Showing 381 - 400 results of 642 for search 'Second Foundation', query time: 0.09s Refine Results
  1. 381
  2. 382

    “Beyond the Finish Line” the Epidemiology of Injury and Illness in Professional Cycling: Insights from a Year-Long Prospective Study by Thomas Fallon, Rory Nolan, John Peters, Neil Heron

    Published 2025-01-01
    “…Saddle sores were the second most common at 0.20 (95% CI: 0.04, 0.36) per year for males and 0.08 (95% CI: 0–0.18) per year for females. …”
    Get full text
    Article
  3. 383

    On the concept of Urban Mutations: Urban research bibliography with an objective approach by Z. Bendebbache, A. Khiari, I. Maanser

    Published 2025-01-01
    “…For the co-occurrences, the term “Urban Change” ranked second in strength burst (35.13), and first in centrality (0.41). …”
    Get full text
    Article
  4. 384
  5. 385

    «Which of You Is Ready to Take a Leap to the Emptiness Today»? by Yu. A. Lukin

    Published 2018-10-01
    “…Fromm’s book “To Have or to Be?” The second variant was applied at the  introductory lecture on didactics for second-year students of the Physics and  Mathematics Faculty of the Voronezh State Pedagogical University this  February. …”
    Get full text
    Article
  6. 386

    Construction of network ecological civilization based on the anti-terrorism of colleges and universities by You-deng CHEN

    Published 2017-06-01
    “…Firstly,the basic connotation,significance and potential crisis of the network ecological civilization were introduced.Secondly,the basic situation of the current network terrorism and the challenge to the human civilization and security were analyzed,and the information dissemination was the foundation and that the key point of building the network ecological civilization was put forward.Finally,from the construction of the network discourse system,the construction of the network culture system,the construction of the network ethics system,the planning suggestions were put forward to explore and perfect the construction of the anti-terrorism path of the university network in our country.…”
    Get full text
    Article
  7. 387
  8. 388
  9. 389
  10. 390

    Editorial by Jörg Tremmel, Markus Rutsche

    Published 2022-04-01
    “…This could have been prevented during the second and the further waves. The policy paper also calls for more government funding for prophylactic vaccine research and for the designation of vaccines as “global public goods”. …”
    Get full text
    Article
  11. 391

    戶外教育課程評估指標建構之研究 Indicators for Evaluating Outdoor Education Curricula by 鄭智明 Chi Meng Cheang, 陳美燕 Mei-Yen Chen, 郭雄軍 Husing-Chun Kuo

    Published 2024-12-01
    “…First, outdoor education is a vital component of school education. Second, it is a crucial method for fostering holistic development in students. …”
    Get full text
    Article
  12. 392
  13. 393

    Identification of the Insecticidal Effect of Cry Protein on a Variety of Potato Pests by Deshan ZHOU, Doudou YANG, Juan LIU, Weichao LIN, Jie CHENG, Suhua LI

    Published 2024-10-01
    “…【Objective】The study was conducted to explore the insecticidal effects of Cry protein on Leptinotarsa decemlineata, Spodoptera frugiperda, and Henosepilachna vigintioctopunctata, aiming to provide a foundation for the development of Cry transgenic potato plants with insect resistance.…”
    Get full text
    Article
  14. 394

    The Legacy of KH. Wahid Hasyim's Reforms: Da'wah Management and the Transformation of Islamic Education by M. Fahmi Ashari, Derysmono Derysmono, Muhammad Rozan Fikri

    Published 2024-12-01
    “…Second, in NU, he contributed a lot of reforms to LP Ma'arif NU, namely overhauling human resource and establishing NU schools. …”
    Get full text
    Article
  15. 395
  16. 396
  17. 397
  18. 398

    Reliability Analysis Method of the Motion Accuracy of Rotating Guide-bar Mechanism Considering Multi-correlated Failure Mode by Li Chang, Wang Bingchen, Han Xing, Song Hua

    Published 2015-01-01
    “…There inevitably existed multi-correlated failure modes in the mechanism motion process,and these modes are expressed as functions of random variables.Firstly,a reliability calculation model for the mechanism motion under multi-failure mode is built and solved.Secondly,taking the rotating guide-bar mechanism as example,the calculation solution of the motion accuracy reliability under multi-correlated failure mode is carried out based on the method of Monte Carlo.Lastly,the guide-bar mechanism reliability curves under different times are got,and the theory foundation for mechanism dynamic optimum design is provided.This method with high accuracy,has some theory meaning and application value.…”
    Get full text
    Article
  19. 399

    A Decoupled Spherical Parallel Mechanism with Sphere Workspace and Its Characteristic by Li Xiang, Li Weimin, Feng Shaohui, Zhang Jianjun, Yu Shanshan

    Published 2018-01-01
    “…And according to the expression of the Jacobian matrix,the decoupled feature of the proposed parallel mechanism is validated. The theoretical foundation for the application of the mechanism to the sphere workspace is provided.…”
    Get full text
    Article
  20. 400

    Research on quantitative assessment model on vulnerability risk for information system by ZHOU Liang1, LI Jun-e2, LU Tian-bo3, LIU Kai-pei1

    Published 2009-01-01
    “…A quantitative method of vulnerability assessment was put forward on the foundation of research on current assessment methods home and abroad in order to evaluate vulnerability risk objectively.Vulnerability connection network(VCN) was discussed firstly for the purpose of taking connection of vulnerability into account,which divides vulnerabil-ity risk into entity risk and path risk;Secondly,advanced methods of quantifying entity importance in entity risk and network node connection effects in path risk were proposed;Lastly,an evaluation example of vulnerability risk on dis-patching management information system in power system was given out.Corresponding results show that quantitative assessment model brings out scientific and credible evaluation on vulnerability risk.…”
    Get full text
    Article