Suggested Topics within your search.
Suggested Topics within your search.
- Research 7
- Civilization 6
- History 6
- Mass media 5
- Moral and ethical aspects 5
- Social life and customs 5
- methods 5
- Biochemistry 4
- Methodology 4
- Social conditions 4
- Cultural property 3
- Education 3
- Educational technology 3
- Evaluation 3
- Financial statements 3
- Information technology 3
- Nursing 3
- Politics and government 3
- Protection 3
- Standards 3
- Study and teaching 3
- Anesthesia 2
- Anesthesiology 2
- Application software 2
- Child 2
- Colonial influence 2
- Computer-assisted instruction 2
- Economic conditions 2
- Economic policy 2
- Education, Elementary 2
-
801
The OHM Pays de Bitche as a testing ground for interdisciplinary and participatory scientific practice
Published 2024-07-01Subjects: Get full text
Article -
802
Dono ed economie altre: per un nuovo contratto sociale
Published 2014-04-01Subjects: “…Gift…”
Get full text
Article -
803
Asymptotic behaviour of solutions for porous medium equation with periodic absorption
Published 2001-01-01Get full text
Article -
804
Lax Integrability and Soliton Solutions for a Nonisospectral Integrodifferential System
Published 2017-01-01Get full text
Article -
805
A mathematical model of stem cell regeneration with epigenetic state transitions
Published 2017-09-01Get full text
Article -
806
Image visualization encryption algorithm based on Shamir threshold secret key sharing
Published 2018-07-01“…An image visualization encryption algorithm with authentication function by using Shamir scheme was proposed.The main idea of this algorithm is to obtain the data by segmenting the binary secret image into blocks.Then,Shamir scheme was used to obtain the sub-secret data and simultaneously sign the secret image with the SM2 signature algorithm.And it would embed the shared data and signature information into carrier images.When the restoration is required,a specified number of sub-secret images are required for information extraction,restoration and authentication.The simulation experiment of the scheme shows that the secret image sharing scheme improves the security of secret image storage and transmission.…”
Get full text
Article -
807
-
808
Periprostetik Eklem Enfeksiyonu Tanısında Serolojik Belirteçlerin Değeri
Published 2017-03-01Get full text
Article -
809
The Bessel-Struve intertwining operator on ℂ and mean-periodic functions
Published 2004-01-01Get full text
Article -
810
-
811
Disulfidptosis as a key regulator of glioblastoma progression and immune cell impairment
Published 2025-01-01Get full text
Article -
812
Relevance of the Watson-Jones anterolateral approach in the management of Pipkin type II fracture-dislocation: a case report and literature review
Published 2024-06-01“…The surgeon must select a safe approach that enables osteosynthesis of the fracture while also preserving the vascularization of the femoral head. …”
Get full text
Article -
813
-
814
Numerical Simulation of the Effect of Long-Term Reclamation on the Flow and Sediment Concentration in Binhai Port,Yancheng
Published 2021-01-01Subjects: Get full text
Article -
815
Oscillation Criteria for Even Order Neutral Equations with Distributed Deviating Argument
Published 2010-01-01Get full text
Article -
816
Dari Sosialisme menuju Islam Makrifat: Evolusi Pemikiran HOS Tjokroaminotoaminoto, 1924 – 1928
Published 2023-11-01“…This pinnacle work can serve as a point of reference for understanding the trajectory of HOS Tjokroaminotos thought throughout his life and in all his works. Keywords :HOS Tjokroaminotoaminoto;Islamic Socialism;Islamic Marifat; Thought Evolution…”
Get full text
Article -
817
Surveillance colonoscopy after resection of large polyps: Can we reduce loss to follow up?
Published 2025-01-01Get full text
Article -
818
Data Preprocessing Method and Fault Diagnosis Based on Evaluation Function of Information Contribution Degree
Published 2018-01-01“…Finally, the validity of this algorithm is verified by the example of UCI-Combined Cycle Power Plant (UCI-ccpp) simulation of standard data set.…”
Get full text
Article -
819
Pipelined Training with Stale Weights in Deep Convolutional Neural Networks
Published 2021-01-01“…Applied Computational Intelligence and Soft Computing…”
Get full text
Article -
820
Regard en arrière sur « Le sens de l’“alliance” religieuse : “mari” d’esprit, “femme” de dieu »
Published 2023-06-01Get full text
Article