Suggested Topics within your search.
Suggested Topics within your search.
- Philosophy 11
- History 9
- Moral and ethical aspects 8
- Economic development 7
- Social service 7
- Research 6
- Economic policy 5
- History and criticism 5
- Management 5
- Mass media 5
- Social aspects 5
- Study and teaching 5
- Economic conditions 4
- Education 4
- Quantum theory 4
- methods 4
- Chemistry, Physical and theoretical 3
- Communication 3
- Criticism 3
- Culture 3
- Economic aspects 3
- Economics 3
- Educational leadership 3
- Globalization 3
- Information theory 3
- Jurisprudence 3
- Law 3
- Literature 3
- MATHEMATICS / Mathematical Analysis 3
- Number theory 3
-
26121
Oscillatory autophagy induction is enabled by an updated AMPK-ULK1 regulatory wiring.
Published 2024-01-01“…Although oscillatory behaviour is typically associated with processes like the cell cycle or circadian rhythm, emerging experimental and theoretical evidence suggests that such periodic dynamics may explain conflicting experimental results in autophagy research. …”
Get full text
Article -
26122
METHODOLOGICAL PROFILES OF THE CIVIL SOCIETY: CIVIC VIRTUE VERSUS CIVIL ASSOCIATION
Published 1999-01-01“…The professional sensu stricto usage of the concept unfolds and could be as such identified only on the diachronic and synchronous background of different theoretical contexts that were articulated in the millennial history of ever controversial Western philosophical discourse. …”
Get full text
Article -
26123
Energy efficient relay node fast selection algorithm for multi-hop wireless sensor networks
Published 2010-01-01“…Aiming at the inefficiency of the relay selection of data gathering protocol for multi-hop wireless sensor networks(WSN),an energy efficient relay node fast selection(EERNFS) algorithm was proposed.In EERNFS,time-sharing channel was adopted to maintain time synchronization of WSN and periodically update the information of the neighbor network node.The network nodes could be activated synchronously in any network listening/sleeping cycle according to a certain probability,thus the real-time consistency and the stability of the nodes’ connectivity degree in WSN were guaranteed.Based on the geographic priority,the value of the nodes and the distribution estimation of the route-link quality,the relay node was selected through the competition method and the competing between the candidate relay nodes was reduced through gradually multiplying time window method.Theoretical analysis and simulation results show that EERNFS outperforms FFS(forwarder fast selection) and GeRaF in terms of energy efficiency,delay of data delivery,and data delivery rate so that the network lifetime is greatly prolonged.…”
Get full text
Article -
26124
Research on the Structural Strength of the New Energy Cantilever Type Reducer Box at the Wheel Side
Published 2023-04-01“…The operational experiment result of gearboxes is in agreement with the above theoretical analysis. The proposed structural strength analysis method provides a technical basis for the structural design of the gearbox.…”
Get full text
Article -
26125
Hiérarchies au sein des mouvements féministes en Iran. Marginalisation des femmes des minorités ethniques dans la production féministe académique et militante
Published 2023-05-01“…From the standpoint that comprehends class and ethnicity in their dialectical unity, I will critically examine both the theoretical premises as well as the political implications of dominant strands of Iranian feminism, dubbed here as “centralist reformist feminism”. …”
Get full text
Article -
26126
Gender parity among authorities in the Ecuadorian system of high education
Published 2022-09-01“…University authorities are understood to be rectors, vice-rectors, and intermediate positions, such as deans, directors, and coordinators. For the theoretical discussion, the concepts of glass ceiling and vertical segregation are taken into account for explaining the findings. …”
Get full text
Article -
26127
The Diffusive Model for West Nile Virus on a Periodically Evolving Domain
Published 2020-01-01“…Some numerical simulations are performed in order to illustrate our analytical results. Our theoretical analysis and numerical simulations show that the periodic change of the habitat range plays an important role in the West Nile virus transmission, in particular, the increase of periodic evolution rate has positive effect on the spread of the virus.…”
Get full text
Article -
26128
Rigid-flexible Coupling Modeling and Fault Characteristic Simulation Research of Planetary Transmission System
Published 2021-03-01“…The simulation results can provide basic basis and theoretical support for the research on the fault mechanism and fault diagnosis technology of the planetary gearbox.…”
Get full text
Article -
26129
Design Analysis and Experiment of Lower Limb Power Exoskeleton
Published 2020-05-01“…In order to verify the correctness of theoretical research, the exoskeleton prototype is processed and related experiments are carried out. …”
Get full text
Article -
26130
Effect of Gear Eccentricity on Dynamic Behavior of Locomotive Rolling Stock Transmission System
Published 2023-01-01“…This point can be used for gear eccentricity health monitoring, which provides a theoretical basis for the operation and maintenance of the locomotive gear transmission system.…”
Get full text
Article -
26131
Study on Estimation of the Gripping Force of Surgical Instruments Based on the Dynamic Model
Published 2024-04-01“…The simulation results show that the gripping force estimation model of the surgical instrument based on the dynamic model is consistent with the actual situation, which provides a theoretical basis for the subsequent research on the gripping force security of the surgical instrument.…”
Get full text
Article -
26132
La difficile « naturalisation » du causse Méjean
Published 2014-12-01“…On the other hand, we consider this failure as the result of a “contractual turn” that is disconnected with the principle of freedom that is theoretically at the heart of any contractual form. Indeed, in a context where almost a third of the breeder’s incomes come from such contracts, signing these latter is perceived less as a matter of choice than of necessity. …”
Get full text
Article -
26133
Measurement of Total Flow Rates in Horizontal Well Oil-Water Two-Phase Flows by the Application of BP Neural Network Algorithm to Production Array Logs
Published 2022-01-01“…The results showed that the average relative error was less than 10%, which justify that the BPNN has good practicability in using data of MAPS in oil-water two-phase flows horizontal wells to predict the total flow rates, and it provides a new method and theoretical support for obtaining flow rates in horizontal wells.…”
Get full text
Article -
26134
Joint optimization of dispersion matrix and 3D constellation for STSK system based on improved genetic algorithm
Published 2021-09-01“…Space-time shift keying (STSK) is a modulation scheme used in multi-input multi-output (MIMO) communication systems.It uses a pre-designed dispersion matrix set (DMS) to realize the flexible design of the system between multiplexing and diversity.An improved genetic algorithm (GA) was proposed to assist the joint optimization of DMS and 3D constellations, that is, the DMS and 3D constellations were jointly coded as the chromosome of GA , and the coding gain corresponding to the rank and determinant criterion was adopted as the overall fitness value.Through efficient selection and improved mutation and crossover strategies, DMS and 3D constellations with low bit error rate (BER) can be obtained.At the same time, the symmetry of the 3D constellation was used to greatly reduce the computational complexity of according to the fitness value the coding gain.The theoretical average paired error probability (ABEP) of the 3D STSK scheme was deducted.The simulation results show that, compared with the traditional GA and random search schemes, the improved GA proposed can significantly reduce the complexity of system implementation while ensuring BER performance.…”
Get full text
Article -
26135
An investigation of the concept Religious Communication
Published 2022-11-01“…The religious communications pro cess is analysed through the symbolic interactionist perspective as a broad theoretical point of departure and within it a religious communication model was developed. …”
Get full text
Article -
26136
Computationally efficient direction-of-arrival estimation of non-circular signal based on subspace rotation technique
Published 2020-11-01“…In order to solve the problem that the high computational burden of the multiple signal classification algorithm of non-circular signal (NC-MUSIC) in direction-of-arrival (DOA) estimation,a novel computationally efficient DOA estimation algorithm based on subspace rotation technique was proposed.Firstly,the partitioning of noise subspace matrix and the subspace rotation technique (SRT) were used to construct a new reduced-dimension noise subspace.Then,the two-dimensional peak searching was converted to the one-dimensional peak searching on the basis of the separation of variables and the orthogonality between the new reduced-dimension noise subspace and the space spanned by the columns of the extended manifold matrix.The proposed algorithm can enhance the computational efficiency by means of the conversion of the two-dimensional peak searching into the one-dimensional peak searching and the removal of redundant computations.Theoretical analysis and simulation results show that the proposed algorithm can reduce the computational complexity to less than 5% as compared to NC-MUSIC algorithm on the premise of ensuring the accuracy of DOA estimation.Especially,the efficiency advantage of the proposed algorithm is more obvious in scenarios where the large numbers of sensors are required.…”
Get full text
Article -
26137
Cache privacy protection strategy in content centric networking
Published 2015-12-01“…Cache privacy leak was one of the important security threats of CCN,the adversary could obtain the legitimate user’s privacy information through probing cache visiting time.Aiming at this security problem,the privacy and non-privacy contents were dealt separately,then a cache privacy protection strategy based on recent visiting information and evicted copy up (CPPS-RVI&ECP) was proposed.In order to compare with the current typical defense strategy-random first k delay (RFKD),the theoretical analysis of privacy leak probability and network hit probability are further given.The CPPS-RVI&ECP identifies the recent visitor by setting privacy mark in interest packet,decreases the privacy leak probability by selecting replacing position randomly,and promotes the network performance by the mechanism of shifting evicted copy upstream.The numeric analysis results under the prescribed experimental conditions show that,whereas the ideal privacy protection ability of RFKD is obtained at the expense of sacrifice of cache contents delivery capability,the proposed CPPS-RVI&ECP can obtain low privacy leak probability and in the meantime maintain high network hit probability by setting reasonable upstream shifting probability.…”
Get full text
Article -
26138
La prévention intégrée au travail : une conceptualisation basée sur les perspectives des parties prenantes canadiennes
Published 2024-09-01“…The objective of this study is to refine the definition of integrative prevention at work established theoretically, by considering the perspectives of people exposed to the concept. …”
Get full text
Article -
26139
Austen Henry Layard at the remains of Nineveh: The everyday life of an archaeological expedition
Published 2021-12-01“…At this stage, the theoretical and methodological foundations of this discipline were still undeveloped. …”
Get full text
Article -
26140
Factors Contributing to the Successful Implementation of Management Innovations
Published 2017-11-01“…Research results suggest theoretical and practical implications for strengthening the effectiveness of local self-government.…”
Get full text
Article