Showing 30,421 - 30,440 results of 33,243 for search 'Theorbo~', query time: 2.79s Refine Results
  1. 30421
  2. 30422

    Numerical Simulation Analysis of Different Excavation Parameters for TBM 3D Disc Cutters Based on the Discrete Element Method by Feng Liang, Chenyuan Pei, Weibang Luo, Minglong You, Fei Tan

    Published 2024-12-01
    “…This study provides a theoretical foundation for optimizing tunnel boring machine (TBM) excavation parameters under diverse geological conditions, offering significant engineering value by enhancing construction efficiency and reducing costs. …”
    Get full text
    Article
  3. 30423

    Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain by Lin JIN, Youliang TIAN

    Published 2022-08-01
    “…Currently, there is no data exchanging and sharing between different hospitals, and it is easy to form data islands.At the same time, regional medical data contains a large amount of sensitive information of patients.The public acquisition, sharing and circulation of these data will lead to malicious tampering, theft, abuse and loss of ownership, thereby revealing patient privacy.In addition, the size of medical data is enormous and the data is unstructured, then it is more difficult to prevent and hold accountable some highly targeted malicious attacks, such as malicious attacks on medical data theft, tampering, and extortion.In view of the above problems, a blockchain-based on multi-authority attribute hidden electronic medical record sharing scheme was proposed to achieve fine-grained access to shared electronic medical records while ensuring patient privacy.The Multi-Authorization Attribute Encryption (MA-ABE) algorithm was introduced, which used multi-authority organizations to manage decentralized attributes.It also used hash functions to identify different users, in order to effectively resist collusion attacks between users with different authorizations.Besides, the linear secrets sharing scheme (LSSS) was used to realize partial hiding of attributes, and the attributes were divided into two parts:attribute name and attribute value.In addition, combined with the characteristics of blockchain openness, transparency and tamper-proof, the design of access policy can update the algorithm.Based on the access policy update algorithm, the policy block was added.The new access policy was uploaded to the blockchain to form a policy update traceability chain, which can realize distributed and reliable access control management under the condition of hidden policy.It can also support data privacy protection at the same time, and traceability of user behavior.The theoretical proof and experimental analysis have proved that this scheme protect attribute privacy effectively, while reduces computational overhead.…”
    Get full text
    Article
  4. 30424

    Kemampuan Sosial Anak Usia Dini: Sebuah Tinjauan Etnoparenting pada Lembaga Pendidikan Anak Usia Dini by Siti Fadjryana Fitroh, Muhammad Abdul Latif, Tarich Yuandana, Jelita Trisetiawati, Winda Dwi Aprilia

    Published 2025-01-01
    “…Research Implications – This study contributes to the theoretical understanding of ethnoparenting by demonstrating its practical application in early childhood education. …”
    Get full text
    Article
  5. 30425

    Inter-Agency Analysis of EU Specialised Administrative Services: Insights from the Republic of Cyprus by Andreas Kirlappos, Stefanos Iacovides

    Published 2024-05-01
    “…Academic contribution to the field: This study offers a theoretical contribution by providing a comprehensive understanding of moderate Europeanisation effects on EU specialised structures within the Cypriot administrative framework. …”
    Get full text
    Article
  6. 30426

    Real-Time Warning Model of Highway Engineering Construction Safety Based on Internet of Things by Haoran Song, Hao Yu, Dianliang Xiao, Yuexiang Li

    Published 2021-01-01
    “…Therefore, the creation of a more active, smarter, and more effective real-time early warning model for construction safety is a strong complement to current research and has important theoretical and practical implications. The Internet of Things is the third wave of the information industry after computers, the Internet, and mobile communication networks. …”
    Get full text
    Article
  7. 30427

    Teachers’ pedagogical improvement who participate in the training and specialization of doctors in Venezuela by Felicia Pérez Moya, Nilzer Agramonte Vargas, Silvia Enríquez Vilaplana, Maribel Torres Cobas

    Published 2023-03-01
    “…<br /><strong>Methods:</strong> a descriptive, pedagogical research was carried out. The theoretical and empirical level methods were applied: analytical-synthetic, inductive-deductive, historical-logical, group interview, participant observation and documentary analysis. …”
    Get full text
    Article
  8. 30428

    La Paille, un matériau pour transmettre by Volker Ehrlich, Édouard Vermès

    Published 2021-05-01
    “…The very first condition for this is thus the introduction of alternative theoretical and practical techniques in architecture schools. …”
    Get full text
    Article
  9. 30429

    EDUCATIONAL BUILDING PERFORMANCE EVALUATION PRACTICES AND PERCEPTIONS: A CASE OF FEDERAL UNIVERSITIES IN SOUTH EAST NIGERIA by K.C Okolie, W.M. Shakantu

    Published 2012-12-01
    “…The exploratory nature of this research clarifies the problems that need to be addressed in future studies and so raised a number of theoretical and conceptual issues that must be explored in the performance evaluation of educational buildings. …”
    Get full text
    Article
  10. 30430

    Exploring Customary Law: Perspectives of Hazairin and Cornelis Van Vollenhoven and its Relevance to the Future of Islamic Law in Indonesia by Ilham Tohari, Siti Rohmah, Ahmad Qiram As-Suvi

    Published 2023-10-01
    “…This research provides a conceptual historical-theoretical narrative related to customary law in Indonesia. …”
    Get full text
    Article
  11. 30431

    SOME CONSIDERATIONS ON THE TYPOLOGY OF PHILOSOPHICAL-ANTHROPOLOGICAL MODELS (TO THE PROBLEM OF VALUE IDENTIFICATIONS OF UKRAINIANS) by V. V. Mudrakov, O. S. Polishchuk

    Published 2018-12-01
    “…It is about certain models that fulfill the worldview-semantic modes of a person. Theoretical basis. The authors cover (O. Polishchuk – Thesis I; V. …”
    Get full text
    Article
  12. 30432

    ECONOMIC ASPECTS OF ORGANIC SOY PRODUCTION IN UKRAINE by Hanna Pantsyreva

    Published 2024-12-01
    “…The research methodology is based on European experience, taking into account the theoretical and methodological provisions of the scientific aspects of organic soybean production in Ukraine. …”
    Get full text
    Article
  13. 30433

    “Diversity’s good unless you have a Southern accent, then you’re a hick”: Self-evaluation, linguistic insecurity and symbolic domination in Middle Tennessee by Marc-Philippe Brunet

    Published 2022-11-01
    “…In this context, we draw upon on the notion of symbolic domination, that is a lack of awareness regarding the inherently arbitrary nature of a linguistic standard which leads speakers of less prestigious varieties to judge their own linguistic productions through the prism of dominant criteria (Bourdieu, 2001; Bourdieu & Boltanski, 1975).Our study is based on the results of sociolinguistic fieldwork data from Murfreesboro (Middle Tennessee), which was collected in accordance with the theoretical and methodological framework of the PAC research programme and within the scope of the LVTI-Language, Urban Life, Work, Identity sociophonological project (Durand & Przewozny, 2012; Przewozny et al. 2020). …”
    Get full text
    Article
  14. 30434

    Role of homeostatic plasticity in critical brain dynamics following focal stroke lesions by Rodrigo P. Rocha, Marco Zorzi, Maurizio Corbetta

    Published 2024-12-01
    “…The present study tackles this controversy and provides evidence that the theoretical framework proposed by Janarek et al. cannot explain the anomalous cluster dynamics observed in our patients. …”
    Get full text
    Article
  15. 30435

    The performance of cylindrical solar still with hemispherical dome using circular fins in basin by Shahzanan Falah, Dhafer Manea Hachim, Wisam A. Abd Al-wahid

    Published 2025-01-01
    “…The evaluation was conducted theoretically and experimentally in Najaf, Iraq (at the geographical coordinates of 31.590°N and 44.190°E). …”
    Get full text
    Article
  16. 30436

    Toward efficient authentication for space-air-ground integrated Internet of things by Baokang Zhao, Puguang Liu, Xiaofeng Wang, Ilsun You

    Published 2019-07-01
    “…MASIT exploits the natural broadcast property of space-air-ground integrated Internet of things to speed up authentication process, and leverage the distinguished feature of IPv6 to support concurrent numerous nodes. Theoretically, we prove that MASIT is existential unforgeable secure under adaptively chosen message and identity Attacks. …”
    Get full text
    Article
  17. 30437

    LeaData a novel reference data of leather images for automatic species identification by Anjli Varghese, Malathy Jawahar, A. Amalin Prince

    Published 2025-02-01
    “…This big data spans leather images with theoretically ideal and practically non-ideal grain patterns. …”
    Get full text
    Article
  18. 30438

    Preference learning based deep reinforcement learning for flexible job shop scheduling problem by Xinning Liu, Li Han, Ling Kang, Jiannan Liu, Huadong Miao

    Published 2025-01-01
    “…Abstract The flexible job shop scheduling problem (FJSP) holds significant importance in both theoretical research and practical applications. Given the complexity and diversity of FJSP, improving the generalization and quality of scheduling methods has become a hot topic of interest in both industry and academia. …”
    Get full text
    Article
  19. 30439
  20. 30440

    Stability Study of Shield Tunnel Excavation Face Induced by Shield Chamber Pressure Entering in Shallow-Buried Sand Stratum by GE Jun

    Published 2025-01-01
    “…[Method] The limit support pressure during the shield tunneling pressurized chamber entry operation is studied by combining numerical simulation, theoretical analysis and engineering verification methods. …”
    Get full text
    Article