Showing 18,441 - 18,460 results of 33,243 for search 'Theorbo~', query time: 3.01s Refine Results
  1. 18441

    Designing a Parent Training Model to Prevent Cyber Space Risks in Students by Seyed Majid Karimi, Seyed Mohammadbagher Jafari, Gholamreza Sharifi Rad, Ali Akbar Khoshgoftar Moghadam

    Published 2024-01-01
    “…Through the application of grounded theory methodology, the data acquired from interviews with eleven experts and professionals within the domains of family dynamics and education were systematically coded and examined through three distinct phases: open coding, axial coding, and selective coding. …”
    Get full text
    Article
  2. 18442

    Action potential-like modes as modulated waves in an extended soliton model for biomembranes and nerves by J. A. Onana Inouga, S. E. Mkam Tchouobiap, M. Siewe Siewe, F. M. Moukam Kakmeni

    Published 2025-01-01
    “…Accordingly, the analytical theory uses a perturbative technique, and a damped cubic–quintic nonlinear Schrödinger equation is derived, which admits a single-pulse-type solitary solution that possesses different phase characteristics of the typical neuronal Appulse structure, representative of nerve impulse profiles. …”
    Get full text
    Article
  3. 18443

    Thematic marking of the anthropological corpus: a methodology for classifying miners’ narratives by L. L. Mazitova, L. M. Panteleeva

    Published 2025-01-01
    “…The type of marking used can be called extra-linguistic based on the specifics of the subject information, analytical based on the method of identification, narrative based on the object, multi-level based on the depth of classification, manual based on the method of assigning labels, and neutral in relation to a certain theory.…”
    Get full text
    Article
  4. 18444

    The emergence of an independent Polish state and the problem of national minorities by G. G. Dedurin

    Published 2023-07-01
    “…However, the situation in Poland with regard to national minorities became a classic example of the discrepancy between law-making theory and law enforcement practice. It has been proved that due to the lack of mechanisms for monitoring compliance with international norms which were supposed to guarantee the rights of national minorities and imperfections in domestic legislation, the Polish authorities at various levels have repeatedly violated the democratic principles of the March 1921 Constitution and other legal acts designed to ensure equal rights for representatives of national minorities, which, in turn, created constant tension within the Second Polish Republic, destabilising the internal situation in the country. …”
    Get full text
    Article
  5. 18445

    Gravitational Lensing of Charged Ayon-Beato-Garcia Black Holes and Nonlinear Effects of Maxwell Fields by H. Ghaffarnejad, M. Amirmojahedi, H. Niad

    Published 2018-01-01
    “…Nonsingular Ayon-Beato-Garcia (ABG) spherically symmetric static black hole (BH) with charge to mass ratio q=g/2m is metric solution of Born Infeld nonlinear Maxwell-Einstein theory. Central region of the BH behaves as (anti-)de Sitter for (|q|>1)  |q|<1. …”
    Get full text
    Article
  6. 18446

    Tidally Distorted Stars Are Triaxial Pulsators by Jim Fuller, Saul Rappaport, Rahul Jayaraman, Don Kurtz, Gerald Handler

    Published 2025-01-01
    “…We compute the mode frequencies and geometries of tidally distorted stars using perturbation theory, accounting for the effects of the Coriolis force and the coupling between different azimuthal orders m of a multiplet induced by the tidal distortion. …”
    Get full text
    Article
  7. 18447

    The oppression concept based on Soyinka's a Dance of the Forests by Malek Awfi Jassim

    Published 2024-09-01
    “…The methodological chapter first introduced post-colonialism as a critical theory. Then, it discussed Fanon's concept of oppression. …”
    Get full text
    Article
  8. 18448

    UTAUT Model Analysis on the Use of Siplah (Survey to BOSP Treasurers Under the Auspices of Cadisdikwil VII West Java Province) by Panji Mustika Muhammad, Dani Dagustani

    Published 2025-01-01
    “…Among the latest research models that can be applied to determine the level of technological adaptation so that the BOSP Treasurer is willing to adopt SIPLah is the Unified Theory of Acceptance and Use of Technology (UTAUT). …”
    Get full text
    Article
  9. 18449

    The Nexus Between Talent Management Attention and Artificial Intelligence: Evidence from Companies Operating Within the AI Domain

    Published 2025-01-01
    “…This study makes important contributions to theory and practice by offering a nuanced understanding of TM's role in shaping organisational performance within the dynamic AI landscape. …”
    Get full text
    Article
  10. 18450

    Adjustment Speed of Capital Structure: Effect of Organizational and Performance Characteristics (Comparison between Financial and Non-Financial Sectors) by Saeed Dehghan Khavari, Seyed Hossein Mirjalili, Mohammad Hossein Abdorrahimian, Farida Khosh Sirat

    Published 2024-12-01
    “…According to the dynamic trade-off theory, continuous adjustment of capital structure to maximize company value is essential. …”
    Get full text
    Article
  11. 18451

    Time in Russian and Japanese Lingo-cultures by N. E. Gorelova

    Published 2014-08-01
    “…The question of their commensuration is one of the key questions for the theory and practice ofintercultural communication, considering the influence of cultural differences on the run of the communicative event, its "success" or "failure." …”
    Get full text
    Article
  12. 18452

    The impact of caesarean scar niche on fertility - a systematic review by M. M van den Tweel, S. van der Struijs, S. Le Cessie, K. E Boers

    Published 2024-12-01
    “…Three studies comparing the microbiome between persons with and without a CS could be identified.Conclusion There is low-grade evidence to conclude that the presence of a niche reduces live birth rates when compared to persons without a niche. The theory that a caesarean has a negative impact on pregnancy outcomes because of dysbiosis promoted by the niche is interesting, but there is no sufficient literature about this.…”
    Get full text
    Article
  13. 18453

    Exposure to Lead (Pb) influences the outcomes of male-male competition during precopulatory intrasexual selection by Rosemary Patrick, Kim Colyvas, Andrea S. Griffin, Michael Stat, Wayne A. O’Connor, Mohammad Mahmudur Rahman, Mallavarapu Megharaj, Geoff R. MacFarlane

    Published 2024-10-01
    “…Abstract Male-male competition is a component of Darwin’s theory of precopulatory intrasexual selection, where males compete for access to resources important for reproduction and successful males pass on traits that endow greater competitive ability to their offspring, thereby exaggerating the trait(s) over evolutionary time. …”
    Get full text
    Article
  14. 18454

    Realization of Yanus Korchak ideas in the scientific works of students of pedagogical universities by Lyubov A. Kochemasova

    Published 2020-03-01
    “…Mikhalak, etc.) are examined which develop the ideas of the teacher, analyze the problems of the theory and practice of education in the pedagogical concept of Janusz Korczak. …”
    Get full text
    Article
  15. 18455

    Research on the dynamic characteristics of the cavitation bubble collapsing between multiple particles by Xiaoyu Wang, Jingrong Hu, Yufei Wang, Yuning Zhang, Yuning Zhang

    Published 2025-01-01
    “…Combining the Kelvin impulse theory and the results of high-speed photography experiments, this paper researches the dynamic behaviors of a single bubble located between three equal-sized spherical particles. …”
    Get full text
    Article
  16. 18456

    University-Industry Interaction as an Element of the University’s «Third Mission» by E. V. Kudryashova, S. E. Sorokin, O. D. Bugaenko

    Published 2020-06-01
    “…Besides, the authors use the provisions of the theory of stakeholders, which describes the parameters taking into account the interests of various actors in the process of University management.On the example of the Northern (Arctic) Federal University named after M.V. …”
    Get full text
    Article
  17. 18457

    Multiobjective Neuro-Fuzzy Controller Design and Selection of Filter Parameters of UPQC Using Predator Prey Firefly and Enhanced Harmony Search Optimization by Koganti Srilakshmi, Gummadi Srinivasa Rao, Katragadda Swarnasri, Sai Ram Inkollu, Krishnaveni Kondreddi, Praveen Kumar Balachandran, C. Dhanamjayulu, Baseem Khan

    Published 2024-01-01
    “…., (ACA) (GA), as well as the standard methods of synchronous reference frame (SRF) and instantaneous active and reactive power theory (p-q). The results clearly demonstrate that the proposed method exhibits a reduced mean square error (MSE) of 0.02107 and a lower total harmonic distortion (THD) of 2.06% compared to alternative methods.…”
    Get full text
    Article
  18. 18458

    Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology by Hailong MA, Liang WANG, Tao HU, Yiming JIANG, Yanze QU

    Published 2022-04-01
    “…Build upon the dynamic-heterogeneous-redundant architecture for multi-body execution, multi-mode ruling and multi-dimension reconstruction, cyberspace mimic defense (CMD) uses uncertain system to deal with the uncertain threat to cyberspace ubiquity.The evolution of CMD over the past 8 years were reviewed systematically from the vertical, horizontal, current, developing and future perspectives.From the vertical perspective, the development process of CMD from concept to theory and practice was summarized.From the horizontal view, it elaborated the core structure DHR (dynamical heterogeneous redundancy) of CMD, the principles based on CMD’s three major theorems, safety gains and performance costs.A comparison was conducted between CMD and five other active defense technologies, namely intrusion tolerance, moving target defense, zero trust architecture, trusted computing and computer immunology.From the current perspective, it reviewed the implementation elements, performance, system architecture, heterogeneous strategies, scheduling strategies, voting strategies and other common technology patterns and characteristics of 11 types of main existing mimic products including mimicry router, mimicry processor, mimicry DNS server and mimicry cloud platform.From the developing perspective, it explored the “mimic+” AICDS (Mimic + AI/IoT/Cloud/Data/SDN) symbiotic ecology with respect to 5 types of new technologies, namely artificial intelligence, Internet of things, cloud computing, big data and software-defined network, and proposed the corresponding technology junctions and cross research value.From the future perspective, it looked into the future mimicry baseline 2.0 product ecology, “mimic +5G/6G”, “mimic + edge computing”,“mimic + cloud” and “mimic + blockchain” application scenarios.Besides, 4 types of challenges faced by CMD in the future were analyzed and summarized, including escape space of multi-mode decision attack, mutual restriction of heterogeneous and synchronous, difficult balance between security and function, and limited transformation space of existing endogenous security components.…”
    Get full text
    Article
  19. 18459

    Separation of infrared and bulk in thermal QCD by The χQCD collaboration and the CLQCD collaboration, Xiao-Lan Meng, Peng Sun, Andrei Alexandru, Ivan Horváth, Keh-Fei Liu, Gen Wang, Yi-Bo Yang

    Published 2024-12-01
    “…This behavior necessitates non-analyticities in the theory. In pure-glue QCD, such non-analyticities have been shown to arise via Anderson-like mobility edges in Dirac spectra (λ IR = 0, ±λ A ≠ 0), as manifested in the dimension function d IR(λ). …”
    Get full text
    Article
  20. 18460

    Multiscale Intermuscular Coupling Analysis via Complex Network-Based High-Order O-Information by Chang Yu, Qingshan She, Michael Houston, Tongcai Tan, Yingchun Zhang

    Published 2025-01-01
    “…We applied this framework to data collected from experiments on three different upper limb movements. Graph theory-based analysis revealed significant differences in muscle network connectivity across the various upper limb movement tasks. …”
    Get full text
    Article