Showing 14,561 - 14,580 results of 18,544 for search 'thumri~', query time: 2.13s Refine Results
  1. 14561

    Application of Computer-Based Simulation Teaching Combined with PBL in Colorectal Tumor Hemorrhage by Yanling Zhang, Jinyan Hu, Lingling Li, Yunpeng Zhao

    Published 2022-01-01
    “…The outpatient department organized 21 nursing staffs to conduct computer simulation combined with PBL teaching, compared emergency theory and skill scores, and investigated the recognition of computer simulation teaching combined with PBL. …”
    Get full text
    Article
  2. 14562

    De la force illocutionnaire de l’énoncé comme potentialité de performativité dans l’interaction verbale by Abdelhadi Bellachhab, Olga Galatanu

    Published 2025-02-01
    “…Le cadre de cette recherche est celui de la sémantique de l’(inter)action verbale – la SIV, développement d’une théorie plus générale du sens linguistique, de ses potentialités discursives et sémantiques, la Sémantique des Possibles Argumentatifs. …”
    Get full text
    Article
  3. 14563

    Research on the Deformation Mechanism of Mining Roadway Stratiform Surrounding Rock with Nonuniform Stress Field by Yongxin Sun

    Published 2021-01-01
    “…The research results can enrich the butterfly plastic zone theory and provide the basis for roadway supporting design.…”
    Get full text
    Article
  4. 14564

    Soret Effect on the Instability of Double-Diffusive Convection in a Saturated Vertical Brinkman Porous Layer of Oldroyd-B Fluid by Yuanzhen Ren, Yongjun Jian

    Published 2024-12-01
    “…Based on perturbation theory, an Orr–Sommerfeld eigenvalue problem is derived and numerically solved using the Chebyshev collocation method. …”
    Get full text
    Article
  5. 14565

    Two-stage high-frequency switching power supply device design study by Lijuan Zhang

    Published 2025-02-01
    “…Overall, the control strategy proposed by the research institute can effectively control the front and rear modules in theory. In practical applications, it can effectively improve the power output and reduce the pollution in the power grid. …”
    Get full text
    Article
  6. 14566

    Airline Overbooking Problem with Uncertain No-Shows by Chunxiao Zhang, Congrong Guo, Shenghui Yi

    Published 2014-01-01
    “…Given the chance constraint of social reputation, an overbooking model with discount fares is developed to maximize the profit rate based on uncertain programming theory. Finally, the analytic expression of the optimal booking limit is obtained through a numerical example, and the results of sensitivity analysis indicate that the optimal booking limit is affected by flight capacity, discount, confidence level, and parameters of the uncertainty distribution significantly.…”
    Get full text
    Article
  7. 14567

    IMPACT ASSESSMENT OF NIGERIA POLICE FORCE ON THE SECURITY MAINTANANCE IN NIGERIA by LAMBE EMMANUEL OYEWOLE

    Published 2024-06-01
    “…The paper adopted qualitative research method with the application of the constructive theory for better explanation of issues relating to the security in Nigeria. …”
    Get full text
    Article
  8. 14568

    From Life to Its Online School: An Analysis of Alain de Botton’s ‘The School of Life’ as Strategy and Tactic by Gökçen Karanfil, A. Özgür Gürsoy

    Published 2020-12-01
    “…It thereby becomes possible to acknowledge the insights of the culture industry perspective of critical theory, while providing a more nuanced interpretation and evaluation of certain works of popular culture. …”
    Get full text
    Article
  9. 14569

    Willingness to stay or quit: evidence from migrants working in the galway bar and restaurant industry in Ireland by Olaiwola Jamiu Ogunpaimo, Kesiena Ebenade

    Published 2024-09-01
    “…The study employs the theory of work adjustment (TWA) to understand the demographics, experiences and future intentions of migrants working in Galway City’s bars and restaurants. …”
    Get full text
    Article
  10. 14570

    EMPIRICAL INVESTIGATION OF POLICE HARASSMENT OF PRIVATE UNIVERSITY STUDENTS IN OGUN STATE, NIGERIA by Ademolu Oluwaseun Adenuga, Abdullahi Abiodun Oyekanmi

    Published 2023-08-01
    “…Questionnaires were administered on the respondents and SPSS was deployed for data analysis, while social learning theory was adopted as theoretical framework. The findings of the study revealed that males students in private universities are prone to police harassment than females, that harassment has become police strategy to ease possible extortion of the students and that most cases these harassment were informed by the students bad dresses and hairstyles. …”
    Get full text
    Article
  11. 14571

    The vibration of micro-circular ring of ceramic with viscothermoelastic properties under the classical Caputo and Caputo-Fabrizio of fractional-order derivative by Eman A. N. Al-Lehaibi

    Published 2025-01-01
    “…The foundation of the model is Kirchhoff’s theory of love plates. The governing equations have been developed by using Lord and Shulman’s generalized thermoelastic model. …”
    Get full text
    Article
  12. 14572

    Zespołowa organizacja pracy (teamwork) w niemieckich bibliotekach uniwersyteckich by Zdzisław Gębołyś

    Published 2008-01-01
    “…The teamwork concept, originated in big industry, has now ceased to be just a theory in libraries. It has been used successfully in German university, academic and public libraries. …”
    Get full text
    Article
  13. 14573

    Investigating the factors that influence Chinese undergraduate students' sustained use of open source communities. by Xinyi Wang, Rafiza Abdul Razak, Siti Hajar Halili

    Published 2024-01-01
    “…The influencing factors in innovation diffusion theory and the technology acceptance model were analyzed using the partial least squares structural equation model. …”
    Get full text
    Article
  14. 14574

    ISTORINIS PASAKOJIMAS KAIP NARATOLOGINĖS ANALIZĖS OBJEKTAS by Vytautas Žemgulis

    Published 2004-01-01
    “…Furthermore, after having explained the main notions of theory of literature narrative I will try to analyse an extract from History of Lithuania by E. …”
    Get full text
    Article
  15. 14575

    Modulation recognition driven by signal enhancement by CHENG Fengyun, ZHOU Jin

    Published 2024-04-01
    “…The existing modulation recognition algorithms based on deep learning theory require a large number of IQ signal samples during the training phase. …”
    Get full text
    Article
  16. 14576

    Research on hydrodynamic performance of S-type turbine based on linear wave. by LingJie Bao, Ying Wang, JunHua Chen, Hao Li, ChuHua Jiang, Yue Zhuo, Siru Wu

    Published 2025-01-01
    “…The method of combining numerical simulation with physical experiment is adopted.Based on linear wave theory and turbulence model, Star CCM+numerical simulation software is used for digital modeling, and overlapping grid technology is used for grid modeling. …”
    Get full text
    Article
  17. 14577

    Pro-Poor Growth: A Book Review by Seyedhossein Mirjalili

    Published 2017-05-01
    “…It integrates growth analytics with the microanalysis of household data to determine how country policies and conditions interact to reduce poverty and to spread the benefits of growth across different income groups.It is an advantage of pro-poor growth theory that instead of focusing on redistribution of income for the poor, it focuses on the pattern of economic growth and proposes participation in growth. …”
    Get full text
    Article
  18. 14578

    Honeypot contract detection method for Ethereum based on source code structure and graph attention network by Youwei WANG, Yudong HOU, Lizhou FENG

    Published 2023-09-01
    “…To address the problems of low accuracy and poor generalization of current honeypot contract detection methods, a honeypot contract detection method for Ethereum based on source code structure and graph attention network was proposed.Firstly, in order to extract the structural information of the Solidity source code of the smart contract, the source code was parsed and converted into an XML parsing tree.Then, a set of feature words that could express the structural and content characteristics of the contract was selected, and the contract source code structure graph was constructed.Finally, in order to avoid the impact of dataset imbalance, the concepts of teacher model and student model were introduced based on the ensemble learning theory.Moreover, the graph attention network model was trained from the global and local perspectives, respectively, and the outputs of all models were fused to obtain the final contract detection result.The experiments demonstrate that CSGDetector has higher honeypot detection capability than the existing method KOLSTM, with increments of 1.27% and 7.21% on F<sub>1</sub> measurement in two-class classification and multi-class classification experiments, respectively.When comparing with the existing method XGB, the average recall rate of CSGDetector in the masked honeypot detection experiments for different types of honeypot contracts is improved by 7.57%, which verifies the effectiveness of the method in improving the generalization performance of the algorithm.…”
    Get full text
    Article
  19. 14579

    Topologies Generated by Two Ideals and the Corresponding j-Approximations Spaces with Applications by Mona Hosny

    Published 2021-01-01
    “…Topology is a rich source for constructs that is helpful to enrich the original model of approximations spaces. Rough set theory has inbuilt topological concepts. Hence, the main purpose of this paper is to point out that the concept of rough sets has a purely topological aspects nature. …”
    Get full text
    Article
  20. 14580

    Pricing Strategies in the Remanufacturing Market for the Uncertain Market Size in the Second Period by Liurui Deng, Shenggang Yang

    Published 2016-01-01
    “…Moreover, we delicately and subtly incorporate the game theory, stochastic analysis, adversarial risk analysis (ARA), and optimization methods into the pricing strategies in the remanufacturing market. …”
    Get full text
    Article