Suggested Topics within your search.
Suggested Topics within your search.
- Law 9
- Methodology 7
- Reasoning 5
- English language 3
- Interpretation and construction 3
- Mass media 3
- Moral and ethical aspects 3
- Rhetoric 3
- College readers 2
- Common law 2
- Grammar 2
- History 2
- History and criticism 2
- Objectivity 2
- Philosophy 2
- Psychological aspects 2
- Psychology 2
- Report writing 2
- Research 2
- Academic writing 1
- Administrative law 1
- Agroforestry 1
- Buildings 1
- Criticism 1
- Decolonization 1
- Electric equipment 1
- Electric wiring 1
- Electric wiring, Interior 1
- Emotions 1
- Emotions (Philosophy) 1
-
8861
What AI “art” can teach us about art
Published 2024-12-01“…In the third section, I shall analyse the most important reason why AI artefacts are defined as art. In the fourth and fifth sections, I shall use thought experiments to argue that AI artefacts cannot be defined as art. …”
Get full text
Article -
8862
Prediction of Basic Commodity Prices at the Cooperative, SME, and Trade Office Using the Least Squares Method
Published 2024-08-01“…The Least Squares method was employed to calculate the estimated prices, with the system achieving a Mean Absolute Percentage Error (MAPE) of 14.20%, indicating that the system can predict market prices with a reasonable degree of accuracy.…”
Get full text
Article -
8863
EFFECTS OF VEGETATION AND PCM IN REDUCING URBAN HEAT ISLAND
Published 2023-09-01“…This study is on understanding the reasons behind UHI, its effects, and finding out proper strategies for mitigation in the context of Bangladesh. …”
Get full text
Article -
8864
Selection of key urban defense areas based on regional comprehensive risk assessment
Published 2025-02-01“…Aiming at the problem of how to select high risk key defense area under the condition of limited urban defense force, to maximize the utility of limited force and minimize the urban risk, this paper proposes a method of selecting key defense area based on regional comprehensive risk assessment. Firstly, a reasonable risk assessment index system is constructed from the perspective of the intruder and the defender. …”
Get full text
Article -
8865
PERSISTENT EVASION FROM PAYING CHILDREN’S ALLOWANCE IN THE RUSSIAN CRIMINAL LAW
Published 2014-03-01“…Results: The specific scientific reasoned recommendations are proposed which would further improve the criminal law on the responsibility for the crime of persistent evasion from paying the children’s allowance. …”
Get full text
Article -
8866
The Quality of Inpatient Health Services at Mamajang Health Center, Makassar City
Published 2021-07-01“…The quality of health services in the public or individual's need for health by standards with reasonable, efficient, effective use of resources within the limited capacity of the government and the community, and is carried out safely and satisfactorily by good norms and ethics. …”
Get full text
Article -
8867
Content of consent to transaction
Published 2018-04-01“…Particular attention has been paid to the problems associated with the interpretation of the term “subject of the transaction”; two main interpretational approaches (broad and narrow) have been singled out and studied, and the logic of the narrow vision based on the consideration of the subject of the transaction as the most important but not the only essential condition has been argued for reasons of formal legal and substantive order. The classification of the conditions of consent turns out to be as follows: a) based on their substantive focus – main and additional (or accidental) conditions associated with the “organizational” moments of the transaction; b) by the criterion of the need for indication – mandatory (or objectively significant) and optional (or subjectively significant). …”
Get full text
Article -
8868
Analysis of Deep Foundation Pit Pile-Anchor Supporting System Based on FLAC3D
Published 2022-01-01“…By analyzing the variation law of stress and deformation, the timeliness of the data in the construction process is improved, and an effective and reasonable case reference is provided for the informatization construction of simulated relevant working conditions.…”
Get full text
Article -
8869
OVERCROWDING – CURRENT ISSUES IN ROMANIAN DETENTION CENTERS. CAUSES, EFFECTS AND REMEDIES
Published 2019-05-01“…If this issue wasn’t given much attention in the past, being considered an inevitable mental sufferance of the execution of punishment, respectively a reasonable constraint determined by the conviction, lately it has been approached more seriously, at both national and international level and, as a result, new standards are set for ensuring the protection of the fundamental human rights. …”
Get full text
Article -
8870
Study on Flood Control Dispatching Rehearsal in Shenzhen River Basin
Published 2022-01-01“…At present,it is difficult to carry out large-scale flood control project construction in Shenzhen River Basin.Therefore,to ensure the flood control safety of Shenzhen Reservoir and downstream Shenzhen River,this paper follows the requirements of the forecast,early warning,rehearsal,and preplan proposed by the Ministry of Water Resources for flood and drought disaster prevention and analyzes constraints to be considered when constructing the rehearsal scene.In addition,the joint flood control dispatching rehearsal is carried out in Shenzhen Reservoir and Shenzhen River.By simulating the influence of reservoir flood discharge on river channel level under typical conditions,the paper explores the potential of the reservoir in flood regulation and detention and discusses the feasibility of flood discharge by staggering the tide.The results show that Shenzhen River Basin faces the heaviest rainfall in a decade,and the local heaviest rainfall in Shenzhen Reservoir is no more than once in 100 years.At the same time,under the unfavorable conditions of astronomical tides,Shenzhen Reservoir can effectively regulate flood peaks and ensure the safety of flood control.The results reveal the optimal effect of reservoir dispatching on flood control safety of Shenzhen Reservoir and Shenzhen River,and the joint dispatching rehearsal of Shenzhen River and Shenzhen Reservoir can be realized scientifically and reasonably through the flood model.…”
Get full text
Article -
8871
Spectrum demand prediction ofLTE-Rsystem based on delay difference constraint
Published 2017-12-01“…In order to plan and allocate the spectrum resources ofLTE-Rscientifically,it is necessary to make reasonable forecast of total spectrum demand for LTE-R.After deep analysis of ITU-R M.1768 method,a spectrum demand forecasting method based on different delay constraints forLTE-Rsystem was provided.This method defined nine kinds of service categories,nine kinds of service environments,and derived the expression ofLTE-Rsystem traffic.Under different delay constraints condition of different services,the M/G/1 queuing model was used to analyze the spectrum requirements ofLTE-Rsystem preliminarily.The results show that the uplink and downlink spectrum demand of China’sLTE-Rsystem is asymmetric and the possible range is 14~15MHz uplink and 5~6MHz downlink,respectively.If new video traffic in the future is not considered,the current spectrum resources distributed to GSM-R system spectrum can meet the bandwidth requirements ofLTE-Rsystem.In addition,the influence of engineering frequency efficiency ofLTE-Rnetwork and high-bandwidth video traffic onLTE-Rspectrum total bandwidth demand was analyzed.This study provides technical support for the frequency planning of China’s next generation railway mobile communication system.…”
Get full text
Article -
8872
Fog-aided identity privacy protection scheme for sensing users in mobile crowd sensing
Published 2019-12-01“…In mobile crowd sensing(MCS),attackers can reconstruct the social circle among sensing users,who use the social association information among sensing users and the correlation between the sensing user’s identity and sensing data to further attack a social alliance.In order to tackle this issue,a fog-aided identity privacy protection scheme is proposed.Firstly,two fog nodes are introduced which located at the edge of the sensing terminal.The one is task allocation center (TC) for handling the reasonable allocation of sensing tasks,and the other is data center (DC) for calculating sensing data.Furthermore,differential privacy is employed for preventing attackers from acquiring the specific social association weight of sensing users.Finally,in order to prevent attackers from obtaining the sensing users' identity information and sensing data at the same time,sensing users use different blind identities to communicate with TC and DC.Security analysis indicates that the proposed scheme can ensure the security of identity privacy information of sensing users in the process of completing sensing tasks.Experimental results show that the proposed scheme can protect the social association information between sensing users,and has a low delay.…”
Get full text
Article -
8873
Effect of Surfactants on Gas Holdup in Shear-Thinning Fluids
Published 2017-01-01“…These proposed correlations reasonably fitted the experimental data obtained for gas holdup in this system.…”
Get full text
Article -
8874
Un avenir post-nucléaire ? Les atermoiements des acteurs du territoire de Trino (Italie) en contexte de démantèlement
Published 2021-10-01“…This contribution tries to explain why the post-nuclear phase is not so obvious and the reasons that are largely holding it back. From a diachronic perspective, this article shows how the various actors and social groups of this territory went through the phase of decline in nuclear production (referendum of 1987 decreeing a moratorium on the construction of new plants), the uncertain phase of the shutdown of nuclear power plants production (1990), and then passive safety (1990-2003) and dismantling (since 2003) to settle in the lasting uncertainty of dismantling and waste management, waiting for a national repository that, in Italy, has still not been realized. …”
Get full text
Article -
8875
Empiricism and Theorizing in Epidemiology and Social Network Analysis
Published 2011-01-01“…This circumstance may arise both from data deficiencies and from the ease with which data can be created by simulation. But for whatever reason, theory and empirical data often occupy different orbits. …”
Get full text
Article -
8876
Tant qu’il y aura des « profanes »… dans la gestion des risques littoraux
Published 2016-09-01“…Indeed, this policy domain persistently depends upon settled assumptions that local citizens either lack knowledge about risk or are likely to reason on the basis of their emotions and in the short-term. …”
Get full text
Article -
8877
Using PSO and Genetic Algorithms to Optimize ANFIS Model for Forecasting Uganda’s Net Electricity Consumption
Published 2020-04-01“…To achieve this, electricity as a form of modern and clean energy has been identified as a driving force for all the sectors of the economy. For this reason, electricity consumption forecasts that are realistic and accurate are key inputs to policy making and investment decisions for developing Uganda’s electricity sector. …”
Get full text
Article -
8878
Call Duration Characteristics based on Customers Location
Published 2014-05-01“…The goal of this paper is to reveal the ties between user's voice call duration and the location of call. For this reason we analyzed more than 5 million calls from real mobile network, which were made over the base stations located in rural areas, roads, small towns, business and entertainment centers, residential districts. …”
Get full text
Article -
8879
Steroidogenic pathway in girls diagnosed with autism spectrum disorders.
Published 2024-01-01“…The diagnostic prevalence of autism spectrum disorders (ASD) shows boys to be more affected than girls. Due to this reason, there is a lack of research including and observing ASD girls. …”
Get full text
Article -
8880
The legal status of the Tatar Republic in its early development (historical and legal aspect)
Published 2020-08-01“…The influence of the creation of the USSR on the possibilities of improving the national statehood was assessed. The reasons that slowed down the constitutional development of the region were revealed. …”
Get full text
Article