Showing 26,341 - 26,360 results of 33,243 for search 'Theorbo~', query time: 3.83s Refine Results
  1. 26341

    Suscetibilidade a eventos de inundação como subsídio ao planejamento urbano - O estudo da cidade do Crato/Ceará/Brasil by Edmundo Rodrigues de Brito, Frederico de Holanda Bastos

    Published 2021-12-01
    “…Natural hazards in cities represent major challenges in terms of urban planning, requiring a solid theoretical and methodological basis of analysis in order to avoid socioeconomic damage. …”
    Get full text
    Article
  2. 26342

    How Is Gross Profit Margin Overestimated in China? by Fulei Shi, Bingbing Huang, Chuanqi Wu, Liang Jin

    Published 2021-01-01
    “…This paper explores the theoretical limitations of the current revenue that lead to the overestimation of the gross profit margin. …”
    Get full text
    Article
  3. 26343

    Intent-based UAV swarm network: management architecture, key technologies, and future vision by LI Xuan, LI Haiyan, ZHANG Lu, ZHANG Yuhang, ZHANG Haojie

    Published 2024-07-01
    “…Through in-depth analysis and discussion, a solid theoretical foundation and technical reference were aimed to be provided for the future development of UAV swarms.…”
    Get full text
    Article
  4. 26344

    Blind detection for image steganography using short du ate codes statistical model for Hilbert scanning sequences by Shang-ping ZHONG, Qiao-fen XU, Wen-zhong GUO, Bin LIAO

    Published 2013-01-01
    “…By analyzing and proving the correlation between the detection capability of a short duplicate code statistical feature and the probability of cumulating short duplicate codes、the dimension of short duplicate codes,a method to improving the detection capability of a short duplicate code statistical feature was found.Then,a blind detection method for image steganography using short duplicate codes statistical model for Hilbert scanning sequences was proposed.The proposed method used Poisson distribution test to detect the stego-message based on the statistical feature of short duplicate code with same elements in LSB Hilbert scanning sequences.So,the proposed method could make full use of Hilbert curve to maintain the good properties of local correlation,and could not only use the correlation of adjacent elements,but also use the correlation of elements in local regions.Theoretical lysis and experiments show that the proposed method can effectively improve the detection rate under the condition of effectively controlling the false alarm rate.…”
    Get full text
    Article
  5. 26345

    Low-Vacuum Quadrupole Mass Filter Using a Drift Gas by Peihe Jiang, Zhanfeng Zhao

    Published 2020-01-01
    “…This work provides a theoretical foundation for the development of low-vacuum mass spectrometry, which will promote portability, provide a lower threshold of use, and expand the fields of application for mass spectrometers.…”
    Get full text
    Article
  6. 26346

    Signs of the Times: Medieval Punctuation, Diplomatic Encoding and Rendition by Elisa Cugliana, Gioele Barabucci

    Published 2022-05-01
    “…The aim of this paper is to address the theoretical aspects of these questions and their practical implications, providing a couple of solutions fitting the paradigms and the technologies of the TEI. …”
    Get full text
    Article
  7. 26347

    Creative occupations as knowledge practices: Innovation and precarity in the creative economy by Hearn Greg

    Published 2014-06-01
    “…This paper commences with some description of empirical work that investigates creative occupations; however, the real point is to suggest that this type of detailed, occupation-based empirical work has important theoretical potential that has not yet been fully expended (though see Cunningham 2013; Hearn and Bridgstock 2014; Bakhshi, Freeman and Higgs 2013; Hartley and Potts 2014).…”
    Get full text
    Article
  8. 26348

    Participatory communication in South African municipal government by Tshepang Bright Molale

    Published 2022-10-01
    “…They also suggest a need for further research on how “participation as an end” can be theorised in line with participatory communication in a complex municipal system that already requires “participation as a means” to achieve certain goals. …”
    Get full text
    Article
  9. 26349

    Modeling the Dynamics of a Single-Species Model with Pollution Treatment in a Polluted Environment by Bing Liu, Shi Luan, Yinghui Gao

    Published 2013-01-01
    “…Numerical simulations confirm our theoretical results.…”
    Get full text
    Article
  10. 26350

    Disentangling rural smartness in European policies: a critical overview of the Smart Village concept by Valentina E. Albanese, Teresa Graziano

    Published 2024-11-01
    “…From a methodological point of view, a qualitative policy document analysis (QPDA) and software-based content analysis were carried out on UE official documents, offering new theoretical insights and operational recommendations for understanding the concept of smartness beyond urban-centered perspectives.…”
    Get full text
    Article
  11. 26351

    Understanding the Spatial Variation of Integrated Use of Ride-Hailing Services With the Metro by Mingyang Du, Zhicheng Li, Xuefeng Li, Jiacong Xu, Dong Liu, Mei-Po Kwan

    Published 2024-01-01
    “…The research results can provide the theoretical support for the seamless connection and coordinated development of these two services.…”
    Get full text
    Article
  12. 26352

    Oversight, Accountability, or Influence? Understanding the Use of Monetary Dialogues in the European Parliament by Amie Kreppel, Corinne Tomasi

    Published 2025-01-01
    “…First, we develop a theoretical framework that moves beyond a general concept of “accountability” and differentiates between accountability, oversight, and influence. …”
    Get full text
    Article
  13. 26353

    Shuffled differential privacy protection method for K-Modes clustering data collection and publication by Weijin JIANG, Yilin CHEN, Yuqing HAN, Yuting WU, Wei ZHOU, Haijuan WANG

    Published 2024-01-01
    “…Aiming at the current problem of insufficient security in clustering data collection and publication, in order to protect user privacy and improve data quality in clustering data, a privacy protection method for K-Modes clustering data collection and publication was proposed without trusted third parties based on the shuffled differential privacy model.K-Modes clustering data collection algorithm was used to sample the user data and add noise, and then the initial order of the sampled data was disturbed by filling in the value domain random arrangement publishing algorithm.The malicious attacker couldn’t identify the target user according to the relationship between the user and the data, and then to reduce the interference of noise as much as possible a new centroid was calculated by cyclic iteration to complete the clustering.Finally, the privacy, feasibility and complexity of the above three methods were analyzed from the theoretical level, and the accuracy and entropy of the three real data sets were compared with the authoritative similar algorithms KM, DPLM and LDPKM in recent years to verify the effectiveness of the proposed model.The experimental results show that the privacy protection and data quality of the proposed method are superior to the current similar algorithms.…”
    Get full text
    Article
  14. 26354

    Opportunistic routing algorithm based on trust model for ad hoc network by Bo WANG, Xun-xun CHEN

    Published 2013-09-01
    “…Due to the absence of enough physical protection,dynamic topology,distributed collaboration,the limited bandwidth and computing ability in ad hoc network,traditional routing security mechanism cannot adapt to the design of routing protocols.Recently,opportunistic routing is of the research hotspots,which can cope with the unreliable transmissions to improve throughput of the whole network by exploiting the broadcast nature of the wireless medium and spatial diversity of multi-hop wireless network.The concept of trust-based similarity in opportunistic routing for ad hoc network was incorporated,and a novel trusted opportunistic forwarding model based on trust degree of node and least cost of opportunistic routing were also built.Then a trusted minimum cost routing algorithm (MCOR) was proposed and the correctness and effectiveness of this algorithm from theoretical ana ysis were proved.Finally,MCOR algorithm was verified by simulation and was compared with the classic protocols:ExOR,TAODV and Watchdog-DSR.The simulation results show that MCOR scheme can detect and mitigate node misbehaviors.Furthermore,MCOR scheme outperforms the other protocols in terms of throughput,delay,expected ETX and cost of routing.…”
    Get full text
    Article
  15. 26355

    Transition into distance education: A scoping review protocol. by Roxana Schweighart, Michael Hast, Caroline Trautwein

    Published 2024-01-01
    “…The findings derived from the scoping review will provide conceptual clarification, summarize the given theoretical and empirical knowledge in the field and offer practical implications for designing the initial phase in distance education. …”
    Get full text
    Article
  16. 26356

    Integrating schools as community hubs: planning strategies and implementation challenges in South Korean new towns by Nami Hong, Sanghoon Jung

    Published 2025-02-01
    “…The study contributes to theoretical understanding of school-community integration and practical insights for future development, emphasizing the importance of coordinated planning, construction, and operational frameworks in creating sustainable school-oriented community hubs.…”
    Get full text
    Article
  17. 26357

    Commuting flow prediction using OpenStreetMap data by Kuldip Singh Atwal, Taylor Anderson, Dieter Pfoser, Andreas Züfle

    Published 2025-01-01
    “…We show that the types of buildings, residential and non-residential, are a strong indicator for predicting commuting flows. Consistent with theoretical and analytical models, our experiments indicate that building types, distance, and population are the determining characteristics for mobility related to commuting. …”
    Get full text
    Article
  18. 26358

    The impact of customer involvement in airline loyalty programs: a multigroup analysis by Pablo Flôres Limberger, Lucimari Acosta Pereira, Tércio Pereira

    Published 2021-07-01
    “…Finally, this study provides practical and theoretical contributions and guides future research efforts.…”
    Get full text
    Article
  19. 26359

    Cathodic tandem alkylation/dearomatization of heterocycles enabled by Al-facilitated carbonyl deoxygenation by Jinhui Hu, Weijie Deng, Jianfeng Zhou, Yubing Huang

    Published 2025-01-01
    “…Our approach can be executed via two distinct paths: the aluminum (Al)-facilitated spin-center shift (SCS) path and the Al-facilitated direct deoxygenation path. Both paths are theoretically substantiated by DFT calculations. The crux of this protocol is the in-situ activation of the alcohol intermediates by Al salts, which substantially lowers the activation energy necessary for the formation of key transition states, thereby effectively facilitating the deoxygenation process. …”
    Get full text
    Article
  20. 26360

    Kosova’s Goddess on the Throne: Critical Fabulation as an Anthropological Method by Drita Bruqi Kabashi

    Published 2023-12-01
    “…Empirical evidence from the Balkan Neolithic can help theorize aspects of the goddess’s usage and meaning, but little can be known definitively (for example, the perceived gender of the figurine). …”
    Get full text
    Article