Showing 20,421 - 20,440 results of 24,450 for search 'Theorbo~', query time: 2.50s Refine Results
  1. 20421

    Political discourse, military and securitization of health nexus: contemporary security challenges and the military role in public health security by Vanja Rokvić, Vladimir Ajzenhamer

    Published 2020-02-01
    “…The purpose of this paper is to provide answers to the questions why health is viewed through the lens of national and international security, and what might be the potential role of the armed forces in strategic response to health security challenges. Relying on theoretical settings of Foucault’s discourse studies and securitization concept developed by the Copenhagen School of security studies, authors will try to illuminate the nexus between political discourse, military and securitization of health. …”
    Get full text
    Article
  2. 20422

    ChatGPT and AI in the Universities: An Introduction to the Near Future by A. V. Rezaev, N. D. Tregubova

    Published 2023-07-01
    “…The paper aims to present the theoretical and methodological foundations for developing and implementing artificial intelligence (AI) instruments in higher education within the HumanCentered AI framework and considers ChatGPT as a specific case. …”
    Get full text
    Article
  3. 20423

    Privacy-enhanced federated learning scheme based on generative adversarial networks by Feng YU, Qingxin LIN, Hui LIN, Xiaoding WANG

    Published 2023-06-01
    “…Federated learning, a distributed machine learning paradigm, has gained a lot of attention due to its inherent privacy protection capability and heterogeneous collaboration.However, recent studies have revealed a potential privacy risk known as “gradient leakage”, where the gradients can be used to determine whether a data record with a specific property is included in another participant’s batch, thereby exposing the participant’s training data.Current privacy-enhanced federated learning methods may have drawbacks such as reduced accuracy, computational overhead, or new insecurity factors.To address this issue, a differential privacy-enhanced generative adversarial network model was proposed, which introduced an identifier into vanilla GAN, thus enabling the input data to be approached while satisfying differential privacy constraints.Then this model was applied to the federated learning framework, to improve the privacy protection capability without compromising model accuracy.The proposed method was verified through simulations under the client/server (C/S) federated learning architecture and was found to balance data privacy and practicality effectively compared with the DP-SGD method.Besides, the usability of the proposed model was theoretically analyzed under a peer-to-peer (P2P) architecture, and future research work was discussed.…”
    Get full text
    Article
  4. 20424

    The Adoption of Holacracy in Higher Education: A Scale Development Study by Merve Turpçu

    Published 2024-09-01
    “…After the analyses, it was determined that this 25-item scale, which is in harmony with its theoretical foundations, is a valid and reliable scale suitable for measuring faculty members’ opinions.…”
    Get full text
    Article
  5. 20425

    A Novel Design of CPW Feed Planar Omnidirectional Circularly Polarized Antenna by Jiawei Yang, Xi Li, Lin Yang

    Published 2021-01-01
    “…Finally, the correctness of our theoretical analysis is verified by processing and measuring this antenna. …”
    Get full text
    Article
  6. 20426

    The history of science through the prism of race by Elise K. Burton, Sayori Ghoshal, James Poskett

    Published 2024-01-01
    “…Finally, new research shows how race remains covertly embedded in theoretical frameworks, statistical formulae and technological devices still used by scientists today. …”
    Get full text
    Article
  7. 20427

    Analysis method on the properties of social networks of internet nuisance communities by WANG Bo, GUO Jie, QIU Weidong, HUANG Zheng

    Published 2024-06-01
    “…The research results can be utilized to analyze the characteristics of public hazard communities, track criminal activity trajectories, and provide theoretical references for the investigation and crackdown of public hazard organizations, as well as for the design of automated detection systems.…”
    Get full text
    Article
  8. 20428

    Influence Factors on General Contractor Capability in the Context of Transforming China by Jie Yang, Hetong Yuan, Lin Zhang

    Published 2020-01-01
    “…The results contribute to the construction of the theoretical system of general contractor capability. …”
    Get full text
    Article
  9. 20429
  10. 20430

    Conceptual approaches to definition of the category «management сitizens’ savings» by Yu. V. Indychenko

    Published 2018-12-01
    “…Systematization of theoretical aspects of various sources of domestic and foreign literature, made it clear that there is no definition of the category «management of savings of citizens». …”
    Get full text
    Article
  11. 20431

    CFD Simulation of Pressure and Velocity Drop on Y-Type Fuel Injectors by Tarun Kumar Kotteda, Sudheer Kumar Varma Namburi, Prasada Raju Kantheti, Ravi Varma Penmetsa, Velivela Lakshmikanth Chowdary

    Published 2022-01-01
    “…This type of study needs to be both theoretical and experimental with simulation being a great tool to replace the latter. …”
    Get full text
    Article
  12. 20432

    ENSEMBLE MUSIC AS EDUCATIONAL AND COMMUNICATIVE RESOURCE. ONLINE SEMINAR REVIEW by Valentina L. Boiko, Svetlana A. Mitasova, Sergey G. Chaikin

    Published 2024-12-01
    “…Accumulation and summarizing theoretical and practical educational and tutorial experience with students in the process of moulding young musician professional and personal formation.…”
    Get full text
    Article
  13. 20433

    Public policy in universities’ science development: stages of lifecircle by D. Y. Znamenskiy

    Published 2018-03-01
    “…Primary data were obtained as a result of an in-depth expert questionnaire, as well as a focus group interview.The main theoretical result of the study is to substantiate the category “life cycle of public policy”, covering such major stages as its formation, implementation and evaluation. …”
    Get full text
    Article
  14. 20434

    Transferencias condicionadas de dinero en Colombia: entre la política social y las lógicas de servidumbre by Leidy Yolanda González García

    Published 2022-12-01
    “…The article adopts a critical perspective that uses theoretical references from the French school of regulation, as well as some analyses of the work of Michel Foucault. …”
    Get full text
    Article
  15. 20435

    Delay optimal opportunistic pipeline routing scheme for cognitive radio sensor networks by Anfeng Liu, Wei Chen, Xiao Liu

    Published 2018-04-01
    “…In the Variable Duty Cycle for Opportunistic Pipeline Routing scheme, the nodes employ high duty cycle in the area far from the sink, and low duty cycle in the area near to the sink, which can achieve the balance of energy consumption and reduce the data transmission delay while not affecting network lifetime. The theoretical analysis and experimental results show that, compared with previous opportunistic pipeline routing, energy consumption of network is relatively balanced and the data transmission delay can be reduced by 36.6% in the Variable Duty Cycle for Opportunistic Pipeline Routing scheme.…”
    Get full text
    Article
  16. 20436

    Identification and control of risks in the payment system: Russian and foreign experience by I. A. Rizvanova

    Published 2024-11-01
    “…The review of the estimated indicators of the identification and control system in the Russian payment system is conducted. The theoretical significance of the research lies in expanding knowledge and understanding of modern mechanisms for identification and risk control in the Russian payment system, as well as international experience in identifying and controlling risks in the payment system. …”
    Get full text
    Article
  17. 20437

    Nonlinear Matrix Ferroelectric Composites on Construction Quality and Safety Measures by Danping Hu, Gongxing Yan, Hongquan Sun

    Published 2022-01-01
    “…Therefore, this study mainly studies the influence laws of viscoelasticity, elastic viscoplasticity, and macro mechanical behavior of nonlinear matrix ferroelectric composites. Through theoretical analysis and experiments, it is concluded that the change of effective stress relaxation stiffness of nonlinear matrix ferroelectric composites tends to be stable with the increase of time, and the effective stress relaxation stiffness of composites increases with the increase of age volume fraction at t = 0 s.…”
    Get full text
    Article
  18. 20438

    Experimental Study on Single-excavation Compound Shock-reflection Blasting Technology of Protective Layer by MA Mengmeng, ZHENG Jiawei, DU Haoliang, ZHAO Zhenfu, LU Wenbo

    Published 2024-01-01
    “…The energy control principle of this technology is analyzed by theoretical analysis and numerical simulation, and the technological feasibility and the influence of blasting parameters are studied by field tests. …”
    Get full text
    Article
  19. 20439

    Differential Scanning Calorimetry Material Studies: Benzil Melting Point Method for Eliminating the Thermal History of DSC by Ziyang Zhu, Wei Li, Yilin Yin, Ruilin Cao, Zenghe Li

    Published 2022-01-01
    “…The results show that the peak shape of the melting peak is sharper and the peak emergence position is closer to the theoretical melting point after the elimination of the thermal history by the freeze-gradient heating up method. …”
    Get full text
    Article
  20. 20440

    Enhancing MaaS user satisfaction through strategic marketing: The synergy of sustainability and service experience. by LiYan Bu, Hong Chen, WeiCheng Pan, HeSen Li

    Published 2025-01-01
    “…This research offers both theoretical insights and practical guidance for understanding the operational dynamics of MaaS and improving the user experience.…”
    Get full text
    Article