Results for 'Meng-Jun Hsu'

991 found
Order:
  1. Teaching the Concept of Computational Thinking: A STEM-Based Program With Tangible Robots on Project-Based Learning Courses.Ming-Chia Hsieh, Hui-Chun Pan, Sheng-Wen Hsieh, Meng-Jun Hsu & Shih-Wei Chou - 2022 - Frontiers in Psychology 12.
    The twenty-first century is arguably the century of computing. In such a world saturated by computing, Computational Thinking is now recognized as a foundational competency for being an informed citizen and being successful in STEM work. Nevertheless, how to effectively import different types of teaching methods in university courses is subjected to further evaluation. Currently, the arguments in favor of tangible robots including high interaction, great practicality, and specific operation results make themselves to be often used as a teaching medium (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  10
    Differential Tractography and Correlation Tractography Findings on Patients With Mild Traumatic Brain Injury: A Pilot Study.Meng-Jun Li, Fang-Cheng Yeh, Si-Hong Huang, Chu-Xin Huang, Huiting Zhang & Jun Liu - 2022 - Frontiers in Human Neuroscience 16.
    Differential tractography and correlation tractography are new tractography modalities to study neuronal changes in brain diseases, but their performances in detecting neuronal injuries are yet to be investigated in patients with mild traumatic brain injury. Here we investigated the white matter injury in mTBI patients using differential and correlation tractography. The diffusion MRI was acquired at 33 mTBI patients and 31 health controls. 7 of the mTBI patients had one-year follow-up scans, and differential tractography was used to evaluate injured fiber (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  16
    The relationship between physical exercise and school adaptation of junior students: A chain mediating model.Meng-Zhu Bai, Shu-Jun Yao, Qi-Shuai Ma, Xun-Ling Wang, Chao Liu & Ke-Lei Guo - 2022 - Frontiers in Psychology 13.
    ObjectiveThis study explores the relationship between physical exercise and school adaptation of junior middle school students and constructs a chain intermediary model through the intermediary role of psychological resilience and sports learning motivation.MethodsUsing the stratified cluster sampling method, 930 junior middle school students in Anhui Province were measured in group psychology by using the physical exercise rating scale, adolescent psychological resilience scale, physical learning motivation scale and school adaptation scale. The statistical software SPSS 23.0 and process plug-in were used for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  45
    The Effect of Organization-Based Self-Esteem and Deindividuation in Protecting Personal Information Privacy.Meng-Hsiang Hsu & Feng-Yang Kuo - 2003 - Journal of Business Ethics 42 (4):305 - 320.
    In this research we apply the Theory of Planned Behavior (TPB) to study decisions related to information privacy protection. A TPB-based model was proposed to investigate whether organization-based self-esteem and perceived deindividuation can be employed to measure the strength of the perceived behavioral control construct. In addition, we examined if the addition of a causal path linking subjective norms to attitudes and another causal path linking organization-based self-esteem to subjective norms enhanced our research model's predicting power. Our study shows that (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  5.  12
    Opportunities and Challenges for Chinese Elderly Care Industry in Smart Environment Based on Occupants’ Needs and Preferences.Qingfeng Meng, Ziming Hong, Zhen Li, Xin Hu, Weixiang Shi, Jun Wang & Kai Luo - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  45
    The Mediating Effect of Creativity on the Relationship Between Mathematic Achievement and Programming Self-Efficacy.Jun Liu, Meng Sun, Yue Dong, Fei Xu, Xue Sun & Yan Zhou - 2022 - Frontiers in Psychology 12.
    Purpose: This study aimed to explore the relationship between mathematic achievement and programming self-efficacy, and adopt a mediation model to verify the mediating role of creativity on the relationship between mathematic achievement and programming self-efficacy.Methods: A total of 950 upper-secondary school students were surveyed using their math test scores, the Kirton Adaption-Innovation and the Programmed Self-Efficacy Scale. SPSS-26 was used for descriptive statistical analysis and correlation analysis of related variables. The PROCESS plugin was used to test the mediating effect of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  82
    Prognostic value of cerebrospinal fluid free fatty acid levels in patients with acute ischemic stroke.Xue-Jun Wei, Meng Han, Guang-Chen Wei & Chong-Hao Duan - 2015 - Frontiers in Human Neuroscience 9.
  8.  83
    Development and validation of ethical computer self-efficacy measure: The case of softlifting. [REVIEW]Feng-Yang Kuo & Meng-Hsiang Hsu - 2001 - Journal of Business Ethics 32 (4):299 - 315.
    The concept of self-efficacy is concerned with people''s beliefs in their ability to produce given attainment. It has been widely applied to study human conduct in various settings. This study, based on Albert Bandura''s social cognitive theory, proposes the employment of self-efficacy for investigating people''s ethical conduct related to computer use. Specifically, an ethical computer self-efficacy (ECSE) construct concerning software piracy is developed and validated. The measurement model of the construct was rigorously tested and validated through confirmatory factor analysis. The (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   24 citations  
  9.  12
    The influence of “small private online course + flipped classroom” teaching on physical education students’ learning motivation from the perspective of self-determination theory.Ti Hu, Meng-Long Zhang, Hong Liu, Jun-Cheng Liu, Si-jia Pan, Jiang-hao Guo, Zong-en Tian & Lei Cui - 2022 - Frontiers in Psychology 13.
    ObjectiveThe study aimed to enhance the learning motivation of college physical education students and improve their learning outcomes. Based on the perspective of the self-determination theory, this study explores the influence of “Small Private Online Course + flipped classroom” teaching on the learning motivation of students majoring in physical education and profoundly analyzes the influencing factors and promotion paths of learning motivation using this model.Materials and methodsA total of four classes of physical education majors in a university were selected and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  56
    Assessing gender differences in computer professionals' self-regulatory efficacy concerning information privacy practices.Feng-Yang Kuo, Cathy S. Lin & Meng-Hsiang Hsu - 2006 - Journal of Business Ethics 73 (2):145 - 160.
    Concerns with improper collection and usage of personal information by businesses or governments have been seen as critical to the success of the emerging electronic commerce. In this regard, computer professionals have the oversight responsibility for information privacy because they have the most extensive knowledge of their organization's systems and programs, as well as an intimate understanding of the data. Thus, the competence of these professionals in ensuring sound practice of information privacy is of great importance to both researchers and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  11.  16
    Assessing Gender Differences in Computer Professionals’ Self-Regulatory Efficacy Concerning Information Privacy Practices.Feng-Yang Kuo, Cathy S. Lin & Meng-Hsiang Hsu - 2006 - Journal of Business Ethics 73 (2):145-160.
    Concerns with improper collection and usage of personal information by businesses or governments have been seen as critical to the success of the emerging electronic commerce. In this regard, computer professionals have the oversight responsibility for information privacy because they have the most extensive knowledge of their organization's systems and programs, as well as an intimate understanding of the data. Thus, the competence of these professionals in ensuring sound practice of information privacy is of great importance to both researchers and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  12.  25
    Association Between Job Stress and Organizational Commitment in Three Types of Chinese University Teachers: Mediating Effects of Job Burnout and Job Satisfaction.Peng Wang, Pengpeng Chu, Jun Wang, Runsheng Pan, Yu Sun, Meng Yan, Longzhen Jiao, Xiangping Zhan & Denghao Zhang - 2020 - Frontiers in Psychology 11.
  13.  26
    An International Survey of Deep Brain Stimulation Utilization in Asia and Oceania: The DBS Think Tank East.Chencheng Zhang, Adolfo Ramirez-Zamora, Fangang Meng, Zhengyu Lin, Yijie Lai, Dianyou Li, Jinwoo Chang, Takashi Morishita, Tooru Inoue, Shinsuke Fujioka, Genko Oyama, Terry Coyne, Valerie Voon, Paresh K. Doshi, Yiwen Wu, Jun Liu, Bhavana Patel, Leonardo Almeida, Aparna A. Wagle Shukla, Wei Hu, Kelly Foote, Jianguo Zhang, Bomin Sun & Michael S. Okun - 2020 - Frontiers in Human Neuroscience 14.
  14. Kʻung-tzu hsüeh shuo, kuo fu ssu hsiang yü che hsüeh.Meng-Hsiung Chou - 1976
     
    Export citation  
     
    Bookmark  
  15. Kʻo hsüeh yü jen sheng kuan chih lun chan. Wang, Meng-Tsou & [From Old Catalog] - 1973
     
    Export citation  
     
    Bookmark  
  16. Meng-tzu ti che hsüeh.Pao-lun Hsüeh - 1976
     
    Export citation  
     
    Bookmark  
  17.  10
    Dang dai jun ren he xin jia zhi guan jiao yu 21 jiang.Meng Li, Guangwei Sun & Xiaolong Ru (eds.) - 2008 - Beijing: Chang zheng chu ban she.
    本书内容包括:当代军人的世界观、当代军人的时代观、当代军人的国家观、当代军人的安全观、当代军人的战争观、当代军人的使命观等。.
    Direct download  
     
    Export citation  
     
    Bookmark  
  18. Meng-tzu chin i lei pien.Shu-Piao Hsü - 1968
     
    Export citation  
     
    Bookmark  
  19.  9
    Comments on previous psychological Tai-Chi models: Jun-zi self-cultivation model.Jin Xu, Nam-Sat Chang, Ya-Fen Hsu & Yung-Jong Shiah - 2022 - Frontiers in Psychology 13.
    In this article we describe four previous Tai-Chi models based on the I-Ching and their limitations. The I-Ching, the most important ancient source of information on traditional Chinese culture and cosmology, provides the metaphysical foundation for this culture, especially Confucian ethics and Taoist morality. To overcome the limitations of the four previous Tai-Chi models, we transform I-Ching cultural system into a psychological theory by applying the cultural system approach. Specifically, we propose the Jun-zi Self-Cultivation Model, which argues that an individual (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20. Meng-tzu hsüeh shuo yen chiu.Wensheng Chen - 1977
     
    Export citation  
     
    Bookmark  
  21. Kʻung Meng jen hsüeh chih yen chiu.Po-ta Chou - 1964
     
    Export citation  
     
    Bookmark  
  22. Meng-tzu lun hsing yü hsiu wei hsüeh.Ju-Sung Wang - 1974
     
    Export citation  
     
    Bookmark  
  23. Meng-tzu cheng chih che hsüeh.Guyuan Chen - 1926
     
    Export citation  
     
    Bookmark  
  24. Meng-tzu hsin hsüeh chih yen chiu.Jen-Tsai Cheng - 1977 - [S.N.].
     
    Export citation  
     
    Bookmark  
  25. Kʻung Meng hsüeh shuo yü hsien tai ssu hsiang.Lifu Chen (ed.) - 1978
     
    Export citation  
     
    Bookmark  
  26. Kʻung Meng Hsün chiao yü che hsüeh ssu hsiang pi chiao fen hsi yen chiu.Yung-hsi Lin - 1976 - Wen Ching Shu Chü.
     
    Export citation  
     
    Bookmark  
  27.  7
    Wang zi: cong Majiweili "Jun wang lun" hui dao Kong Meng "wang dao" = Prince People Power.Kuang Lu - 2013 - Taibei Shi: Tangshan chu ban she.
    Direct download  
     
    Export citation  
     
    Bookmark  
  28.  18
    Die Belagerung von K'ai-feng im Winter 1126/27: Nach Kapitel 64-69 des San-ch'ao pei-meng hui-pien, kompiliert von Hsü Meng-hsinDie Belagerung von K'ai-feng im Winter 1126/27: Nach Kapitel 64-69 des San-ch'ao pei-meng hui-pien, kompiliert von Hsu Meng-hsin. [REVIEW]Ina Asim & Sabine Werner - 1996 - Journal of the American Oriental Society 116 (4):761.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  29.  60
    Depressive rumination is correlated with brain responses during self-related processing.Tzu-Yu Hsu & Timothy J. Lane - 2021 - Journal of Psychiatry and Neuroscience 46:E518-E527.
    Background: Rumination, a tendency to focus on negative self-related thoughts, is a central symptom of depression. Studying the self-related aspect of such symptoms is challenging because of the need to distinguish self effects from the emotional content of task stimuli. This study employed an emotionally neutral self-related paradigm to investigate possible altered self-processing in depression and its link to rumination. Methods: People with major depressive disorder (n = 25) and controls (n = 25) underwent task-based electro-encephalogram recording. We studied late (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  40
    Deconstructing" Japanese Religion": A Historical Survey.Jun'ichi Isomae & 磯前順一 - forthcoming - Japanese Journal of Religious Studies.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  6
    The Japanese Ideology: a Marxist critique of liberalism and fascism.Jun Tosaka - 2024 - New York: Columbia University Press.
    A translation of a Japanese text written by philosopher Tosaka Jun in 1935, at the moment the country had begun to embark upon a course of fascist authoritarianism that led to war and total destruction. Titled The Japan Ideology, the text purposely recalls its derivation and kinship with Marx and Engels's The German Ideology and expands on the role played by philosophic idealism in preparing the population for both the new politics of fascism and the demands of the eventual war (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  32. Did the NSA and GCHQ Diminish Our Privacy? What the Control Account Should Say.Leonhard Menges - 2020 - Moral Philosophy and Politics 7 (1):29-48.
    A standard account of privacy says that it is essentially a kind of control over personal information. Many privacy scholars have argued against this claim by relying on so-called threatened loss cases. In these cases, personal information about an agent is easily available to another person, but not accessed. Critics contend that control accounts have the implausible implication that the privacy of the relevant agent is diminished in threatened loss cases. Recently, threatened loss cases have become important because Edward Snowden’s (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  33.  12
    Fang Yizhi zhuan.Meng Bai - 2020 - Hefei Shi: Anhui da xue chu ban she.
    Direct download  
     
    Export citation  
     
    Bookmark  
  34. Di 3 Juan.Meng Qingren Bian - 1990 - In Wenying Wang (ed.), Zhu ming Makesi zhu yi zhe xue jia ping zhuan. Jinan: Shandong sheng xin hua shu dian fa xing.
    No categories
     
    Export citation  
     
    Bookmark  
  35. Tʻang Shuo-chai yen chiu.Hsüeh-wu Chou - 1973
     
    Export citation  
     
    Bookmark  
  36.  56
    The Mediating Effect of Ethical Climate on the Relationship Between Paternalistic Leadership and Team Identification: A Team-Level Analysis in the Chinese Context.Meng-Yu Cheng & Lei Wang - 2015 - Journal of Business Ethics 129 (3):639-654.
    The aim of this paper is to explore the role of ethical climate on the relationship between the paternalistic leadership and team identification at the team level. In contrast to the prior studies which tended to focus on ethical climate as a whole dimension, this paper further classified the domain of construct into the categories of egoism, benevolence, and principle using a sample from 143 teams in Mainland China and Taiwan. Hierarchical regression results showed that the average paternalistic leadership had (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  37. Three Control Views on Privacy.Leonhard Menges - 2022 - Social Theory and Practice 48 (4):691-711.
    This paper discusses the idea that the concept of privacy should be understood in terms of control. Three different attempts to spell out this idea will be critically discussed. The conclusion will be that the Source Control View on privacy is the most promising version of the idea that privacy is to be understood in terms of control.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  38. Blaming.Leonhard Menges - 2023 - In Maximilian Kiener (ed.), The Routledge Handbook of Responsibility. Routledge.
    In the last two decades, blame has become a core topic in ethics, philosophical moral psychology and, more recently, epistemology. This chapter aims at clarifying the complex state of the debate and at making a suggestion for how we should proceed from here. The core idea is that accounts of blame are often motivated by very different background goals. One standard goal is to provide a unifying account of our everyday blame practices. The chapter argues that there is reason to (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  39. Responsibility and appropriate blame: The no difference view.Leonhard Menges - 2020 - European Journal of Philosophy 29 (2):393-409.
    How do the fact that an agent is morally responsible for a certain morally objectionable action and the fact that she is an appropriate target of blame for it relate to each other? Many authors inspired by Peter Strawson say that they necessarily co‐occur. Standard answers to the question of why they co‐occur say that the occurrence of one of the facts explains that the other obtains. This article presents a third option: that they are one and the same fact. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  40.  4
    The significance of conceptualism in McDowell.Shao-An Hsu - 2024 - Asian Journal of Philosophy 3 (1):1-9.
    To explain perceptual justification, McDowell proposes so-called “conceptualism,” the view that the content of experience is all conceptual. Tony Cheng, in his book, John McDowell on Worldly Subjectivity (2021), suggests that McDowell can do without conceptualism. To support his suggestion, Cheng makes several contentions against McDowell’s thesis of the co-extensiveness of conceptuality and rationality. In this commentary, I focus on two most crucial contentions Cheng makes: (i) conceptualism is an extra commitment for explaining perceptual justification and (ii) it can be (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  29
    Geography and the production of space in nineteenth-century American literature.Hsuan L. Hsu - 2010 - New York: Cambridge University Press.
    In Geography and the Production of Space in Nineteenth-Century American Literature, Hsuan L. Hsu examines how literature represents different kinds of spaces ranging from the single-family home to the globe. He focuses on authors such as Charles Brockden Brown, Edgar Allan Poe, Herman Melville and Sarah Orne Jewett, who drew on literary tools such as rhetoric, setting, and point of view to mediate between individuals and different kinds of spaces. These authors used forms such as the regional sketch, the domestic (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  42. Group ethical voice and ethical behaviors: The mediating role of group moral transitive motivation and moderating role of group faultlines.Meng Qi, Bin Feng, Fei Liu & Ting Qian - forthcoming - Business Ethics, the Environment and Responsibility.
    Ethical voice involves individuals’ perceptions of what is right and what is wrong. Although prior research has investigated the impacts of individual-level prohibitive ethical expression on personal outcomes, there has been limited examination of ethical voice at the group level. Our study examines how and when different types of ethical voice influence group outcomes. Using data gathered from 363 participants from 61 groups in two Chinese companies, the results reveal that promotive and prohibitive ethical voices at the group level exert (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  24
    Embeddings between well-orderings: Computability-theoretic reductions.Jun Le Goh - 2020 - Annals of Pure and Applied Logic 171 (6):102789.
    We study the computational content of various theorems with reverse mathematical strength around Arithmetical Transfinite Recursion (ATR_0) from the point of view of computability-theoretic reducibilities, in particular Weihrauch reducibility. Our main result states that it is equally hard to construct an embedding between two given well-orderings, as it is to construct a Turing jump hierarchy on a given well-ordering. This answers a question of Marcone. We obtain a similar result for Fraïssé's conjecture restricted to well-orderings.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  44.  27
    Corporate Philanthropy and Tunneling: Evidence from China.Jun Chen, Wang Dong, Jamie Tong & Feida Zhang - 2018 - Journal of Business Ethics 150 (1):135-157.
    This paper examines the association between corporate philanthropy and tunneling by controlling shareholders. Using a unique dataset from China, the paper finds evidence that firms donating more are less likely to tunnel. The negative association between philanthropy and tunneling is stronger when firms are faced with more severe agency conflicts, as indicated by lower largest shareholding, fewer growth opportunities, lower state ownership, and weaker product market competition. The results suggest that companies engaging in philanthropy have incentives to enhance their reputations (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  45. A critical review of the statisticalist debate.Jun Otsuka - 2016 - Biology and Philosophy 31 (4):459-482.
    Over the past decade philosophers of biology have discussed whether evolutionary theory is a causal theory or a phenomenological study of evolution based solely on the statistical features of a population. This article reviews this controversy from three aspects, respectively concerning the assumptions, applications, and explanations of evolutionary theory, with a view to arriving at a definite conclusion in each contention. In so doing I also argue that an implicit methodological assumption shared by both sides of the debate, namely the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   22 citations  
  46.  38
    Cost‐effectiveness analysis for Pap smear screening and human papillomavirus DNA testing and vaccination.Meng-Kan Chen, Hui-Fang Hung, Stephen Duffy, Amy Ming-Fang Yen & Hsiu-Hsi Chen - 2011 - Journal of Evaluation in Clinical Practice 17 (6):1050-1058.
  47.  16
    The Quest for Ecstatic Sovereignty: Georges Bataille’s Obsession with the Lingchi Photos.Meng-Shi Chen - 2019 - Culture and Dialogue 7 (2):213-236.
    This essay considers the way Georges Bataille associates sovereignty with ecstasy through his peculiar emotive reactions to the photographic images of lingchi execution. Aside from the traditional views relating to political authority, I show how Bataille holds an idiosyncratic notion of sovereignty that is firmly connected with ecstasy, which is disclosed and best exemplified in his fascination with the lingchi photos with intolerable imagery of torture and cruelty. I argue that the reasons for Bataille to seek ecstatic experience is to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  15
    Length Neutrosophic Subalgebras of BCK=BCI-Algebras.Young Bae Jun, Madad Khan, Florentin Smarandache & Seok-Zun Song - 2020 - Bulletin of the Section of Logic 49 (4):377-400.
    Given i, j, k ∈ {1,2,3,4}, the notion of -length neutrosophic subalgebras in BCK=BCI-algebras is introduced, and their properties are investigated. Characterizations of length neutrosophic subalgebras are discussed by using level sets of interval neutrosophic sets. Conditions for level sets of interval neutrosophic sets to be subalgebras are provided.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  63
    Causal Foundations of Evolutionary Genetics.Jun Otsuka - 2016 - British Journal for the Philosophy of Science 67 (1):247-269.
    The causal nature of evolution is one of the central topics in the philosophy of biology. The issue concerns whether equations used in evolutionary genetics point to some causal processes or purely phenomenological patterns. To address this question the present article builds well-defined causal models that underlie standard equations in evolutionary genetics. These models are based on minimal and biologically plausible hypotheses about selection and reproduction, and generate statistics to predict evolutionary changes. The causal reconstruction of the evolutionary principles shows (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  50. Similarity Measure of Refined Single-Valued Neutrosophic Sets and Its Multicriteria Decision Making Method.Jun Ye & Florentin Smarandache - 2016 - Neutrosophic Sets and Systems 12:41-44.
    This paper introduces a refined single-valued neutrosophic set (RSVNS) and presents a similarity measure of RSVNSs. Then a multicriteria decision-making method with RSVNS information is developed based on the similarity measure of RSVNSs. By the similarity measure between each alternative and the ideal solution (ideal alternative), all the alternatives can be ranked and the best one can be selected as well. Finally, an actual example on the selecting problems of construction projects demonstrates the application and effectiveness of the proposed method.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 991