Suggested Topics within your search.
Suggested Topics within your search.
- English language 21
- Grammar 15
- History 13
- English 11
- Study and teaching 8
- methods 7
- French language 6
- Rhetoric 6
- Usage 6
- Foreign speakers 5
- Law 5
- Nursing 5
- Politics and government 5
- Report writing 5
- Research 5
- College readers 4
- Economic conditions 4
- History and criticism 4
- Management 4
- Mass media 4
- Moral and ethical aspects 4
- Psychological aspects 4
- diagnosis 4
- Digital techniques 3
- Domestic relations 3
- Economic development 3
- Economic policy 3
- Evaluation 3
- Foreign economic relations 3
- Forests and forestry 3
-
100961
Higher-Order Splitting Method for Elastic Wave Propagation
Published 2008-01-01“…We have also looked at the influence of singular forcing terms on the convergence properties of the scheme.…”
Get full text
Article -
100962
Raconter les Highland Clearances : Fluctuations mémorielles et instrumentalisationde la mémoire
Published 2011-06-01“…This article uses the notion of “cultural memory”, put forward by Jan Assman, to analyse the meaning, values and mind-set that the collective memory of the Clearances has come to encapsulate. …”
Get full text
Article -
100963
Anomaly detection and location of malicious node for IoT based on smart contract in blockchain network
Published 2020-06-01“…With the explosive growth of the number of distributed devices in the Internet of things (IoT) network,the security of decentralized multi-agent optimization algorithm has become the forefront problem.The distributed algorithms in the IoT network are vulnerable to data injection attacks from internal malicious node because each agent locally estimates its state without any supervision.In general,the detection methods for malicious node run independently in each agent,inducing issues such as closed data,single points of failure,opaque detection processes,and so on.The proposed strategy considered detecting via an aid of blockchain technology and smart contracts in Ethereum to detect malicious node in the network.Based on the decentralized and multiple backup features of blockchain technology,the multi-site backup features of the blockchain technology enabled data sharing and avoided single point failure.In addition,the contract code,execution process and result of the smart contract were open and transparent,and the contract code and result could not be tampered to ensure that the detection process could be traced and verified.Finally,the average consensus algorithm was adopted as an example,and the proposed strategy was verified on a simplified IoT network implemented by Raspberry Pi.…”
Get full text
Article -
100964
Pakistan’s Water Security Crisis: Challenges and the Case for Integrated Water Resource Management
Published 2025-01-01“…The study is grounded in the theoretical framework of ‘water security’, and the methodology used is the STEEPLE Analysis to foreground multifarious key factors behind burgeoning water insecurity in Pakistan. …”
Get full text
Article -
100965
Ética y cuidado desde el currículo
Published 2021-12-01“… Objetivo: Realizar un análisis curricular a partir de la reflexión crítica sobre su pertinencia con el fin de aportar a la formación de los futuros profesionales en enfermería. …”
Get full text
Article -
100966
Estimates for the Green function and singular solutions for polyharmonic nonlinear equation
Published 2003-01-01“…We establish a new form of the 3G theorem for polyharmonic Green function on the unit ball of ℝn(n≥2) corresponding to zero Dirichlet boundary conditions. …”
Get full text
Article -
100967
Megagrazer loss drives complex landscape-scale biophysical cascades
Published 2025-01-01“…Our study demonstrates that removals of megagrazers in HiP were related to complex ecosystem-wide cascades with measurable impacts on land cover and surface albedo and consequences on climate forcing. This highlights the importance of restoring functional ecosystems by reinstating trophic processes.…”
Get full text
Article -
100968
Effect of Wood Preservatives on Surface Properties of Coated Wood
Published 2015-01-01Get full text
Article -
100969
Marching towards the Cruzada: Douglas Jerrold's road to nationalist Spain
Published 2002-12-01“…In the present article, which traces Jerrold’s political thought through his fictional and nonfictional work, it is demonstrated that his advocacy of Franco’s Nationalist forces was not merely a knee-jerk response to the anticlericalism of 1936 but virtually an inevitable consequence of his commitment to what he termed the “Counter-Revolution” as a means of restoring his vision of an earlier era. …”
Get full text
Article -
100970
Transpolar Convection and Magnetospheric Ring Current Relations: Real‐Time Applications of the Polar Cap (PC) Indices
Published 2021-07-01“…From analyses spanning a decade (2009–2018), equivalent ASY‐H index values were derived from a linear relation with SRT PCN (North) and PCS (South) indices combined to form the non‐negative PCC indices. For the cases of strong magnetic storms (Dst(peak )< −100 nT), the equivalent ASY‐H indices were found to agree well with reported (real) ASY‐H index values. …”
Get full text
Article -
100971
Gardening in Raised Beds
Published 2013-05-01“…The planting area is raised above the existing soil level and usually enclosed within a structure to form a planting bed. This 3-page fact sheet was written by Terry Brite DelValle, and published by the UF Department of Environmental Horticulture, May 2013. …”
Get full text
Article -
100972
El IAPI y el financiamiento de la expansión industrial entre 1946 y 1955
Published 2014-12-01“…Accordingly, two mutually complementary operational hypotheses are formulated: 1-the industrial sector is the main destination of the funds of IAPI, either as subsidies or as loans and 2-the profits generated by foreign trade are the main source of funds of IAPI. …”
Get full text
Article -
100973
Palavra e poder: os discursos de Fidel Castro como fontes históricas (1959-1976)
Published 2024-12-01“…Por se tratarem de documentos controlados pelo Estado, no que diz respeito à sua produção e circulação social, atentaremos para as características destes que foram registros históricos elaborados com o objetivo de perpetuar uma narrativa sobre o passado insular a partir da luta armada de Sierra Maestra. …”
Get full text
Article -
100974
Turbulence of internal gravity waves in the laboratory
Published 2024-09-01“…The common feature to these studies is that they adopted the same strategy of injecting energy in weakly non-linear waves before increasing the forcing amplitude in order to trigger a transition to a wave turbulence regime. …”
Get full text
Article -
100975
Encoding of cerebellar dentate neuron activity during visual attention in rhesus macaques
Published 2025-01-01“…The role of cerebellum in controlling eye movements is well established, but its contribution to more complex forms of visual behavior has remained elusive. To study cerebellar activity during visual attention we recorded extracellular activity of dentate nucleus (DN) neurons in two non-human primates (NHPs). …”
Get full text
Article -
100976
Criminological analysis of the state and particularities of determination of the illegal possession of vehicles in Ukraine under conditions of armed aggression
Published 2023-06-01“…Victim-urban factors are represented by a conglomeration of circumstances of criminogenic significance that form a situation of relaxed control over vehicles in places where they are forced to concentrate, for relatively long periods of time. …”
Get full text
Article -
100977
The Prospects of Russia and India Jointly Leading a New Non-Aligned Movement
Published 2020-04-01Get full text
Article -
100978
Hipnosis como tratamiento del dolor en pacientes con fibromialgia
Published 2013-06-01“…La fibromialgia es un conjunto de síntomas diversos de etiología aún incierta, sin embargo, su común denominador, el dolor crónico generalizado de los músculos, ataca de forma impredecible con una variable duración e intensidad, el cual llega muchas veces a ser discapacitante. …”
Get full text
Article -
100979
-
100980
Exercise Recommendation Model Based on Cognitive Level and Educational Big Data Mining
Published 2022-01-01“…Based on the analysis results, appropriate exercises are selected from the educational resource data to form a list to be recommended. The experimental results show that the exercise recommendation algorithm based on cognitive level and data mining has better recommendation effect and accuracy than the other two recommendation models. …”
Get full text
Article