Showing 14,361 - 14,380 results of 18,544 for search 'thumri~', query time: 2.04s Refine Results
  1. 14361

    Possibility of critical practice in computational design: applications on boundaries between public and private space by Laurence Kimmel

    Published 2018-02-01
    “…The way parameters and algorithms could be set to function in this model is utopian, although, according to theories of “emergence”, theoretically feasible in the future. …”
    Get full text
    Article
  2. 14362

    Emerging international regime of information security by S. V. Shitkov, T. A. Polyakova, A. A. Smirnov

    Published 2021-11-01
    “…The article examines burning issues of the formation of an international regime in the field of ensuring international information security in the context of geopolitical transformations and turbulence. The theory of international regimes developed by Russian and foreign researchers is used as a theoretical and methodological basis for the study.Based on the classical definition of the international regime, the authors focus on the norms and principles in the field of international information security. …”
    Get full text
    Article
  3. 14363

    Du keynésianisme au libertarianisme.La place de la monnaie dans les transformations du savoir économique autorisé by Bruno Théret

    Published 2012-01-01
    “…Section II shows how money, whose characteristic is to have no economic role in General Equilibrium Theory, has tormented american mainstream economics since the nineteen seventies. …”
    Get full text
    Article
  4. 14364

    Modeling Nonusers’ Behavioral Intention towards Mobile Chatbot Adoption: An Extension of the UTAUT2 Model with Mobile Service Quality Determinants by Gatzioufa Paraskevi, Vaggelis Saprikis, Giorgos Avlogiaris

    Published 2023-01-01
    “…The present empirical paper, which is aimed at identifying and discussing the factors motivating nonusers to adopt the specific technology in mobile contexts, proposes a comprehensive conceptual model, which combines the UTAUT 2 behavioral theory with variables of mobile service quality contexts, such as information quality, privacy concerns, interface, and equipment, as well as trust and mobility factors. …”
    Get full text
    Article
  5. 14365

    Spectral Representation-Based Multidimensional Nonstationary Ground Motion Model for Seismic Reliability Analysis of Frame Structures by Lawali Moussa Laminou, Xinghua Chen

    Published 2021-01-01
    “…A framework for a multidimensional nonstationary ground motion model based on spectral representation theory is proposed in this paper. The multidimensional nonstationary ground motion model is built from a local target to fit the multidimensional response spectrum. …”
    Get full text
    Article
  6. 14366

    Autour du concept d’expérience chez Benjamin by Laurence Manesse

    Published 2013-04-01
    “…Notre attention a été retenue par un texte programmatique rédigé en 1917-1918 par Benjamin, texte de jeunesse, sous le titre Sur le programme de la philosophie qui vient, dont l’enjeu central serait une théorie de l’expérience établie à partir de la critique du concept kantien. …”
    Get full text
    Article
  7. 14367

    Chaos in Inverse Parallel Schemes for Solving Nonlinear Engineering Models by Mudassir Shams, Bruno Carpentieri

    Published 2024-12-01
    “…Bifurcation and chaos theory were used to find the best parameter regions that increase the parallel method’s effectiveness and stability. …”
    Get full text
    Article
  8. 14368

    The Yoruba News as a Political Tool and Avenue for Cultural Revival by Abidemi Bolarinwa

    Published 2021-12-01
    “…Adopting the Diffusion of Innovations theory, this study examines the form and content of the newspaper. …”
    Get full text
    Article
  9. 14369

    Critical Optical Depth Hypothesis for Phytoplankton Growth and Bloom. A New Graphical Approach to the Classic Sverdrup Critical Depth Model by Wojciech Szeligiewicz

    Published 2023-05-01
    “…Such an extended Sverdrup model provides a simple visual, qualitative way of obtaining results consistent with Huisman and Weissing’s (1994) critical light theory. It is convenient for considering more complex phytoplankton growth scenarios. …”
    Get full text
    Article
  10. 14370

    Study on the Dynamic Response of Composite Box Girder Bridges with Corrugated Steel Webs by Ya-Na Mao, Chi Ma, Shi-Zhong Liu, Li-Yuan Li

    Published 2023-01-01
    “…To more accurately consider the dynamic response of composite box girder bridges with corrugated steel webs under the effect of live loads, based on the theory of vehicle-bridge coupled vibration, a refined finite element model of vehicle-bridge coupled vibration analysis for composite box girders was established. …”
    Get full text
    Article
  11. 14371

    The Existence of Sexual Violence Crime in Indonesia by Fajar Yaskur, Ifahda Pratama Hapsari

    Published 2024-11-01
    “…They are compiled using the normative method, which includes the study of laws and regulations, legal theories, opinions of experts, and other legal materials. …”
    Get full text
    Article
  12. 14372
  13. 14373

    Evolutionary game model of information management mechanism for public opinion governance by Shuting LIU, Yinghua MA, Xiuzhen CHEN

    Published 2023-12-01
    “…Conflicting information in online social networks, often stemming from opposing views, can lead to rumors and the fragmentation of society.A reputation-based dynamic information management mechanism was proposed, adopting a dynamic reward and punishment strategy to decrease unnecessary information conflict so as to activate self-purification of network.By utilizing evolutionary game theory, a cumulative-prospect-based evolutionary game model of social network information conflict was constructed to validate the efficacy of the proposed mechanism.Numerical simulations were conducted to analyze the evolutionary trends of 18 different theoretical application scenarios under 9 constraints.The results demonstrate that, under constraint 5, both sides of the game tend to exhibit relatively rational behavior towards conflicts.Furthermore, dynamic evolution analysis and sensitivity analysis of the model parameters were performed while satisfying constraint 5, providing practical strategic suggestions for the dynamic information management mechanism.This model represents a novel attempt to capture the interaction of multiple factors, such as interest-driven behavior and conformity psychology, in the evolution of public opinion.Moreover, the model successfully simulates well-known patterns of rumor dissemination, confirming its validity.The proposed model offers valuable insights for the development and design of malicious information control systems in social networks and provides new ideas for the research and implementation of public opinion governance.…”
    Get full text
    Article
  14. 14374

    POVERTY ERADICATION AND NATIONAL DEVELOPMENT: AN APPRAISAL OF TELEVISION JINGLES by DORCAS BABA, AYODELE B. JOSEPH, MENDOS B. DOGO

    Published 2023-09-01
    “…Drawing on the principle of Media Development theory, the study investigates the impact of television jingles on raising awareness about poverty, shaping public perceptions, and motivating behavioral change. …”
    Get full text
    Article
  15. 14375

    Network Ripple Effects: How Twitter Deplatforming Flipped Authority Structure and Discourse of the Arizona Election Review Community by Michael Simeone, Steven R. Corman

    Published 2025-01-01
    “…Several significant changes are observed, including a drop in participation from accounts that were not deplatformed and a de-centralization of the Twitter network. Conspiracy theories remain in the discourse, but their themes become more diffuse, and their calls to action more abstract. …”
    Get full text
    Article
  16. 14376

    Cross-domain multi-copy of flow discovery mechanism based on dual certificate storage by Haiyang LUO, Bin KUANG, Shoukun GUO, Lingcui ZHANG, Ben NIU, Fenghua LI

    Published 2024-02-01
    “…To solve the problems of the privacy information leakage caused by the deliberate or inadvertent retention of information when information was frequently exchanged across nodes and systems in a ubiquitous sharing environment, a cross-domain multi-copy of flow discovery mechanism based on dual certificate storage was proposed, which could trace the propagation path and channel, and construct a multi-copy propagation graph of the information.Depending on the timing and method of certification, the dual certification was comprised active circulation certification and passive operation certification.Before the information was shared, the information sharer actively recorded the propagation path and method to generate active circulation certification records.Before the information was operated, the system automatically recorded the propagation path to generate passive operational certification records.Compared with single certificate storage, the dual certificate storage could improve the integrity and authenticity of the constructed multi-copy propagation graph of information, and could detect nodes with abnormal certificate storage behavior and provide disposals.Based on the theory of social punishment, the effectiveness of abnormal certificate storage behavior detection and handling was demonstrated.A prototype system for multi-copy discovery of OFD with dual certificate storage is developed, the improvement of information dissemination graph construction integrity by the proposed mechanism is verified.…”
    Get full text
    Article
  17. 14377

    The Construction of an Action-Speech Feature-Based School Violence Recognition Algorithm and Occupational Therapy Education Model for Adolescents by Shuaiqing Zhang, Huan Li

    Published 2022-01-01
    “…Based on the classical D-S theory, we proposed an improved D-S evidence fusion algorithm by modifying the original evidence model with a new probability distribution function and constructing new fusion rules, which can solve the fusion conflict problem well. …”
    Get full text
    Article
  18. 14378

    Dysfunctional Attitudes in Alcohol Dependents: A Comparative Study by Görkem Karakaþ Uðurlu, Mustafa Uðurlu, Levent Turhan, M. Hakan Türkçapar

    Published 2012-08-01
    “…Objective: Cognitive behavioral theory provides a theoretical framework for understanding the etiology and persistence of pathological drinking, and a conceptual basis for developing clinical techniques to treat the disorder. …”
    Get full text
    Article
  19. 14379

    Mechanism of Extruding Flowing Floor Heave in Mining Gateways Using an Elastic Foundation Beam Model by Pan Chen, Yuan-Xiang Yu, Shuan-Cheng Gu

    Published 2022-01-01
    “…Considering the action of high bearing pressures, a mechanical model of a coal wall mining gateway is established based on the elastic theory. The stress-strain distribution of the coal body is also discussed. …”
    Get full text
    Article
  20. 14380

    Electronic Structure of Hydrogenated and Surface-Modified GaAs Nanocrystals: Ab Initio Calculations by Hamsa Naji Nasir, Mudar A. Abdulsattar, Hayder M. Abduljalil

    Published 2012-01-01
    “…The two methods use ab initio Hartree-Fock and density functional theory, respectively. The results show that both energy gap and lattice constant decrease in their value as the nanocrystals grow in size. …”
    Get full text
    Article