Suggested Topics within your search.
Suggested Topics within your search.
-
6001
MICRO-REGIONALISATION OF A TOURIST DESTINATION - A MODEL FOR A SUSTAINABLE DEVELOPMENT OF A TOURIST DESTINATION ON THE EXAMPLE OF BOTEVGRAD MUNICIPALITY
Published 2019-10-01“…The main conclusions point the opportunities for destination management at a local level through micro-regionalisation as a successful model for sustainable tourism.…”
Get full text
Article -
6002
A Novel Resource Productivity Based on Granular Neural Network in Cloud Computing
Published 2021-01-01“…In this paper, we propose a method using a granular neural network, which is used to model data processing. This method identifies the physical hosts’ workloads before the overflow and can improve energy consumption while also reducing violation of service-level agreements. …”
Get full text
Article -
6003
Brain Activity at the Embryonic Stages of Development
Published 2015-06-01“…The main function of our brain is to run internal models of the external world. …”
Get full text
Article -
6004
Effect of Molecular Chain Structure on Fracture Mechanical Properties of Aeronautical Polymethyl Methacrylate Using Extended Digital Image Correlation Method
Published 2016-01-01“…The main purpose of this work is to investigate the fracture mechanical properties of aeronautical polymethyl methacrylate, which has been treated with directional tensile technology. …”
Get full text
Article -
6005
OPTIMIZATION POSSIBILITIES IN BULGARIAN LOCAL TAXATION
Published 2023-12-01“…The main goal of this article is to review and analyze the potential of local taxes in terms of increasing revenue to municipalities in Bulgaria. …”
Get full text
Article -
6006
A Heuristic for Disassembly Planning in Remanufacturing System
Published 2014-01-01“…Even though disassembly processes are considered as the reverse of the corresponding assembly processes, under some technological and management constraints the feasible and efficient disassembly planning can be achieved by only well-designed algorithms. …”
Get full text
Article -
6007
A Review of DNA Cryptography
Published 2025-01-01“…After summarizing and discussing the security foundations of these cryptographic methods, we highlight the main challenges relating to measurability, standard protocols, robustness, and operability. …”
Get full text
Article -
6008
Comparison of Hole Quality After Drilling and Helical Milling of the Al/CFRP Stacks
Published 2023-12-01“…These materials are often joined by screws or rivets requiring mounting holes. One of the main problems is ensuring the quality of the holes after machining. …”
Get full text
Article -
6009
LABORATORY OF CLINICAL IMMUNOLOGY N.V. SKLIFOSOVSKY RESEARCH INSTITUTE FOR EMERGENCY MEDICINE (HISTORY AND PRESENT)
Published 2016-03-01“…Assessment of the immune status of patients with urgent types of pathology in the Institute for Emergency Medicine is performed according to three main objects of research: humoral , phagocytic and lymphocytic components of immune system . …”
Get full text
Article -
6010
DETERMINING THE SIZE OF THE POPULATION OF THE GENETIC ALGORITHM FOR THE PROBLEMS OF DISCRETE OPTIMIZATION IN CAD
Published 2018-10-01“…The regression model is obtained as a result of processing simulation data in the formation of a population for a single-variable objective function. …”
Get full text
Article -
6011
Battery-Less 6LoWPAN-Based Wireless Home Automation by Use of Energy Harvesting
Published 2013-07-01“…Being one of the current main technologies, wireless sensor network (WSN) is absolutely critical and plays an increasingly important role in the development of a wide range of data acquisition, processing, and control applications. …”
Get full text
Article -
6012
Research progress on bacterial biofilms in the food industry
Published 2024-08-01“…Biofilm is the main ecological form of bacteria in the natural environment, which is a three-dimensional structured microbial community. …”
Get full text
Article -
6013
An efficient deception architecture for cloud-based virtual networks
Published 2019-08-01“…Emerging deceptive systems present a new promise for the uprising security problems in cloud-based virtual networks, especially those operated by small and medium enterprises. The main goal of deceptive systems is to form a layer of defensive nodes in an Internet-accessible cloud-based virtual network to distract and deceive malicious clients. …”
Get full text
Article -
6014
Enchancing Enhancing Medical Named Entity Recognition with Ensemble Voting of BERT-Based Models on BC5CDR
Published 2025-06-01“…One of the main applications in NLP is Named Entity Recognition (NER), which aims to identify important entities in the text, such as disease names, drugs, and proteins. …”
Get full text
Article -
6015
Blockchain Approaches Survey for Big Data: Systematic Study, Challenges and Innovations
Published 2023-12-01“…The growth of data in blockchain is the main important part that needs processing for further results as features. …”
Get full text
Article -
6016
An analysis on the revoking mechanisms for JSON Web Tokens
Published 2018-09-01“…Solving this problem without losing the main benefits of JSON Web Tokens still remains an open challenge which will be addressed in the article. …”
Get full text
Article -
6017
INNOVATION ACTIVITIES OF FOOD INDUSTRY ENTERPRISES
Published 2014-12-01“…The article discusses the main trends related to initiating innovation activities in the segment of new generation products (dairy desserts and dessert concentrates). …”
Get full text
Article -
6018
Emerging Technologies of Natural Language-Enabled Chatbots: A Review and Trend Forecast Using Intelligent Ontology Extraction and Patent Analytics
Published 2021-01-01“…Natural language processing (NLP) is a critical part of the digital transformation. …”
Get full text
Article -
6019
Ethical study of the virtue of justice in the verses of the rulings "With the approach of moral analysis of the verses of retribution"
Published 2021-08-01“…The present article examines the relationship between the two areas of ethics and jurisprudence in the context of the interaction of verses related to retribution based on the interpretive method of verse to verse and interpretive sources to examine the moral examples of the virtue of justice "with the approach of educational analysis of verses" in retribution Paid. The main purpose of this study is the significant effect of the teachings of Islamic ethics in jurisprudential verses and specifically in matters of retribution. …”
Get full text
Article -
6020
SEMAN: A Novel Secure Middleware for Mobile Ad Hoc Networks
Published 2016-01-01“…The middleware includes three modules: service, processing, and security. Security module is the main part of the middleware. …”
Get full text
Article