Suggested Topics within your search.
Suggested Topics within your search.
- Philosophy 11
- History 9
- Moral and ethical aspects 8
- Economic development 7
- Social service 7
- Research 6
- Economic policy 5
- History and criticism 5
- Management 5
- Mass media 5
- Social aspects 5
- Study and teaching 5
- Economic conditions 4
- Education 4
- Quantum theory 4
- methods 4
- Chemistry, Physical and theoretical 3
- Communication 3
- Criticism 3
- Culture 3
- Economic aspects 3
- Economics 3
- Educational leadership 3
- Globalization 3
- Information theory 3
- Jurisprudence 3
- Law 3
- Literature 3
- MATHEMATICS / Mathematical Analysis 3
- Number theory 3
-
26341
Suscetibilidade a eventos de inundação como subsídio ao planejamento urbano - O estudo da cidade do Crato/Ceará/Brasil
Published 2021-12-01“…Natural hazards in cities represent major challenges in terms of urban planning, requiring a solid theoretical and methodological basis of analysis in order to avoid socioeconomic damage. …”
Get full text
Article -
26342
How Is Gross Profit Margin Overestimated in China?
Published 2021-01-01“…This paper explores the theoretical limitations of the current revenue that lead to the overestimation of the gross profit margin. …”
Get full text
Article -
26343
Intent-based UAV swarm network: management architecture, key technologies, and future vision
Published 2024-07-01“…Through in-depth analysis and discussion, a solid theoretical foundation and technical reference were aimed to be provided for the future development of UAV swarms.…”
Get full text
Article -
26344
Blind detection for image steganography using short du ate codes statistical model for Hilbert scanning sequences
Published 2013-01-01“…By analyzing and proving the correlation between the detection capability of a short duplicate code statistical feature and the probability of cumulating short duplicate codes、the dimension of short duplicate codes,a method to improving the detection capability of a short duplicate code statistical feature was found.Then,a blind detection method for image steganography using short duplicate codes statistical model for Hilbert scanning sequences was proposed.The proposed method used Poisson distribution test to detect the stego-message based on the statistical feature of short duplicate code with same elements in LSB Hilbert scanning sequences.So,the proposed method could make full use of Hilbert curve to maintain the good properties of local correlation,and could not only use the correlation of adjacent elements,but also use the correlation of elements in local regions.Theoretical lysis and experiments show that the proposed method can effectively improve the detection rate under the condition of effectively controlling the false alarm rate.…”
Get full text
Article -
26345
Low-Vacuum Quadrupole Mass Filter Using a Drift Gas
Published 2020-01-01“…This work provides a theoretical foundation for the development of low-vacuum mass spectrometry, which will promote portability, provide a lower threshold of use, and expand the fields of application for mass spectrometers.…”
Get full text
Article -
26346
Signs of the Times: Medieval Punctuation, Diplomatic Encoding and Rendition
Published 2022-05-01“…The aim of this paper is to address the theoretical aspects of these questions and their practical implications, providing a couple of solutions fitting the paradigms and the technologies of the TEI. …”
Get full text
Article -
26347
Creative occupations as knowledge practices: Innovation and precarity in the creative economy
Published 2014-06-01“…This paper commences with some description of empirical work that investigates creative occupations; however, the real point is to suggest that this type of detailed, occupation-based empirical work has important theoretical potential that has not yet been fully expended (though see Cunningham 2013; Hearn and Bridgstock 2014; Bakhshi, Freeman and Higgs 2013; Hartley and Potts 2014).…”
Get full text
Article -
26348
Participatory communication in South African municipal government
Published 2022-10-01“…They also suggest a need for further research on how “participation as an end” can be theorised in line with participatory communication in a complex municipal system that already requires “participation as a means” to achieve certain goals. …”
Get full text
Article -
26349
Modeling the Dynamics of a Single-Species Model with Pollution Treatment in a Polluted Environment
Published 2013-01-01“…Numerical simulations confirm our theoretical results.…”
Get full text
Article -
26350
Disentangling rural smartness in European policies: a critical overview of the Smart Village concept
Published 2024-11-01“…From a methodological point of view, a qualitative policy document analysis (QPDA) and software-based content analysis were carried out on UE official documents, offering new theoretical insights and operational recommendations for understanding the concept of smartness beyond urban-centered perspectives.…”
Get full text
Article -
26351
Understanding the Spatial Variation of Integrated Use of Ride-Hailing Services With the Metro
Published 2024-01-01“…The research results can provide the theoretical support for the seamless connection and coordinated development of these two services.…”
Get full text
Article -
26352
Oversight, Accountability, or Influence? Understanding the Use of Monetary Dialogues in the European Parliament
Published 2025-01-01“…First, we develop a theoretical framework that moves beyond a general concept of “accountability” and differentiates between accountability, oversight, and influence. …”
Get full text
Article -
26353
Shuffled differential privacy protection method for K-Modes clustering data collection and publication
Published 2024-01-01“…Aiming at the current problem of insufficient security in clustering data collection and publication, in order to protect user privacy and improve data quality in clustering data, a privacy protection method for K-Modes clustering data collection and publication was proposed without trusted third parties based on the shuffled differential privacy model.K-Modes clustering data collection algorithm was used to sample the user data and add noise, and then the initial order of the sampled data was disturbed by filling in the value domain random arrangement publishing algorithm.The malicious attacker couldn’t identify the target user according to the relationship between the user and the data, and then to reduce the interference of noise as much as possible a new centroid was calculated by cyclic iteration to complete the clustering.Finally, the privacy, feasibility and complexity of the above three methods were analyzed from the theoretical level, and the accuracy and entropy of the three real data sets were compared with the authoritative similar algorithms KM, DPLM and LDPKM in recent years to verify the effectiveness of the proposed model.The experimental results show that the privacy protection and data quality of the proposed method are superior to the current similar algorithms.…”
Get full text
Article -
26354
Opportunistic routing algorithm based on trust model for ad hoc network
Published 2013-09-01“…Due to the absence of enough physical protection,dynamic topology,distributed collaboration,the limited bandwidth and computing ability in ad hoc network,traditional routing security mechanism cannot adapt to the design of routing protocols.Recently,opportunistic routing is of the research hotspots,which can cope with the unreliable transmissions to improve throughput of the whole network by exploiting the broadcast nature of the wireless medium and spatial diversity of multi-hop wireless network.The concept of trust-based similarity in opportunistic routing for ad hoc network was incorporated,and a novel trusted opportunistic forwarding model based on trust degree of node and least cost of opportunistic routing were also built.Then a trusted minimum cost routing algorithm (MCOR) was proposed and the correctness and effectiveness of this algorithm from theoretical ana ysis were proved.Finally,MCOR algorithm was verified by simulation and was compared with the classic protocols:ExOR,TAODV and Watchdog-DSR.The simulation results show that MCOR scheme can detect and mitigate node misbehaviors.Furthermore,MCOR scheme outperforms the other protocols in terms of throughput,delay,expected ETX and cost of routing.…”
Get full text
Article -
26355
Transition into distance education: A scoping review protocol.
Published 2024-01-01“…The findings derived from the scoping review will provide conceptual clarification, summarize the given theoretical and empirical knowledge in the field and offer practical implications for designing the initial phase in distance education. …”
Get full text
Article -
26356
Integrating schools as community hubs: planning strategies and implementation challenges in South Korean new towns
Published 2025-02-01“…The study contributes to theoretical understanding of school-community integration and practical insights for future development, emphasizing the importance of coordinated planning, construction, and operational frameworks in creating sustainable school-oriented community hubs.…”
Get full text
Article -
26357
Commuting flow prediction using OpenStreetMap data
Published 2025-01-01“…We show that the types of buildings, residential and non-residential, are a strong indicator for predicting commuting flows. Consistent with theoretical and analytical models, our experiments indicate that building types, distance, and population are the determining characteristics for mobility related to commuting. …”
Get full text
Article -
26358
The impact of customer involvement in airline loyalty programs: a multigroup analysis
Published 2021-07-01“…Finally, this study provides practical and theoretical contributions and guides future research efforts.…”
Get full text
Article -
26359
Cathodic tandem alkylation/dearomatization of heterocycles enabled by Al-facilitated carbonyl deoxygenation
Published 2025-01-01“…Our approach can be executed via two distinct paths: the aluminum (Al)-facilitated spin-center shift (SCS) path and the Al-facilitated direct deoxygenation path. Both paths are theoretically substantiated by DFT calculations. The crux of this protocol is the in-situ activation of the alcohol intermediates by Al salts, which substantially lowers the activation energy necessary for the formation of key transition states, thereby effectively facilitating the deoxygenation process. …”
Get full text
Article -
26360
Kosova’s Goddess on the Throne: Critical Fabulation as an Anthropological Method
Published 2023-12-01“…Empirical evidence from the Balkan Neolithic can help theorize aspects of the goddess’s usage and meaning, but little can be known definitively (for example, the perceived gender of the figurine). …”
Get full text
Article