-
2701
Stylistic variation in three English translations of the Dead Sea Scrolls
Published 2007-12-01“…It is suggested that the issue of stylistic variation boils down to linguistically inscribed preference in the choice and construction of discourses in the translated texts, i.e. a case of identifying the norms governing the patterning of translational behaviour within a given socio-cultural milieu. …”
Get full text
Article -
2702
A systems model for Political Communication
Published 2022-11-01“…It is concluded that a systems approach is, at this stage in the development of Political Communication as a field, preferred to more reductionist approaches. …”
Get full text
Article -
2703
Invasive Insects (Adventive Pest Insects) in Florida
Published 2004-07-01“…This is the definition we accept here, except that for several reasons we prefer the word adventive (meaning they arrived) to non-native. …”
Get full text
Article -
2704
Investigate the Process Parameter on the Friction Stir Welding of Dissimilar Aluminium Alloys
Published 2022-01-01“…Taguchi L27, orthogonal array method, is preferred for optimizing FSW parameters such as shoulder diameter, tool rotational speed, and traverse speed. …”
Get full text
Article -
2705
Cooperativas populares e práticas em Psicologia Social
Published 2014-01-01“…Although the work in cooperatives is recognized, the cooperative members prefer formal jobs, ruled by the Consolidation of Labor Laws. …”
Get full text
Article -
2706
Calculating the feature method of short text based on analytic hierarchy process
Published 2016-12-01“…In order to model the accurate interest preference of microblog users and discover user groups with similar in-terest, a new method was proposed which considered the total amount of retweets, comments and attitudes of each mi-croblog for text feature calculation with utilizing classic analytical hierarchy process method. …”
Get full text
Article -
2707
Survey on large language models alignment research
Published 2024-06-01“…Common methods for collecting instruction data and human preference datasets were introduced, research on supervised tuning and alignment adjustments was summarized, commonly used datasets and methods for model evaluation were discussed, and future research directions were concluded.…”
Get full text
Article -
2708
Plant-Based Milks: Coconut
Published 2020-10-01“…Factors that may steer consumers toward nondairy milk alternatives include adherence to a vegan diet, lactose intolerance, allergy to cow's milk, or simply preference. Coconut milk is one of the many varieties of plant-based milk. …”
Get full text
Article -
2709
4-H Horse and Pony Lease
Published 2018-04-01“…This lease form was designed to cover the basic agreement between a 4-H member and a horse owner. If either party prefers to delete or edit any of the wording, or add more wording, it may be done as long as both parties agree and it does not alter any lease rules required by 4-H. …”
Get full text
Article -
2710
PROSPECTS FOR THE APPLICATION OF DISTRIBUTED LEDGER TECHNOLOGY TO IMPROVE FINANCING OF START-UP (JAPAN EXPERIENCE)
Published 2019-10-01“…The model of investor behavior (taking into account risk and profitability) has made it possible to show, that with growing investor confidence (individuals and households) and a certain level of profitability of startups, investing in startups will be more preferable, than a bank deposit. The features of the project have been highlighted and a conclusion has been made, that under certain conditions, the adduced scheme for financing start-ups can be used in Russia, for example, by the Industry Development Fund.…”
Get full text
Article -
2711
Improved SpaceTwist privacy protection method based on anchor optimization algorithm
Published 2017-10-01“…With location-based services worldwide used,private location data appealed easily in query process which caused serious security problems.So the introduction of SpaceTwist incremental nearest neighbor query algorithm,proposes protection of privacy method combined with improved SpaceTwist location optimization algorithm.The anchor point authentication server added to distributed system structure,user generate a k anonymous area according to their privacy preference and actual environment,using optimization algorithm to generate the anchor point.Forwarding users use the incremental nearest neighbor query throught the anchor point and accurate.Experiments in road network environment with different data sets show that the privacy protection works well in the algorithm,and own high work efficiency.…”
Get full text
Article -
2712
Social Networking and the Family Business Performance: A Conceptual Consideration
Published 2019-01-01“…Researchers and practitioners are divided on the preferred measures of business performance, largely due to the quality of available financial data and the measurability of the non-financial indicators. …”
Get full text
Article -
2713
Five-Phase Modular External Rotor PM Machines with Different Rotor Poles: A Comparative Simulation Study
Published 2012-01-01“…The performance of fault-tolerant modular permanent magnet machines depends on the proper selection of the pole and slot numbers which result in negligible coupling between phases. The preferred slot and pole number combinations eliminate the effect of low-order harmonics in the stator magnetomotive force and thereby the vibration and stray loss are reduced. …”
Get full text
Article -
2714
Sportsmanship in sport with athlete perspective
Published 2023-12-01“…In the study, qualitative research method and phenomenology design was preferred. The sampling group of the study consists of 15 athletes determined by the easily accessible case sampling method. …”
Get full text
Article -
2715
Cloud scheduling algorithm based on fuzzy clustering
Published 2012-03-01“…In order to better serve cloud’s objective of providing low-cost and on-demand services,a two-level and fuzzy clustering based cloud scheduling algorithm named FCTLBS(fuzzy clustering and two level based task scheduling algorithm) was proposed.Scheduling was divided into two levels:user scheduling and task cheduling.It used fuzzy clustering method to cluster resources according to their capabilities and computed tasks’resource bias coefficient according to their parameters.Thus tasks with different resource preference were able to choose different capability resources in the corresponding clusters.The new algorithm reduces the scale of resource choice,better reflects cloud tasks’ service requirements.Simulation results show that the proposed algorithm has some advantages compared to other kindred algorithms.…”
Get full text
Article -
2716
‘A place for everyone who gets it’:
Published 2025-01-01“…Investigating Starr’s visual style and aesthetic strategies, as well as the platformed visibility labor she engages in, the article argues that Peachgate can be seen as an indication of the potential for this work to transform from an intimate public to an affective public, although only if allowed to circulate beyond the intentions and preferred interpretations offered by Starr. …”
Get full text
Article -
2717
Internationalization strategy and foreign distribution channels: analysis of the brazilian cosmetics company Natura
Published 2010-01-01“…The results indicate that the company's internationalization process has followed the model of the Uppsala school (learning) and that the company has maintained the same distribution strategy (direct sales) in markets with similar cultures (Latin America), but for the European market (Paris) it preferred to establish a physical store because of the cultural differences of that market. …”
Get full text
Article -
2718
Predatory Mite, Neoseiulus californicus (McGregor) (Arachnida: Acari: Phytoseiidae)
Published 2005-10-01“… The predatory mite Neoseiulus californicus (McGregor) has characteristics of both type II specialist predatory mites and type III generalist predatory mites. N. californicus prefers Tetranychid mites as food, but will also consume other mite species, small insects, such as thrips, and even pollen when the primary prey is unavailable. …”
Get full text
Article -
2719
A new mathematical model to improve encryption process based on Split-Radix Fast Fourier Transform algorithm
Published 2025-01-01“…Several types of cryptoanalysis attacks such as brute-forcing, autocorrelation and dictionary attacks are comparatively evaluated and the end result of SRFFT evaluation indicates that SRFFT is preferable in many practical encryption applications since SRFFT complexity increases with the range of split-radix computations thus eliminating the potential chances of cryptanalysis attacks.…”
Get full text
Article -
2720
Pre·Election coverage by SABC·TV of the 1989 General Election
Published 2022-11-01“…The report attempts to be a "case-study" In the construction of television news, employing discourse theory and the semiotics of film and communication In preference to the traditional quantitative approach. …”
Get full text
Article