Suggested Topics within your search.
Suggested Topics within your search.
- Entrepreneurship 5
- Management 5
- English language 4
- Business enterprises 3
- Economic development 3
- Industrial management 3
- Information technology 3
- Methodology 3
- Research 3
- Study and teaching 3
- Classroom environment 2
- Communication in education 2
- Effective teaching 2
- Elementary school teaching 2
- Hospitality industry 2
- Inquiry-based learning 2
- Interaction analysis in education 2
- Intercultural communication 2
- Internet in public administration 2
- Internet marketing 2
- Marketing 2
- Moral and ethical aspects 2
- Psychological aspects 2
- Psychology 2
- Public administration 2
- Public relations 2
- Rhetoric 2
- Social networks 2
- Sustainable development 2
- Technical writing 2
-
7821
Design and Kinematics Analysis of the Wearable Lower Limb Exoskeleton
Published 2023-12-01“…The joint curve data provides the data basis for the formulation of the control strategy of the lower limb exoskeleton.…”
Get full text
Article -
7822
Application of wireless LoRa in multi-service state grid e-ubiquitous power internet of things
Published 2020-09-01“…The “multi-service state grid e-ubiquitous power internet of things” proposed by the State Grid Corporation of China is the integration and evolution of the energy network and the internet of things,and is a key energy infrastructure serving the majority of users.With the rise of the power internet of things strategy,the online monitoring and acquisition nodes and monitoring scale of transmission lines will increase rapidly.What kind of technical system will be used to construct the on-site communication network? …”
Get full text
Article -
7823
Agreeing and Impacting: The Effect of the Shareholders' Agreement on Firms' Market Value
Published 2018-01-01“…The sample is composed by 472 companies, including 86 companies with shareholder’ agreements. The empirical strategy comprises the fixed effects method on a panel data model. …”
Get full text
Article -
7824
SOCIO-PSYCHOLOGICAL APPROACHES TO THE DEFINITION OF TERRORISM
Published 2020-08-01“…As a result of the analysis of works devoted to the psychology of terrorism, five approaches to the definition of terrorism have been distinguished: terrorism as a form of activity; terrorism as a communicative strategy; terrorism as a form of war; terrorism as a form of conflict; terrorism as a form of extremism. …”
Get full text
Article -
7825
New Exact Solutions of Nonlinear (3 + 1)-Dimensional Boiti-Leon-Manna-Pempinelli Equation
Published 2019-01-01“…New lump arrangement is built by applying the bilinear strategy and picking appropriate polynomial. Under various parameter settings, this lump arrangement has three sorts of numerous irregularity waves, blended arrangements including lump waves and solitons are additionally developed. …”
Get full text
Article -
7826
Survey research in practical theology and congregational studies
Published 2015-12-01“…The best-known data-based research strategy is survey research. In practical theology, survey research is probably one of the most used research strategies. …”
Get full text
Article -
7827
REAL DRIVING FORCE PAVING THE WAY FOR A TREND OF INTEGRATION FOR HOCHIMINH’S LANGUAGE
Published 2018-05-01“…Here, the real strength of Hochiminh’s speech strategy, which is the crystallization of the experiential process of putting linguistic actions into social interactions, verifies the integration theories that are of interest. …”
Get full text
Article -
7828
Relaxing the sharp density stratification and columnar motion assumptions in layered shallow water systems
Published 2024-11-01“…Because the hydrostatic Euler equations are not known to enjoy suitable stability estimates, we rely on thickness-diffusivity contributions proposed by Gent and McWilliams. Our strategy also applies to one-layer and multilayer frameworks.…”
Get full text
Article -
7829
An energy conservation method for locating wireless sensor network nodes in smart grid
Published 2016-03-01“…Wireless sensor network has been increasingly applied for detecting,monitoring and locating targets in smart grid.In a wireless sensor network,energy is deemed as a critical resource and life of the system can be prolonged by energy saving strategy.A node detection and localization method based on energy-aware was presented.The method could be used for the clustering-based wireless sensor networks.It employed a posterior algorithm using a two-step communication protocol between the clustering head sensor and sensors inside.Only a small amount of node information was needed for the clustering head to run the localization program to determine the subset of sensors for further localization.In this way,consumption of energy and demand for communication bandwidth could be reduced,and the system life could be prolonged as well.Experiment results show that this locating method is able to save up to 32% of energy.…”
Get full text
Article -
7830
Comparative study of specific physical abilities to prove the efficacy of working with performance subgroups.
Published 2005-12-01“…<strong>Objective</strong>: To suggest a strategy of subgroups-work to develop some physical capacities. …”
Get full text
Article -
7831
Cartografia e geopolítica das relações sul-sul: sobre a cooperação técnica Brasil-África.
Published 2019-03-01“…We understand the foreign policy and South-South cooperation as a form of geopolitical exercise of hegemonic projection and that the incentives to the cooperation agreements were part of a projection that would territorialize the global strategies of a State. Throughout 2003-2010, the Africa continent was the target of this Brazilian South-South foreign policy strategy, thus receiving great part of the technical cooperation investments. …”
Get full text
Article -
7832
An Evolutionary Game Analysis on Public Information Communication between the Government and the Public in China
Published 2021-01-01“…Our objective is to find how the evolutionary path changes between the two players when strategies are changing. Then, a simulation analysis is presented in six scenarios to illustrate the results. …”
Get full text
Article -
7833
Sustainable Development Principles for Engineering Educator
Published 2020-07-01“…The main aim of this course is to help educators to develop a strategy how to integrate sustainable development principles into engineering education at large.…”
Get full text
Article -
7834
Evacuation Model of Emotional Contagion Crowd Based on Cellular Automata
Published 2021-01-01“…The evacuation efficiency of the whole system is also effectively improved due to the consideration of emotional contagion and evacuation strategy.…”
Get full text
Article -
7835
Adieu, Paris ! de Simone Routier à la croisée de l’intime et du médiatique
Published 2018-04-01“…The form of the report that modulates Routier’s diary is also compatible with the strategy of success preferred by the writer since she stages a figure, the reporter one, who wants to unifier. …”
Get full text
Article -
7836
Satirical Frame of Mind: Ken Kalfus’s A Disorder Peculiar to the Country and the Literary Engagement with 9/11
Published 2017-08-01“…Prompted by debates on the role of comedy in the USA after 9/11, the essay explores the use of satire as one important narrative strategy that emerged in the subgenre of the American 9/11 novel. …”
Get full text
Article -
7837
CLB-Defense: based on contrastive learning defense for graph neural network against backdoor attack
Published 2023-04-01“…For the problem that the existing backdoor attack defense methods are difficult to deal with irregular and unstructured discrete graph data to alleviate the threat of backdoor attacks, a backdoor attack defense method for GNN based on contrastive learning was proposed, namely CLB-Defense.Specifically, a contrastive model was built by using contrastive learning in an unsupervised way, which searches suspicious backdoored samples.Then the suspicious backdoored samples were reshaped by using the graph importance indexes and the label smoothing strategy, and the defense against graph backdoor attack was realized.Finally, extensive experimental results show that CLB-Defense realizes the effect of defense performance on four public datasets and five popular graph backdoor attacks, e.g., CLB-Defense can reduce the attack success rate by an average of 75.66% (compared with the baselines, an improvement of 54.01%).…”
Get full text
Article -
7838
Is it the End of the Ice Age?
Published 2023-06-01“…However, the efficacy of using ice as a recovery strategy following injury in humans remains uncertain, and there is a growing trend recommending against icing following injury. …”
Get full text
Article -
7839
Knowledge graph and data application:intelligent recommendation
Published 2019-08-01“…Knowledge graph technology is an emerging internet technology with good forward-looking and strong technological advancement,and has broad application prospects.Knowledge graph technology provides the ability to analyze problems from the “relationship” perspective.It can deeply mine data,transform natural language into computer language,and display the value of data to the greatest extent.It can serve intelligent search,intelligent recommendation,risk early warning,intelligent operation,intelligent customer service,public opinion monitoring,equipment early warning and other businesses,greatly improving the production efficiency of enterprises.The comprehensive clustering algorithm,SVD decomposition algorithm,commodity-based collaborative concerns recommendation algorithm,user-based collaborative concerns recommendation algorithm and commodity similarity algorithm were studied.Combined with recommendation strategy,an intelligent recommendation system based on knowledge graph data application was proposed.It proves the feasibility and deployability of the data application with knowledge graph as the basic tool,which can fully meet the user’s demand for information on the internet platform.…”
Get full text
Article -
7840
Feminist Interventions in Political Representation in the United States and Canada: Training Programs and Legal Quotas
Published 2015-03-01“…Women's groups involved in the promotion of women in politics in the U.S. and Canada do not support the strategy of legal quota implementation; rather, one type of intervention is favored over all others: training programs. …”
Get full text
Article