Suggested Topics within your search.
Suggested Topics within your search.
- History 24
- Management 19
- English language 15
- Research 15
- Study and teaching 12
- Methodology 11
- Psychology 10
- Economic policy 9
- Social aspects 9
- Social conditions 9
- methods 9
- Economic conditions 8
- History and criticism 8
- Mass media 8
- Moral and ethical aspects 8
- Organizational behavior 8
- Psychological aspects 8
- Philosophy 7
- Anesthesia 6
- Civilization 6
- Economic development 6
- Economics 6
- Grammar 6
- Politics and government 6
- Rhetoric 6
- Sociolinguistics 6
- Animal behavior 5
- Communication 5
- Criminal law 5
- Electric wiring, Interior 5
-
247981
4-Chlorocurcumin
Published 2025-01-01“…The title compound [systematic name: 4-chloro-5-hydroxy-1,7-bis(4-hydroxy-3-methoxyphenyl)hepta-1,4,6-trien-3-one], C21H19ClO6, is close to planar, with a dihedral angle of 2.61 (7)° between the terminal phenyl groups and three intramolecular O—H...O hydrogen bonds occur. …”
Get full text
Article -
247982
Effect of Deficiencies in the Tunnel Crown Thickness on Pressure Tunnels with Posttensioned Concrete Linings
Published 2018-01-01“…The posttensioned concrete lining can still maintain a satisfactory stress state when deficiencies in the tunnel crown thickness exist, and undesirable stress levels may be caused only when the tunnel crown thickness decreases below a certain threshold. Furthermore, cracks are most likely to occur at the external and internal surfaces of the crown and at the internal surface of the crown’s adjacent parts, which is useful for taking measurements regarding the lining tightness and stability.…”
Get full text
Article -
247983
Body image and appearance distress among military veterans and civilians with an injury-related visible difference: A comparison study.
Published 2025-01-01“…Based on these identified associated factors, it is suggested that both groups, but particularly veterans, may benefit from an Acceptance and Commitment Therapy-based intervention, including explicit self-compassion activities, and practical social skills training.…”
Get full text
Article -
247984
A Double-Threshold Based Spectrum Allocation Algorithm in Cognitive Radio System
Published 2013-08-01“…Based on the spectrum allocation of Underlay model in cognitive radio systems,a double-threshold based spectrum allocation algorithm was proposed.Two signal-to-noise radio(SNR)thresholds were also given.If SNR is less than the small threshold,aiming to maximize the channel capacity of the primary users,some second users are chosen to cooperate with primary users to communicate data.If SNR is larger than the big threshold,considering to maximize the number of the second users accessing the spectrum,some second users are allowed to use the occupied spectrum with low power.If SNR is between the two thresholds,primary users occupy the spectrum alone.Simulation and numerical results illustrate the reliability of the theoretical analysis.…”
Get full text
Article -
247985
Bupropion Mediated Effects on Depression, Attention Deficit Hyperactivity Disorder, and Smoking Cessation
Published 2023-07-01“…Bupropion had been in use since the late 1980s as an unconventional treatment for depression. …”
Get full text
Article -
247986
DeepEye: Link Prediction in Dynamic Networks Based on Non-negative Matrix Factorization
Published 2018-03-01“…Finally, we demonstrate how latent NMF features can express network dynamics efficiently rather than by static representation, thereby yielding better performance. The amalgamation of time and structural information makes the method achieve prediction results that are more accurate. …”
Get full text
Article -
247987
Green Cosmetics to Environmental Sustainability
Published 2024-06-01“…One form of implementation of CSR activities has been carried out by The Body Shop in Indonesia with the Bring Back Our Bottle (BBOB) CSR Program. …”
Get full text
Article -
247988
Polyfactoriality as a Defining Criterion of Formulaic Speech
Published 2020-12-01“…This notion permits to take into account segmental, prosodic, corporal, contextual and situational elements in order to define an utterance or one of its units as being formulaic, even when it consists of one lexical item only. …”
Get full text
Article -
247989
PROFILING OF THE HOB TOOL FOR WORM SHAFTS DEFORMATION
Published 2023-02-01“…Two such tandem tools are used for deformation, the semi-finished product being positioned between them. During generation, the tools rotate around their own axes, which, combined with their helical surface, causes a helical movement of the blank. …”
Get full text
Article -
247990
Probabilistic Evaluation of Seismic Performance of Steel Buildings with Torsional Irregularities in Plan and Soft Story under Mainshock-Aftershock Sequence
Published 2023-01-01“…Furthermore, irregularities such as soft story and torsional irregularity may change the structural behavior under the influence of earthquakes. This study investigates the fragility curves associated with the three-, five-, and eight-story models with steel moment-resisting frames under the main earthquake and mainshock-aftershock sequence to probabilistically evaluate the aftershock impacts on the steel structures with irregularities in the plan and height. …”
Get full text
Article -
247991
Multiplicity results for asymmetric boundary value problems with indefinite weights
Published 2004-01-01“…The proof is developed in the framework of topological methods and is based on some relations between rotation numbers and weighted eigenvalues.…”
Get full text
Article -
247992
A survey of cybersecurity for intelligent connected-automated vehicle
Published 2020-04-01“…(Semi-) Autonomous vehicles use a new generation of information and communication technologies to realize a full range of interactions between vehicles and cloud,vehicles and vehicles,vehicles and roads,and vehicles and pedestrian,etc.When cars started to become connected computers on wheels,network security became a major challenge,and because the scope of cyber threats extended from virtual space to physical space,the harm of cybersecurity had risen to human life.The electronic/electrical structure,in-vehicle network structure,and out-of-vehicle network structure of intelligent vehicles were introduced,the security requirements of vehicle networks were elaborated,several cyber-attacks against connected-automated vehicle (CAV) were pointed out,the available defense measures against these attacks were addressed.The advantages and disadvantages of these measures were summarized.Finally,possible defense measures and directions in the future were discussed to further ensure the security of CAV.…”
Get full text
Article -
247993
A Taguchi-based study on the control factors of reinforced composites with the fiber of coir and pineapple leaves
Published 2025-01-01“…The use of composite materials, whether metallic or non-metallic, is becoming more popular nowadays because of some of their superior characteristics compared to the use of wood and metallic materials alone. …”
Get full text
Article -
247994
A estrutura da rede das companhias aéreas brasileiras: concentração empresarial e centralização territorial
Published 2022-06-01“…The structure of the Brazilian aerial network has been configured in a concentrated and centralized way for decades. …”
Get full text
Article -
247995
THE REVIEW OF SNACK BAR FROM CHIA - MOCAF AS AN ANTIDIABETIC FOOD
Published 2021-07-01“…The content mocaf flour in 100 grams are protein 1.2%, fat 0.4%, and 3.4% fiber. Chia seed flour has been shown to increase AMPK expression, while mocaf can increase insulin sensitivity in type 2 diabetes mellitus.…”
Get full text
Article -
247996
Code security of mobile backup modules on the Android platform
Published 2017-01-01“…By studying how widely these backup services were being used in the Android applications, the differences of code security about four mainstream Android backup SDK were investigated. …”
Get full text
Article -
247997
Roots of Equivalence in Translation History Till The Current Times With Concentration on Arabic as an Example
Published 2023-06-01“…Achieving equal value or equivalence between the source text (ST) and the target text (TT) is the key aim of every translation attempt. …”
Get full text
Article -
247998
Diet, Physical Activity, Weight Status, and Culture in a Sample of Children from the Developing World
Published 2012-01-01“…Results. Sugar-sweetened beverages provided 21% of energy consumed. Energy intake significantly explained BMI. …”
Get full text
Article -
247999
An Extended Newmark-FDTD Method for Complex Dispersive Media
Published 2018-01-01“…In this paper, the time-stepping equation of the polarization vector is derived by applying simultaneously the Newmark algorithm to the two sides of a second-order time-domain differential equation obtained from the relation between the polarization vector and electric field intensity in the frequency domain by the inverse Fourier transform. …”
Get full text
Article -
248000
Water Hammer Modelling and Simulation by GIS
Published 2012-01-01“…This work defined an Eulerian-based computational model compared with regression of the relationship between the dependent and independent variables for water hammer surge wave in transmission pipeline. …”
Get full text
Article