Showing 4,441 - 4,460 results of 11,103 for search 'features problems', query time: 0.11s Refine Results
  1. 4441

    Factors associated with breastfeeding initiation time in a Baby-Friendly Hospital by Emel Orün, S Songül Yalçin, Yusuf Madendağ, Zeynep Ustünyurt-Eras, Sehnaz Kutluk, Kadriye Yurdakök

    Published 2010-02-01
    “… The purpose of this study was to investigate maternal, gestational, and neonatal features associated with the early initiation of breastfeeding. …”
    Get full text
    Article
  2. 4442

    Charismatic Leadership in the Middle East and North Africa in the 21 st Century: Regional Specifics and Prospects for the Evolution of the Phenomenon by N. Yu. Surkov

    Published 2020-04-01
    “…It analyzes the existing caesarean regimes of the Middle East and North Africa: their nature (progressive vs. conservative), characteristic features and prospects of their evolution. To achieve this goal the author uses a synthetic analytical approach based on ideas of Max Weber and Antonio Gramshi. …”
    Get full text
    Article
  3. 4443

    Global and Russian Market of Chemical Products: Key Trends of Development by J. O. Sizova

    Published 2022-04-01
    “…The article studies specific features and makes a comparative analysis of chemical industry production in Russia and the world, analyzes the structure of trade turnover according to Clause 6 of the uniform goods nomenclature of the foreign economic activity in the Eurasian Economic Union. …”
    Get full text
    Article
  4. 4444

    Codification of Spelling Norms of the Yakut Literary Language by N. M. Vasilyeva

    Published 2019-12-01
    “…The problem of the development and codification of spelling norms of the Yakut literary language is considered. …”
    Get full text
    Article
  5. 4445
  6. 4446

    Criminal process and limitation period’s provisions in the EU jurisprudence framework. Dialogue between systems or identity conflict? by Michele Caianiello

    Published 2017-10-01
    “…With decision no. 24/2017 the problems raised by Taricco saga were just postponed, though they are far from being resolved. …”
    Get full text
    Article
  7. 4447

    Legislation Related to the EU Mandatory Labeling System for Genetically Modified Foods and Enlightenments Drawn from It by ZHANG Jing, LUO Jiaoni

    Published 2025-01-01
    “…Our aim is to provide innovative ideas for solving the problems existing in China’s GMF labeling system.…”
    Get full text
    Article
  8. 4448

    Structure of air chemical pollution and environmental zoning for health assessment in large industrial centre by M. V. Tabakaev, S. A. Maksimov, E. B. Shapovalova, G. V. Artamonova

    Published 2013-11-01
    “…The problem of contamination of the lower layer of the atmosphere in Western Siberia remains relevant more than half a century. …”
    Get full text
    Article
  9. 4449

    The concept of responsibility as the modern outlook of the designer by M. L. Sokolova, N. E. Milchakova, A. I. Zhigunova

    Published 2020-04-01
    “…A set of knowledge, skills abilities necessary for the designer to understand the concept of responsible design ensure such a design process is determined. The arising problems are considered, and the approaches to their solution on the basis of modern competence approach are offered. …”
    Get full text
    Article
  10. 4450

    Artificial Intelligence in the Politics of the EU and China by Nikolay V. Litvak, Natalia B. Pomozova

    Published 2024-08-01
    “…It is possible that, despite solemn statements, Europe will have to use elements of the Chinese pragmatic approach to the problem.…”
    Get full text
    Article
  11. 4451

    The Character and Function of the Temple Metaphor (ναός) in the Corinthian Correspondence by Marcin Kowalski

    Published 2025-04-01
    “…Turning to the Corinthian correspondence, in which the term ναός occurs, the author places 1 Cor 3:16–17, 6:19, and 2 Cor 6:16 in their argumentative context and points to their common features. Among them, he mentions problems in Corinth, the individual and communal character of the temple metaphor, the apostle’s appeals for unity in the Church, for the Church to break with sin, and embrace his gospel. …”
    Get full text
    Article
  12. 4452

    Nash Equilibrium Strategy for a DC Pension Plan with State-Dependent Risk Aversion: A Multiperiod Mean-Variance Framework by Liyuan Wang, Zhiping Chen

    Published 2018-01-01
    “…Moreover, we incorporate the wage income factor into our model, which leads to a more complicated problem than the portfolio selection problems that appeared in relevant papers. …”
    Get full text
    Article
  13. 4453

    Key aspects of modern documentary and information provision of health promotion by Shemaiev Oleksandr

    Published 2024-01-01
    “…The scientific novelty is that the actual problems of document and information provision of health promotion related to insufficiently effective document and information system of provision of health promotion are determined; directions that will contribute to increasing the effectiveness of health promotion are substantiated. …”
    Get full text
    Article
  14. 4454

    The Criminalization of Environmental Harm: Theoretical Perspectives in the European Union by Krisztina Ficsor

    Published 2024-12-01
    “…Traditional legal approaches often focus on punishing individual transgressions and direct harm, but climate change and environmental damage are collective and long-term problems that require a more systemic approach. The complexity of the problem comes from the fact that climate change and its serious consequences are the result of human action. …”
    Get full text
    Article
  15. 4455

    Determinates of Formation and Development of German Newspaper-Publicistic Style in 19<sup>th</sup> Century by A. V. Kokova

    Published 2017-04-01
    “…The article considers theoretical problems of the language functioning on the example of formation and development of the German newspaper-publicistic style. …”
    Get full text
    Article
  16. 4456

    Edge computing privacy protection method based on blockchain and federated learning by Chen FANG, Yuanbo GUO, Yifeng WANG, Yongjin HU, Jiali MA, Han ZHANG, Yangyang HU

    Published 2021-11-01
    “…Aiming at the needs of edge computing for data privacy, the correctness of calculation results and the auditability of data processing, a privacy protection method for edge computing based on blockchain and federated learning was proposed, which can realize collaborative training with multiple devices at the edge of the network without a trusted environment and special hardware facilities.The blockchain was used to endow the edge computing with features such as tamper-proof and resistance to single-point-of-failure attacks, and the gradient verification and incentive mechanism were incorporated into the consensus protocol to encourage more local devices to honestly contribute computing power and data to the federated learning.For the potential privacy leakage problems caused by sharing model parameters, an adaptive differential privacy mechanism was designed to protect parameter privacy while reducing the impact of noise on the model accuracy, and moments accountant was used to accurately track the privacy loss during the training process.Experimental results show that the proposed method can resist 30% of poisoning attacks, and can achieve privacy protection with high model accuracy, and is suitable for edge computing scenarios that require high level of security and accuracy.…”
    Get full text
    Article
  17. 4457

    A novel general kernel-based non-negative matrix factorisation approach for face recognition by Wen-Sheng Chen, Xiya Ge, Binbin Pan

    Published 2022-12-01
    “…Kernel-based non-negative matrix factorisation (KNMF) is a promising nonlinear approach for image data representation using non-negative features. However, most of the KNMF algorithms are developed via a specific kernel function and thus fail to adopt other kinds of kernels. …”
    Get full text
    Article
  18. 4458

    Build with intrinsic security: Trusted autonomy security system by Shen He, Jing Huang, Penglin Yang

    Published 2020-11-01
    “…Intrinsic security emphasizes that network itself must be trusted and security autonomous to address the security problems which are caused by remote and heterogeneous. …”
    Get full text
    Article
  19. 4459

    Adaptation Strategies of the U.S. Companies to the Digitalization of Production by V. P. Bauer, G. L. Podvoisky, N. E. Kotova

    Published 2018-08-01
    “…The researchers set themselves the task of analyzing various aspects of this problem — to identify the features and stages of adaptation of American companies in the implementation of digitalization in the field of production. …”
    Get full text
    Article
  20. 4460

    Research on Clothing Image Database Retrieval Algorithm Based on Wavelet Transform by Xiaoyue Cui

    Published 2022-01-01
    “…Aiming at the problems of low image data retrieval accuracy and slow retrieval speed in the existing image database retrieval algorithms, this paper designs a clothing image database retrieval algorithm based on wavelet transform. …”
    Get full text
    Article