Showing 6,141 - 6,160 results of 19,871 for search '"*** (novel)"', query time: 0.07s Refine Results
  1. 6141

    Role of Nanomedicine and Nanotechnology in Dentistry – A Narrative Review by Richa Singh, M Sathya Kumar, K T Magesh, Nivedidha Manohar, Aravindhan Ravi, A Sivachandran

    Published 2024-12-01
    “…Nanomedicine integrates nanotechnology with medicine to develop novel approaches for targeted drug delivery, imaging, sensing, and regenerative medicine. …”
    Get full text
    Article
  2. 6142

    Colocar-se em palavras: memórias de um percurso íntimo by Regina Dalcastagnè

    Published 2012-01-01
    “…Based on a rapprochement between the award-winning novel Nur na escuridão (Nur in darkness), by Salim Miguel, which tells his family’s saga during his immi- gration from Lebanon to Brazil, and the unpublished manuscripts of Jose Miguel, the author’s father, who tells the same story, this article discusses the reasons for writing and the use of narrative resources to build a meaning for his life. …”
    Get full text
    Article
  3. 6143

    Peut-on mesurer la vitesse du récit médiéval ? Réflexions sur le rythme, l’agencement et la lecture du roman en vers by Vanessa Obry

    Published 2021-07-01
    “…In Figures III, Gérard Genette considers the alternation of scenes and summaries as the traditional rhythmic pattern of the novel. The article considers the possible use of Genette’s theorical system on narrative speed, for the study of the writing process and for the understanding of the reading modes of the medieval narratives. …”
    Get full text
    Article
  4. 6144

    Fairness based channel borrowing strategy for multimedia LEO satellite communications by HUANG Fei, XU Hui, WU Shi-qi

    Published 2006-01-01
    “…A LEO satellite mobility model and user multimedia traffic model was first built,then a novel channel bor-rowing strategy(CBS)was proposed and its performance was evaluated and compared with several existing channel al-location schemes through computer simulation.Simulation results show this scheme can satisfy the QoS requirement of LEO satellite multimedia service very well,at the same time,keeping resource utilization high,finally discussed the fair-ness and system performance under three different channel borrowing strategies.…”
    Get full text
    Article
  5. 6145

    Authentication-based double images fractal watermarking model of vector maps by SUN Jian-guo1, MEN Chao-guang1, MA Chun-guang1, LI Cheng-ming2

    Published 2009-01-01
    “…To realize the invasion identification and copyright authentication, a novel digital watermarking model for vector maps based on authentication was introduced.A double images fractal coding technology was proposed for the compound images, namely, the map owner’s fingerprint was taken as the domain blocks and the vector map was taken as range blocks.The control parameters of fractal similarity computation were defined as watermarking, which could be embedded into the properties file of the map.Experiments and analysis show that, besides providing services of copyright protection, the model improves the robustness and the owners’ authentication probability.…”
    Get full text
    Article
  6. 6146

    Approximate Solutions of Fractional Riccati Equations Using the Adomian Decomposition Method by Fei Wu, Lan-Lan Huang

    Published 2014-01-01
    “…The fractional derivative equation has extensively appeared in various applied nonlinear problems and methods for finding the model become a popular topic. Very recently, a novel way was proposed by Duan (2010) to calculate the Adomian series which is a crucial step of the Adomian decomposition method. …”
    Get full text
    Article
  7. 6147

    Method of data interleaving for H.264 video communication by SONG Bin, GUO Chun-fang, QIN Hao

    Published 2007-01-01
    “…According to the NALU of H.264 and the characteristic of real-time video communication,a method of data interleaving for H.264 video communication was presented.Using forward erasure correction,this method could provide the unequal protection mechanism to the H.264 video stream.The more important the H.264 video stream,the stronger protection it could provide.Furthermore,a novel format of RTP payload and encapsulation was also proposed.Simulation results show that the quality of the reconstructed video can be greatly increased with similar bit rates by using the presented method.…”
    Get full text
    Article
  8. 6148

    Debating Igbo conversion to Christianity: a critical indigenous view by F. Hale

    Published 2006-12-01
    “…Within the genre of the novel, West African writers like the Ibgos Chinua Achebe, John Munonye, and T. …”
    Get full text
    Article
  9. 6149

    Role and Function of T Cell-Derived Exosomes and Their Therapeutic Value by Yuanyuan Shao, Xiaofeng Pan, Rong Fu

    Published 2021-01-01
    “…In the more than three decades since the discovery of exosomes, several studies have revealed that T cell-derived exosomes play a novel role in cell-to-cell signaling, especially in inflammatory responses, autoimmunity, and infectious diseases. …”
    Get full text
    Article
  10. 6150

    COVID-19 Preventative Measures: Cleaning and Disinfecting Reusable Bags by Natalie Seymour, Mary Yavelak, Candice Christian, Ben Chapman, Michelle Danyluk

    Published 2020-03-01
    “… Current evidence suggests that novel coronavirus may remain viable for hours or days on a variety of surfaces. …”
    Get full text
    Article
  11. 6151

    Les Quotas by Marie-Laure Schultze, Sujarei Tali

    Published 2017-12-01
    “…In this universe, the choice of whom you have sexual relationships with, how and at which rate doesn’t belong to you anymore.This narrative is presented in three different forms: a comic, an audio recording and a novel, three ways (graphic, audio and textual) as three attempts to thwart Kimée and Djoa’s gender and sexuality—the characters, and their universe. …”
    Get full text
    Article
  12. 6152

    « This is Hell – Hell - Hell ! » : les éléments dans The Nether World de George Gissing by Fabienne Gaspari

    Published 2010-06-01
    “…Such evocations generate clusters of images which are first meant to convey some grim picture of reality but which also lead to a poetic and fleeting representation of the elements, a reverie on the « dung-heap » (a metaphor defining the naturalist novel) and on the flowers which grow from it.…”
    Get full text
    Article
  13. 6153

    Réflexion sur l’indécidable flaubertien : à partir de la traduction de Bouvard et Pécuchet en japonais by Norioki Sugaya

    Published 2020-12-01
    “…In a second time, we will deal with the problem of editing in general and try to measure the meaning of the semantic ambiguities of which we find many examples in the novel. This will result in relativizing a little the received modernist idea on Flaubert’s undecidability.…”
    Get full text
    Article
  14. 6154

    « Comme à l’époque de Suzie Wong ». Les mutations du red-light district de Wan Chai by Nicolas Paris

    Published 2011-06-01
    “…The exotic novel, The World of Suzie Wong, and its many adaptations immortalized the red-light district of Wan Chai, Hong Kong with its American sailors, British Empire expatriates and Hong Kong prostitutes in the late 1950s. …”
    Get full text
    Article
  15. 6155

    Research on traffic identification and wavelength scheduling scheme in optical internet by WANG Hong-xiang, JI Yue-feng, LI Hui

    Published 2008-01-01
    “…A conception of universal inter-arrival time (UIAT), and a traffic identification algorithm based on UIAT by using Bayesian network was presented. A novel wavelength scheduling scheme with traffic identification was proposed and numerically simulated. …”
    Get full text
    Article
  16. 6156

    A Madame Bovary’s Daughter: David Lean’s Visual Transliteration of Flaubert by Franck Dalmas

    Published 2014-11-01
    “…The impersonal narration and sensual expression of the novel are reassessed in light of this loose adaptation. …”
    Get full text
    Article
  17. 6157

    Research and applications of intelligent public security information system based on big data by Dong-ke LI

    Published 2016-12-01
    “…The rapid development of big data push the big changes to every industries and government agencies.The concept of big data and security intelligent system framework was cleared.Then,the serious problems of the devel-opment of intelligent public security were analyzed,the novel work model of public security was also studied,and the new paths and method were pointed ont.Next,the intelligent information system for public security was built up,and the effectiveness of this system were evaluated.The system can efficiently meet the requirements of the current public security,and serve the national security with great significance.…”
    Get full text
    Article
  18. 6158

    Non-interference trusted model based on processes by ZHANG Xing1, CHEN You-lei2, SHEN Chang-xiang2

    Published 2009-01-01
    “…A novel abstract model for the design of trusted computing platform system was proposed.By using the basic idea of non-interference theory as reference and introduces the reasoning method of process algebra, thus abstracting the system as processes, actions, states and outputs, and giving the formal definition of the trusted of process running.Process isolation trusted theorem was verified formally.Furthermore, by associating process with system state, the definition and the theorem of system running trusted was proposed.The model was established by logic reasoning and independent of special security mechanism and enforcement.The trust of the running system can be realized by any method which satisfies the conditions of the model.…”
    Get full text
    Article
  19. 6159

    Event-Triggered Consensus Control for Leader-Following Multiagent Systems Using Output Feedback by Yang Liu, Xiaohui Hou

    Published 2018-01-01
    “…The event-triggered consensus control for leader-following multiagent systems subjected to external disturbances is investigated, by using the output feedback. In particular, a novel distributed event-triggered protocol is proposed by adopting dynamic observers to estimate the internal state information based on the measurable output signal. …”
    Get full text
    Article
  20. 6160

    Optimal algorithm based on weight balancing for designing the logical topology of the optical network by FU Ming-lei, LE Zi-chun, LU Min

    Published 2006-01-01
    “…The design of an optimal logical topology in optical networks was reported.The traffic load matrix and the delay matrix were considered together and then two novel network weights were defined.Therefore,both the congestion and average delay were optimized simultaneously.Moreover,an optimal algorithm which based on the two kinds of weight definition was proposed.In the simulation part,the NSFNET was chosen as the network model and the heuristic algorithm was compared with two other kinds of designing algorithms.Finally,the effect on network performances,which was caused by four performance parameters including the congestion,blocking probability,delay and load balanc-ing states,was discussed in numerical results part.…”
    Get full text
    Article