Suggested Topics within your search.
Suggested Topics within your search.
- Visual communication 2
- ART / Digital 1
- Bildanalyse 1
- Bildwissenschaft 1
- Computer animation 1
- Criminal investigation 1
- Digital cinematography 1
- Equality -- Economic aspects -- Econometric models 1
- Fraud investigation 1
- Investigations 1
- Moral and ethical aspects 1
- Photography 1
- Poverty -- Statistical methods 1
- Semiotik 1
- Textanalyse 1
- Visual literacy 1
- Visuelle Kommunikation 1
- Visuelle Medien 1
- Visuelle Wahrnehmung 1
-
12361
Pattern of Neurological Intracranial Lesions on Magnetic Resonance Imaging in Sokoto, North Western Nigeria
Published 2024-04-01“…Cerebral atrophy and cerebral metastasis were nearly equally prevalent, each occurring in 20.93% (n = 18) of the cases. …”
Get full text
Article -
12362
Learn your entropy from informative data: An axiom ensuring the consistent identification of generalized entropies
Published 2025-07-01“…Shannon entropy, a cornerstone of information theory, statistical physics, and inference methods, is uniquely identified by the Shannon-Khinchin or Shore-Johnson axioms. …”
Get full text
Article -
12363
Total Gold Reserves in the BRICS Countries: Analytical Study
Published 2025-06-01“…Currently, the combined gold reserves of the BRICS countries account for 17 to 20 per cent of the entire global gold reserves. Methods. The given article uses the Orange software to forecast the amount and value of gold reserves of the BRICS countries (Russia, China and India) for the period of 2015–2029 at equal annual intervals. …”
Get full text
Article -
12364
A COMPUTER TECHNIQUE FOR ANALYZING RADIO‐TELEMETRY DATA
Published 1980-01-01“…The program calculates home range by the convex polygon, capture radius, and non‐circular home range methods. Geometric center of use, total and daily travel distance, circumference of the area of use, and mean activity radius are also calculated. …”
Get full text
Article -
12365
Vascularised composite allotransplants: Transplant of upper extremities and face
Published 2015-05-01“…The advantage of these over the conventional reconstructive methods is its ability to give aesthetically and functionally superior equal composite substitute to the missing or deformed part. …”
Get full text
Article -
12366
Implementation of Asymmetrical Decentralization In Papua: Relevance to Demands and Problems
Published 2025-01-01“…This research uses qualitative research methods packaged in a normative legal approach, including historical and legal approaches as primary sources for research. …”
Get full text
Article -
12367
Socioeconomic status and psychological distress do not predict mortality risk in the island population of Vis, Croatia
Published 2021-11-01“… # Conclusions These results confirm previous reports of the high level of social equality in the population of the island of Vis. Small and isolated communities may experience a lesser extent of social inequalities in health.…”
Get full text
Article -
12368
Data augmentation for dense passage retrieval using corpus-passage frequency-based token deletion
Published 2025-08-01“…Unlike traditional random token deletion methods that delete tokens with equal probability, the proposed method calculates token importance by considering both passage and corpus-level frequencies, leading to more effective token deletion. …”
Get full text
Article -
12369
Pragmatic analysis of refusal strategies in spoken English of Bahraini and Indian L2 learners
Published 2024-12-01“…Different refusal strategies were employed with varied methods of data assortment.…”
Get full text
Article -
12370
Pattern of Problem Solving in Religious Harmony Forum
Published 2024-08-01“…This research chose a qualitative approach with descriptive methods. The data revealed is in the form of verbal expressions from the subjects or key informants and informants and then recorded and written according to the categories that have been determined. …”
Get full text
Article -
12371
Time-warping analysis for biological signals: methodology and application
Published 2025-04-01“…Critical advances to the more common method of dynamic time-warping (DTW) are discussed. …”
Get full text
Article -
12372
Gender Gap in the Writing Practice and Identity Experienced by Male University Students in South Kalimantan
Published 2023-06-01“…In this work, I employed qualitative research methods to unearth the intricate narratives of personal experiences masked by quantitative research approaches. …”
Get full text
Article -
12373
Crossing Borders Between Languages: The Great Transition of Hindi Literary Translation with Special Reference to Geetanjali Shree’s Tomb of Sand
Published 2024-07-01“…However, a transformative event occurred in 2022 when Geetanjali Shree, a Delhi-based Hindi novelist, clinched the prestigious International Booker Prize for her work, Tomb of Sand, originally titled Ret Samadhi in Hindi. The prize was equally shared between Geetanjali Shree, the writer, and Daisy Rockwell, the translator. …”
Get full text
Article -
12374
Mathematical model for constructing a matrix of coefficients thermal conductivity under low-temperature influence on the multilayer epidermis of biological tissue
Published 2024-10-01“…The purpose of the study is to develop a mathematical model for constructing a matrix of thermal conductivity coefficients under low-temperature exposure to the multilayer epidermis of biological tissue. Method. The research is based on methods of thermo dynamic analysis, full-scale and computational modeling of processes under low-temperature influence. …”
Get full text
Article -
12375
Research on scenario-based mechanism in privacy-aware mobile networks
Published 2015-12-01“…The well-developed information services has infiltrated in each part of our daily life,various novel ser-vice modes and applications provide us conveniences at the cost of our privacy.This situation becomes more serious with the increasing number of applications and users’ requirements.The privacy issues of scenario-based mechanism in mobile networks have been studied based on analyzing the state-of-the-art research trends.The threat and chal-lenges of privacy disclosure caused by the mobile network services,and review the scenarios,service models and attack models were introduced firstly.Followed,a comprehensive study on current status of background information,quality of services,and resource-restricted related privacy preservation were made.Finally,some key technologies on privacy preservation such as background information modeling and descripting,multi-background information fusion,quality of services descripting and modeling,self-adaptive methods based on historical information,pri-vacy-preserving solutions optimizing energy resources and privacy-preserving schemes equalizing multiple factors etc were posted.…”
Get full text
Article -
12376
Increased behavioural problems associated with corticosteroid use in children with nephrotic syndrome: a Southeast Asian perspective
Published 2023-09-01“…Introduction: The study was performed to determine the psychological problems in children with idiopathic nephrotic syndrome (INS) while they were on steroid therapy, as compared to healthy children. Methods: This prospective cohort study was conducted in a paediatric clinic of a tertiary hospital. …”
Get full text
Article -
12377
Communicating Museums: A Textual Analysis of Content and Interaction Management
Published 2018-01-01“…With the new digital era, museums had to adapt to new forms of communication: in an environment that, at least, gives everybody an equal voice, museums managed to communicate themselves without renouncing their position of depositaries of knowledge and authority. …”
Get full text
Article -
12378
Feedback bit allocation in distributed antenna array systems
Published 2020-11-01“…In a frequency division duplex communication system,precoding at the base station usually requires terminal feedback channel state information.In a distributed array system,the channel conditions between the terminal and different access nodes in the cell are different because multiple access nodes are arranged at different locations in the cell.When the resources for feedback channel state information are limited,the allocation method of feedback bit needs to be optimized to improve the overall performance of the system.In a multi-user distributed array system,an access node selection method based on distance threshold was adopted.Based on this method,the quantization characteristics of the random vector quantization codebook and the Taylor expansion method were used to derive the system quantization capacity loss,and then an approximate expression was given.Based on this expression,a feedback bit allocation method was proposed.Compared with other allocation methods,the method of this paper was more universal because it did not limit the number of access nodes selected by the user.The simulation results show that the strategy proposed is superior to the traditional equal-bit allocation scheme and can obtain better performance when the feedback resources are limited.…”
Get full text
Article -
12379
Experiences of Sexual Stigma in Medical Care Facility Encountered by Gay and Bisexual Men in Taiwan
Published 2025-01-01“…Conclusion: The participants’ narratives revealed experiences of sexual stigma in medical units; therefore, implementing interventions for reducing sexual stigma and enhancing healthcare equality for GBM is imperative.…”
Get full text
Article -
12380
PERSPEKTIF ISLAM TERHADAP KEDUDUKAN PEREMPUAN DALAM HIKAYAT PUTRI SALAMAH
Published 2024-11-01“…This research uses qualitative descriptive methods through document or text study. Data is obtained by recording quotations in Hikayat Putri Salamah that are by the research objectives. …”
Get full text
Article