Suggested Topics within your search.
Suggested Topics within your search.
- Philosophy 11
- History 9
- Moral and ethical aspects 8
- Economic development 7
- Social aspects 6
- Economic policy 5
- History and criticism 5
- Mass media 5
- Social service 5
- Economic conditions 4
- Management 4
- Marketing 4
- Quantum theory 4
- Research 4
- Advertising 3
- Business communication 3
- Communication 3
- Criticism 3
- Culture 3
- Economics 3
- Education 3
- Hospitality industry 3
- Information technology 3
- Information theory 3
- Jurisprudence 3
- Law 3
- Literature 3
- MATHEMATICS / Mathematical Analysis 3
- Number theory 3
- Problems, exercises, etc 3
-
16561
Nonthermal heavy dark matter from a first-order phase transition
Published 2024-12-01Get full text
Article -
16562
Covid-19 and the South African Pentecostal Landscape: Historic Shift from Offline Liturgical Practice to Online Platforms
Published 2021-12-01“…The article uses the Giddens theory of structuration to understand the social structural challenges emanating from an online liturgical practice. …”
Get full text
Article -
16563
Significance of the modular approach for independent work of students when studying grammar of a foreign language at non-language university
Published 2018-09-01“…Educating process of students was conducted with the help of manuals of English grammar, published at the Department of Linguistics, Intercultural Communication and Russian as a Foreign Language of SamSTU and the Department of Theory and Practice of Translation of OSU. The experiment showed that the use of the modular approach applied to the study of English grammar in the framework of independent work of students was more effective than traditional methods. …”
Get full text
Article -
16564
The limits of criminalization and the principle of legality in blanket economic criminal offenses: Whoever does not deal in good faith shall be punished!
Published 2024-01-01“…By comparing the positions taken by the Supreme Court in its decisions with the positions of legal theory regarding the significance, nature, and content of guarantees arising from the principle of legality, and further comparing them with the positions taken on this issue by the European Court of Human Rights, this paper concludes that the principle of legality in blanket economic criminal offenses has been completely undermined. …”
Get full text
Article -
16565
A Scoping Review of Empirical Research Relating to Quality and Effectiveness of Research Ethics Review.
Published 2015-01-01“…No study reported using an underlying theory or framework of quality/effectiveness to guide study design or analyses. …”
Get full text
Article -
16566
Teachers’ Perception Towards Integration of Artificial Intelligence Tutoring-Based System in the School Curriculum: A Survey
Published 2024-10-01“…Artificial Intelligence (AI) is the theory and development of computer systems capable of performing tasks normally requiring human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages. …”
Get full text
Article -
16567
The relationship between Islamic theology and poetry
Published 2023-01-01“…The beginning of the 21st century was marked by several literary-critical works that point to the problem of naming and classifying Islamic religious poetry in our speaking area, which indicates the necessity of forming the principles of Islamic theological aesthetics and literary theory.…”
Get full text
Article -
16568
Applying System Dynamics of Discrete Supported Track to Analyze the Rail Corrugation Causation on Curved Urban Railway Tracks
Published 2021-01-01“…Finally, case studies validate the proposed theory model and method. The results show that the practical prediction model for the rail corrugation growth proposed in this paper is able to estimate the occurrence possibility of rail corrugation on a specific track, and the superharmonic resonance of the track directly excited by passing vehicles eventually leads to rail corrugation. …”
Get full text
Article -
16569
Five Poems
Published 2022-12-01“…I would add, after Louise Glück who states in her introduction to Proofs & Theories: Essays on Poetry (1994) that her poetry and her scholarship spring from the same impulse that, to me, both teaching and research, as I try to practise them, are in themselves deeply creative acts.Finally, a song lyric (for the source cf below). …”
Get full text
Article -
16570
Rebate Strategy Selection and Channel Coordination of Competing Two-Echelon Supply Chains
Published 2021-01-01“…And we aim at full coordination with rebate. Game theory is exploited to identify the equilibrium rebate decisions, which are fully characterized with two rebate strategies considering rebate sensitivity. …”
Get full text
Article -
16571
Orden dentro del desorden: circulación de libros de derecho en Nueva España, 1585–1640
Published 2021-11-01Get full text
Article -
16572
Gender similarities in high school mathematics: affective and cognitive aspects
Published 2023-06-01“…Theoretically, the study confirmed Hyde’s (2005) gender similarity hypothesis and this investigation in the Ethiopian high school mathematics context contributes to the contested research in gender and mathematics which could contribute to the theories in educational psychology. Further implications and directions for future study are forwarded. …”
Get full text
Article -
16573
Evaluation of Different Variables of Agression Levels of Physical Education and Sports School and Educational Faculty Students
Published 2018-12-01“…As a result; the fact that aggression behaviors differ according to various variables, but the fact that there is not a statistically significant difference between participants who do sports and those who do not, is quite striking in contradiction with various theories in the field.…”
Get full text
Article -
16574
Multi-level governance of low-carbon tourism in rural China: policy evolution, implementation pathways, and socio-ecological impacts
Published 2025-01-01“…This study contributes to policy diffusion and multi-level governance theories by demonstrating the intricate interplay between top-down directives and bottom-up innovations in shaping sustainable tourism outcomes. …”
Get full text
Article -
16575
Pakistan-Russia Relations within the Framework of the SCO: A Regional Analysis
Published 2025-01-01“…An analysis of Pakistan-Russia relations from 2015 to 2024, grounded in the theory of complex interdependence, indicates progress in cooperation and potential for enhanced collaboration in areas such as security, energy, and cultural exchange. …”
Get full text
Article -
16576
‘This settlement is just a launch pad to move to better city spaces’: radical sense of place and migration aspirations among youth migrants in the diaspora
Published 2025-01-01“…This perspective challenges existing migration theories by highlighting the temporary and strategic relationships with place among diaspora youths. …”
Get full text
Article -
16577
A place holder: the social sciences of monkeys and apes
Published 2014-02-01“…This would, in turn, make it possible to better identify the innate elements of the social skills of primates and to limit the importation of adaptationist theories into social sciences. In other words, the issue here is to replace an ideological debate with empirical questions. …”
Get full text
Article -
16578
Project portfolio management in an educational organization
Published 2021-07-01“…The methodological justification for the development of a project portfolio management structure is the theory of project management, the project management methodology Scrum. …”
Get full text
Article -
16579
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
Get full text
Article -
16580
Path Optimization of Enterprise Network Innovation Performance Management Based on Deep Learning and Internet of Things
Published 2022-01-01“…The main contents of this study include the following. (1) Through the collation and review of the related theories of network relationship strength, technological learning cost and technological innovation performance, and the existing research results, the theoretical model of this study is established, and the theoretical assumptions of this study are put forward. (2) A presurvey is carried out first, and the data collected from the presurvey are used to test the reliability and validity of the scale of this study, and the appropriate measurement scales for the strength of network relationship, technology learning cost, and technology innovation performance are determined. (3) Adopt the method of regression analysis combined with the SME method, to verify this paper builds the theoretical model, and further clarify the network relation intensity, technology acquisition cost, and cost of technological learning all dimensions and performance of technological innovation and network strength, technological learning mechanism between cost, and performance of technological innovation.…”
Get full text
Article