Suggested Topics within your search.
Suggested Topics within your search.
- novel 11
- History 4
- Appreciation 3
- History and criticism 3
- kiswahili novel 3
- Experimental fiction 2
- FICTION / Literary 2
- Novel 2
- Swahili fiction 2
- Swahili literature 2
- Themes, motives 2
- African fiction 1
- African literature 1
- American 1
- American Literature 1
- American literature 1
- Anesthesia 1
- Anesthesiology 1
- Authors, Nigerian 1
- Beauty operators 1
- Bed and breakfast accommodations 1
- Blue collar workers 1
- Brothers 1
- Brothers and sisters 1
- Celebrities 1
- Chemical weapons 1
- Coming of Age 1
- Courtship 1
- Criticism and interpretation 1
- Elias (Fictitious character) 1
-
6001
L’Incipit de Jane Eyre : l’annonce d’une quête
Published 2009-03-01“…In this first unit of text, what is quite striking is that the ekphrasis enables the narrator to give a thematic, poetic and aesthetic orientation to the novel that is being written. Indeed by describing the pictures of the book by Thomas Bewick, Jane Eyre not only gives an idea of her miserable existence but also heralds the quest she is about to undertake.…”
Get full text
Article -
6002
Solution of Fractional Kinetic Equations Involving Laguerre Polynomials via Sumudu Transform
Published 2024-01-01“…It is essential to note that the results obtained in this study are exceptionally versatile and have the potential to yield both established and potentially novel findings in this field of research.…”
Get full text
Article -
6003
Pós-colonialidade, pós-escravismo, bioficção e con(tra)temporaneidade
Published 2014-01-01“…This critical essay promotes a connection between the contemporary concept from the literary theory field named “biofiction”, the post-colonial theory and the issue of Africa n - diasporic subjetivization, from the Brazilian historical experience and intellectual possibility of speech, crisscrossed with a symptomatic study of the last novels written by Toni Morrison, Home (2012), and Jamaica Kincaid, See now then ( 2013), as well as of the novel A question of power (1970) by Bessie Head. …”
Get full text
Article -
6004
Large scale network worm detection using automatic signature extraction
Published 2006-01-01“…Worms had done serious harm to the computer networks due to their propagating speeds.The research was necessary to detect worms quickly and automatically.In large scale networks,flux based anomaly found module was used to screen out anomalous network data set,and automatic signature extraction was processed in succession,then its signa-ture was updated to the signature database of the signature based detection module,thus,the approach to detect unknown worms was realized.Novel epidemic can be found effectively,and the whole system is the fundament of worm automatic defense.…”
Get full text
Article -
6005
The Tennis Shoe Army and Leviathan: Relics and Specters of Big Government in The Road
Published 2017-12-01“…To the extent that parallels can be drawn between the novel’s presentation of a tennis shoe army on the march, which resembles dream-like processions in other McCarthy novels, and Thomas Hobbes’ vision of an absolutist government as Leviathan, this essay argues that The Road can be seen as conveying an aversion to the impersonal rule of the bureaucratic state.…”
Get full text
Article -
6006
Composite Learning Sliding Mode Control of Flexible-Link Manipulator
Published 2017-01-01“…The sliding mode control is proposed while the adaptive design is developed using neural networks (NNs) and disturbance observer (DOB) where the novel update laws for NN and DOB are designed. The closed-loop system stability is guaranteed via Lyapunov analysis. …”
Get full text
Article -
6007
Proportional fairness based resource allocation algorithm for dirty-paper coded multi-user MIMO-OFDM systems
Published 2008-01-01“…A novel resource allocation algorithm was proposed for dirty-paper coded multi-user multiple-input multi-ple-output (MIMO)-orthogonal frequency division multiplexing (OFDM) systems. …”
Get full text
Article -
6008
Vector space embedding of DNS query behaviors by deep learning
Published 2016-03-01“…A novel approach to analyze DNS query behaviors was introduced.This approach embeds queried domains or querying hosts to vector space by deep learning mechan then the relationship between querying of domains or hosts was mapped to vector space operations.By processing two real campus network DNS log datasets,it is found that this method maintains relationships very well.After doing mension reduction and clustering analysis,researchers can not only easily explore hidden relationships intuitively,but also discover abnormal network events like botnet.…”
Get full text
Article -
6009
Les relatives en américain contemporain
Published 1999-12-01“…This paper presents an analysis of relatives clauses in a corpus of American English (a contemporary novel).Our first aim was to study whether the syntax of relatives clauses is the same in American English and in British English - and the study shows that the two systems differ in several important ways.Our second aim was to revive a methodology: the idea was to approach the data with an open mind, to gather and analyse all the occurrences in a complete discourse, to ‘listen’ to what the data have to say - as opposed to an approach frequently used in recent studies, where the argumentation is theory-based and theory-oriented, and examples collected here and there are mere illustrations of what is posited.…”
Get full text
Article -
6010
Dynamics Contact Analysis of the Slewing Reducer Rigid-flexible Coupled based on ABAQUS
Published 2015-01-01“…The slewing reducer is widely applied in the field of solar photovoltaic power generation.Aiming at the high probability problem of the contact fatigue strength at the gear surface in all fatigue failure,by using the ABAQUS,the simulation analysis of dynamics contact problem is carried out.In order to simplify the problem and improve the precision of the model,a novel method is proposed.The worm is taken as a rigid body,and the slewing gear is taken as the flexible body,and then the contact fatigue analysis is carried out.The simulation results show that the model tallies with the actual situation,and the analysis results can provide guidance for the design optimization.…”
Get full text
Article -
6011
WGRe:a re-encryption anonymous tunnel
Published 2009-01-01“…The universal re-encryption scheme URE and its extension EURE were reviewed,discovering their vulnerabilities to Pfitzmann attack.Then a novel re-encryption scheme WGRe(WonGoo Re-encryption) was proposed.WGRe could en-sure the correctness of the outputs from a node and protect against replay attack,which was hard in layered encryption sys-tems.The experimental results show WGRe is practical and more efficient than URE and EURE schemes due to the fact that its ciphertext is only double the size of the corresponding plaintext,instead of four times as URE or EURE.…”
Get full text
Article -
6012
Space-Terrestrial Integrated Multi-Identifier Network with Endogenous Security
Published 2020-12-01“…A novel network architecture, named space-terrestrial integrated multi-identifi er network (STI-MIN) was proposed, which was suitable for the environment of space-terrestrial integrated situation.In the following passage, the fundamental theory, Space-Terrestrial integrated routing strategy, identifi er management system and endogenous security mechanism of STI-MIN were depicted.Then prototype experiment progress was summarized and the merit of STI-MIN by comparing with traditional network was analyzed.…”
Get full text
Article -
6013
Cryptanalysis and design of signature schemes with identity ambiguity in the standard model
Published 2011-01-01“…The security and flaw of the two anonymous signature schemes called ZLW(2008) and LHMM(2009) were analyzed,where the ZLW scheme couldn’t provide signed message verifiability and the LHMM scheme couldn’t resist on the multiple-known-signature existential forgery.A novel anonymous signature scheme was proposed that enforced the security level to Model3 security and reduced the computational cost,which only needed two multiple calculations in G in signing phase and n+1 bilinear pairing operators in verifying algorithm.…”
Get full text
Article -
6014
Algorithm of video object segmentation based on region Gibbs potential function
Published 2005-01-01“…A novel video motion object segmentation algorithm was proposed under spatial-temporal framework. …”
Get full text
Article -
6015
Service-Aware Algorithm Based on DT-KSVM
Published 2015-11-01“…A novel service-aware method based on decision tree kernel support vector machine(DT-KSVM) algorithm was proposed.A service-aware model was developed by using ReliefF algorithm to extract service characteristics,and proposing the separable degree between samples to simply the service-aware process.Through experiment comparison between this proposed model and traditional one-versus-one SVM method,it is shown that the proposed method has a better service-aware accuracy and time performance.…”
Get full text
Article -
6016
AI-Based Holistic Framework for Cyber Threat Intelligence Management
Published 2025-01-01“…Therefore, in this work, we propose ThreatWise AI, a novel framework that enables the gathering, analysis, enrichment, storage, and sharing of CTI in an efficient and secure manner. …”
Get full text
Article -
6017
A Comprehensive Review of the Diversity of Fungal Secondary Metabolites and Their Emerging Applications in Healthcare and Environment
Published 2024-11-01“…These SMs exhibit significant biological activity, which contributes to the formulation of novel pharmaceuticals, biopesticides, and environmental bioremediation agents. …”
Get full text
Article -
6018
Epigenetic Biomarkers and the Wnt/β-Catenin Pathway in Opisthorchis viverrini-associated Cholangiocarcinoma: A Scoping Review on Therapeutic Opportunities.
Published 2024-09-01“…However, additional validation is crucial for translating these novel insights into clinically applicable strategies, enhancing personalised Ov-CCA management approaches.…”
Get full text
Article -
6019
Pulsed Electromagnetic Field-Assisting Reduced Graphene Oxide-Incorporated Nanofibers for Osteogenic Differentiation of Human Dental Pulp Stem Cells
Published 2024-01-01“…To address these limitations and strengthen previous approaches, this study presents a novel strategy in tissue engineering for enhanced osteogenic differentiation. …”
Get full text
Article -
6020
Construction of 3D aerogels consisting of cellulose and BNNSs bridged by AgNPs for enhancing thermal and tribological properties of polyurethane composites
Published 2024-12-01“…Waterborne polyurethane (WPU) is attracting widespread attention in the friction field, but pure WPU cannot meet the wear resistance requirements due to poor thermal and self-lubricating properties. Herein, a novel cellulose/BNNSs-AgNPs aerogel (CBAg) composed of zero-dimensional silver nanoparticles (AgNPs), one-dimensional cellulose and two-dimensional boron nitride nanosheets (BNNSs) was successfully fabricated. …”
Get full text
Article