Suggested Topics within your search.
Suggested Topics within your search.
- Research 58
- Methodology 29
- Social sciences 10
- Study and teaching 10
- Mass media 8
- Education 7
- English language 7
- Evaluation research (Social action programs) 7
- Moral and ethical aspects 7
- Psychological aspects 7
- Psychology 7
- Report writing 7
- methods 7
- research 7
- Dissertations, Academic 6
- History 6
- Sociology 6
- Consumers 5
- Evaluation 5
- Management 5
- Research--Methodology 5
- Sex role 5
- Social conditions 5
- Academic writing 4
- Conversation analysis 4
- Information technology 4
- Qualitative research 4
- Rhetoric 4
- Social aspects 4
- Technological innovations 4
-
120861
COMPLEX MODIFICATION OF GRAY CAST IRON
Published 2017-03-01“…The influence of the complex modifier by chemical – active and surface-active additives of gray cast iron on the size of chill and on the width of molted iron zone was researched. The width of a chill zone and molted iron zones were measured at chank ends of various diameter cores. …”
Get full text
Article -
120862
Exploring spatial justice in times of disruptions: Introduction to the special issue
Published 2023-11-01“…The ARL International Summer School 2022 has thus invited doctoral students and other early career researchers to Stockholm University to debate conceptual, methodological and empirical aspects under the theme ‘Exploring spatial justice in times of disruptions’. …”
Get full text
Article -
120863
Evaluation of the Mechanical Failure Criterion to Consider the Triple Base Propellant Safety Life: Application of Sustainable Renewables for Environmental Hazards
Published 2022-01-01“…The failure criterion of mechanical properties was obtained by researching the correlation between launch safety change and mechanical property change of samples. …”
Get full text
Article -
120864
Physical Activity Modulates Common Neuroplasticity Substrates in Major Depressive and Bipolar Disorder
Published 2017-01-01“…Accordingly, the aims of this review are to (1) explicate key modulators, processes, and interactions that impinge upon multiple susceptibility points to effectuate neuroplasticity deficits in MDs; (2) explore the putative mechanisms by which PA mitigates these features; (3) review protocols used to induce the positive effects of PA in MDs; and (4) highlight implications for clinicians and researchers.…”
Get full text
Article -
120865
Details of Writing Scientific Journal Articles: An Editor’s Perspective
Published 2024-12-01“…By incorporating easy-to-understand cases, it provides a helpful reference for novice researchers seeking to navigate the requirements and pitfalls of writing for scientific journals.…”
Get full text
Article -
120866
Detection of malicious domain name based on a classifier combination
Published 2020-05-01“…As a fundamental service on the internet,domain name system (DNS) can inevitably be abused by malicious activities.Based on the studies of Botnets and other malwares which made use of the domain generation algorithm (DGA),and researches on current major techniques of malicious domain detection,a malicious domain detection framework based on a classifier combination was proposed.The framework applied the support vector machine (SVM) as its main classifier and combined the naive Bayes classifier (NBC) supportively with some statistical characteristics.Experiment result demonstrates that the framework outperformes current techniques in the offline-training time and the capability of detecting unknow malicious domain families,which satisfies the requirement of internet service provider (ISP) to detect and analyze malicious domainson the internet.…”
Get full text
Article -
120867
Reversible data hiding in encrypted images using recompression
Published 2015-09-01“…To improve the performance of RDH (reversible data hiding) method in encrypted images,the embedding room was reserved before encryption and realizes the real separation of the data extraction from image decryption in op-eration.First,the feasibility of RDH in JPEG decompressed image blocks was researched.Then the theoretical probabil-ity of successful recovery of decompressed image blocks was calculated.Finally,a method of RDH in encrypted images was proposed and the main steps of the method include pretreatment,encryption,data embedding,data extraction and image recovery.The performance of the proposed method was compared with three existing RDH methods in encrypted images.The results demonstrate the proposed method has less error in image recovery,and for given embedding rates,the PSNR of decrypted image containing the embedded data are significantly improved.…”
Get full text
Article -
120868
Millennial landscape and tourist development in China. The case of the Hani rice terraces in Yunnan
Published 2020-10-01“…Between 1995 and 2015, I conducted fieldwork in a rice-growing village in southwest China as an artist-researcher. In this text, I examine the profound changes taking place in rural border areas inhabited by non-Han minorities, and particularly those of the Hani in the Yunnan Red River Valley. …”
Get full text
Article -
120869
Potential Application of Electrical Stimulation in Stem Cell-Based Treatment against Hearing Loss
Published 2018-01-01“…However, the survival rate of stem cell transplantation is low, with uncontrollable differentiation hindering its application. Most researchers have focused on biochemical factors to regulate the growth and differentiation of stem cells, whereas little study has been performed using physical factors. …”
Get full text
Article -
120870
A Study on the Lateral Distribution of Cherenkov Radiation of Extensive Air Showers at High Observation Levels
Published 2024-11-01“…It is shown that the relationship between the steepness of the lateral distribution of Cherenkov radiation and the maximum depth of showers, which was introduced in previous researches, should be calibrated for each observation level separately. …”
Get full text
Article -
120871
Problems of Staffing for the Scientific and Technological Development of Russia in the Light of the New Education Development Strategy Formation until 2040
Published 2025-02-01“…The professional education of highly and highly qualified researchers and developers takes the special place in overcoming these challenges. …”
Get full text
Article -
120872
Necropsies of Reptiles: Recommendations and Techniques for Examining Invasive Species
Published 2013-12-01“… Captures and postmortem examinations, or necropsies, of invasive or nonnative animals may provide insight into the ecological impact of these invaders. Researchers should be able to perform necropsies when an opportunity arises to examine nonnative species for study. …”
Get full text
Article -
120873
Distributed network management system with load balancing
Published 2009-01-01“…Based on the latest researches on physical topology, a distributed network management system named D-CBNMS with load balancing was proposed.Firstly, the system had very good scalability to extend the management scale by dynamically increase manage nodes.Secondly, it had the ability of fine-granularity load-balancing to adjust the load of management nodes.Thirdly, it had topology-awareness ability that allocates management tasks to the nearest management node, utilizing the detailed physical topology.D-CBNMS had been applied to the management of CBISNS(community broad-band integrated services network system), which was a total solution for CPN(customer premises network).Experiments show that D-CBNMS can reduce effectively the bandwidth occupied by management data.…”
Get full text
Article -
120874
Survey of Distributed Ledger Technology (DLT) for Secure and Scalable Computing
Published 2025-01-01“…The paper aims to guide researchers and practitioners navigating DLT’s evolving landscape, underscoring its transformative potential for secure and scalable computing in the digital age.…”
Get full text
Article -
120875
PSALM 62: PRAYER, ACCUSATION, DECLARATION OF INNOCENCE, SELF-MOTIVATION, SERMON, OR ALL OF THESE?
Published 2018-12-01“… Because of its seeming mix of different styles, Psalm 62 has intrigued researchers for a long time. It has been regarded by many as the prayer of an innocent person who was accused of some wrongdoing, but the direct exhortation to the “people” of God to put their trust in him seems to argue against this. …”
Get full text
Article -
120876
MEDICINAL, COSMETIC, CHEMICALAND OTHER APPLICATIONS OF BORATES
Published 2024-10-01“…The various characteristics of borates including its application are discussed and reviewed in this article, which may be beneficial for researchers in the development of various scientific and technological fields. …”
Get full text
Article -
120877
Encoding Interruptions in Parliamentary Data: From Applause to Interjections and Laughter
Published 2022-06-01“…Parliamentary data, especially parliamentary discourse, is of interest to researchers from various fields in the humanities and social sciences. …”
Get full text
Article -
120878
Analyse des ajustements réciproques dans une activité de coenseignement
Published 2023-03-01“…Mainly based on the researchs carried out by Bucheton (2009) about adjustements skills in teaching and professional posture of scaffolding (Bucheton et Soulé, 2009, Saillot, 2015), our scientific issue aims to caraterize co-teaching when both teachers are fitting each other. …”
Get full text
Article -
120879
USE OF CHEMICAL SYNTHESIS OF NANODISPERSE MODIFIERS AT INDUCTION HEATING OF FURNACE CHARGE ON THE BASIS OF POWDERS TIN BRONZE FOR HARDENING AND INCREASE OF TRIBOTECHNICAL PROPERTIE...
Published 2016-12-01“…Results of metalgraphical researches and tribotechnical testing of the coverings received from powders of tin bronze and a boehmite in the course of an induction centrifugal overlay welding on the temperature conditions promoting synthesis a-Al2O3 are given.…”
Get full text
Article -
120880
3D Self-Deployment Algorithm in Mobile Wireless Sensor Networks
Published 2015-04-01“…The sensor deployment problem of wireless sensor networks (WSNs) is a key issue in the researches and the applications of WSNs. Fewer works focus on the 3D autonomous deployment. …”
Get full text
Article