Showing 39,001 - 39,020 results of 48,208 for search '"structuralism"', query time: 0.19s Refine Results
  1. 39001

    Influence of compliance of intramodular joints on the natural vibrations frequency of a modular building by V. S. Shirokov

    Published 2023-10-01
    “…One of the main parameters in the calculation of loads from dynamic effects is the determination of natural frequencies of vibrations of the structure. The subject of research is the natural vibrational frequency of modular buildings. …”
    Get full text
    Article
  2. 39002

    SOCIAL AND PEDAGOGICAL FORECASTING IN THE PROCESS OF CHILDREN’S SOCIALIZATION by Antonina L. Leutina

    Published 2015-03-01
    “…The increase in personal resource value determines the application of socio-structural approach in pedagogy which contributes to the reduction of risks connected with the results of pedagogic activity and makes prediction of social and personal evolution of a child more prominent. …”
    Get full text
    Article
  3. 39003

    The concept of interethnic security of the region (on the example of Tatarstan) by Rezida R. Khusnutdinova, Il’dar M. Yusupov

    Published 2023-08-01
    “…Predictors of increasing interethnic tension in the region they make up a structural pentabasis. Exceeding the acceptable for an ethnic group norms of any of them causes alatent murmur of ethnophores. …”
    Get full text
    Article
  4. 39004

    A novel topology optimization of coverage-oriented strategy for wireless sensor networks by Shuxin Wang, Hairong You, Yinggao Yue, Li Cao

    Published 2021-04-01
    “…Combining the characteristics of topology structure of wireless sensor networks and the optimization idea of the wolf pack algorithm redefines the group’s wandering and surprise behavior. …”
    Get full text
    Article
  5. 39005

    CORPORATE ENTREPRENEURSHIP AND SERVICE FIRMS’ PERFORMANCE IN NIGERIA by Moruff Sanjo Oladimeji, Adebiyi Julius Abosede, Benneth Uchenna Eze

    Published 2019-05-01
    “…The study employed a survey research design through the administration of a structured questionnaire on 636 employees of 21 service firms, purposively selected. …”
    Get full text
    Article
  6. 39006

    Insilico targeting of virus entry facilitator NRP1 to block SARS-CoV2 entry. by Nousheen Bibi, Maleeha Shah, Shahzad Khan, Muhammad Shahzad Chohan, Mohammad Amjad Kamal

    Published 2025-01-01
    “…The crystallographic structure of the b1 domain of human NRP1 (PDB entry: 7JJC) was used for this purpose. …”
    Get full text
    Article
  7. 39007

    L’abeille mellifère (Apis mellifera unicolor) à Mayotte by Samuel Perichon

    Published 2024-06-01
    “…The place of this insect in social and religious representations and social practices is being questioned due to the archipelago’s multicultural identity and recent evolution of society. Semi-structured interviews (35) have revealed the high value placed on bees in Mayotte for the services they provide to humans. …”
    Get full text
    Article
  8. 39008

    Research on multi-granularity password analysis based on LLM by Meng HONG, Weidong QIU, Yangde WANG

    Published 2024-02-01
    “…Password-based authentication has been widely used as the primary authentication mechanism.However, occasional large-scale password leaks have highlighted the vulnerability of passwords to risks such as guessing or theft.In recent years, research on password analysis using natural language processing techniques has progressed, treating passwords as a special form of natural language.Nevertheless, limited studies have investigated the impact of password text segmentation granularity on the effectiveness of password analysis with large language models.A multi-granularity password-analyzing framework was proposed based on a large language model, which follows the pre-training paradigm and autonomously learns prior knowledge of password distribution from large unlabelled datasets.The framework comprised three modules: the synchronization network, backbone network, and tail network.The synchronization network module implemented char-level, template-level, and chunk-level password segmentation, extracting knowledge on character distribution, structure, word chunk composition, and other password features.The backbone network module constructed a generic password model to learn the rules governing password composition.The tail network module generated candidate passwords for guessing and analyzing target databases.Experimental evaluations were conducted on eight password databases including Tianya and Twitter, analyzing and summarizing the effectiveness of the proposed framework under different language environments and word segmentation granularities.The results indicate that in Chinese user scenarios, the performance of the password-analyzing framework based on char-level and chunk-level segmentation is comparable, and significantly superior to the framework based on template-level segmentation.In English user scenarios, the framework based on chunk-level segmentation demonstrates the best password-analyzing performance.…”
    Get full text
    Article
  9. 39009

    EFFECT OF Zanthoxylum acanthopodium DC EXTRACT ON THE INCREASE OF BRAIN CELLS IN THE SUBSTANTIA NIGRA OF WISTAR RATS THAT ARE ROTENONE-INDUCED by Shalli hafizha, Binarwan Halim, Linda Chiuman

    Published 2024-12-01
    “…Histopathological observations showed that 70% ethanol extract of andaliman fruit improved the histological structure of brain cells in the substantia nigra area. …”
    Get full text
    Article
  10. 39010

    Seed endophytes of malting barley from different locations are shaped differently and are associated with malt quality traits by Oyeyemi Ajayi, Ramamurthy Mahalingam

    Published 2025-02-01
    “…However, it remains unclear the forces that shapes microbial structure and assembly, and how plant seed-microbiome interactions impact grain quality. …”
    Get full text
    Article
  11. 39011

    Bolsonaro’s ‘Anti-Diplomacy' by J. A. Timofeeva

    Published 2022-07-01
    “…To strengthen his positions, the president appeals to the population, looks for support in the Parliament and pushes through an administrative bill aimed at making the president more autonomous in managing the executive branch structures.The appearance of the “right-wing” president and powerful influence of the conservative military stem from the economic and political crisis in Brazil, and Bolsonaro’s “special” governance style fits a worldwide trend of populism and active politics coverage in social networks.…”
    Get full text
    Article
  12. 39012

    Theoretical and Experimental Study on Synchronization of the Two Homodromy Exciters in a Non-Resonant Vibrating System by Xue-Liang Zhang, Chun-Yu Zhao, Bang-Chun Wen

    Published 2013-01-01
    “…The numeric and experiment results derived thereof show that the two exciters can operate synchronously as long as the structural parameters of system satisfy the criterion of stability in the regions of frequency capture. …”
    Get full text
    Article
  13. 39013

    Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm by Meixi Chen

    Published 2021-01-01
    “…Encryption and decryption use the same algorithm structure, but the order in which the subkeys are used is reversed. …”
    Get full text
    Article
  14. 39014
  15. 39015

    Principles of Preventive Police Activity: Concepts, Content and Their Classification by S. O. Shatrava, H. R. Parkhanov

    Published 2019-09-01
    “…The principles of preventive police activity should be understood as objectively stipulated, pivotal, relatively stable, scientifically substantiated guiding principles, enshrined by the norms of national legislation and international legal acts, which are the basis for the activity of the National Police of Ukraine, as well as the authorized officials of its agencies and structural units carried out in the process of forecasting and preventing offenses through the use of preventive police measures permitted by national law, and complex of preventive actions.…”
    Get full text
    Article
  16. 39016

    The Mediating Effect of Religiosity in Evaluating Individual Cultural Values Regarding Interest by Selim Aren, Hatice Nayman Hamamcı

    Published 2022-08-01
    “…Exploratory factor analysis was performed on a newly developed scale measuring negative opinion on interest. Next, structural equation modeling (SEM) was used to test the research models and analyze the results from the confirmatory factor analysis. …”
    Get full text
    Article
  17. 39017
  18. 39018

    Partner Choices in Long Established Migrant Communities in Belgium by Emilien Dupont, Amelie Van Pottelberge, Bart Van de Putte, John Lievens, Frank Caestecker

    Published 2017-02-01
    “…We focused on the role of migration history and transnational links, culture (religion, language), skin colour and structural characteristics of the district migrants live in (mainly community size) to gain further insight into the partner choices of migrants in Belgium. …”
    Get full text
    Article
  19. 39019

    Criminalistics characteristics of arms trafficking offences committed by organised groups and criminal organisations by R. E. Veliiev

    Published 2024-12-01
    “…It is established that the method of committing crimes in the field of firearms trafficking involving organised groups and criminal organisations is a full-structured one. It is also found that in most cases it includes actions of preparation, direct commission and concealment. …”
    Get full text
    Article
  20. 39020

    Technology engagement in enhancing memory functionality in elderly care centers by Feras Ali Mohammad Al-Habies, Mamdouh Baniah Lafee Al Zaben, Abdullah M.A Al-Tarawneh, Nagham Mohammad Abu Al-Basal, Hanadi Aldreabi, Omar Ismail Hamzeh Alorani, Hend Abdulaziz Alsulaiman

    Published 2025-01-01
    “…The data was collected quantitatively using “Everyday Technology Use, Episodic Memory, Executive function, Clock Drawing Test (CDT), and Cognitive Assessment” tools and qualitatively using semi-structured interviews. The data analyzed descriptively and inferentially using NVivo and SPSS 23.0. …”
    Get full text
    Article