Suggested Topics within your search.
Suggested Topics within your search.
- Philosophy 11
- History 9
- Moral and ethical aspects 9
- Economic development 7
- Social service 7
- Management 6
- Research 6
- Economic policy 5
- History and criticism 5
- Mass media 5
- Social aspects 5
- Study and teaching 5
- Economic conditions 4
- Education 4
- Marketing 4
- Quantum theory 4
- methods 4
- Advertising 3
- Business communication 3
- Chemistry, Physical and theoretical 3
- Communication 3
- Criticism 3
- Culture 3
- Economic aspects 3
- Economics 3
- Educational leadership 3
- Globalization 3
- Hospitality industry 3
- Information technology 3
- Information theory 3
-
20421
Political discourse, military and securitization of health nexus: contemporary security challenges and the military role in public health security
Published 2020-02-01“…The purpose of this paper is to provide answers to the questions why health is viewed through the lens of national and international security, and what might be the potential role of the armed forces in strategic response to health security challenges. Relying on theoretical settings of Foucault’s discourse studies and securitization concept developed by the Copenhagen School of security studies, authors will try to illuminate the nexus between political discourse, military and securitization of health. …”
Get full text
Article -
20422
ChatGPT and AI in the Universities: An Introduction to the Near Future
Published 2023-07-01“…The paper aims to present the theoretical and methodological foundations for developing and implementing artificial intelligence (AI) instruments in higher education within the HumanCentered AI framework and considers ChatGPT as a specific case. …”
Get full text
Article -
20423
Privacy-enhanced federated learning scheme based on generative adversarial networks
Published 2023-06-01“…Federated learning, a distributed machine learning paradigm, has gained a lot of attention due to its inherent privacy protection capability and heterogeneous collaboration.However, recent studies have revealed a potential privacy risk known as “gradient leakage”, where the gradients can be used to determine whether a data record with a specific property is included in another participant’s batch, thereby exposing the participant’s training data.Current privacy-enhanced federated learning methods may have drawbacks such as reduced accuracy, computational overhead, or new insecurity factors.To address this issue, a differential privacy-enhanced generative adversarial network model was proposed, which introduced an identifier into vanilla GAN, thus enabling the input data to be approached while satisfying differential privacy constraints.Then this model was applied to the federated learning framework, to improve the privacy protection capability without compromising model accuracy.The proposed method was verified through simulations under the client/server (C/S) federated learning architecture and was found to balance data privacy and practicality effectively compared with the DP-SGD method.Besides, the usability of the proposed model was theoretically analyzed under a peer-to-peer (P2P) architecture, and future research work was discussed.…”
Get full text
Article -
20424
The Adoption of Holacracy in Higher Education: A Scale Development Study
Published 2024-09-01“…After the analyses, it was determined that this 25-item scale, which is in harmony with its theoretical foundations, is a valid and reliable scale suitable for measuring faculty members’ opinions.…”
Get full text
Article -
20425
A Novel Design of CPW Feed Planar Omnidirectional Circularly Polarized Antenna
Published 2021-01-01“…Finally, the correctness of our theoretical analysis is verified by processing and measuring this antenna. …”
Get full text
Article -
20426
The history of science through the prism of race
Published 2024-01-01“…Finally, new research shows how race remains covertly embedded in theoretical frameworks, statistical formulae and technological devices still used by scientists today. …”
Get full text
Article -
20427
Analysis method on the properties of social networks of internet nuisance communities
Published 2024-06-01“…The research results can be utilized to analyze the characteristics of public hazard communities, track criminal activity trajectories, and provide theoretical references for the investigation and crackdown of public hazard organizations, as well as for the design of automated detection systems.…”
Get full text
Article -
20428
Influence Factors on General Contractor Capability in the Context of Transforming China
Published 2020-01-01“…The results contribute to the construction of the theoretical system of general contractor capability. …”
Get full text
Article -
20429
-
20430
Conceptual approaches to definition of the category «management сitizens’ savings»
Published 2018-12-01“…Systematization of theoretical aspects of various sources of domestic and foreign literature, made it clear that there is no definition of the category «management of savings of citizens». …”
Get full text
Article -
20431
CFD Simulation of Pressure and Velocity Drop on Y-Type Fuel Injectors
Published 2022-01-01“…This type of study needs to be both theoretical and experimental with simulation being a great tool to replace the latter. …”
Get full text
Article -
20432
ENSEMBLE MUSIC AS EDUCATIONAL AND COMMUNICATIVE RESOURCE. ONLINE SEMINAR REVIEW
Published 2024-12-01“…Accumulation and summarizing theoretical and practical educational and tutorial experience with students in the process of moulding young musician professional and personal formation.…”
Get full text
Article -
20433
Public policy in universities’ science development: stages of lifecircle
Published 2018-03-01“…Primary data were obtained as a result of an in-depth expert questionnaire, as well as a focus group interview.The main theoretical result of the study is to substantiate the category “life cycle of public policy”, covering such major stages as its formation, implementation and evaluation. …”
Get full text
Article -
20434
Transferencias condicionadas de dinero en Colombia: entre la política social y las lógicas de servidumbre
Published 2022-12-01“…The article adopts a critical perspective that uses theoretical references from the French school of regulation, as well as some analyses of the work of Michel Foucault. …”
Get full text
Article -
20435
Delay optimal opportunistic pipeline routing scheme for cognitive radio sensor networks
Published 2018-04-01“…In the Variable Duty Cycle for Opportunistic Pipeline Routing scheme, the nodes employ high duty cycle in the area far from the sink, and low duty cycle in the area near to the sink, which can achieve the balance of energy consumption and reduce the data transmission delay while not affecting network lifetime. The theoretical analysis and experimental results show that, compared with previous opportunistic pipeline routing, energy consumption of network is relatively balanced and the data transmission delay can be reduced by 36.6% in the Variable Duty Cycle for Opportunistic Pipeline Routing scheme.…”
Get full text
Article -
20436
Identification and control of risks in the payment system: Russian and foreign experience
Published 2024-11-01“…The review of the estimated indicators of the identification and control system in the Russian payment system is conducted. The theoretical significance of the research lies in expanding knowledge and understanding of modern mechanisms for identification and risk control in the Russian payment system, as well as international experience in identifying and controlling risks in the payment system. …”
Get full text
Article -
20437
Nonlinear Matrix Ferroelectric Composites on Construction Quality and Safety Measures
Published 2022-01-01“…Therefore, this study mainly studies the influence laws of viscoelasticity, elastic viscoplasticity, and macro mechanical behavior of nonlinear matrix ferroelectric composites. Through theoretical analysis and experiments, it is concluded that the change of effective stress relaxation stiffness of nonlinear matrix ferroelectric composites tends to be stable with the increase of time, and the effective stress relaxation stiffness of composites increases with the increase of age volume fraction at t = 0 s.…”
Get full text
Article -
20438
Experimental Study on Single-excavation Compound Shock-reflection Blasting Technology of Protective Layer
Published 2024-01-01“…The energy control principle of this technology is analyzed by theoretical analysis and numerical simulation, and the technological feasibility and the influence of blasting parameters are studied by field tests. …”
Get full text
Article -
20439
Differential Scanning Calorimetry Material Studies: Benzil Melting Point Method for Eliminating the Thermal History of DSC
Published 2022-01-01“…The results show that the peak shape of the melting peak is sharper and the peak emergence position is closer to the theoretical melting point after the elimination of the thermal history by the freeze-gradient heating up method. …”
Get full text
Article -
20440
Enhancing MaaS user satisfaction through strategic marketing: The synergy of sustainability and service experience.
Published 2025-01-01“…This research offers both theoretical insights and practical guidance for understanding the operational dynamics of MaaS and improving the user experience.…”
Get full text
Article