Showing 61,421 - 61,440 results of 73,440 for search 'it*', query time: 0.33s Refine Results
  1. 61421

    Revisiting ECB’s Technocratic Legitimacy: No Longer Fit‐for‐Purpose? by Dimitrios Argyroulis, Nikolas Vagdoutis

    Published 2025-01-01
    “…This article revisits the technocratic model of legitimacy that the European Central Bank (ECB) has enjoyed since its early period, by exploring the Monetary Policy Strategy statements that constitute the “comprehensive framework” guiding the Bank’s operational decisions. …”
    Get full text
    Article
  2. 61422

    A Causal Model for Safety Assessment Purposes in Opening the Low-Altitude Urban Airspace of Chinese Pilot Cities by Jun Tang, Wenyuan Yang

    Published 2018-01-01
    “…China has been gradually relaxing its ban on the use of low-altitude airspace across the country. …”
    Get full text
    Article
  3. 61423

    Comparison of effectiveness in smoking cessation using nicotine replacement therapy and electronic cigarettes by Adrianna Kopaczyńska, Katarzyna Szafrańska, Szymon Niemirka, Aleksandra Janiak, Kinga Dominiczak, Łukasz Grądalski, Filip Dębicki

    Published 2025-02-01
    “…This article explores the complexities of nicotine addiction, highlighting its dual nature as both a learned behavior and a physical dependence. …”
    Get full text
    Article
  4. 61424

    The Origin of Individual Differences in the Course and Severity of Diseases by Sergey N. Rumyantsev

    Published 2006-01-01
    “…Any disease manifests itself individually either by a bright or restricted spectrum of clinical signs and resultant clinical courses that range from asymptomatic to deadly, from acute to chronic, etc. …”
    Get full text
    Article
  5. 61425

    Fatigue properties and fracture mechanism of load carrying type fillet joints with one-sided welding by Takamasa Abe, Hiroyuki Akebono, Masahiko Kato, Atsushi Sugeta

    Published 2016-01-01
    “…In this study, the fatigue properties and the fracture mechanism of the load carrying type fillet joints with one-sided welding were investigated experimentally to evaluate its fatigue damage with high accuracy based on the experimental results. …”
    Get full text
    Article
  6. 61426

    Forest Resource Information on the Internet: Connecting to Today’s Online Resources by Chris Demers

    Published 2014-09-01
    “… In 1997, the UF/IFAS School of Forest Resources and Conservation (SFRC) published Forest Resource Information on the Internet, which provided detailed information about the Internet: its history, structure, and how to use it. It also provided a sample of forest resource websites. …”
    Get full text
    Article
  7. 61427

    Collaborative Governance in the Digital Transformation Age: A Systematic Literature Review with Bibliometric Mapping by Rio Yusri Maulana, Mitja Dečman

    Published 2023-05-01
    “…Originality/Value: The research contributes to the understanding of collaborative digital transformation as a distinct research area within the broader concepts of digital transformation and collaborative governance, which is still seeking its own identity in academic literature, and offers a definition of collaborative digital transformation (CDT). …”
    Get full text
    Article
  8. 61428

    A spotlight on fossil fuel lobby and energy transition possibilities in emerging oil-producing economies by Isaac Ankrah, Michael Appiah-Kubi, Eric Ofosu Antwi, Ivy Drafor Amenyah, Mohammed Musah, Frank Gyimah Sackey, Richard Asravor, Isaiah Sikayena

    Published 2025-01-01
    “…These findings underscore the need to expand the lobby-effect theory to include indirect economic influences, such as investment patterns and structural dependencies, that enable fossil fuel dominance. Through its focus on Ghana, this study contributes fresh insights into the energy transition dynamics of emerging economies, offering a broader and more inclusive perspective to the energy transition literature.…”
    Get full text
    Article
  9. 61429

    Competitiveness of the enterprise on the market when developing new production by R. V. Chernov

    Published 2024-06-01
    “…The author has suggested ways to determine both current competitiveness and its indicators in past and future periods. It is proposed to restructure the domestic technology transfer to the international one with friendly countries, moving from simple trade and exchange of goods to joint product development. …”
    Get full text
    Article
  10. 61430

    THE MAIN TRENDS OF INVESTMENT ACTIVITY IN REGIONS OF THE RUSSIAN FEDERATION by A. V. Kozhukhova, M. D. Khabib

    Published 2019-05-01
    “…Investments as a factor of increase in level of economic development of the country and its regions have been considered. The analysis of macroeconomic indicators, which characterize the conditions and results of investment activity, has been carried out. …”
    Get full text
    Article
  11. 61431

    Evaluating the influence of anti-PD-1 immunotherapy combined with IMRT on thyroid dysfunction in nasopharyngeal carcinoma by Liqianqi Chen, Zihuang Li, Xianming Li, Shihai Wu, Long Gong, Gang Xu, Shanyi Chen, Yucong Zhang

    Published 2025-01-01
    “…Anti-PD-1 immunotherapy has significantly prolonged Event-free Survival (EFS) in Nasopharyngeal Carcinoma (NPC). However, its potent anti-tumor effects can also attack normal tissues and organs, leading to immune-related adverse effects (irAE), with the thyroid being one of the most commonly affected organs. …”
    Get full text
    Article
  12. 61432

    Wasp Parasitoid Doryctobracon areolatus (Szépligeti) (Insecta: Hymenoptera: Braconidae) by Charles Stuhl, John Sivinski

    Published 2012-07-01
    “…Doryctobracon areolatus was introduced into Florida and the Dominican Republic for control of the Caribbean fruit fly and the West Indian fruit fly. In its native habitats, parasitism of fruit flies in certain fruit can reach more than 80%. …”
    Get full text
    Article
  13. 61433

    The Relation between CSR and Innovation. Model Approach by Dawid Szutowski, Piotr Ratajczak

    Published 2016-01-01
    “…The paper attempts to fulfil the research gap concerning the mutual relation between company innovation and its corporate social responsibility practices, by determining the conditions in which the innovation/CSR relation appears and develops. …”
    Get full text
    Article
  14. 61434

    The usage of antibiotics in primary health care. by José Carles Zerquera, Grace A. de Lara García, Mariela García Gattorno, Rubén Rodríguez Rodríguez, Sorahy Santander García

    Published 2008-12-01
    “…In primary health care this action requires a great relevance due to its common use. An updated bibliographical review and a search were performed with the aim to present the most frequent antibiotics used, the bases for its correct selection, time the treatment may last, as well as other information which are essential to be known by the medical personnel. …”
    Get full text
    Article
  15. 61435

    A Study of Non-Finite Forms of Anaphoric do in the Spoken BNC by Kimberly Oger

    Published 2019-12-01
    “…It is rarely used in other varieties of English, and American speakers, in particular, tend to consider its usage ungrammatical. British do has received very little attention in the literature, particularly in comparison with other anaphoric phenomena involving do, such as ellipsis. …”
    Get full text
    Article
  16. 61436

    Deciphering sepsis: transforming diagnosis and treatment through systems immunology by Robert E. W. Hancock, Andy An, Claudia C. dos Santos, Amy H. Y. Lee

    Published 2025-01-01
    “…Current treatment approaches (antimicrobials and supportive care) do not address the complexity of sepsis or its mechanistic heterogeneity between and within patients over time. …”
    Get full text
    Article
  17. 61437

    Weighted and Well-Balanced Nonlinear TV-Based Time-Dependent Model for Image Denoising by Khursheed Alam, Alka Chauhan, Santosh Kumar

    Published 2023-12-01
    “…Furthermore, we want to prove the viscosity solution of our weighted and well balanced time-dependent model, demonstrating its existence and uniqueness. The finite difference method is applied to discretize the nonlinear time-dependent models. …”
    Get full text
    Article
  18. 61438

    A Method for the Simultaneous Determination of Chlorogenic Acid and Sesquiterpene Lactone Content in Industrial Chicory Root Foodstuffs by Honorine Willeman, Philippe Hance, Anne Fertin, Najia Voedts, Nathalie Duhal, Jean-François Goossens, Jean-Louis Hilbert

    Published 2014-01-01
    “…A method for the simultaneous determination of free chlorogenic acids (CGA) and sesquiterpene lactones (STL) in chicory root and its dried (flour) and roasted (grain) forms is described. …”
    Get full text
    Article
  19. 61439

    A Database for the Future by Sören Edvinsson, Elisabeth Engberg

    Published 2020-12-01
    “…In this article, we first give a brief presentation of the DDB and its history, characteristics, and development from the 1970s to the present. …”
    Get full text
    Article
  20. 61440

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article