Showing 1,821 - 1,840 results of 2,597 for search 'Iolaus~', query time: 2.30s Refine Results
  1. 1821

    Study on Announcement Effect of Stock Repurchase from the Perspective of Configuration Analysis by Hong Bing Wang, Ai Hua Jin, Hai Yun Yu

    Published 2021-01-01
    “…Through the analysis of the degree of premium (DP), repurchase ratio (RR), natural logarithm of total assets (LAS), return on net assets (ROE), top 10 shareholder equity ratio (CR10), and executive shareholding ratio (MSL), it is found that the paths of high CAR stock repurchase effect include repurchase clause-oriented type and centralization-proportional matching type; the path of nonhigh CAR stock repurchase effect includes size-premium limit type, profit-proportion limit type, and repurchase clause limit type. …”
    Get full text
    Article
  2. 1822

    Linguistic Insights into Eurolect of Institutional Documents Based on the System of Logico-Semantic Relations by Vladislav Hrežo

    Published 2022-11-01
    “…The analysis is focused on the occurrence of textual Themes used for signalling organization of information and their functioning in the selected text of CJEU judgement based on the Halliday's (1985) theory of information distribution in a text and the system of logico-semantic relations between clauses later adapted by Trklja (2017). On the basis of the data obtained, it follows that the textual Themes denoting different logico-semantic relation types are distributed in the analysed text of EU Judgement unevenly, whereas the most frequent and prevailing type of relation between clauses is represented by lexical items of enhancement denoting causal-conditional relations. …”
    Get full text
    Article
  3. 1823

    Relational Processes in Mandalika’s Tourism Texts: A Systemic Functional Linguistic Analysis by Elisa Debora Silalahi, Eva Tuckyta Sari Sujatna, Ekaning Krisnawati

    Published 2024-10-01
    “…Based on the analysis, each clause broadly reflects Mandalika’s features, but the participants involved have different ways of describing each feature. …”
    Get full text
    Article
  4. 1824

    Autologous Blood Transfusion after Local Infiltration Analgesia with Ropivacaine in Total Knee and Hip Arthroplasty by Torben Breindahl, Ole Simonsen, Peter Hindersson, Bjarne Brødsgaard Dencker, Mogens Brouw Jørgensen, Sten Rasmussen

    Published 2012-01-01
    “…Peak total and free venous ropivacaine concentrations after 8 h and 16 h postoperative bolus injections were 2.6 μg/mL and 0.11 μg/mL, respectively. …”
    Get full text
    Article
  5. 1825

    Posterior Quadratus Lumborum Block versus Transversus Abdominis Plane Block with Bupivacaine and Dexmedetomidine for Postoperative Analgesia following Caesarean Delivery: A Randomi... by V Rajesh Kumar Kodali, Kiran Muthu Rajah, Varun Karuppaiah Thiagarajan

    Published 2025-01-01
    “…Aim: To compare the number of rescue analgesic boluses required in the 24-hour postoperative period between the QLB and TAP block groups. …”
    Get full text
    Article
  6. 1826

    Patient-Controlled Analgesia (PCA): Intravenous Administration (IV-PCA) versus Oral Administration (Oral-PCA) by Using a Novel Device (PCoA® Acute) for Hospitalized Patients with A... by Stefan Wirz, Stefanie Seidensticker, Ronit Shtrichman

    Published 2021-01-01
    “…Outcome measures include the Numeric Rating Scale (NRS) score at rest and movement, side effects, technical difficulties, bolus dose administered, and bolus dose requested. …”
    Get full text
    Article
  7. 1827

    Efficient identification protocol provably secure in standard model by LI Yan-ping1, WANG Yu-min1

    Published 2009-01-01
    “…Based on the hardness assumption of the collusion attack algorithm with k traitors (K-CAA) in a gap Diffie-Hellman (GDH) group, a new and efficient identification protocol is proposed. …”
    Get full text
    Article
  8. 1828

    Doktrína řádného procesu jako prostředek inkorporace Bill of Rights by Jaroslav Ženíšek

    Published 2025-01-01
    “…Among the proponents of the incorporation theory we find two groups: one that advocates incorporation through the privileges or immunities clause and another one that supports incorporation through the due process clause or the so called doctrine of substantive due process. …”
    Get full text
    Article
  9. 1829
  10. 1830

    La modalité appréciative : vers une sémantique de good by Viviane Arigne

    Published 2015-07-01
    “…The ontological study is extended to adjectives which, like good, are found in superordinate clauses in the context of meditative-polemic should. …”
    Get full text
    Article
  11. 1831

    Research on incentive mechanism integrated trust management for P2P networks by HU Jian-li1, ZHOU Bin2, WU Quan-yuan2

    Published 2011-01-01
    “…An important challenge regarding peers’ trust valuation in peer-to-peer(P2P) systems was how to cope with such issues as dishonest feedbacks from malicious peers,collusions and complicatedly strategic frauds to the trust model itself,which could not be effectively tackled by the existing solutions.Thus,an incentive mechanism integrated trust management model for P2P networks,(IMTM) was proposed,to quantify and evaluate the trustworthiness of peers.Moreover,the related definitions and distributed implementation strategies of IMTM was also given.In IMTM,the recommendation credibility,composed of three factors,including the similarity characteristics,the altering scope of interaction experiences and the time fading feature of trust when interacting,was introduced to portray the extent to which the trustor trusted another recommender’s recommendations.Besides,the trusted service persistent intensity was imported to this model to promote peers to provide high-quality services to others continuously,and the risk mechanism was used to improve the sensitivity of this model.Additionally,based on the trust model,an adaptive reputation based incentive mechanism was presented.Through this mechanism,trusted peers could migrate to the centric position,while untrusted peers to the edge of the topology,incenting peers to provide more high-quality services in order to get more return on services.Theoretical analyses and experimental results demonstrate that IMTM has advantages in combating such malicious behaviors as the dishonest recommendations from malicious peers,collusions and the complicatedly strategic attacks to the trust model itself over the existing models,and show more adaptability,sensitivity and effectiveness.…”
    Get full text
    Article
  12. 1832

    Les fabriques de soi ? by Pergia Gkouskou-Giannakou

    Published 2017-03-01
    “…The author shows how digital writing technologies construct the illusion of a euphoric and user-friendly personal and social universe of heterogeneous semio-technical elements.…”
    Get full text
    Article
  13. 1833

    Application of the Theory of Cohesion in Analyzing Coherence among Different Texts by Hadi Edalatpoor

    Published 2020-02-01
    “…Coherence theory of Holiday is used for determining cohesive clause and the degree of coherence of a text by semantic relationships among sentences and different parts of that text. …”
    Get full text
    Article
  14. 1834

    INFORMACIJOS VISUOMENĖS SAMPRATA: SENŲJŲ VYNMAIŠIŲ GNIAUŽTAI by Marius P. P. Šaulauskas

    Published 2003-01-01
    “…It argues, first, that the most widespread understanding of the information society dwells on the existential presupposition, which sensu stricto implausibly posits information society, tentatively endowed with an utmost societal importance, as an already real phenomenon in status nascendi. …”
    Get full text
    Article
  15. 1835

    INFORMACIJOS VISUOMENĖS SAMPRATA: SENŲJŲ VYNMAIŠIŲ GNIAUŽTAI by Marius P. P. Šaulauskas

    Published 2003-01-01
    “…It argues, first, that the most widespread understanding of the information society dwells on the existential presupposition, which sensu stricto implausibly posits information society, tentatively endowed with an utmost societal importance, as an already real phenomenon in status nascendi. …”
    Get full text
    Article
  16. 1836

    Pattern memory cannot be completely and truly realized in deep neural networks by Tingting Li, Ruimin Lyu, Zhenping Xie

    Published 2024-12-01
    “…Inspired by perceptual characteristics of human vision on optical illusions, we propose a novel working capability analysis framework for DNNs through innovative cognitive response characteristics on visual illusion images, accompanied with fine adjustable sample image construction strategy. …”
    Get full text
    Article
  17. 1837

    Learning How to Use Input-Based and Output-Based Form-Focused Instruction: A Meta-Analytic Comparison of Korean and Persian EFL Learners by Andrew Schenck

    Published 2024-01-01
    “…The results suggested that input-based instruction was more effective for smaller phrasal features, while output-based instruction was more effective for features with more complex clauses (e.g., relative clauses or conditionals). …”
    Get full text
    Article
  18. 1838

    From evaluative to deontic predication: Evidence for the grammaticalization path from clausal complementation strategies by Axel Holvoet

    Published 2024-12-01
    “…The conditional clause type under discussion contains the anteriority converb in -us, which, as a result of the shift ‘evaluative → deontic’, has become characteristic of a set of deontic constructions where it competes with the infinitive. …”
    Get full text
    Article
  19. 1839

    Multi-user broadcast authentication scheme in wireless sensor networks with defending against DoS attacks by GUO Jiang-hong, MA Jian-feng

    Published 2011-01-01
    “…A multi-user broadcast authentication scheme was proposed in wireless sensor networks with defending against DoS attacks(DDA-MBAS) based on vBNN-IBS signature,the bogus messages could be filtered using hash op-eration and user information.Compared with existing multi-user broadcast authentication schemes,except defending against node compromise attack and active attack,the bogus messages can be filtered with low energy consumption and the threat of DoS attack and collusion attack launched by compromised user can be limited effectively.…”
    Get full text
    Article
  20. 1840

    Influence of hydrocortisone infusion method on the clinical outcome of patients with septic shock: A systematic review and meta-analysis by Yuting Li, Youquan Wang, Jianxing Guo, Dong Zhang

    Published 2025-01-01
    “…This systematic review and meta-analysis evaluate the impact of intermittent bolus and continuous infusion of hydrocortisone on these outcomes. …”
    Get full text
    Article