Suggested Topics within your search.
Suggested Topics within your search.
- Education 2
- Evaluation 2
- Research 2
- Biodiversity conservation 1
- Business-to-Business-Marketing 1
- Children 1
- Conservation biology 1
- Data processing 1
- Educational evaluation 1
- Educational technology 1
- Industrial marketing 1
- Language 1
- Language disorders in children 1
- Linguistics 1
- MEDICAL / Audiology & Speech Pathology 1
- Management 1
- Marketing 1
- Mass media 1
- Moral and ethical aspects 1
- Natural resources 1
- Nursing 1
- Nursing Research 1
- Policy sciences 1
- Political planning 1
- Prosodic analysis (Linguistics) 1
- Schools 1
- Study and teaching 1
- Teacher educators 1
- Teachers 1
- Training of 1
-
18861
Le Falstaff de Manfredo Maggioni et Michael Balfe : façonner un opéra italien pour le public anglais
Published 2011-12-01“…Not only is it sung in Italian but it also respects the structural codes, vocal and scenic practices which make it recognizable as an opera buffa on the aesthetic stage of the time, and above all on the English stage. The issue of rewriting implies here a reflection on the intimately linked processes of production and reception. …”
Get full text
Article -
18862
Performance Measurement of Management System Standards Using the Balanced Scorecard
Published 2017-11-01Get full text
Article -
18863
Clinical manifestations and basic mechanisms of myocardial ischemia/reperfusion injury
Published 2018-01-01Get full text
Article -
18864
The changing roles of mass media amidst the growth of the digital media
Published 2024-12-01“…Thus, we explore this issue along with the factors and implications that this trend might bring about. …”
Get full text
Article -
18865
Se suspendre aux lendemains de Fessenheim – une approche croisée sur les traces visibles et invisibles d’un territoire nucléaire en transformation.
Published 2021-10-01“…Moreover, it started a form of public engagement that other actors may build on to continue the process of reflection initiated by this introductory exhibition. …”
Get full text
Article -
18866
Underwater acoustic channel estimation method based on response generative network
Published 2025-04-01“…To address the issue of low channel estimation accuracy in underwater acoustic communication environments, an underwater acoustic channel estimation method based on the response generative network (RGNet) was proposed. …”
Get full text
Article -
18867
Jews and Anti-Jewish Rules in the Czech Codification of Church Law of 1349
Published 2023-11-01“… The first codification of church law in the territory of the historically Czech lands, known as the provincial statutes of Ernst of Pardubice (Statuta provinicialia Arnesti), was issued in 1349, with validity for the entire Prague archdiocese. …”
Get full text
Article -
18868
Car Hacking: Accessing and Exploiting the CAN Bus Protocol
Published 2019-06-01“…The purpose of this paper is to present a clear, step-by-step process for creating a car-hacking research workstation and to give faculty, students, and researchers the ability to implement car hacking in their own courses and lab environments. …”
Get full text
Article -
18869
Defense scheme for the world state based attack in Ethereum
Published 2022-04-01“…Ethereum is taken as the representative platform of the second generation of blockchain system.Ethereum can support development of different distributed applications by running smart contracts.Local database is used to store the account state (named world state) for efficient validation of transactions, and the state root is stored in the block header to guarantee the integrity of the state.However, some researches revealed that the local database could be easily tempered with, and attackers can issue illegal transactions based on the modified account state to obtain illegitimate benefits.This world-state based security problem was introduced, and the preconditions for attack were analyzed.Compared with the two common security threats under the PoW (proof of work) consensus, it was found that when the attacker controls the same mining computing power, the world-state based attack brought higher risk, and the success rate approached 100%.In order to deal with this threat, a practical scheme for attack detection and defense was proposed accordingly.The secondary verification and data recovery process were added to the Ethereum source code.The feasibility and complexity of the proposed scheme was evaluated with single-machine multi-threading experiments.The proposed scheme improves Ethereum’s tolerance to malicious tampering of account state, and is applicable to other blockchain platforms applying local database for transaction validation, such as Hyperledger Fabric.In addition, the time and computational overhead brought by the proposed scheme are not prominent, so it has good applicability and induces acceptable impact on the performance of original system.…”
Get full text
Article -
18870
Towards sustainable urban densification: governmental timidity vs. 4D-Geodesigning urban transformation in Baden, Switzerland
Published 2025-07-01“…Abstract Urban densification remains a contentious issue, often hindered by preservationist attitudes and risk-averse governance. …”
Get full text
Article -
18871
A dialectic on validity: Explanation-focused and the many ways of being human
Published 2023-12-01Get full text
Article -
18872
Youth and Publicness
Published 2025-01-01“…In relation to the theme of this Special Issue, we hope to open up a discussion about possible perspectives on inclusive urban spatial practice based on resonance and an expanded definition of sociality.…”
Get full text
Article -
18873
Agriculture as Energy Prosumer: Review of Problems, Challenges, and Opportunities
Published 2024-12-01“…The issue of energy in agriculture is complex and multifaceted. …”
Get full text
Article -
18874
DOA estimation with anti-jitter based on DMA heterogeneous codebook cyclic Kalman filtering
Published 2025-03-01“…However, its performance can be significantly impacted by platform jitter. To address the issue of random angular jitter in airborne DOA estimation, an anti-jitter DOA estimation algorithm based on DMA heterogeneous codebook cyclic Kalman filtering was proposed. …”
Get full text
Article -
18875
Preserving Tradition: Motif Design Development for Batik Tulis Lasem
Published 2025-07-01Get full text
Article -
18876
Bibliometric analysis of studies on mental health in higher education from 1960 to 2024
Published 2025-08-01“…Abstract The issue of mental health has attracted interest not only in the field of health but also in many sectors from education to industry. …”
Get full text
Article -
18877
The Social Construction of Water Scarcity: An Exploration Study along the “Bharathapuzha” in Kerala
Published 2018-11-01“… Water scarcity is a very critical issue in the context of sustainability and global environmental change. …”
Get full text
Article -
18878
The Queer State of Being: Navigating the Neoliberal City through Kari
Published 2025-07-01Get full text
Article -
18879
-
18880
Business cycle and innovation activity in medium-high and high technology industry in Poland
Published 2015-12-01Get full text
Article