Showing 16,561 - 16,580 results of 18,544 for search 'thumri~', query time: 2.12s Refine Results
  1. 16561
  2. 16562

    Covid-19 and the South African Pentecostal Landscape: Historic Shift from Offline Liturgical Practice to Online Platforms by John Mhandu and Vivian Ojong

    Published 2021-12-01
    “…The article uses the Giddens theory of structuration to understand the social structural challenges emanating from an online liturgical practice. …”
    Get full text
    Article
  3. 16563

    Significance of the modular approach for independent work of students when studying grammar of a foreign language at non-language university by Yuliya S. Elagina, Kseniya S. Oparina

    Published 2018-09-01
    “…Educating process of students was conducted with the help of manuals of English grammar, published at the Department of Linguistics, Intercultural Communication and Russian as a Foreign Language of SamSTU and the Department of Theory and Practice of Translation of OSU. The experiment showed that the use of the modular approach applied to the study of English grammar in the framework of independent work of students was more effective than traditional methods. …”
    Get full text
    Article
  4. 16564

    The limits of criminalization and the principle of legality in blanket economic criminal offenses: Whoever does not deal in good faith shall be punished! by Todorović Aleksandar D.

    Published 2024-01-01
    “…By comparing the positions taken by the Supreme Court in its decisions with the positions of legal theory regarding the significance, nature, and content of guarantees arising from the principle of legality, and further comparing them with the positions taken on this issue by the European Court of Human Rights, this paper concludes that the principle of legality in blanket economic criminal offenses has been completely undermined. …”
    Get full text
    Article
  5. 16565

    A Scoping Review of Empirical Research Relating to Quality and Effectiveness of Research Ethics Review. by Stuart G Nicholls, Tavis P Hayes, Jamie C Brehaut, Michael McDonald, Charles Weijer, Raphael Saginur, Dean Fergusson

    Published 2015-01-01
    “…No study reported using an underlying theory or framework of quality/effectiveness to guide study design or analyses. …”
    Get full text
    Article
  6. 16566

    Teachers’ Perception Towards Integration of Artificial Intelligence Tutoring-Based System in the School Curriculum: A Survey by Vivian M. Olaseni

    Published 2024-10-01
    “…Artificial Intelligence (AI) is the theory and development of computer systems capable of performing tasks normally requiring human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages. …”
    Get full text
    Article
  7. 16567

    The relationship between Islamic theology and poetry by Nasufović Sead

    Published 2023-01-01
    “…The beginning of the 21st century was marked by several literary-critical works that point to the problem of naming and classifying Islamic religious poetry in our speaking area, which indicates the necessity of forming the principles of Islamic theological aesthetics and literary theory.…”
    Get full text
    Article
  8. 16568

    Applying System Dynamics of Discrete Supported Track to Analyze the Rail Corrugation Causation on Curved Urban Railway Tracks by Xianxian Yin, Xiukun Wei, Haichao Zheng

    Published 2021-01-01
    “…Finally, case studies validate the proposed theory model and method. The results show that the practical prediction model for the rail corrugation growth proposed in this paper is able to estimate the occurrence possibility of rail corrugation on a specific track, and the superharmonic resonance of the track directly excited by passing vehicles eventually leads to rail corrugation. …”
    Get full text
    Article
  9. 16569

    Five Poems by Adrian GRAFE

    Published 2022-12-01
    “…I would add, after Louise Glück who states in her introduction to Proofs & Theories: Essays on Poetry (1994) that her poetry and her scholarship spring from the same impulse that, to me, both teaching and research, as I try to practise them, are in themselves deeply creative acts.Finally, a song lyric (for the source cf below). …”
    Get full text
    Article
  10. 16570

    Rebate Strategy Selection and Channel Coordination of Competing Two-Echelon Supply Chains by Ziling Wang, Rong Zhang, Bin Liu

    Published 2021-01-01
    “…And we aim at full coordination with rebate. Game theory is exploited to identify the equilibrium rebate decisions, which are fully characterized with two rebate strategies considering rebate sensitivity. …”
    Get full text
    Article
  11. 16571
  12. 16572

    Gender similarities in high school mathematics: affective and cognitive aspects by Negasi Hagos Tekola, Dawit Asrat Getahun, Hailu Hagos

    Published 2023-06-01
    “…Theoretically, the study confirmed Hyde’s (2005) gender similarity hypothesis and this investigation in the Ethiopian high school mathematics context contributes to the contested research in gender and mathematics which could contribute to the theories in educational psychology. Further implications and directions for future study are forwarded. …”
    Get full text
    Article
  13. 16573

    Evaluation of Different Variables of Agression Levels of Physical Education and Sports School and Educational Faculty Students by Serkan Hazar, Ercan Polat, Zekihan Hazar

    Published 2018-12-01
    “…As a result; the fact that aggression behaviors differ according to various variables, but the fact that there is not a statistically significant difference between participants who do sports and those who do not, is quite striking in contradiction with various theories in the field.…”
    Get full text
    Article
  14. 16574

    Multi-level governance of low-carbon tourism in rural China: policy evolution, implementation pathways, and socio-ecological impacts by Yi Guo, Shengchao Li

    Published 2025-01-01
    “…This study contributes to policy diffusion and multi-level governance theories by demonstrating the intricate interplay between top-down directives and bottom-up innovations in shaping sustainable tourism outcomes. …”
    Get full text
    Article
  15. 16575

    Pakistan-Russia Relations within the Framework of the SCO: A Regional Analysis by Hira Yaqoob, Abeeda Qureshi

    Published 2025-01-01
    “…An analysis of Pakistan-Russia relations from 2015 to 2024, grounded in the theory of complex interdependence, indicates progress in cooperation and potential for enhanced collaboration in areas such as security, energy, and cultural exchange. …”
    Get full text
    Article
  16. 16576

    ‘This settlement is just a launch pad to move to better city spaces’: radical sense of place and migration aspirations among youth migrants in the diaspora by Johannes Bhanye, Abraham Matamanda, Ruvimbo Shayamunda

    Published 2025-01-01
    “…This perspective challenges existing migration theories by highlighting the temporary and strategic relationships with place among diaspora youths. …”
    Get full text
    Article
  17. 16577

    A place holder: the social sciences of monkeys and apes by Véronique Servais

    Published 2014-02-01
    “…This would, in turn, make it possible to better identify the innate elements of the social skills of primates and to limit the importation of adaptationist theories into social sciences. In other words, the issue here is to replace an ideological debate with empirical questions. …”
    Get full text
    Article
  18. 16578

    Project portfolio management in an educational organization by Vera M. Zhurakovskaya, Olga A. Olicheva

    Published 2021-07-01
    “…The methodological justification for the development of a project portfolio management structure is the theory of project management, the project management methodology Scrum. …”
    Get full text
    Article
  19. 16579

    Computationally secure steganography based on speech synthesis by Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU

    Published 2022-06-01
    “…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
    Get full text
    Article
  20. 16580

    Path Optimization of Enterprise Network Innovation Performance Management Based on Deep Learning and Internet of Things by Peiran Xiong

    Published 2022-01-01
    “…The main contents of this study include the following. (1) Through the collation and review of the related theories of network relationship strength, technological learning cost and technological innovation performance, and the existing research results, the theoretical model of this study is established, and the theoretical assumptions of this study are put forward. (2) A presurvey is carried out first, and the data collected from the presurvey are used to test the reliability and validity of the scale of this study, and the appropriate measurement scales for the strength of network relationship, technology learning cost, and technology innovation performance are determined. (3) Adopt the method of regression analysis combined with the SME method, to verify this paper builds the theoretical model, and further clarify the network relation intensity, technology acquisition cost, and cost of technological learning all dimensions and performance of technological innovation and network strength, technological learning mechanism between cost, and performance of technological innovation.…”
    Get full text
    Article