Showing 1,701 - 1,720 results of 29,992 for search 'Achaea~', query time: 1.91s Refine Results
  1. 1701

    PENGEMBANGAN BAHAN AJAR BIOLOGI SEL PADA PROGRAM STUDI PENDIDIKAN BIOLOGI UIN ALAUDDIN MAKASSAR by St. Muriati

    Published 2014-11-01
    “…Thus, the implementation and achievement of learning objectives can be achieved optimally so that it can support contextual learning of Cell Biology.…”
    Get full text
    Article
  2. 1702

    Fully Kernected Neural Networks by Wei Zhang, Zhi Han, Xiai Chen, Baichen Liu, Huidi Jia, Yandong Tang

    Published 2023-01-01
    “…In this paper, we apply kernel methods to deep convolutional neural network (DCNN) to improve its nonlinear ability. DCNNs have achieved significant improvement in many computer vision tasks. …”
    Get full text
    Article
  3. 1703

    TOWARDS A SYSTEMIC CONSTRUCTION INDUSTRY DEVELOPMENT: A RESEARCH AGENDA FOR A FRAGMENTED INDUSTRY IN AFRICA by Williams Gyadu-Asiedu

    Published 2013-12-01
    “…In the process better and realistic results of infrastructural developmental agenda will be achieved …”
    Get full text
    Article
  4. 1704

    Are future teachers academically motivated? by Myriam Alvariñas-Villaverde, Sara Domínguez-Lloria, María Eulalia Agrelo-Costas, Margarita Pino-Juste

    Published 2025-01-01
    “…The aim of this work was to study the degree of global academic motivation, self-efficacy, achievement motivation and causal attribution of achievement in this group, observing the influence of personal and academic variables. …”
    Get full text
    Article
  5. 1705

    Response of fabric insert injection overmolding PP based composites subjected to single and muti-impact by José António Martins Ferreira, Tiago Febra, José Costa, Carlos Capela

    Published 2019-03-01
    “…For single impact tests, it was concluded that the highest impact energy required to achieve impactor perforation is obtained with Kevlar insert, while the highest percentage of energy recovered is achieved with biaxial glass fibre netting. …”
    Get full text
    Article
  6. 1706

    Eliminating Network Depth: Genetic Algorithm for Parameter Optimization in CNNs by M. Askari, S. Soleimani, M. H. Shakoor, M. Momeni

    Published 2025-01-01
    “…For instance, the generated CNN achieves an accuracy improvement of 0.75 percentage points over ResNet-110 while using 84% fewer parameters. …”
    Get full text
    Article
  7. 1707

    Environmental Sustainability under the Impact of the Current Crises by Anna Mravcová

    Published 2024-03-01
    “… The state of the environment is getting worse worsening, despite the efforts of international community and individual states aimed at its improvement and achieving environmental sustainability. Moreover, the current crises – the COVID-19 pandemic and the armed conflict in Ukraine – have many negative effects on these efforts. …”
    Get full text
    Article
  8. 1708

    The Implementation of Contrastive Analysis-Based Arabic Learning by Raswan Raswan

    Published 2018-12-01
    “…As well as other learning process, the successful Arabic learning can be achieved through several steps. This study aims to explain those steps, and it uses library research. …”
    Get full text
    Article
  9. 1709

    A 4 × 4 Beamforming Network for Spatial Diversity and Multiplexing Reconfiguration by Li Sun, Yuan Gao, Shi-gang Zhou, Guan-xi Zhang, Gao-ang Li

    Published 2022-01-01
    “…By analyzing and decomposing the simplified transmission matrix of the network, it is found that the 4 × 4 butler matrix can achieve spatial diversity and multiplexing reconfiguration by switching the operating modes of the four-port devices. …”
    Get full text
    Article
  10. 1710

    Mechanical properties of honeycomb structure with zero Poisson’s ratio for flexible trailing edge by ZHOU Yue, LI Bo, XU Weiwei, WEN Youyi

    Published 2025-02-01
    “…The quasi-linear strain of the cosine honeycomb achieves 27.8%. Excellent bending performance of cosine honeycomb segment can be achieved by parameter adjustment,thereby achieving significant bending deformation of the flexible trailing edge structure. …”
    Get full text
    Article
  11. 1711

    Fighting against COVID-19 requires wearing a face mask by not some but all by Hakan Yilmazkuday

    Published 2025-01-01
    “…The formal analysis is achieved by using a difference-in-difference design, where U.S. county-level data on changes in COVID-19 cases or deaths are regressed on lagged changes in social interaction of people measured by Google mobility. …”
    Get full text
    Article
  12. 1712

    Low-RCS, Circular Polarization, and High-Gain Broadband Antenna Based on Mirror Polarization Conversion Metasurfaces by Liang Zhang, Changqing Liu, Chun Ni, Meng Kong, Xianliang Wu

    Published 2019-01-01
    “…In this paper, a novel slot antenna array that is based on mirror polarization conversion metasurfaces (MPCM) is proposed. It achieves circular polarization (CP) and effectively reduces the radar cross section (RCS) and increases gain in the entire x-band. …”
    Get full text
    Article
  13. 1713

    Impact of digital transformation on the competitive advantage of companies by Zimonjić Marijana

    Published 2024-01-01
    “…Organizations can make this goal more achievable by defining a clear, comprehensive digital transformation strategy that should highlight key digital advantages.…”
    Get full text
    Article
  14. 1714

    Investigating Low Latency Communications With Link-Layer Rate of NOMA Under Nakagami-<italic>m</italic> Fading Channel in Finite Blocklength Regime by Muhammad Imran, Muhammad Amjad, Muhammad Khalil Afzal, Muhammad Usman, Byung-Seo Kim

    Published 2025-01-01
    “…We investigate the impact of transmit signal-to-noise ratio, delay exponent, transmission error probability, and various blocklength on the achievable effective capacity of each user. The impact of varying packet sizes (blocklength) and transmit SNR on the total achievable EC of NOMA users are investigated in detail. …”
    Get full text
    Article
  15. 1715

    Discretization of a mathematical model for image analysis based on the optics of spiral beams by S.A. Kishkin, S.P. Kotova

    Published 2024-04-01
    “…The process of its discretization is discussed in more detail as part of the development of numerical methods that allow the proposed model to be implemented using modern computer technology, while achieving real-time performance. Explicit mathematical procedures suitable for writing application software codes are given, an estimate of computational complexity is obtained, and the possibility of achieving real-time performance is confirmed. …”
    Get full text
    Article
  16. 1716

    Research and implement of file safe deposit box based on authentication and authorization by Xiao-ning DONG, Xiao-ping WU, Hong-cheng LI

    Published 2016-05-01
    “…Considering that the existing file safe deposit boxes lack online authentication and server authorization,a file safe deposit box based on authentication and authorization was designed and achieved.This system firstly identified the users of the file box online,thus avoiding the illegal users to login.Moreover,the master collected the operation events exerted on the files in the clients,and the master provided a granular authentication for the operation of users,thus avoiding the illegal operation and incorrect operation.The test of this system proved that it can be able to achieve the preset functions and can be widely used in many conditions.…”
    Get full text
    Article
  17. 1717

    The Classification of Multi-Domain Samples Based on the Cooperation of Multiple Models by Qingzeng Song, Junting Xu, Lei Ma, Ping Yang, Guanghao Jin

    Published 2022-01-01
    “…Furthermore, our framework achieves good scalability on multiple domains.…”
    Get full text
    Article
  18. 1718

    Research on the searchable encryption by Peng XU, Hai JIN

    Published 2016-10-01
    “…Searchable encryption has been recognized as a promising method to achieve the secure cloud search.According to the types of encryption keys,searchable encryption can be divided into searchable public-key and symmetric-key encryptions.The existing and well-known schemes of those two kinds of encryptions,their limitations,and the corresponding solutions were introduced.Specifically,two works under the condition of high security were introduced:one was to reduce the search complexity of searchable public-key encryption; the other one was to achieve the physical deletion of searchable symmetric-key ciphertexts.…”
    Get full text
    Article
  19. 1719

    Desarrollo histórico de la Enseñanza Médica Superior en Cuba de 1959 a 1989 by Flavia Linares Tovar, Claudia Katerine López Palmero, Yainara Abreus Ponvert

    Published 2015-02-01
    “…Aspects related to the achievements in health professional training, teaching methods, curricula and the network of medical schools throughout the country are discussed. …”
    Get full text
    Article
  20. 1720

    ANALYSIS OF THE ECONOMIC SITUATION IN WESTERN EUROPE by L. M. Rubaeva, A. A. Datieva

    Published 2021-02-01
    “…The article considers the issue of achieving the most stable socio-economic situation in the countries of Western Europe. …”
    Get full text
    Article