Suggested Topics within your search.
Suggested Topics within your search.
-
2961
Research on Tourism Marketing in the Early Days in Japan:
Published 2025-02-01“…The following four trends were identified: (1) T (Theory), existing theories were employed alongside an endeavor to introduce a new theoretical model; (2) C (Context), a relatively large number of studies have focused on inbound travel and tourism industries; (3) C (Characteristics), the studies focused more on the external environment as an independent variable in tourism marketing, and many of the references referred to the economic impact through the acquisition of foreign currency and contribution to international peace as the outcomes of tourism marketing; and (4) M (Methodology), few empirical studies have so far been conducted.…”
Get full text
Article -
2962
Product Acceptance Determination with Measurement Error Using the Neutrosophic Statistics
Published 2019-01-01“…The variable data is obtained from the measurement process which is not fully complete or clear in nature due to measurement error. …”
Get full text
Article -
2963
Citation et textologie du journal : ce que vient faire l’infinitif de narration dans les colonnes des quotidiens
Published 2017-10-01“…This contribution deals with a specific use of the infinitive in the context of the French-speaking print media, and more particularly common representations of this type of expression in the daily newspapers. …”
Get full text
Article -
2964
Attack Analysis Framework of Space-Integrated-Ground Information Network Based on Cybersecurity Knowledge Graph
Published 2021-09-01“…While realizing global coverage, random access, on-demand service, security and credibility, the space-integrated-ground information network(SGIN) is confronted with more complex and variable security threats.Compared with the internet, satellite network has a lot of diff erences, such as highly dynamic changes of topology, transfer protocol and data format.In terms of these questions, it was necessary to integrated the rule of satellite network attacks into the rules of APT attacks, developed the cybersecurity knowledge graph and the attack rules library to analyzed the attacks of the SGIN.The pattern of attack rules was expressed based on time-space data model, which was used to completed the attack chain when there were non-continuous missed data or false positives data.The attack analysis framework proposed in this paper could accurately perceived the security status of the SGIN in real time , and provided decision support for the SGIN.…”
Get full text
Article -
2965
Knowledge about prevention and control of infection related to health care: hospital context
Published 2017-08-01“…For some professionals the more training time and professional performance, the less knowledge.A variable with respect to respiratory tract showed statistically significant (p=0.044). …”
Get full text
Article -
2966
Des « arrangements » à la confrontation. Les jeunes coiffeuses et ouvriers du bâtiment face à leur·s employeur·s
Published 2019-11-01“…Having said that, such analysis is also incomplete since it masks the variable and discretionary aspects of many of these arrangements – explaining the need to also consider the conditions in which they occur. …”
Get full text
Article -
2967
The burden of thalassemia disorder: Past and present: The feedback of patients experience in the COVID-19 pandemic crisis
Published 2025-07-01“…The recent worldwide pandemic of COVID-19 worsened the situation and made it more complicated for most patients, especially in the emerging countries.…”
Get full text
Article -
2968
Innovative assessment scheme of navigation risk based on improved multi-source information fusion techniques
Published 2018-04-01“…Considering the unsatisfactory characteristics of the standard Dempster–Shafer evidence theory, the optimal combination rule is derived step by step. What"s more, the lowly dimensional Kalman filter is applied to forecast the navigation risk. …”
Get full text
Article -
2969
Application of Modified Laplace Variational Iteration Hybrid Approach for Solving Time-Fractional Fourth-Order Parabolic PDEs
Published 2025-01-01“…Ultimately, we observed that the method employed for tackling fractional-order partial differential equations is more precise, simple, and computationally efficient. …”
Get full text
Article -
2970
The Mean and the Variance as Dual Concepts in a Fundamental Duality
Published 2025-06-01“…Hence, there is an equally fundamental dual logic of partitions. At a more basic or granular level, the elements of a subset are dual to the distinctions (pairs of elements in different blocks) of a partition. …”
Get full text
Article -
2971
Une histoire du paysage végétal à travers les analyses palynologiques du boulevard Dr Henri-Henrot à Reims/Durocortorum
Published 2022-11-01“…Archaeological efforts revealed variable periods of clogging or filling of an ancient branch of the Vesle, of its banks, and archaeological structures (basins). …”
Get full text
Article -
2972
TSEN54 gene-related pontocerebellar hypoplasia type 2 presenting with exaggerated startle response: report of two cases in a family
Published 2015-06-01“… The pontocerebellar hypoplasias (PCHs) are a heterogeneous group of autosomal recessive disorders characterized by hypoplasia of the ventral pons and cerebellum, with variable cerebral involvement and severe psychomotor retardation. …”
Get full text
Article -
2973
A METHOD AND APPLICATION TO IDENTIFY REASONS FOR DECREASING VEHICLES’ DRIVING SPEED IN CITIES
Published 2018-03-01“…This paper proposes a method for traffic data collection and an application for recording data of variable factors having impact on a vehicle speed in cities and agglomerations. …”
Get full text
Article -
2974
Research on Dynamic and Complexity of Duopoly Price Strategies between Low-Carbon and Nonlow-Carbon Products under Cap-and-Trade Policies
Published 2021-01-01“…And, it was found that compared with the variable feedback chaos control method, the parameter adjustment chaos control method is more effective in controlling the pricing system in this paper. …”
Get full text
Article -
2975
INCOME AND CRIME RELATIONSHIP IN THE RECESSION PERIOD: A QUANTILE REGRESSION APPROACH
Published 2018-11-01“…Because the crime variables are highlyskewed, a quantile regression approach can be more appropriate then a regularregression. …”
Get full text
Article -
2976
Evolutionarily conserved brainstem architecture enables gravity-guided vertical navigation.
Published 2024-11-01“…Gravity-blind mutant fish swim with more variable heading and excessive veering, leading to less effective vertical navigation. …”
Get full text
Article -
2977
Optimal payload lengths of reliable multicast schemes
Published 2011-01-01“…Using total transmission time-the time needed to guarantee reliable data dissemination——as judgment criterion,the payload length selection problem was investigated for three multicast solutions which are based on simple feedback retransmission,Reed-Solomon codes,and LT fountain codes,respectively,with the consideration of packet overhead.A theoretical analysis method was proposed to determine the optimal payload lengths,which was verified by simulations.Analyses and simulations indicate,for variable packet overhead sizes and link bit error rates,each method considered has its optimal payload length.As link bit error rate increases,the performance gain brought by the selection of optimal pay-load lengths becomes more significant.Among the three solutions,the reliable multicast solution based on LT fountain codes has the most outstanding performance.…”
Get full text
Article -
2978
Attack Analysis Framework of Space-Integrated-Ground Information Network Based on Cybersecurity Knowledge Graph
Published 2021-09-01“…While realizing global coverage, random access, on-demand service, security and credibility, the space-integrated-ground information network(SGIN) is confronted with more complex and variable security threats.Compared with the internet, satellite network has a lot of diff erences, such as highly dynamic changes of topology, transfer protocol and data format.In terms of these questions, it was necessary to integrated the rule of satellite network attacks into the rules of APT attacks, developed the cybersecurity knowledge graph and the attack rules library to analyzed the attacks of the SGIN.The pattern of attack rules was expressed based on time-space data model, which was used to completed the attack chain when there were non-continuous missed data or false positives data.The attack analysis framework proposed in this paper could accurately perceived the security status of the SGIN in real time , and provided decision support for the SGIN.…”
Get full text
Article -
2979
Conceptual Consideration of the Verse of Examining Orphans “Vabtlu Al-yatama” about the Permissibility of the Intelligent Minor in Financial Possessions
Published 2012-12-01“…Considering the opinions of jurists and commentators, it seems that the variable interference of the growth in trade of children, regardless of whether or not it coincides with the maturity, to be worthy of more serious reelection. …”
Get full text
Article -
2980
International legal cooperation in “Lava Jato” Case: a critical analysis based on the diversity of national legal systems
Published 2019-06-01“…This article is focused on analyzing, from the data on international cooperation cases in the "Lava Jato" operation, which variable (s) would have influenced the more proactive position of the countries in the implementation of aid applications, despite the diversity between the legal systems. …”
Get full text
Article