Showing 1,581 - 1,600 results of 72,530 for search 'IXFORM~', query time: 4.91s Refine Results
  1. 1581
  2. 1582

    Evaluation of food habits and information levels of elite table tennis players and trainers by Cengiz Taskın, Metin Kaya, Oktay Cımen

    Published 2015-03-01
    “…In the first section, a personal information form was developed to show the participants' demographic characteristics by the researcher. …”
    Get full text
    Article
  3. 1583
  4. 1584
  5. 1585

    An Evolutionary Game Analysis on Public Information Communication between the Government and the Public in China by Hongsen Luo, Ying Gao, Fulei Shi

    Published 2021-01-01
    “…Public information is a social resource that connects all aspects of social life, regulates social activities and public behaviors, and plays a very important role in influencing public trust. …”
    Get full text
    Article
  6. 1586
  7. 1587
  8. 1588
  9. 1589

    The Octocoral Trait Database: a global database of trait information for octocoral species by D. Gómez-Gras, C. Linares, N. Viladrich, Y. Zentner, J. Grinyó, A. Gori, C. S. McFadden, K. E. Fabricius, J. S. Madin

    Published 2025-01-01
    “…In 2016, the Coral Trait Database advanced coral reef science by centralizing trait information for stony corals (i.e., Subphylum Anthozoa, Class Hexacorallia, Order Scleractinia). …”
    Get full text
    Article
  10. 1590
  11. 1591

    Brain Stroke Detection by Microwaves Using Prior Information from Clinical Databases by Natalia Irishina, Aurora Torrente

    Published 2013-01-01
    “…We show that using brain MRI images as prior information about brain's configuration, along with known brain dielectric properties, and the intrinsic regularization by structural inversion, allows successful and rapid stroke detection even in difficult cases. …”
    Get full text
    Article
  12. 1592
  13. 1593
  14. 1594

    Optimization Analysis of Advertising Information Resource Allocation in View of the Dynamic Game Model by Jun Han

    Published 2022-01-01
    “…Advertising has become the most important part of emerging advertising media with rich content, vivid form, huge browsing volume, and exponential growth in market share. …”
    Get full text
    Article
  15. 1595

    Celiac Disease in Children and YouTube: Do the Videos Contain Accurate Information? by Abdulkerim Elmas, Mustafa Akcam

    Published 2025-01-01
    “…Parents whose children are diagnosed with CD search for information about the disease via the internet. YouTube is one of the most frequently used platforms to access information due to the number of users and ease of access. …”
    Get full text
    Article
  16. 1596
  17. 1597

    Joint Pricing and Purchasing Decisions for the Dual-Channel Newsvendor Model with Partial Information by Jixiang Zhou, Yong Wang, Xiaoming Yan

    Published 2014-01-01
    “…A robust optimization approach that maximizes the worst-case profit is adapted under the aforementioned conditions to model demand uncertainty and linear clearing functions that characterize the relationship between demand and prices. We obtain a close-form expression for the robust optimal policy. Illustrative simulations and numerical experiments show the effects of several parameters on the optimal policy and on newsvendor performance. …”
    Get full text
    Article
  18. 1598

    DIFFUSION OF INNOVATIONS: AN ASSESSMENT OF BUILDING INFORMATION MODELLING UPTAKE TRENDS IN SOUTH AFRICA by Tim FROISE, Winston SHAKANTU

    Published 2014-12-01
    Subjects: “…Adoption, BIM, collaboration, diffusion of innovations, single information source…”
    Get full text
    Article
  19. 1599

    Geographical information based false report filtering scheme in wireless sensor networks by Zhi-xiong LIU, Jian-xin WANG

    Published 2012-02-01
    “…A geographical information based false reports filtering scheme(GFFS)in sensor networks was presented.In GFFS,each node distributes its location information to some other nodes after deployment.When a report was generated for an observed event,it must carry not only MACs from t detecting nodes with distinct key partitions,but also locations of these nodes.Each forwarding node checks not only the correctness of the MAC and the locations carried in the report,but also the legitimacy of the locations.Analysis and simulation results demonstrate that GFFS can resist collaborative false data injection attacks and thus can tolerate much more compromised nodes than existing schemes.…”
    Get full text
    Article
  20. 1600