Suggested Topics within your search.
Suggested Topics within your search.
- History 9
- Social conditions 6
- Criminal law 4
- Mass media 4
- Philosophy 4
- Politics and government 4
- Economic development 3
- Information technology 3
- Jews 3
- Management 3
- Moneylenders 3
- Moral and ethical aspects 3
- Study and teaching 3
- Advertising 2
- Agriculture 2
- Civilization 2
- Colonial influence 2
- Constitutional law 2
- Democracy 2
- Economic aspects 2
- Economic policy 2
- Geology 2
- History and criticism 2
- Internet in public administration 2
- Law 2
- Manners and customs 2
- Marketing 2
- Natural resources 2
- Poetics 2
- Psychological aspects 2
-
1521
-
1522
Roberto Bizzocchi, In famiglia. Storie di interessi e affetti nell’Italia moderna
Published 2002-11-01“…Laboratoire Italien…”
Get full text
Article -
1523
-
1524
-
1525
Water conservation assessment and its influencing factors identification using the InVEST and random forest model in the northern piedmont of the Qinling Mountains
Published 2025-02-01“…This study reveals the spatiotemporal characteristics of water conservation and identifies its key influencing factors in the NPQM. Additionally, the effects of these factors on water conservation are further discussed. …”
Get full text
Article -
1526
RNA N4‐acetylcytidine modification and its role in health and diseases
Published 2025-01-01“…It also emphasizes the potential of NAT10 as a prognostic biomarker and its therapeutic potential as a target for disease treatment. …”
Get full text
Article -
1527
-
1528
Access control model and its application for collaborative information systems
Published 2008-01-01“…The authorization decision on resources is the major problem in collaborative information systems.Firstly,the term "action" was defined based on roles,temporal states and environmental states,and the action-based access control(ABAC) model was presented.Then,the access control mechanism based on ABAC for collaborative information sys-tems was introduced.The security association was defined and its producing procedure was proposed,which contains security properties such as user request,user identity,password,role,temporal state,environmental state and lifetime.Finally,to exchange the security properties among user,action server and resources management server,a secure authen-tication protocol was proposed,and its security was proven under the universally composable model.…”
Get full text
Article -
1529
Electronic trade and prospects for its development in the world economy
Published 2019-04-01Get full text
Article -
1530
New Iterative Method for the Solution of Fractional Damped Burger and Fractional Sharma-Tasso-Olver Equations
Published 2018-01-01“…The new iterative method has been used to obtain the approximate solutions of time fractional damped Burger and time fractional Sharma-Tasso-Olver equations. …”
Get full text
Article -
1531
Existence of Covers and Envelopes of a Left Orthogonal Class and Its Right Orthogonal Class of Modules
Published 2022-01-01Get full text
Article -
1532
René Demoris, Florence Ferran, Corinne Lucas. Art et violence. Vies d’artistes entre xvie et xviiie siècles. Italie, France, Angleterre
Published 2014-02-01“…Laboratoire Italien…”
Get full text
Article -
1533
Assessment of the hypoglycemic effect of Cyanthillium cinereum (L.) H. Rob. and its dual impact on uterine contraction in gestational diabetic rats
Published 2025-01-01“…Conclusion: CCE reduces elevated glucose levels and exhibits hypolipidemic and hepatoprotective effects, improving maternal and fetal outcomes in GDM. Its uterine contractility effects suggest potential as a complementary therapy to MET for GDM management.…”
Get full text
Article -
1534
Simultaneous Determination of Six Components in Beagle Dog Plasma by UPLC-MS/MS and Its Application to a Comparative Pharmacokinetic Study of Three Different Yuanhu Zhitong Preparations
Published 2022-01-01“…The results showed oral liquid can exert its efficacy quickly, while dispersible tablet and dropping pills exhibit relatively slow release pattern. …”
Get full text
Article -
1535
-
1536
General Iterative Methods for Equilibrium Problems and Infinitely Many Strict Pseudocontractions in Hilbert Spaces
Published 2012-01-01“…We propose an implicit iterative scheme and an explicit iterative scheme for finding a common element of the set of fixed point of infinitely many strict pseudocontractive mappings and the set of solutions of an equilibrium problem by the general iterative methods. …”
Get full text
Article -
1537
N*-Iteration Approach for Approximation of Fixed Points in Uniformly Convex Banach Space
Published 2025-01-01Subjects: Get full text
Article -
1538
-
1539
Chaotic Motion and Its Control of Rotary Machinery
Published 2016-01-01“…The main idea of the method is to take the parameters of controller as the system parameters,and the edge of chaos is determined,from which the design parameters of controller can be chosen directly. The method and its effectiveness are demonstrated by the design of PD controller and phase controller.…”
Get full text
Article -
1540
Hadji Agus Salim's Islamic Feminism Thoughts and Its Contribution to Contemporary Islamic Studies
Published 2024-12-01Get full text
Article