Showing 1,361 - 1,380 results of 139,491 for search 'THE*', query time: 0.19s Refine Results
  1. 1361
  2. 1362
  3. 1363

    Recent Fuzzy Generalisations of Rough Sets Theory: A Systematic Review and Methodological Critique of the Literature by Abbas Mardani, Mehrbakhsh Nilashi, Jurgita Antucheviciene, Madjid Tavana, Romualdas Bausys, Othman Ibrahim

    Published 2017-01-01
    “…Currently, there is not a systematic literature review and classification of these new generalisations about rough set models. Therefore, in this review study, the attempt is made to provide a comprehensive systematic review of methodologies and applications of recent generalisations discussed in the area of fuzzy-rough set theory. …”
    Get full text
    Article
  4. 1364
  5. 1365
  6. 1366
  7. 1367
  8. 1368
  9. 1369
  10. 1370

    Physiotherapy and Nutrition: Two Unavoidable Therapies in the Treatment of Chronic non-communicable Diseases by Ismaray Sacerio González, Lourdes Elena Duany Badell, Lenia Marín Medina

    Published 2023-06-01
    “…The nutritional evaluation in a patient has a direct effect on the physiotherapy treatment, therefore, in order to really optimize the repair and the recovery process, the physiotherapist provides the required nutritional guidance. …”
    Get full text
    Article
  11. 1371
  12. 1372
  13. 1373

    Cognitive-Behavioral Therapy versus Other PTSD Psychotherapies as Treatment for Women Victims of War-Related Violence: A Systematic Review by N. Inès Dossa, Marie Hatem

    Published 2012-01-01
    “…The subgroup analysis shows that cognitive processing therapy (CPT), culturally adapted CPT, and narrative exposure therapy (NET) contribute to the reduction of PTSD and depression severity in the population of interest. …”
    Get full text
    Article
  14. 1374
  15. 1375
  16. 1376

    Research on distributed multi-access edge computing based on mimic defense theory by Hongyi ZHU, Xiaoyuan LU, Yi LI

    Published 2019-09-01
    “…The highly efficient network resources are provided by multi-access edge computing at the edge of the network,but high security capability is required also due to its distributed position and organization.Based on mimic defense theory,mimic defense structure for distributed multi-access edge computing was proposed.By segmenting data,padding check data and processing data at multiple edge node,dynamic scheduling and decision-making functions according to checksum were implemented.The simulation results show that with the increase of delay cost,the data manipulation and leak rates can be reduced effectively by the proposed structure.The edge node scheduling strategy based on trust and cost is proposed to improve the efficiency and security of the system.…”
    Get full text
    Article
  17. 1377

    Existence Theory for Pseudo-Symmetric Solution to 𝑝-Laplacian Differential Equations Involving Derivative by You-Hui Su, Weili Wu, Xingjie Yan

    Published 2011-01-01
    “…Some new sufficient conditions are obtained for the existence of at least one, triple, or arbitrary odd positive pseudosymmetric solutions by using pseudosymmetric technique and fixed-point theory in cone. As an application, two examples are given to illustrate the main results.…”
    Get full text
    Article
  18. 1378
  19. 1379
  20. 1380