Suggested Topics within your search.
Suggested Topics within your search.
- Philosophy 11
- History 9
- Moral and ethical aspects 8
- Economic development 7
- Social aspects 6
- Economic policy 5
- History and criticism 5
- Mass media 5
- Social service 5
- Economic conditions 4
- Management 4
- Marketing 4
- Quantum theory 4
- Research 4
- Advertising 3
- Business communication 3
- Communication 3
- Criticism 3
- Culture 3
- Economics 3
- Education 3
- Hospitality industry 3
- Information technology 3
- Information theory 3
- Jurisprudence 3
- Law 3
- Literature 3
- MATHEMATICS / Mathematical Analysis 3
- Number theory 3
- Problems, exercises, etc 3
-
14561
Application of Computer-Based Simulation Teaching Combined with PBL in Colorectal Tumor Hemorrhage
Published 2022-01-01“…The outpatient department organized 21 nursing staffs to conduct computer simulation combined with PBL teaching, compared emergency theory and skill scores, and investigated the recognition of computer simulation teaching combined with PBL. …”
Get full text
Article -
14562
De la force illocutionnaire de l’énoncé comme potentialité de performativité dans l’interaction verbale
Published 2025-02-01“…Le cadre de cette recherche est celui de la sémantique de l’(inter)action verbale – la SIV, développement d’une théorie plus générale du sens linguistique, de ses potentialités discursives et sémantiques, la Sémantique des Possibles Argumentatifs. …”
Get full text
Article -
14563
Research on the Deformation Mechanism of Mining Roadway Stratiform Surrounding Rock with Nonuniform Stress Field
Published 2021-01-01“…The research results can enrich the butterfly plastic zone theory and provide the basis for roadway supporting design.…”
Get full text
Article -
14564
Soret Effect on the Instability of Double-Diffusive Convection in a Saturated Vertical Brinkman Porous Layer of Oldroyd-B Fluid
Published 2024-12-01“…Based on perturbation theory, an Orr–Sommerfeld eigenvalue problem is derived and numerically solved using the Chebyshev collocation method. …”
Get full text
Article -
14565
Two-stage high-frequency switching power supply device design study
Published 2025-02-01“…Overall, the control strategy proposed by the research institute can effectively control the front and rear modules in theory. In practical applications, it can effectively improve the power output and reduce the pollution in the power grid. …”
Get full text
Article -
14566
Airline Overbooking Problem with Uncertain No-Shows
Published 2014-01-01“…Given the chance constraint of social reputation, an overbooking model with discount fares is developed to maximize the profit rate based on uncertain programming theory. Finally, the analytic expression of the optimal booking limit is obtained through a numerical example, and the results of sensitivity analysis indicate that the optimal booking limit is affected by flight capacity, discount, confidence level, and parameters of the uncertainty distribution significantly.…”
Get full text
Article -
14567
IMPACT ASSESSMENT OF NIGERIA POLICE FORCE ON THE SECURITY MAINTANANCE IN NIGERIA
Published 2024-06-01“…The paper adopted qualitative research method with the application of the constructive theory for better explanation of issues relating to the security in Nigeria. …”
Get full text
Article -
14568
From Life to Its Online School: An Analysis of Alain de Botton’s ‘The School of Life’ as Strategy and Tactic
Published 2020-12-01“…It thereby becomes possible to acknowledge the insights of the culture industry perspective of critical theory, while providing a more nuanced interpretation and evaluation of certain works of popular culture. …”
Get full text
Article -
14569
Willingness to stay or quit: evidence from migrants working in the galway bar and restaurant industry in Ireland
Published 2024-09-01“…The study employs the theory of work adjustment (TWA) to understand the demographics, experiences and future intentions of migrants working in Galway City’s bars and restaurants. …”
Get full text
Article -
14570
EMPIRICAL INVESTIGATION OF POLICE HARASSMENT OF PRIVATE UNIVERSITY STUDENTS IN OGUN STATE, NIGERIA
Published 2023-08-01“…Questionnaires were administered on the respondents and SPSS was deployed for data analysis, while social learning theory was adopted as theoretical framework. The findings of the study revealed that males students in private universities are prone to police harassment than females, that harassment has become police strategy to ease possible extortion of the students and that most cases these harassment were informed by the students bad dresses and hairstyles. …”
Get full text
Article -
14571
The vibration of micro-circular ring of ceramic with viscothermoelastic properties under the classical Caputo and Caputo-Fabrizio of fractional-order derivative
Published 2025-01-01“…The foundation of the model is Kirchhoff’s theory of love plates. The governing equations have been developed by using Lord and Shulman’s generalized thermoelastic model. …”
Get full text
Article -
14572
Zespołowa organizacja pracy (teamwork) w niemieckich bibliotekach uniwersyteckich
Published 2008-01-01“…The teamwork concept, originated in big industry, has now ceased to be just a theory in libraries. It has been used successfully in German university, academic and public libraries. …”
Get full text
Article -
14573
Investigating the factors that influence Chinese undergraduate students' sustained use of open source communities.
Published 2024-01-01“…The influencing factors in innovation diffusion theory and the technology acceptance model were analyzed using the partial least squares structural equation model. …”
Get full text
Article -
14574
ISTORINIS PASAKOJIMAS KAIP NARATOLOGINĖS ANALIZĖS OBJEKTAS
Published 2004-01-01“…Furthermore, after having explained the main notions of theory of literature narrative I will try to analyse an extract from History of Lithuania by E. …”
Get full text
Article -
14575
Modulation recognition driven by signal enhancement
Published 2024-04-01“…The existing modulation recognition algorithms based on deep learning theory require a large number of IQ signal samples during the training phase. …”
Get full text
Article -
14576
Research on hydrodynamic performance of S-type turbine based on linear wave.
Published 2025-01-01“…The method of combining numerical simulation with physical experiment is adopted.Based on linear wave theory and turbulence model, Star CCM+numerical simulation software is used for digital modeling, and overlapping grid technology is used for grid modeling. …”
Get full text
Article -
14577
Pro-Poor Growth: A Book Review
Published 2017-05-01“…It integrates growth analytics with the microanalysis of household data to determine how country policies and conditions interact to reduce poverty and to spread the benefits of growth across different income groups.It is an advantage of pro-poor growth theory that instead of focusing on redistribution of income for the poor, it focuses on the pattern of economic growth and proposes participation in growth. …”
Get full text
Article -
14578
Honeypot contract detection method for Ethereum based on source code structure and graph attention network
Published 2023-09-01“…To address the problems of low accuracy and poor generalization of current honeypot contract detection methods, a honeypot contract detection method for Ethereum based on source code structure and graph attention network was proposed.Firstly, in order to extract the structural information of the Solidity source code of the smart contract, the source code was parsed and converted into an XML parsing tree.Then, a set of feature words that could express the structural and content characteristics of the contract was selected, and the contract source code structure graph was constructed.Finally, in order to avoid the impact of dataset imbalance, the concepts of teacher model and student model were introduced based on the ensemble learning theory.Moreover, the graph attention network model was trained from the global and local perspectives, respectively, and the outputs of all models were fused to obtain the final contract detection result.The experiments demonstrate that CSGDetector has higher honeypot detection capability than the existing method KOLSTM, with increments of 1.27% and 7.21% on F<sub>1</sub> measurement in two-class classification and multi-class classification experiments, respectively.When comparing with the existing method XGB, the average recall rate of CSGDetector in the masked honeypot detection experiments for different types of honeypot contracts is improved by 7.57%, which verifies the effectiveness of the method in improving the generalization performance of the algorithm.…”
Get full text
Article -
14579
Topologies Generated by Two Ideals and the Corresponding j-Approximations Spaces with Applications
Published 2021-01-01“…Topology is a rich source for constructs that is helpful to enrich the original model of approximations spaces. Rough set theory has inbuilt topological concepts. Hence, the main purpose of this paper is to point out that the concept of rough sets has a purely topological aspects nature. …”
Get full text
Article -
14580
Pricing Strategies in the Remanufacturing Market for the Uncertain Market Size in the Second Period
Published 2016-01-01“…Moreover, we delicately and subtly incorporate the game theory, stochastic analysis, adversarial risk analysis (ARA), and optimization methods into the pricing strategies in the remanufacturing market. …”
Get full text
Article