Showing 6,001 - 6,020 results of 19,871 for search '"*** (novel)"', query time: 0.09s Refine Results
  1. 6001

    L’Incipit de Jane Eyre : l’annonce d’une quête by Elise Ouvrard

    Published 2009-03-01
    “…In this first unit of text, what is quite striking is that the ekphrasis enables the narrator to give a thematic, poetic and aesthetic orientation to the novel that is being written. Indeed by describing the pictures of the book by Thomas Bewick, Jane Eyre not only gives an idea of her miserable existence but also heralds the quest she is about to undertake.…”
    Get full text
    Article
  2. 6002

    Solution of Fractional Kinetic Equations Involving Laguerre Polynomials via Sumudu Transform by Wagdi F. S. Ahmed, D. D. Pawar, W. D. Patil

    Published 2024-01-01
    “…It is essential to note that the results obtained in this study are exceptionally versatile and have the potential to yield both established and potentially novel findings in this field of research.…”
    Get full text
    Article
  3. 6003

    Pós-colonialidade, pós-escravismo, bioficção e con(tra)temporaneidade by Denise Carrascosa

    Published 2014-01-01
    “…This critical essay promotes a connection between the contemporary concept from the literary theory field named “biofiction”, the post-colonial theory and the issue of Africa n - diasporic subjetivization, from the Brazilian historical experience and intellectual possibility of speech, crisscrossed with a symptomatic study of the last novels written by Toni Morrison, Home (2012), and Jamaica Kincaid, See now then ( 2013), as well as of the novel A question of power (1970) by Bessie Head. …”
    Get full text
    Article
  4. 6004

    Large scale network worm detection using automatic signature extraction by WANG Ping, FANG Bin-xing, YUN Xiao-chun

    Published 2006-01-01
    “…Worms had done serious harm to the computer networks due to their propagating speeds.The research was necessary to detect worms quickly and automatically.In large scale networks,flux based anomaly found module was used to screen out anomalous network data set,and automatic signature extraction was processed in succession,then its signa-ture was updated to the signature database of the signature based detection module,thus,the approach to detect unknown worms was realized.Novel epidemic can be found effectively,and the whole system is the fundament of worm automatic defense.…”
    Get full text
    Article
  5. 6005

    The Tennis Shoe Army and Leviathan: Relics and Specters of Big Government in The Road by Robert Pirro

    Published 2017-12-01
    “…To the extent that parallels can be drawn between the novel’s presentation of a tennis shoe army on the march, which resembles dream-like processions in other McCarthy novels, and Thomas Hobbes’ vision of an absolutist government as Leviathan, this essay argues that The Road can be seen as conveying an aversion to the impersonal rule of the bureaucratic state.…”
    Get full text
    Article
  6. 6006

    Composite Learning Sliding Mode Control of Flexible-Link Manipulator by Bin Xu, Pengchao Zhang

    Published 2017-01-01
    “…The sliding mode control is proposed while the adaptive design is developed using neural networks (NNs) and disturbance observer (DOB) where the novel update laws for NN and DOB are designed. The closed-loop system stability is guaranteed via Lyapunov analysis. …”
    Get full text
    Article
  7. 6007

    Proportional fairness based resource allocation algorithm for dirty-paper coded multi-user MIMO-OFDM systems by ZHAO Yi, LIU Yuan-an, ZENG Ling-kang, XIE Gang, XIONG Fang

    Published 2008-01-01
    “…A novel resource allocation algorithm was proposed for dirty-paper coded multi-user multiple-input multi-ple-output (MIMO)-orthogonal frequency division multiplexing (OFDM) systems. …”
    Get full text
    Article
  8. 6008

    Vector space embedding of DNS query behaviors by deep learning by Chang-ling ZHOU, Xing-long LUAN, Jian-guo XIAO

    Published 2016-03-01
    “…A novel approach to analyze DNS query behaviors was introduced.This approach embeds queried domains or querying hosts to vector space by deep learning mechan then the relationship between querying of domains or hosts was mapped to vector space operations.By processing two real campus network DNS log datasets,it is found that this method maintains relationships very well.After doing mension reduction and clustering analysis,researchers can not only easily explore hidden relationships intuitively,but also discover abnormal network events like botnet.…”
    Get full text
    Article
  9. 6009

    Les relatives en américain contemporain by Françoise Dubois-Charlier

    Published 1999-12-01
    “…This paper presents an analysis of relatives clauses in a corpus of American English (a contemporary novel).Our first aim was to study whether the syntax of relatives clauses is the same in American English and in British English - and the study shows that the two systems differ in several important ways.Our second aim was to revive a methodology: the idea was to approach the data with an open mind, to gather and analyse all the occurrences in a complete discourse, to ‘listen’ to what the data have to say - as opposed to an approach frequently used in recent studies, where the argumentation is theory-based and theory-oriented, and examples collected here and there are mere illustrations of what is posited.…”
    Get full text
    Article
  10. 6010

    Dynamics Contact Analysis of the Slewing Reducer Rigid-flexible Coupled based on ABAQUS by Lu Chao, Chen Jie, Hong Rongjing

    Published 2015-01-01
    “…The slewing reducer is widely applied in the field of solar photovoltaic power generation.Aiming at the high probability problem of the contact fatigue strength at the gear surface in all fatigue failure,by using the ABAQUS,the simulation analysis of dynamics contact problem is carried out.In order to simplify the problem and improve the precision of the model,a novel method is proposed.The worm is taken as a rigid body,and the slewing gear is taken as the flexible body,and then the contact fatigue analysis is carried out.The simulation results show that the model tallies with the actual situation,and the analysis results can provide guidance for the design optimization.…”
    Get full text
    Article
  11. 6011

    WGRe:a re-encryption anonymous tunnel by LU Tian-bo1, QIN Bao-shan2, LI Yang3, DING Li1

    Published 2009-01-01
    “…The universal re-encryption scheme URE and its extension EURE were reviewed,discovering their vulnerabilities to Pfitzmann attack.Then a novel re-encryption scheme WGRe(WonGoo Re-encryption) was proposed.WGRe could en-sure the correctness of the outputs from a node and protect against replay attack,which was hard in layered encryption sys-tems.The experimental results show WGRe is practical and more efficient than URE and EURE schemes due to the fact that its ciphertext is only double the size of the corresponding plaintext,instead of four times as URE or EURE.…”
    Get full text
    Article
  12. 6012

    Space-Terrestrial Integrated Multi-Identifier Network with Endogenous Security by Guohua WEI, Hui LI, Yongjie BAI, Gengxin LI, Kaixuan XING

    Published 2020-12-01
    “…A novel network architecture, named space-terrestrial integrated multi-identifi er network (STI-MIN) was proposed, which was suitable for the environment of space-terrestrial integrated situation.In the following passage, the fundamental theory, Space-Terrestrial integrated routing strategy, identifi er management system and endogenous security mechanism of STI-MIN were depicted.Then prototype experiment progress was summarized and the merit of STI-MIN by comparing with traditional network was analyzed.…”
    Get full text
    Article
  13. 6013

    Cryptanalysis and design of signature schemes with identity ambiguity in the standard model by ZHANG Ming-wu1, YANG Bo1, YAO Jin-tao1, ZHANG Wen-zheng2

    Published 2011-01-01
    “…The security and flaw of the two anonymous signature schemes called ZLW(2008) and LHMM(2009) were analyzed,where the ZLW scheme couldn’t provide signed message verifiability and the LHMM scheme couldn’t resist on the multiple-known-signature existential forgery.A novel anonymous signature scheme was proposed that enforced the security level to Model3 security and reduced the computational cost,which only needed two multiple calculations in G in signing phase and n+1 bilinear pairing operators in verifying algorithm.…”
    Get full text
    Article
  14. 6014

    Algorithm of video object segmentation based on region Gibbs potential function by BAO Hong-qiang, ZHANG Zhao-yang

    Published 2005-01-01
    “…A novel video motion object segmentation algorithm was proposed under spatial-temporal framework. …”
    Get full text
    Article
  15. 6015

    Service-Aware Algorithm Based on DT-KSVM by Hao Dong, Hua Qu, Jihong Zhao, Liangjun Chen, Huijun Dai

    Published 2015-11-01
    “…A novel service-aware method based on decision tree kernel support vector machine(DT-KSVM) algorithm was proposed.A service-aware model was developed by using ReliefF algorithm to extract service characteristics,and proposing the separable degree between samples to simply the service-aware process.Through experiment comparison between this proposed model and traditional one-versus-one SVM method,it is shown that the proposed method has a better service-aware accuracy and time performance.…”
    Get full text
    Article
  16. 6016

    AI-Based Holistic Framework for Cyber Threat Intelligence Management by Arnolnt Spyros, Ilias Koritsas, Angelos Papoutsis, Panos Panagiotou, Despoina Chatzakou, Dimitrios Kavallieros, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris

    Published 2025-01-01
    “…Therefore, in this work, we propose ThreatWise AI, a novel framework that enables the gathering, analysis, enrichment, storage, and sharing of CTI in an efficient and secure manner. …”
    Get full text
    Article
  17. 6017

    A Comprehensive Review of the Diversity of Fungal Secondary Metabolites and Their Emerging Applications in Healthcare and Environment by Khushbu Wadhwa, Neha Kapoor, Hardeep Kaur, Eman A. Abu-Seer, Mohd. Tariq, Sazada Siddiqui, Virendra Kumar Yadav, Parwiz Niazi, Pankaj Kumar, Saad Alghamdi

    Published 2024-11-01
    “…These SMs exhibit significant biological activity, which contributes to the formulation of novel pharmaceuticals, biopesticides, and environmental bioremediation agents. …”
    Get full text
    Article
  18. 6018

    Epigenetic Biomarkers and the Wnt/β-Catenin Pathway in Opisthorchis viverrini-associated Cholangiocarcinoma: A Scoping Review on Therapeutic Opportunities. by Alok Kafle, Sutas Suttiprapa, Mubarak Muhammad, Jan Clyden B Tenorio, Roshan Kumar Mahato, Norhidayu Sahimin, Shih Keng Loong

    Published 2024-09-01
    “…However, additional validation is crucial for translating these novel insights into clinically applicable strategies, enhancing personalised Ov-CCA management approaches.…”
    Get full text
    Article
  19. 6019

    Pulsed Electromagnetic Field-Assisting Reduced Graphene Oxide-Incorporated Nanofibers for Osteogenic Differentiation of Human Dental Pulp Stem Cells by Juo Lee, Sungmin Lee, Iksong Byun, Myung Chul Lee, Jungsil Kim, Hoon Seonwoo

    Published 2024-01-01
    “…To address these limitations and strengthen previous approaches, this study presents a novel strategy in tissue engineering for enhanced osteogenic differentiation. …”
    Get full text
    Article
  20. 6020

    Construction of 3D aerogels consisting of cellulose and BNNSs bridged by AgNPs for enhancing thermal and tribological properties of polyurethane composites by Yu He, Yuanya Zhang, Yongjun Zhou, Junya Yuan, Xuehu Men

    Published 2024-12-01
    “…Waterborne polyurethane (WPU) is attracting widespread attention in the friction field, but pure WPU cannot meet the wear resistance requirements due to poor thermal and self-lubricating properties. Herein, a novel cellulose/BNNSs-AgNPs aerogel (CBAg) composed of zero-dimensional silver nanoparticles (AgNPs), one-dimensional cellulose and two-dimensional boron nitride nanosheets (BNNSs) was successfully fabricated. …”
    Get full text
    Article