evaluation 5
- Management 5
- Research--Methodology 5
- Sex role 5
- Social conditions 5
- Academic writing 4
- Conversation analysis 4
- Information technology 4
- Qualitative research 4
- Rhetoric 4
- Social aspects 4
- Technological innovations 4
-
120501
Influence of Lorentz Invariation Violation on Arbitrary Spin Fermion Tunneling Radiation in the Vaidya-Bonner Space-Time
Published 2020-01-01“…In the space-time of the nonstationary spherical symmetry Vaidya-Bonner black hole, an accurate modification of Hawking tunneling radiation for fermions with arbitrary spin is researched. Considering a light dispersion relationship derived from string theory, quantum gravitational theory, and the Rarita-Schwinger equation in the nonstationary spherical symmetry space-time, we derive an accurately modified dynamic equation for fermions with arbitrary spin. …”
Get full text
Article -
120502
User recommendation based on cross-platform online social networks
Published 2018-03-01“…In the field of online social networks on user recommendation,researchers extract users’ behaviors as much as possible to model the users.However,users may have different likes and dislikes in different social networks.To tackle this problem,a cross-platform user recommendation model was proposed,users would be modeled all-sided.In this study,the Sina micro blog and the Zhihu were investigated in the proposed model,the experimental results show that the proposed model is competitive.Based on the proposed model and the experimental results,it can be known that modeling users in cross-platform online social networks can describe the user more comprehensively and leads to a better recommendation.…”
Get full text
Article -
120503
Raptors’ Species Composition in the Buzuluk pine forest (Orenburg and Samara regions, Russia) based on observations in the past and present
Published 2023-10-01“…Knorre collected between 1928 and 1941, present time observations carried out since 2000 to the present, and published data by other researchers who have visited Buzuluk pine forest starting from the beginning of the 21st century.…”
Get full text
Article -
120504
EFL teachers’ role in English: Letting the silent majority voice their words
Published 2018-10-01“…To this end, identifying twelve highly Persian culture-specific words, the researchers devised an attitude questionnaire, which was administered to 351 EFL teachers to examine their right of cultural encoding (Kirkpatrick, 2014) as English users. …”
Get full text
Article -
120505
NFV security requirements and strategies
Published 2016-03-01“…Rapid development of cloud computing technology not only brings the convenience of high-speed computing,but also buries a lot of unsafe factors.European Telecommunications Standards Institute(ETSI)pointed out that the problem of virtualization security would become a major problem for telecom operators and enterprises in the next year.The NFV architecture security technology was researched,the importance of the safety was pointed out,the facilities of availability management and startup related safety problems were analyzed,and the NFV software security risks was summarized too.Through continuous improvement of NFV security technology makes cloud computing environment can be more secure and orderly development.…”
Get full text
Article -
120506
A unified approach for static and dynamic fracture failure in solids and granular materials by a particle method
Published 2015-10-01“…By exploiting the discrete aspect of materials, the so-called particle methods developed and applied to the simulation of solids and liquids have attracted the attention of several researchers in the field of computational mechanics. …”
Get full text
Article -
120507
Effect of Concrete Age and Creep on the Behavior of Concrete-Filled Steel Tube Columns
Published 2016-01-01“…Then, the proposed formulas are validated independently by comparing their predictions with existing test results performed by other researchers. The comparisons show that the empirical formulas have the potential to be used in the practical design of CFST columns.…”
Get full text
Article -
120508
Brief introduction to distributions and to Hörmander spaces Bp,k
Published 2024-12-01“…The objective of this article is to contribute to a knowledge in this direction especially to colleagues and students who are interested in studying and researching in this central Branch of mathematics. As a model we have chosen H¨ormander’s book, [1], whose study and teaching will be a sign of great progress in this direction in our country. …”
Get full text
Article -
120509
New Results on I2-Statistically Limit Points and I2-Statistically Cluster Points of Sequences of Fuzzy Numbers
Published 2021-01-01“…Also, we broaden the notions of I-statistical limit points and I-statistical cluster points of a sequence of fuzzy numbers to I2-statistical limit points and I2-statistical cluster points of a double sequence of fuzzy numbers. Also, the researchers focus on important fundamental features of the set of all I2-statistical cluster points and the set of all I2-statistical limit points of a double sequence of fuzzy numbers and examine the relationship between them.…”
Get full text
Article -
120510
Cost of Production for Fresh Grapefruit in East Florida (Indian River), 2014/15
Published 2016-05-01“…Typical users of these estimates include growers, consultants, property appraisers, and researchers. Written by Ariel Singerman and published by the Food and Resource Economics Department, February 2016. …”
Get full text
Article -
120511
Navigating Auditing Risks in the Crypto Asset Landscape
Published 2025-02-01“…The findings offer valuable insights for auditors, policymakers, investors, researchers, and practitioners who rely on accurate audits to make informed decisions and build trust and transparency in the crypto ecosystem.…”
Get full text
Article -
120512
A Privacy Preserving Method in WSN
Published 2013-01-01“…A great challenge to wireless sensor network(WSN)is how to protect privacy from disclosing during application in WSN as well as obtain accurate results. In recent years, researchers at home and abroad have done much work on privacy preserving in WSN. …”
Get full text
Article -
120513
Cost of Production for Fresh Market Grapefruit Grown in Indian River, 2020/21
Published 2022-02-01“…Typical users of the estimates presented herein include growers and consultants, who use them as a benchmark; property appraisers, who use them to compute the taxes for property owners; and researchers, who use the estimates to evaluate the economic feasibility of potential new technologies. …”
Get full text
Article -
120514
Detection, Characterization, and Clinical Application of Mesenchymal Stem Cells in Periodontal Ligament Tissue
Published 2018-01-01“…PDL also contains MSC population, and many researchers have isolated them and performed their detailed characterization. …”
Get full text
Article -
120515
Application of Interactive Multi-Biometrics Recognition on E-Commerce
Published 2015-10-01“…An interactive multi-biometrics recognition method was proposed,and its application on e-commerce was researched from third-party payment platform.For our interactive multi-biometrics recognition,the identification of users was accomplished with the recognition of multi-biometrics features like nose,ear,and finger-knuckle-print.Payment confirmation and signature were achieved with interactive face scan and fingerprint identification.A frame of third party payment platform was designed,based on which a simple and light-weighted pre-authentication layered model for online payment was established.This model can well guarantee security and reliability of payers,sellers,and banks,simplify the process of payment for users as well.…”
Get full text
Article -
120516
Reflections on Religious, Cultural, and Political Dynamics in Contemporary Studies
Published 2024-07-01“…Together, these articles contribute to broader discussions on how religious and cultural practices adapt to changing societal contexts, providing valuable insights for researchers, policymakers, and academics.…”
Get full text
Article -
120517
Neural Network Identification and Sliding Mode Control for Hysteresis Nonlinear System with Backlash-Like Model
Published 2019-01-01“…Firstly, only one neural network is designed to estimate the unknown system states and hysteresis section instead of multiscale neural network at former researches since that can save computation and simplify the controller design. …”
Get full text
Article -
120518
APPLYING THE AUTOENCODER MODEL FOR URL PHISHING DETECTION
Published 2024-12-01“…Many machine learning-based approaches have been researched and implemented to overcome these shortcomings. …”
Get full text
Article -
120519
Beyond the Curriculum and the Classroom
Published 2018-12-01“…The programme also incorporated excursions to supplement the extracurricular lessons delivered by the researcher (a qualified English and Classics teacher) whilst working as a teacher of English at the secondary school. …”
Get full text
Article -
120520
Workplace Bullying among Business Professionals: Prevalence, Gender Differences and the Role of Organizational Politics
Published 2005-11-01“…In addition, some implications for both researchers and managers are presented. The article is based on the author’s doctoral thesis.…”
Get full text
Article