Suggested Topics within your search.
Suggested Topics within your search.
- Philosophy 11
- History 9
- Moral and ethical aspects 8
- Economic development 7
- Social aspects 6
- Economic policy 5
- History and criticism 5
- Mass media 5
- Social service 5
- Economic conditions 4
- Management 4
- Marketing 4
- Quantum theory 4
- Research 4
- Advertising 3
- Business communication 3
- Communication 3
- Criticism 3
- Culture 3
- Economics 3
- Education 3
- Hospitality industry 3
- Information technology 3
- Information theory 3
- Jurisprudence 3
- Law 3
- Literature 3
- MATHEMATICS / Mathematical Analysis 3
- Number theory 3
- Problems, exercises, etc 3
-
16521
Improvement of emulsification of egg yolk powder: protein modification techniques
Published 2024-12-01Get full text
Article -
16522
Wikipedia and indigenous language preservation: analysis of Setswana and Punjabi languages
Published 2025-01-01“…The research is framed by the Ethnolinguistic Vitality Theory (EVT), which suggests that language survival lies in reclamation, revitalization, and reinvigoration. …”
Get full text
Article -
16523
Sparse View CT Reconstruction Algorithm Based on Non-Local Generalized Total Variation Regularization
Published 2025-01-01Get full text
Article -
16524
Micro-Engagements through AI-Smartwatch Wearables for eHealth: User Experiential Discourses on Social Media
Published 2025-01-01“…Theoretically, the study was underpinned by The Unified Theory of Acceptance and Use of Technology. A qualitative approach, using a netnography design provided results from online discourses expressed on X (formerly known as Twitter), in response to a question tweeted about the effectiveness of smartwatches. …”
Get full text
Article -
16525
GEOPOLITICAL VARIATION IN THE REPORTAGE OF SECURITY BY THE NATION AND DAILY TRUST NEWSPAPERS (2010-2020): A PROGNOSIS
Published 2024-07-01“…The study hinged on Framing Theory as the theoretical framework. The study depicts that the ownership control has made The Nation and Daily Trust newspapers to report security challenges in a subjective manner, thus, promoting the existing Northern and Southern dichotomy in their reportage of security situation. …”
Get full text
Article -
16526
The influence of instagram on korean-style fashion trends among college students
Published 2024-12-01“…In sociological analysis, rational choice theory is used to understand how students adapt fashion trends on Instagram by considering various factors such as suitability, financial ability, and social acceptance. …”
Get full text
Article -
16527
Security Challenges: Appraisal of Threats to Nigeria’s Sovereignty in the Fourth Republic (1999-2019)
Published 2023-07-01“…Theoretical framework adopted for the analysis is State Fragility-cum-Elite Theory. The study adopted qualitative research methods in which secondary data are employed for analysis. …”
Get full text
Article -
16528
Female Offenders at the Confluence of Medical and Penal Discourses: Towards a Gender-Specific Criminology (1860s-1920s)
Published 2018-06-01“…Rather than annihilate traditional moral explanations of crime promoted by some reformers and civil servants, scientific theories merged with them and gave birth to institutional projects such as inebriate reformatories and asylums for the mentally deficient. …”
Get full text
Article -
16529
20 Years of Scientific Study on Business Intelligence and Decision-Making Performance: A Bibliometric Analysis
Published 2024-10-01“…However, only a few studies use decision theory and further investigations are required to fully understand how BI impacts DMP both inside and outside organizational boundaries. …”
Get full text
Article -
16530
CONSUMER ATTITUDES ABOUT USING FAR-UVC DEVICES IN RETAIL STORES TO MITIGATE COVID-19 TRANSMISSION
Published 2023-03-01“…Predictor variables were demographics, COVID-19, diffusion of innovation theory, risk taking, and consideration of immediate and future consequences. …”
Get full text
Article -
16531
Multi-mode Motion Opening Mechanism Design for Aircraft Door Based on the Bricard Mechanism
Published 2023-04-01“…Based on the orientation feature set theory of parallel mechanism, the azimuth feature set analysis of door opening mechanism under different modes is carried out. …”
Get full text
Article -
16532
A sector fast encryption algorithm for color images based on one-dimensional composite sinusoidal chaos map.
Published 2025-01-01“…Image encryption algorithms based on chaos theory emerge in endlessly. Based on previous various chaotic image fast encryption algorithms, this paper proposes a color image sector fast encryption algorithm based on one-dimensional composite sinusoidal chaotic mapping. …”
Get full text
Article -
16533
Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range
Published 2023-02-01“…Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the cyberspace security majors of various universities.Building on longstanding practices in data security research and teaching, the teaching team of “Academician Fang Binxing’s Experimental Class” (referred to as “Fang Class”) at Guangzhou University has proposed a teaching method for data privacy protection based on a teaching-in-practice range.In the selection of teaching course content, the teaching team selected eight typical key privacy protection techniques including anonymity model, differential privacy, searchable encryption, ciphertext computation, adversarial training, multimedia privacy protection, privacy policy conflict resolution, and privacy violation traceability.Besides, the corresponding teaching modules were designed, which were deployed in the teaching practice range for students to learn and train.Three teaching methods were designed, including the knowledge and application oriented teaching method which integrates theory and programming, the engineering practice oriented teaching method based on algorithm extension and adaptation, and the comprehensive practice oriented teaching method for practical application scenarios.Then the closed loop of “learning-doing-using” knowledge learning and application was realized.Through three years of privacy protection teaching practice, the “Fang class” has achieved remarkable results in cultivating students’ knowledge application ability, engineering practice ability and comprehensive innovation ability, which provided useful discussion for the construction of the initial course of data privacy protection.…”
Get full text
Article -
16534
Effect of adding small applications after verification experiment in a power electronics course
Published 2022-05-01“…By comparing the experimental realisation rate, the correct rate of thinking questions and the in‐depth understanding of the application theory of two experimental classes, namely the class with simple applications and the class without simple applications, it is shown that the students with simple application experiments improved the correct rate of thinking questions and deepened their understanding of the applications. …”
Get full text
Article -
16535
In-Depth Learning Layout and Path Optimization of Energy Service Urban Distribution Sites under e-Commerce Environment
Published 2021-01-01“…It first introduces the relevant theories of energy service city distribution sites in the context of e-commerce and then the types of energy service city distribution sites and the composition of energy service city distribution systems. …”
Get full text
Article -
16536
Experimental Studies of Thermal Hydraulics of Deep Eutectic Solvent Based on Choline Chloride
Published 2022-01-01“…To summarize, glyceline’s friction factor and heat transfer coefficient are predictable in existing theories, but the transition regions for those are different because flow development behavior between hydraulic and thermal boundary layers is different. …”
Get full text
Article -
16537
Research on the Contact and Temperature Field Distribution Characteristic of the Saddle-shaped Buckling Deformation in Hydro-viscous Friction Pair
Published 2022-05-01“…The equivalent model of contact deformation is established to obtain the contact and temperature field distribution characteristics of the deformed friction pairs, which are based on the hertz point contact theory of the ellipsoid and buckling deformation law. …”
Get full text
Article -
16538
FORMATION AND EVOLUTION OF POLITICAL ELITES: A COMPARATIVE ANALYSIS OF HISTORICAL AND CONTEMPORARY APPROACHES
Published 2024-12-01“…It also opens new perspectives for research in political theory, particularly in the context of globalization, the influence of international institutions, and the impact of new technologies on political structures. …”
Get full text
Article -
16539
Multidimensional Scientometric Analysis for the Gig Economy
Published 2023-04-01“…Trends in the Gig economy within the framework of social network theory, analysis in the context of the country, author analysis, cluster analysis and representative document analysis are presented. …”
Get full text
Article -
16540
A Diversified Spectrometric and Molecular Docking Technique to Biophysical Study of Interaction between Bovine Serum Albumin and Sodium Salt of Risedronic Acid, a Bisphosphonate fo...
Published 2018-01-01“…Synchronous fluorescence shows that the microenvironment of tryptophan was altered, not tyrosine of BSA; in addition to this, the distance between tryptophan of BSA and RSN was found out from Forster’s theory of nonradiation energy transfer. The interaction between BSA and RSN mainly occurred as a result of hydrogen bonds and van der Waals forces, the process is exothermic and spontaneous, and it was achieved through van ’t Hoff equation. …”
Get full text
Article