Showing 15,121 - 15,140 results of 20,708 for search 'Tecmo~', query time: 2.08s Refine Results
  1. 15121

    Prediction of Truck Fuel Consumption Based on Crossformer-LSTM Characteristic Distillation by Kai Du, Qingqing Shi, Jingni Song, Dan Chen, Weiyu Liu

    Published 2024-12-01
    “…With the increasing number of heavy-duty trucks and their high fuel consumption characteristics, reducing fuel costs has become a primary challenge for the freight industry. …”
    Get full text
    Article
  2. 15122

    The Main Ionization Sources of Gas in Several Nearby Star Forming Galaxies by Behjat Zarei Jalalabadi, Abbas Abedi, Alexei Moiseev

    Published 2021-03-01
    “…In intermediate cases, when the contributions of radiation from OB stars and from shock waves mix, the identification becomes uncertain. As an extra parameter, the gas velocity dispersion in the line-of-sight can be added to classical diagnostic diagrams (i.e., "BPT-σ" relations) to help finding an appropriate solution. …”
    Get full text
    Article
  3. 15123

    Modern trends of digitalization of innovation process by E. N. Bykovskaya, G. P. Kharchilava, Yu. N. Kafiyatullina

    Published 2018-03-01
    “…Digital technologies are becoming an increasingly important component of the various functional areas of the organization, and in some situations, the success of a business project. …”
    Get full text
    Article
  4. 15124

    Frequency, Prevalence, Interaction, and Gender Differences of Six Psychosocial Factors in Patients Presenting to a Psychiatric Emergency Service by James C. Patterson II, Ovais Khalid, Sarah E. Wakefield, Justin K. Liegmann, Saima Maqsood, Rajeev Srivastava, Elizabeth Allen

    Published 2021-05-01
    “…# INTRODUCTION The psychiatric emergency service (PES) has become an increasingly utilized patient care approach over the past 50 years. …”
    Get full text
    Article
  5. 15125

    Effect of Wind Loading Pattern on Shear Lag Phenomenon in Framed-Tube Building by Ashish Singh, Piyush Gaikwad, Sasankasekhar Mandal

    Published 2024-02-01
    “…Due to loading on half of the face, axial force distribution becomes unsymmetrical, and a minimum axial force in corner columns is observed. …”
    Get full text
    Article
  6. 15126

    Exploring safety at mass gathering events through the lens of three different stakeholders by Alison Hutton, Martin Robertson, Jamie Ranse

    Published 2025-02-01
    “…Through prioritising safety at mass gathering events, organisers enhance the quality of the event, protect individual and promote the long-term success of the event. Questions were centred on their understanding of safety at events, based on their experiences in MGEs.ResultsParticipants in this study identified many risks to event safety, including lack of risk assessment, communication, lack of ownership of risk and poor planning. …”
    Get full text
    Article
  7. 15127

    Influence of We Media Information Dissemination on Public Emotional Cognition and Behavior under Government Responsibility Constraint by Rongjian Xie, Dongju Liu, Yucai Jia, Peiyun Zhang

    Published 2021-01-01
    “…How to properly supervise We Media and effectively manage its violations has become an urgent problem in the process of national governance system and governance capacity building. …”
    Get full text
    Article
  8. 15128

    Apport de diverses sources de données à la réalisation d’une intervention ergonomique by Marie St-Vincent, Denys Denis, Daniel Imbeau, François Ouellet

    Published 2007-05-01
    “…The ergonomic diagnosis must therefore be considered as progressively becoming more precise through the different data sources by a gradual construction of the information throughout the intervention. …”
    Get full text
    Article
  9. 15129

    Communicating with Extension Clients about Water by Alexa J. Lamm, Phillip S. Stokes, Caroline G. Roper

    Published 2017-09-01
    “…As the U.S. and Florida populations continue to increase and the demand for fresh, clean water rises, water quality and quantity issues will become increasingly important. Extension faculty should understand public opinion surrounding water issues and identify the information that needs to be communicated to the public about water issues, as well as the best mode for this communication. …”
    Get full text
    Article
  10. 15130

    CONDITIONS OF SKIN AND INTESTINE MICROBIOTES IN PATIENTS WITH PSORIASIS by Ya.O. Yemchenko, K.E. Ishcheikin, I.P. Kaidashev, G.Yu. Morokhovets

    Published 2022-04-01
    “…Disorders in the regulation of skin microbiota may become a new therapeutic target in patients with psoriasis, and the restoration of symbiosis may increase the effectiveness of existing treatments. …”
    Get full text
    Article
  11. 15131

    Freemium Business Models as the Foundation for Growing an E-business Venture: A Multiple Case Study of Industry Leaders by Franziska Günzel-Jensen, Anna B. Holm

    Published 2015-01-01
    “…In e-business freemium business models have become legitiate. However, current research provides litte insight on how the free and premium offring should be employed to lead to growth and success in the long run. …”
    Get full text
    Article
  12. 15132

    Changes in the Order of Family Life Events in 20th-Century Europe: A Cross-Regional Perspective by Reto Burgin, Reto Schumacher, Gilbert Ritschard

    Published 2017-03-01
    “…In Eastern Europe where family event sequences have become less standardized and where a particular sequence characterized by the reversal of the traditional order between leaving home and family formation has been observed, the hypothesized transition is still in its very beginning. …”
    Get full text
    Article
  13. 15133

    Academic Literacy Development among Master’s Degree Students in the Process of Studying a Foreign Language in Professional Communication by O. M. Sherekhova

    Published 2022-05-01
    “…However, it is necessary to note that the level of academic literacy is low, because students lack the academic writing skills needed to become successful professionals after graduation. …”
    Get full text
    Article
  14. 15134

    IT GOVERNANCE IN THE BANKING SECTOR: EVIDENCE FROM ITALY, GERMANY, FRANCE AND SPAIN by Ida Claudia Panetta, Sabrina Leo, Fabrizio Santoboni, Gianfranco Vento

    Published 2017-11-01
    “…IT and data architectures are also becoming even more necessary to improve banks’ risk management process, and support the broad management of financial risks. …”
    Get full text
    Article
  15. 15135

    Diplomatic History of the Great Patriotic War and the New World Order by A. Y. Borisov

    Published 2015-06-01
    “…But the allies in the war did not become allies in the organization of the postwar world. …”
    Get full text
    Article
  16. 15136

    Consumer Protection of Girls from Cybercrime in a Gender Perspective by Susilowati Suparto, Deviana Yuanitasari, Sonny Dewi Judiasih, Yamudin Salaeh

    Published 2024-12-01
    “…Using protective technologies such as antivirus software and parental monitoring apps can help reduce the risk of girls becoming victims of cybercrime. Psychological and social support is crucial in helping girls who are victims to cope with the negative impact of cybercrime. …”
    Get full text
    Article
  17. 15137

    Java deserialization vulnerability defense technologybased on run-time detection by LI Yulin, CHEN Libo, LIU Yujiang, DU Wenlong, XUE Zhi

    Published 2024-04-01
    “…Consequently, developing strategies to counter Java deserialization vulnerability attacks has become a critical aspect of network security. Following an examination of numerous publicly known Java deserialization vulnerabilities, a runtime detection-based defense technology solution for Java deserialization vulnerabilities was proposed. …”
    Get full text
    Article
  18. 15138

    Effect of Expanded Graphite on Mechanical and Tribological Properties of Polyamide 6/Glass Fibre Composites by Dajana Japić, Simon Kulovec, Mitjan Kalin, Janez Slapnik, Blaž Nardin, Miroslav Huskić

    Published 2022-01-01
    “…The quality of plastic gears, especially their durability, is becoming increasingly important due to advances in electric mobility. …”
    Get full text
    Article
  19. 15139

    Information security vulnerability scoring model for intelligent vehicles by Haiyang YU, Xiuzhen CHEN, Jin MA, Zhihong ZHOU, Shuning HOU

    Published 2022-02-01
    “…More and more electronic devices are integrated into the modern vehicles with the development of intelligent vehicles.There are various design flaws and vulnerabilities hidden in a large number of hardware, firmware and software.Therefore, the vulnerabilities of intelligent vehicles have become the most important factor affecting the vehicle safety.The safety of vehicles is seriously affected by the disclosure of a large number of vulnerabilities, and the wide application of smart cars is also restricted.Vulnerability management is an effective method to reduce the risk of vulnerabilities and improve vehicle security.And vulnerability scoring is one the important step in vulnerability management procedure.However, current method have no capability assessing automotive vulnerabilities reasonably.In order to handle this problem, a vulnerability scoring model for intelligent vehicles was proposed, which was based on CVSS.The attack vector and attack complexity were optimized, and property security, privacy security, functional safety and life safety were added to characterize the possible impact of the vulnerabilities according to the characteristics of intelligent vehicles.With the machine learning method, the parameters in CVSS scoring formula were optimized to describe the characteristics of intelligent vehicle vulnerabilities and adapt to the adjusted and new added weights.It is found in case study and statistics that the diversity and distribution of the model are better than CVSS, which means the model can better score different vulnerabilities.And then AHP is used to evaluate the vulnerability of the whole vehicle based on the vulnerability score of the model, a score is given representing the risk level of whole vehicle.The proposed model can be used to evaluate the severity of information security vulnerabilities in intelligent vehicles and assess the security risks of the entire vehicle or part of the system reasonably, which can provide an evidence for fixing the vulnerabilities or reinforcing the entire vehicle.…”
    Get full text
    Article
  20. 15140

    The effectiveness of moodle-based e-learning in enhancing digital literacy among village owned enterprises by Lia Pebriana Puspitasari, Sri Sumaryati, Sudiyanto Sudiyanto

    Published 2023-10-01
    “…This decision has affected the dynamics of education and training, prompting an increase in the use of E-Learning applications. E-Learning has become a crucial method in creating a supportive learning environment and enhancing learners' performance. …”
    Get full text
    Article