Suggested Topics within your search.
Suggested Topics within your search.
- Philosophy 11
- History 9
- Moral and ethical aspects 8
- Economic development 7
- Social aspects 6
- Economic policy 5
- History and criticism 5
- Mass media 5
- Social service 5
- Economic conditions 4
- Management 4
- Marketing 4
- Quantum theory 4
- Research 4
- Advertising 3
- Business communication 3
- Communication 3
- Criticism 3
- Culture 3
- Economics 3
- Education 3
- Hospitality industry 3
- Information technology 3
- Information theory 3
- Jurisprudence 3
- Law 3
- Literature 3
- MATHEMATICS / Mathematical Analysis 3
- Number theory 3
- Problems, exercises, etc 3
-
16741
Piper-PCA-Fisher Recognition Model of Water Inrush Source: A Case Study of the Jiaozuo Mining Area
Published 2018-01-01“…The Piper-PCA-Fisher water inrush source recognition model was established by combining the Piper trilinear diagram and Fisher discrimination theory. Screened typical samples were used to conduct back-discriminate verification of the model. …”
Get full text
Article -
16742
Aesthetic Function of the Attributes "Aḥad" and "Ṣamad" in the Quran: A Structuralist and Statistical Stylistic Analysis
Published 2024-12-01“…This study employs a descriptive-analytical methodology, incorporating structuralism and statistical stylistics, with a focus on Saussurean theory, to explore the aesthetic implications of the attributes "Aḥad" and "Ṣamad" in the Quran. …”
Get full text
Article -
16743
A privacy budget adaptive optimization scheme for federated computing power Internet of things
Published 2024-12-01“…In specific, to adaptively adjust privacy budgets, the privacy budget estimates for edge computing power nodes based on the Cramér-Rao lower bound theory were analyzed. Furthermore, by assessing the similarity between the local model and the aggregated model, as well as their respective privacy budget proportions, the global contribution of each node was determined, which was used to fairly, also in real time, optimize and adjust the privacy budget settings in conjunction with the estimated privacy budget. …”
Get full text
Article -
16744
Text-Driven Jurisdiction in Cyberspace
Published 2021-06-01“…In the second section, I explore the scope of written legal speech acts, integrating speech act theory and philosophy of technology, explaining how the substantive and procedural principles of criminal law legality depend on the performative effect of written legal speech acts, highlighting their connection with the rise of territorial jurisdiction and the creation of an artifi cial, modern demos. …”
Get full text
Article -
16745
Las identidades políticas en la Argentina de los años noventa: continuidades y rupturas entre peronismo y menemismo.
Published 2005-09-01“…Elle utilise les catégories définies par la Théorie du Discours, afin de mettre en relief les éléments de continuité et de rupture par rapport au péronisme traditionnel. …”
Get full text
Article -
16746
Zoo U: A Stealth Approach to Social Skills Assessment in Schools
Published 2012-01-01“…Zoo U is an innovative product that combines theory-driven content and customized game mechanics. …”
Get full text
Article -
16747
Patient satisfaction with Indonesian sharia hospital services: Halal healthcare tool and implications for loyalty-WoM
Published 2023-06-01“…Originality − This study develops new knowledge on indicators of special services for sharia hospitals according to halal standards by integrating the outputs of satisfaction, loyalty and Word of Mouth (WoM) outputs which have been separated so far but have a chronological sequence in line with existing marketing theory. …”
Get full text
Article -
16748
Neuronal Plasticity Associated with Burn Injury and Its Relevance for Perception and Management of Pain in Burn Patients
Published 2000-01-01“…Through the introduction of the gate control theory and various subsequent works, Ronald Melzack has inspired many investigators worldwide to realize two important facts about pain. …”
Get full text
Article -
16749
Exploration of Erdaohe Silver Polymetallic Deposit in Inner Mongolia based on Induced Polarization Method
Published 2022-01-01“…Whether the problem is solved or not has a strong practical significance for the current and future prospecting work in this area. According to the theory of induced polarization sounding in time domain, it is considered in this paper that when the parameters such as high power, suitable device, and time delay are well coupled with the deep blind ore, it is possible to find anomalies caused by deep lead-zinc ore larger than 300 m. …”
Get full text
Article -
16750
RESEARCH ON FAILURE MECHANISM OF FRICTION-WEAR OF TUBING STRING IN 3 H CURVED WELL (MT)
Published 2023-01-01“…Based on the White-Fleisher wear theory, a calculation method for the wear amount and depth of tubing string in 3H gas wells is proposed. …”
Get full text
Article -
16751
Ancaman Perdamaian di Venezuela Akibat Kemerosotan Demokrasi Pada Masa Pemerintahan Nicolas Maduro
Published 2025-01-01“…Kantian Triangle yang merupakan bagian dari democratic peace theory milik Immanuel Kant, akan menjadi alat analisis dalam penelitian ini. …”
Get full text
Article -
16752
Designing supply chain of blood under uncertainty: A case study
Published 2025-03-01“…This research aims to present a Mixed-Integer Linear Programming (MIP) model under uncertainty for strategic and tactical decision-making in the blood supply chain over a determined planning horizon. The fuzzy theory approach has been used to incorporate uncertainty into the model's parameters. …”
Get full text
Article -
16753
Noncontact Knee Ligament Injury Prevention Screening in Netball: A Clinical Commentary with Clinical Practice Suggestions for Community-Level Players
Published 2021-06-01“…The theoretical principles that are discussed in this commentary include injury control, the sequence of prevention, principles of screening in injury prevention, the multifactorial model of injury etiology, complex systems theory, and systems science. The different types of research that are reviewed include descriptive and analytic-observational studies. …”
Get full text
Article -
16754
Mongolian Education and Science Vocabulary
Published 2024-05-01“…Indigenous Mongolic lexemes are derivatives from sur- ‘to study’, and the terms зүй ‘theory’ and судлал ‘study’ that are used as parts of science names. …”
Get full text
Article -
16755
DN Testing as a Branch of Forensic Technology: Problems of Formation and Directions of Development
Published 2020-06-01“…It is confirmed by the following main arguments: the methodology of this field of research is based on the theory of forensic identification; its objects are traces of human and other living organisms; DNA analysis technologies are developed using the achievements of different sciences and adapted to solve problems of crime detection and investigation; they are aimed to ensuring the activities of law enforcement agencies in counteracting crime; the scope of DNA analysis application in crime combating should not be limited to forensic activities; legislative regulation of collecting and using personal genetic data is essential; DNA analysis technologies in terms of practical significance and fundamental scientific basis exceed all other branches of forensic technology. …”
Get full text
Article -
16756
Digital Teaching and Learning Media for Nursing and Health Care Courses in Germany: Protocol for a Scoping Review
Published 2025-01-01“…ObjectiveThis study aims to map evidence and identify the main concepts, theories, sources, and knowledge gaps in the use of digital teaching and learning formats in nursing and health care education in Germany. …”
Get full text
Article -
16757
Empowering digital competence through peer-assisted learning and virtual reality in health professions education
Published 2025-02-01“…Following a rigorous recruitment and training process, a “train-the-trainer” model fosters autonomy, leadership, and collaboration, guided by sociocultural learning theory. Three focus groups with 10 peer assistants revealed evolving teacher identities, technological mindsets, and professional growth. …”
Get full text
Article -
16758
Social cognition in bipolar I and II disorders: an updated systematic review and meta-analysis
Published 2025-01-01“…Results A total of 20 studies were included, covering three core domains of social cognition (theory of mind (ToM), emotion processing and attributions). …”
Get full text
Article -
16759
Organizational structure of a state agency: concept, typology and directions of application to the system of the National Police of Ukraine
Published 2018-11-01“…Based on the research of scientific works on the theory of public administration, administrative law, management, public management, the author has formulated own definition of the concept of “organizational structure of the National Police of Ukraine”. …”
Get full text
Article -
16760
Internalization of Religious Character Values Through Himpunan Putusan Tarjih Muhammadiyah Learning in College Student Boarding School
Published 2025-01-01“…The data is summarized and then juxtaposed with supporting theories, discourses, and research. The research results show that five religious character values are internalized through Himpunan Putusan Tarjih learning to mahasantri: collaboration, independence, hard work, honesty, and brotherhood. …”
Get full text
Article