Suggested Topics within your search.
Suggested Topics within your search.
-
4861
THE CONCEPT OF SOCIAL, ENVIRONMENTAL, AND ECONOMIC BEHAVIOR OF CORPO- RATES
Published 2025-06-01“…Therefore, effective CSR should involve corporate governance reform and regulatory intervention to make it mandatory and ensure control over the process. …”
Get full text
Article -
4862
Integrity of Best-Answer Assignments in Large Enrollment Classes; the role of Compulsory Attribution
Published 2024-12-01“…The method secures compulsory attribution of digital solutions using meta-data, access controls, and extensible code available in many common applications, including Microsoft Office. …”
Get full text
Article -
4863
Rock Crushing Analysis of TBM Disc Cutter Assisted by Ultra-High-Frequency Loading
Published 2022-01-01“…The addition of ultrahigh-frequency loading also reduces the fluctuation increase of cracks, which makes the operation state of the disc cutter more stable and avoids abnormal damage to tools.…”
Get full text
Article -
4864
Domownik Workbook. A Resource for Shaping Children’s Cultural Identity in Grades I–III
Published 2025-01-01“…These features guide the pupil towards the knowledge and education of language (linguistic codes), customs (communal celebrations), history (collective memory) and being rooted in religion. …”
Get full text
Article -
4865
The Impact of Technology on the Gender Wage Gap
Published 2024-12-01“…This result shows that women should be encouraged and justified to make more investments in the field of technological education…”
Get full text
Article -
4866
Fault classification in inverter based resources system using spherical coordinate system
Published 2025-09-01“…Modern grid codes require renewable energy source (RES) plants to remain connected with the grid even during fault scenarios. …”
Get full text
Article -
4867
Survey on automated vulnerability mining techniques for IoT device firmware
Published 2025-04-01“…In recent years, security incidents caused by IoT devices have occurred frequently, which makes the research of IoT device security become a hot spot. …”
Get full text
Article -
4868
Design and Security Analysis of a Fragment of Internet of Things Telecommunication System
Published 2016-12-01“…We solved the following tasks in the work, namely, a description of the system Smart Home, a description of steps and evaluation system security Smart Home; implementation of hardware assembly and writing a code for the selected fragment of the system; safety evaluation of the selected fragment Smart House and identification of actual threats; make recommendations to counter current threats; software implementation of one of the most urgent threats and software implementation of protective measures for a selected threat. …”
Get full text
Article -
4869
A lightweight high-frequency mamba network for image super-resolution
Published 2025-07-01“…We study the use of self-attention mechanism to integrate local and global information, aiming to make the model better balance the weights of the two parts of information. …”
Get full text
Article -
4870
From Manipulative Masterminds to Flirtatious Fools: An Examination of Male Sweet Voice Archetypes in Anime
Published 2024-12-01“… Anime characters make use of many linguistic features, such as grammatical patterns, vocabulary, and vocal quality, to index specific character traits or archetypes. …”
Get full text
Article -
4871
An Improved Particle Swarm Optimization Algorithm forOptimal Allocation of Distributed Generation Units in Radial Power Systems
Published 2020-01-01“…This development is done by controlling the inertia weight which affects the updating velocity of particles in the algorithm. Matlab codes are developed for the adapted electrical power system and the improved PSO algorithm. …”
Get full text
Article -
4872
CORPORATE GOVERNANCE AND QUALITY OF FINANCIAL REPORTING BY BANKS IN NIGERIA
Published 2023-11-01“…This therefore necessitates some codes that will guide the relationship between owner’s representative and executives, to ensure a balanced corporate administration. …”
Get full text
Article -
4873
Crack evolution mechanism of stratified rock mass under different strength ratios and soft layer thickness: Insights from DEM modeling
Published 2024-12-01“…Through FISH language programming in the particle flow code (PFC), this study reveals the acoustic emission (AE) characteristics, crack initiation and propagation, damage degree, and final failure characteristics. …”
Get full text
Article -
4874
Some applications of linear congruence from number theory
Published 2023-06-01“…This section of the paper can make it easier for mathematicians to apply problems involving linear congruences, especially for those who need basic expertise in number theory. …”
Get full text
Article -
4875
Generation of realistic input parameters for simulating atmospheric point-spread functions at astronomical observatories
Published 2024-04-01“…Rubin Observatory in Chile -- using weather data and historical seeing for a geographic location near the Observatory. We make quantitative predictions for two-point correlation functions (2PCF) that are used in analyses of cosmic shear. …”
Get full text
Article -
4876
THE PRACTICE OF USING DESIGN-THINKING TECHNIQUES IN THE “ONLINE ENTREPRENEURSHIP” TRAINING COURSE: FROM AN IDEA TO PROTOTYPING
Published 2017-10-01“…The key stages of the design thinking process - empathy, focusing, generation, selection, prototyping and testing - are built on the ability to quickly generate a variety of ideas that make it possible to get away from banality as well as on rules of choosing the best solution, its embodiment, even at the prototype level, and testing. …”
Get full text
Article -
4877
Evaluating energy efficiency of Internet of Things software architecture based on reusable software components
Published 2017-01-01“…Nowadays, Internet of Things technology has garnered a great amount of interest because it can make our life much easier, convenient, and even safer. …”
Get full text
Article -
4878
Forensic classification of crimes and misdemeanours related to unlawful encroachments on the assets of business entities
Published 2024-09-01“…The article substantiates the thesis that criminal offences aimed at unlawful alienation of tangible and intangible assets of a business entity or otherwise related thereto are quite numerous and are enshrined in various sections of the Special Part of the Criminal Code of Ukraine. It is noted that this makes it difficult for the prosecution to recognise these criminal offences during the pre-trial investigation. …”
Get full text
Article -
4879
What we need is health system transformation and not health system strengthening for universal health coverage to work: Perspectives from a National Health Insurance pilot site in...
Published 2020-09-01“…An iterative, inductive and deductive data analysis approach was utilised. Transcripts were coded with the aid of MAXQDA 2018. Results: Six broad themes emerged: make PHC work, transform policy development, transform policy implementation, establish public–private partnerships, transform systems and processes and adopt a systems lens. …”
Get full text
Article -
4880
Assessment of the Quality of Basic and Expanded Resuscitative Measures in a Multifield Hospital (Simulation Course)
Published 2017-01-01“…The analysis was performed using the ZOLL RescueNet Code Review® software. A statistical analysis was performed using the Statistica 7.0 software (MannWhitney Utest). …”
Get full text
Article