Showing 16,521 - 16,540 results of 18,544 for search 'thumri~', query time: 2.32s Refine Results
  1. 16521
  2. 16522

    Wikipedia and indigenous language preservation: analysis of Setswana and Punjabi languages by Shahid Minhas, Abiodun Salawu

    Published 2025-01-01
    “…The research is framed by the Ethnolinguistic Vitality Theory (EVT), which suggests that language survival lies in reclamation, revitalization, and reinvigoration. …”
    Get full text
    Article
  3. 16523
  4. 16524

    Micro-Engagements through AI-Smartwatch Wearables for eHealth: User Experiential Discourses on Social Media by Ireen Mmatlou Manyuha, Elizabeth Lubinga

    Published 2025-01-01
    “…Theoretically, the study was underpinned by The Unified Theory of Acceptance and Use of Technology. A qualitative approach, using a netnography design provided results from online discourses expressed on X (formerly known as Twitter), in response to a question tweeted about the effectiveness of smartwatches. …”
    Get full text
    Article
  5. 16525

    GEOPOLITICAL VARIATION IN THE REPORTAGE OF SECURITY BY THE NATION AND DAILY TRUST NEWSPAPERS (2010-2020): A PROGNOSIS by M. M. NURUDDEN, M. M. NURUDDEN

    Published 2024-07-01
    “…The study hinged on Framing Theory as the theoretical framework. The study depicts that the ownership control has made The Nation and Daily Trust newspapers to report security challenges in a subjective manner, thus, promoting the existing Northern and Southern dichotomy in their reportage of security situation. …”
    Get full text
    Article
  6. 16526

    The influence of instagram on korean-style fashion trends among college students by Anjelir Fara Atika, Panji Suminar, Diyas Widiyarti

    Published 2024-12-01
    “…In sociological analysis, rational choice theory is used to understand how students adapt fashion trends on Instagram by considering various factors such as suitability, financial ability, and social acceptance. …”
    Get full text
    Article
  7. 16527

    Security Challenges: Appraisal of Threats to Nigeria’s Sovereignty in the Fourth Republic (1999-2019) by Olanrewaju Rafiu Memud, Solomon A. Ojo

    Published 2023-07-01
    “…Theoretical framework adopted for the analysis is State Fragility-cum-Elite Theory. The study adopted qualitative research methods in which secondary data are employed for analysis. …”
    Get full text
    Article
  8. 16528

    Female Offenders at the Confluence of Medical and Penal Discourses: Towards a Gender-Specific Criminology (1860s-1920s) by Alice Bonzom

    Published 2018-06-01
    “…Rather than annihilate traditional moral explanations of crime promoted by some reformers and civil servants, scientific theories merged with them and gave birth to institutional projects such as inebriate reformatories and asylums for the mentally deficient. …”
    Get full text
    Article
  9. 16529

    20 Years of Scientific Study on Business Intelligence and Decision-Making Performance: A Bibliometric Analysis by Abdessamad Charkaoui, Siham Jabraoui

    Published 2024-10-01
    “…However, only a few studies use decision theory and further investigations are required to fully understand how BI impacts DMP both inside and outside organizational boundaries. …”
    Get full text
    Article
  10. 16530

    CONSUMER ATTITUDES ABOUT USING FAR-UVC DEVICES IN RETAIL STORES TO MITIGATE COVID-19 TRANSMISSION by Joshua Fogel, Ethan Cai

    Published 2023-03-01
    “…Predictor variables were demographics, COVID-19, diffusion of innovation theory, risk taking, and consideration of immediate and future consequences. …”
    Get full text
    Article
  11. 16531

    Multi-mode Motion Opening Mechanism Design for Aircraft Door Based on the Bricard Mechanism by Peng Renhui, Hang Lubin, Wu Borui, Wu Yang, Qiu Xudong

    Published 2023-04-01
    “…Based on the orientation feature set theory of parallel mechanism, the azimuth feature set analysis of door opening mechanism under different modes is carried out. …”
    Get full text
    Article
  12. 16532

    A sector fast encryption algorithm for color images based on one-dimensional composite sinusoidal chaos map. by Ye Tao, Wenhua Cui, Shanshan Wang, Yayun Wang

    Published 2025-01-01
    “…Image encryption algorithms based on chaos theory emerge in endlessly. Based on previous various chaotic image fast encryption algorithms, this paper proposes a color image sector fast encryption algorithm based on one-dimensional composite sinusoidal chaotic mapping. …”
    Get full text
    Article
  13. 16533

    Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range by Zhe SUN, Hong NING, Lihua YIN, Binxing FANG

    Published 2023-02-01
    “…Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the cyberspace security majors of various universities.Building on longstanding practices in data security research and teaching, the teaching team of “Academician Fang Binxing’s Experimental Class” (referred to as “Fang Class”) at Guangzhou University has proposed a teaching method for data privacy protection based on a teaching-in-practice range.In the selection of teaching course content, the teaching team selected eight typical key privacy protection techniques including anonymity model, differential privacy, searchable encryption, ciphertext computation, adversarial training, multimedia privacy protection, privacy policy conflict resolution, and privacy violation traceability.Besides, the corresponding teaching modules were designed, which were deployed in the teaching practice range for students to learn and train.Three teaching methods were designed, including the knowledge and application oriented teaching method which integrates theory and programming, the engineering practice oriented teaching method based on algorithm extension and adaptation, and the comprehensive practice oriented teaching method for practical application scenarios.Then the closed loop of “learning-doing-using” knowledge learning and application was realized.Through three years of privacy protection teaching practice, the “Fang class” has achieved remarkable results in cultivating students’ knowledge application ability, engineering practice ability and comprehensive innovation ability, which provided useful discussion for the construction of the initial course of data privacy protection.…”
    Get full text
    Article
  14. 16534

    Effect of adding small applications after verification experiment in a power electronics course by Guopeng Zhao

    Published 2022-05-01
    “…By comparing the experimental realisation rate, the correct rate of thinking questions and the in‐depth understanding of the application theory of two experimental classes, namely the class with simple applications and the class without simple applications, it is shown that the students with simple application experiments improved the correct rate of thinking questions and deepened their understanding of the applications. …”
    Get full text
    Article
  15. 16535

    In-Depth Learning Layout and Path Optimization of Energy Service Urban Distribution Sites under e-Commerce Environment by Kun Wang, Ki-Hyung Bae

    Published 2021-01-01
    “…It first introduces the relevant theories of energy service city distribution sites in the context of e-commerce and then the types of energy service city distribution sites and the composition of energy service city distribution systems. …”
    Get full text
    Article
  16. 16536

    Experimental Studies of Thermal Hydraulics of Deep Eutectic Solvent Based on Choline Chloride by Myung Hyun Pyo, Siwon Seo, Jaeyoung Lee

    Published 2022-01-01
    “…To summarize, glyceline’s friction factor and heat transfer coefficient are predictable in existing theories, but the transition regions for those are different because flow development behavior between hydraulic and thermal boundary layers is different. …”
    Get full text
    Article
  17. 16537

    Research on the Contact and Temperature Field Distribution Characteristic of the Saddle-shaped Buckling Deformation in Hydro-viscous Friction Pair by Yuyu Jiang, Hongwei Cui, Yijun Qiao, Hao Sun, Jingwei Ning

    Published 2022-05-01
    “…The equivalent model of contact deformation is established to obtain the contact and temperature field distribution characteristics of the deformed friction pairs, which are based on the hertz point contact theory of the ellipsoid and buckling deformation law. …”
    Get full text
    Article
  18. 16538

    FORMATION AND EVOLUTION OF POLITICAL ELITES: A COMPARATIVE ANALYSIS OF HISTORICAL AND CONTEMPORARY APPROACHES by Роман КОЗАЧЕНКО

    Published 2024-12-01
    “…It also opens new perspectives for research in political theory, particularly in the context of globalization, the influence of international institutions, and the impact of new technologies on political structures. …”
    Get full text
    Article
  19. 16539

    Multidimensional Scientometric Analysis for the Gig Economy by Sergen Gürsoy

    Published 2023-04-01
    “…Trends in the Gig economy within the framework of social network theory, analysis in the context of the country, author analysis, cluster analysis and representative document analysis are presented. …”
    Get full text
    Article
  20. 16540

    A Diversified Spectrometric and Molecular Docking Technique to Biophysical Study of Interaction between Bovine Serum Albumin and Sodium Salt of Risedronic Acid, a Bisphosphonate fo... by M. Manjushree, Hosakere D. Revanasiddappa

    Published 2018-01-01
    “…Synchronous fluorescence shows that the microenvironment of tryptophan was altered, not tyrosine of BSA; in addition to this, the distance between tryptophan of BSA and RSN was found out from Forster’s theory of nonradiation energy transfer. The interaction between BSA and RSN mainly occurred as a result of hydrogen bonds and van der Waals forces, the process is exothermic and spontaneous, and it was achieved through van ’t Hoff equation. …”
    Get full text
    Article