Showing 2,561 - 2,580 results of 3,911 for search 'Dhoom~', query time: 1.73s Refine Results
  1. 2561

    The peculiarities of mathematic communication of the eight-formers by Viktorija Sičiūnienė

    Published 2023-09-01
    “…However, to solve them the boys most frequently choose an arithmetic way and wrote down only the answer. …”
    Get full text
    Article
  2. 2562

    Ranking the Return on Assets of Tehran Stock Exchange by a New Method Based on Z-Numbers Data by Maryam Farzam, Mozhdeh Afshar Kermani, Tofigh Allahviranloo, Azim Aminataei

    Published 2023-01-01
    “…First, by ranking the return on assets of Tehran stock exchanges, with this method, we can choose the most risky stock and the least risky stock among the available stocks. …”
    Get full text
    Article
  3. 2563

    Unravelling EFL teachers’ mastery of TPACK to promote students’ participation by Joko Prayudha.S, Ami Pradana

    Published 2023-11-01
    “…Moreover, this study also reported that by choosing the proper technology application based on students’ characteristics, students could participate more actively and more creatively which could support the learning atmosphere, build a sense of comfort in learning, and enhance the learning participation.…”
    Get full text
    Article
  4. 2564

    A Differential Game of Transboundary Pollution Control and Ecological Compensation in a River Basin by Yongxi Yi, Zhongjun Wei, Chunyan Fu

    Published 2020-01-01
    “…Among them, the downstream region as the leader chooses its abatement investment level and an ecological compensation rate to encourage upstream investing in water pollution control firstly. …”
    Get full text
    Article
  5. 2565

    Media and information literacy of  young people: guidelines for public policy by Yu. V. Gnezdova, N. S. Sergienko

    Published 2025-01-01
    “…The article shows that the resilience of society to information threats should become part of building a comprehensive or total protection system in which a young person can choose their role as checks and balances in the overall information ecosystem. …”
    Get full text
    Article
  6. 2566

    Pneumocystis carinii Pneumonia in HIV — Investigate or Just Treat? by Steven Kesten

    Published 1994-01-01
    “…This strategy has not been tested in controlled clinical trials although decision analysis models have attempted to evaluated it, it's liekly reasonable to choose empirical antimicrobial therapy in specific clinical settings such as: (a) typical radiographic picture in a person with dyspnea and/or nonproductive cough. presence of HIV and a CD4 count of less than 200 cells/mm3:(b) previous PCP, typical appearance and the patient is known to tolerate standard anti-PCP medications: and (c) high clinical suspicion in a patient who refuses bronchoscopy yet desires treatment or where bronchoscopy cannot he performed. …”
    Get full text
    Article
  7. 2567

    Computer simulation of stress-strain states in zygomatic bones after complex installation of implants by Timur Dibirov, Aleksey Drobyshev, Eduard Kharazyan, Nikolay Redko, Egor Pankov, Alexander Kozulin, Sergey Panin, Sergey Arutyunov

    Published 2024-01-01
    “…Such a phenomenon should be primarily taken into account when choosing the standard sizes of installed zygomatic implants in order to reduce the compliance of weakened areas of the skull (as the basis of the load-bearing structure). …”
    Get full text
    Article
  8. 2568

    On ∼n Notion of Conjugacy in Some Classes of Epigroups by Aftab Hussain Shah, Amal S. Alali, Mohd Rafiq Parray

    Published 2024-01-01
    “…The challenge to introduce a new notion of conjugacy in semigroups is to choose the suitable set of conjugating elements. A semigroup may contain a zero, and if zero lies in the conjugating set, then the relation reduces to the universal relation as can be seen in the notions ∼l, ∼p, and ∼o. …”
    Get full text
    Article
  9. 2569

    Tradeoffs in automated financial regulation of decentralized finance due to limits on mutable turing machines by Ben Charoenwong, Robert M. Kirby, Jonathan Reiter

    Published 2025-01-01
    “…Any system that claims to follow regulations must choose either a form of permission or a less-than-Turing-complete update facility. …”
    Get full text
    Article
  10. 2570

    Ectopic Tooth in Mandibular Canal, Maxillary Sinus, and Mandibular Condyle by Mert Akbas, Zülfikar Karabıyık, Altan Varol

    Published 2022-01-01
    “…Whether the patient has signs and symptoms related to ectopic tooth, early intervention for the removal of ectopic tooth along with accompanying lesion is the treatment of choice. Specialists choose intervention way based on their experience. …”
    Get full text
    Article
  11. 2571

    Modeling Campaign Optimization Strategies in Political Elections under Uncertainty by Christopher, Senfuka, Paul, Kizito Mubiru, Maureen, N. Ssempijja

    Published 2020
    “…In most political campaigns,the overall goal of every candidate is to maximize the number of voters during the election exercise.In such an effort,cost effective methods in choosing the optimal campaign strategy areparamount.In this paper, a mathematical model is proposed that optimize campaign strategies of a political candidate.Considering uncertainty in voter support and cost implications in holding political rallies,we formulate a finite state markov decision process model where states of a markov chain represent possible states of support among voters.Using daily equal intervals,thecandidates‟s decision of whether or not to campaign and hold a political rally at a given location were made using discrete time Markov chains and dynamic programming over a finite period planning horizon.Empirical data was collected from two locations on a daily basis during the campaign exercise.The data collected was analyzed and tested to establish the optimal campaign strategy and costs at the respective locations.Results from the study indicated the existence of an optimal state-dependent campaign strategy and costs at the respective political rally locations.…”
    Get full text
    Article
  12. 2572

    Influence of Crucible Thermal Conductivity on Crystal Growth in an Industrial Directional Solidification Process for Silicon Ingots by Zaoyang Li, Lijun Liu, Yunfeng Zhang, Genshu Zhou

    Published 2016-01-01
    “…Based on the numerical simulations, some discussions on designing and choosing the crucible thermal conductivity are presented.…”
    Get full text
    Article
  13. 2573

    Afferent Connections to the Rostrolateral Part of the Periaqueductal Gray: A Critical Region Influencing the Motivation Drive to Hunt and Forage by Sandra Regina Mota-Ortiz, Marcia Harumi Sukikara, Luciano Freitas Felicio, Newton Sabino Canteras

    Published 2009-01-01
    “…Therefore, this unique combination of afferent connections puts the rlPAG in a privileged position to influence the motivation drive to choose whether hunting and foraging would be the most appropriate adaptive responses.…”
    Get full text
    Article
  14. 2574

    Research on the Algorithm for Composite Lining of Deep Buried Water Conveyance Tunnel by Fei Li, Ningdong Chang, Jianhui Wang, Tao Feng, Chunling Li

    Published 2021-01-01
    “…Finally, a case study is followed by choosing a typical section of the Eastern Canal in Beijing of the South-to-North Water Diversion Project (SNWDP). …”
    Get full text
    Article
  15. 2575

    Unbalance Identification of Speed-Variant Rotary Machinery without Phase Angle Measurement by Cong Yue, Xingmin Ren, Yongfeng Yang, Wangqun Deng

    Published 2015-01-01
    “…Moreover, the inherent unbalance recognized by experimental data from a turbine rotor with slender shaft is found to be in certain difference under different counterweight combination. Choosing suitable balancing planes will improve the accuracy of unbalance identification.…”
    Get full text
    Article
  16. 2576

    Practices of Protest in the Conditions of the Developing Academic Capitalism by A. E. Geger, S. V. Lyashko, A. V. Klyuev, G. I. Saganenko

    Published 2022-09-01
    “…In the context of developing academic capitalism, teachers choose one of two adaptation strategies: 1) conformism as an opportunity to integrate into a constantly changing situation; 2) the practice of quiet protest as an opportunity to demonstrate the inefficiency of the entrepreneurial model of higher education, at least in its current version, and 3) neutral position to protect the classical values of the academic community.…”
    Get full text
    Article
  17. 2577

    Measured Rare Voltage Sags and Clusters of Sags: Prediction Models Driven by the Intermittence Indices by G. M. Casolino, M. de Santis, L. Di Stasio, C. Noce, P. Varilone, P. Verde

    Published 2024-01-01
    “…The final goal is to implement the procedure in a measurement system that can automatically pre-analyze the recorded sags and choose the best technique for prediction depending on the type of sag. …”
    Get full text
    Article
  18. 2578

    Unusual Localization of an Emergent Bacterium, Raoultella ornithinolytica by Michele Cavaliere, Guido Bartoletti, Pasquale Capriglione, Antonella Miriam Di Lullo, Gaetano Motta, Maurizio Iengo, Elena Cantone

    Published 2020-01-01
    “…Culture test is mandatory to choose the proper therapy and avoid potential severe complications.…”
    Get full text
    Article
  19. 2579

    Nonintegrated Host Association of Myrmecophilus tetramorii, a Specialist Myrmecophilous Ant Cricket (Orthoptera: Myrmecophilidae) by Takashi Komatsu, Munetoshi Maruyama, Takao Itino

    Published 2013-01-01
    “…There were no signs of intimate behaviors such as grooming of hosts or receipt of mouth-to-mouth feeding from hosts, which are seen in some host-specialist Myrmecophilus species among obligate host-ant species. …”
    Get full text
    Article
  20. 2580

    An Enhanced Sine Cosine Algorithm for Feature Selection in Network Intrusion Detection by zahra asgari varzaneh, soodeh hosseini

    Published 2024-12-01
    “…Metaheuristic algorithms are optimization techniques inspired by nature and are well-suited to choose features for network intrusion detection. They are effective in exploring large search spaces and have been widely used for this purpose. …”
    Get full text
    Article