Suggested Topics within your search.
Suggested Topics within your search.
- Business 1
-
321
Examining Trait Anger and Anger Expression Styles of Pro-Licensed Football Coaches
Published 2020-12-01“…Coaches dealing with football sport encounter multidimensional stimulates in an intense competition environment that will cause anger both in and out of the field.These stimuli affect the emotional worlds and selfies of the coaches positively or negatively.Trait anger and unconrollable external and internal expression style ,as well as legal exposures ,harm the coach’s personality, Professional career and corporate identity.It is thought that the data obtained by this study will shed light on the effects of trait anger ,anger control,anger inward and anger outward situations of football coaches who have the highest degree (pro licence)in our country ;help to develop strategies in anger control and contribute to more research in this field.…”
Get full text
Article -
322
-
323
Preparation of Microcrystalline Cellulose from Sugar Beet Pulp and Its Properties
Published 2015-12-01Get full text
Article -
324
A Cooperative Dual to the Nash Equilibrium for Two-Person Prescriptive Games
Published 2014-01-01“…It is based on the assumption that players are completely selfish. However, NEs are often not played in practice, so we present a cooperative dual as an alternative solution concept by which an arbiter can assign the players' actions. …”
Get full text
Article -
325
An efficient cooperative message authentication based on reputation mechanism in vehicular ad hoc networks
Published 2019-06-01“…In the proposed scheme, reputation model is used to assess authentication efforts of vehicles, which enhances initiative for cooperative message authentication and inhabits selfish behavior; sequence optimization algorithm solves messages overflowing on condition limited computation of onboard unit and improves the speed of message authentication at the premise of ensuring the reliability of message authentication. …”
Get full text
Article -
326
-
327
-
328
-
329
Auction based bandwidth allocation mechanism for P2P content distribution networks
Published 2013-04-01“…Unreasonable allocation of originally scarce bandwidth was a severe problem in the P2P content distribution networks.To solve the problem and suppress the node's selfishness,an auction-based bandwidth allocation mechanism for P2P networks was proposed.Through the effective bandwidth payment scheme,the selfish nodes had no incentives to lie and provided the real bandwidth requirements.Also the “tragedy of the commons” could be avoided by the nodes' healthy bandwidth competition.To adapt to the distributed nature of the P2P networks,the algorithm was implemented in parallel at resource providing nodes and request nodes.Simulation results show that the scheme not only suppresses riding nodes efficiently in the system,but also shortens the average completion time for content distribution and decreases the ratio of data uploaded by the source server.…”
Get full text
Article -
330
Prisoner's Dilemma on real social networks: Revisited
Published 2013-07-01“…Thistheoretical game is important in understanding why a seemingly selfish strategy does persist and spread throughout apopulation that is mixing homogeneously at random. …”
Get full text
Article -
331
A Socialist Feminist Reading of Thatcherite Women in British Feminist Plays
Published 2019-12-01“…Socialist/materialist feminism is applied to the plays both to criticize selfish Thatcherite powerful women figures and to express the lack of collaboration among women to improve their position.…”
Get full text
Article -
332
-
333
Follow me y dame like: Hábitos de uso de Instagram de los futuros maestros
Published 2019-01-01“…Además, la finalidad principal de utilizar Instagram es el entretenimiento, y el tipo de contenido con mayor publicaciones son los selfies. Finalmente, algunos de los hábitos de uso de los futuros maestros se vinculan a prácticas de riesgo y a un uso abusivo de Internet. …”
Get full text
Article -
334
Various scenarios of measurements using a smartphone with a LiDAR sensor in the context of integration with the TLS point cloud
Published 2025-06-01“…The research consisted of comparing various scenarios of measuring using a smartphone with a LiDAR sensor (a smartphone held in hand, a smartphone on a selfie stick, and a smartphone mounted on a gimbal), two acquisition strategies (one direction and zigzag) and two registration methods (point to point and cloud to cloud). …”
Get full text
Article -
335
KARAKTER CITRA ARSITEKTURAL DAN DESKRIPSI TEMPAT WISATA BERBASIS PERSEPSI SWAFOTO
Published 2023-06-01“… Abstrak_ Tempat wisata swafoto (selfie) mulai menarik perhatian wisatawan dan media massa sejak tahun 2015. …”
Get full text
Article -
336
The current problems of the digital reflection of social reality: rethinking scientific concepts
Published 2019-05-01“…From positions of the concept of Richard Mark Emerson emergence of new dependences of users of Internet network on special category of subjects socially of interaction – moderators, administrators, owners of resources, the controlling public authorities and also manipulators of people’s attention has been explained; the specific motivation, which reveals itself in such phenomena as hypertrophied aspiration to the self-presentation (“selfie”, etc.); representation of the distorted virtual image for communications, hyperactivity in the appeal to various resources (“Internet surfing”) and also prevalence of motivators and estimated means – anonymous comments, “likes”, posts, reposts, symbolical encouragement and awards. …”
Get full text
Article -
337
The reasoning agent: agency in the capability approach and some implications for development research and practice
Published 2020-11-01“…Contrary to the dominant approach, rational choice theory, which proposes a selfish, calculative, atomistic chooser, the CA proposes a multi-motivated, multidimensional, plural, and reflective chooser. …”
Get full text
Article -
338
Communication performance analysis of secondary users in cognitive radio networks under primary user emulation attacks
Published 2012-11-01“…Cognitive radio network(CRN)is an effective technology and a hot research direction which could solve the problem of deficient resource and revolutionize utilization.And its safety technology attracted more and more researches.Primary user emulation(PUE)is a typically easily and largely affecting attack.PUE attacked come from both malicious misbehavior secondary users(MMU)and selfish misbehavior secondary users(SMU).The former was studied much more deeply than the later one.Distinguishing MMU and SMU,a four dimensional continuous time markov chain model to analyze the communication performance of normal secondary users under PUE attacks,and typically affected by SMUs was proposed.Furthermore,several PUE detection technologies were compared.The emulation results indicate that the SMU detection mechanism is essential for the PUE attack detection technology,which can improve the detection effects largely.…”
Get full text
Article -
339
-
340
Prediction of a New Phase of CuxS near Stoichiometric Composition
Published 2015-01-01Get full text
Article