Showing 120,501 - 120,520 results of 124,197 for search '"research"', query time: 0.66s Refine Results
  1. 120501

    Influence of Lorentz Invariation Violation on Arbitrary Spin Fermion Tunneling Radiation in the Vaidya-Bonner Space-Time by Jie Zhang, Zhie Liu, Bei Sha, Xia Tan, Yuzhen Liu, Shuzheng Yang

    Published 2020-01-01
    “…In the space-time of the nonstationary spherical symmetry Vaidya-Bonner black hole, an accurate modification of Hawking tunneling radiation for fermions with arbitrary spin is researched. Considering a light dispersion relationship derived from string theory, quantum gravitational theory, and the Rarita-Schwinger equation in the nonstationary spherical symmetry space-time, we derive an accurately modified dynamic equation for fermions with arbitrary spin. …”
    Get full text
    Article
  2. 120502

    User recommendation based on cross-platform online social networks by Jian PENG, Tuntun WANG, Yu CHEN, Tang LIU, Wenzheng XU

    Published 2018-03-01
    “…In the field of online social networks on user recommendation,researchers extract users’ behaviors as much as possible to model the users.However,users may have different likes and dislikes in different social networks.To tackle this problem,a cross-platform user recommendation model was proposed,users would be modeled all-sided.In this study,the Sina micro blog and the Zhihu were investigated in the proposed model,the experimental results show that the proposed model is competitive.Based on the proposed model and the experimental results,it can be known that modeling users in cross-platform online social networks can describe the user more comprehensively and leads to a better recommendation.…”
    Get full text
    Article
  3. 120503

    Raptors’ Species Composition in the Buzuluk pine forest (Orenburg and Samara regions, Russia) based on observations in the past and present by Evgeniy V. Barbazyuk, Pavel V. Velmovsky

    Published 2023-10-01
    “…Knorre collected between 1928 and 1941, present time observations carried out since 2000 to the present, and published data by other researchers who have visited Buzuluk pine forest starting from the beginning of the 21st century.…”
    Get full text
    Article
  4. 120504

    EFL teachers’ role in English: Letting the silent majority voice their words by Babaii Esmat, Atai Mahmood Reza, Parsazadeh Abbas

    Published 2018-10-01
    “…To this end, identifying twelve highly Persian culture-specific words, the researchers devised an attitude questionnaire, which was administered to 351 EFL teachers to examine their right of cultural encoding (Kirkpatrick, 2014) as English users. …”
    Get full text
    Article
  5. 120505

    NFV security requirements and strategies by Zhibin GUO, Yangfan CHEN, Lu LIU

    Published 2016-03-01
    “…Rapid development of cloud computing technology not only brings the convenience of high-speed computing,but also buries a lot of unsafe factors.European Telecommunications Standards Institute(ETSI)pointed out that the problem of virtualization security would become a major problem for telecom operators and enterprises in the next year.The NFV architecture security technology was researched,the importance of the safety was pointed out,the facilities of availability management and startup related safety problems were analyzed,and the NFV software security risks was summarized too.Through continuous improvement of NFV security technology makes cloud computing environment can be more secure and orderly development.…”
    Get full text
    Article
  6. 120506

    A unified approach for static and dynamic fracture failure in solids and granular materials by a particle method by Roberto Brighenti, Andrea Carpinteri, Nicholas Corbari

    Published 2015-10-01
    “…By exploiting the discrete aspect of materials, the so-called particle methods developed and applied to the simulation of solids and liquids have attracted the attention of several researchers in the field of computational mechanics. …”
    Get full text
    Article
  7. 120507

    Effect of Concrete Age and Creep on the Behavior of Concrete-Filled Steel Tube Columns by HaiYang Wang, XiaoXiong Zha, Wei Feng

    Published 2016-01-01
    “…Then, the proposed formulas are validated independently by comparing their predictions with existing test results performed by other researchers. The comparisons show that the empirical formulas have the potential to be used in the practical design of CFST columns.…”
    Get full text
    Article
  8. 120508

    Brief introduction to distributions and to Hörmander spaces Bp,k by Alejandro Ortiz Fernández

    Published 2024-12-01
    “…The objective of this article is to contribute to a knowledge in this direction especially to colleagues and students who are interested in studying and researching in this central Branch of mathematics. As a model we have chosen H¨ormander’s book, [1], whose study and teaching will be a sign of great progress in this direction in our country. …”
    Get full text
    Article
  9. 120509

    New Results on I2-Statistically Limit Points and I2-Statistically Cluster Points of Sequences of Fuzzy Numbers by Ö. Kişi, M. B. Huban, M. Gürdal

    Published 2021-01-01
    “…Also, we broaden the notions of I-statistical limit points and I-statistical cluster points of a sequence of fuzzy numbers to I2-statistical limit points and I2-statistical cluster points of a double sequence of fuzzy numbers. Also, the researchers focus on important fundamental features of the set of all I2-statistical cluster points and the set of all I2-statistical limit points of a double sequence of fuzzy numbers and examine the relationship between them.…”
    Get full text
    Article
  10. 120510

    Cost of Production for Fresh Grapefruit in East Florida (Indian River), 2014/15 by Ariel Singerman

    Published 2016-05-01
    “…Typical users of these estimates include growers, consultants, property appraisers, and researchers. Written by Ariel Singerman and published by the Food and Resource Economics Department, February 2016. …”
    Get full text
    Article
  11. 120511

    Navigating Auditing Risks in the Crypto Asset Landscape by Georgiana-Iulia LAZEA (TRIFA), Ovidiu-Constantin BUNGET, Anca-Diana BALAN, Mircea Stefan SOLOVASTRU

    Published 2025-02-01
    “…The findings offer valuable insights for auditors, policymakers, investors, researchers, and practitioners who rely on accurate audits to make informed decisions and build trust and transparency in the crypto ecosystem.…”
    Get full text
    Article
  12. 120512

    A Privacy Preserving Method in WSN by Ping Qian, Meng Wu

    Published 2013-01-01
    “…A great challenge to wireless sensor network(WSN)is how to protect privacy from disclosing during application in WSN as well as obtain accurate results. In recent years, researchers at home and abroad have done much work on privacy preserving in WSN. …”
    Get full text
    Article
  13. 120513

    Cost of Production for Fresh Market Grapefruit Grown in Indian River, 2020/21 by Ariel Singerman

    Published 2022-02-01
    “…Typical users of the estimates presented herein include growers and consultants, who use them as a benchmark; property appraisers, who use them to compute the taxes for property owners; and researchers, who use the estimates to evaluate the economic feasibility of potential new technologies. …”
    Get full text
    Article
  14. 120514

    Detection, Characterization, and Clinical Application of Mesenchymal Stem Cells in Periodontal Ligament Tissue by Atsushi Tomokiyo, Shinichiro Yoshida, Sayuri Hamano, Daigaku Hasegawa, Hideki Sugii, Hidefumi Maeda

    Published 2018-01-01
    “…PDL also contains MSC population, and many researchers have isolated them and performed their detailed characterization. …”
    Get full text
    Article
  15. 120515

    Application of Interactive Multi-Biometrics Recognition on E-Commerce by Ling Tan, Lu Zhang

    Published 2015-10-01
    “…An interactive multi-biometrics recognition method was proposed,and its application on e-commerce was researched from third-party payment platform.For our interactive multi-biometrics recognition,the identification of users was accomplished with the recognition of multi-biometrics features like nose,ear,and finger-knuckle-print.Payment confirmation and signature were achieved with interactive face scan and fingerprint identification.A frame of third party payment platform was designed,based on which a simple and light-weighted pre-authentication layered model for online payment was established.This model can well guarantee security and reliability of payers,sellers,and banks,simplify the process of payment for users as well.…”
    Get full text
    Article
  16. 120516

    Reflections on Religious, Cultural, and Political Dynamics in Contemporary Studies by Busro Busro

    Published 2024-07-01
    “…Together, these articles contribute to broader discussions on how religious and cultural practices adapt to changing societal contexts, providing valuable insights for researchers, policymakers, and academics.…”
    Get full text
    Article
  17. 120517

    Neural Network Identification and Sliding Mode Control for Hysteresis Nonlinear System with Backlash-Like Model by Ruiguo Liu, Xuehui Gao

    Published 2019-01-01
    “…Firstly, only one neural network is designed to estimate the unknown system states and hysteresis section instead of multiscale neural network at former researches since that can save computation and simplify the controller design. …”
    Get full text
    Article
  18. 120518

    APPLYING THE AUTOENCODER MODEL FOR URL PHISHING DETECTION by Dang Thi Mai

    Published 2024-12-01
    “…Many machine learning-based approaches have been researched and implemented to overcome these shortcomings. …”
    Get full text
    Article
  19. 120519

    Beyond the Curriculum and the Classroom by Rachel Jackson

    Published 2018-12-01
    “…The programme also incorporated excursions to supplement the extracurricular lessons delivered by the researcher (a qualified English and Classics teacher) whilst working as a teacher of English at the secondary school. …”
    Get full text
    Article
  20. 120520

    Workplace Bullying among Business Professionals: Prevalence, Gender Differences and the Role of Organizational Politics by Denise Salin

    Published 2005-11-01
    “…In addition, some implications for both researchers and managers are presented. The article is based on the author’s doctoral thesis.…”
    Get full text
    Article