Suggested Topics within your search.
Suggested Topics within your search.
- novel 11
- History 4
- Appreciation 3
- History and criticism 3
- kiswahili novel 3
- Experimental fiction 2
- FICTION / Literary 2
- Novel 2
- Swahili fiction 2
- Swahili literature 2
- Themes, motives 2
- African fiction 1
- African literature 1
- American 1
- American Literature 1
- American literature 1
- Anesthesia 1
- Anesthesiology 1
- Authors, Nigerian 1
- Beauty operators 1
- Bed and breakfast accommodations 1
- Blue collar workers 1
- Brothers 1
- Brothers and sisters 1
- Celebrities 1
- Chemical weapons 1
- Coming of Age 1
- Courtship 1
- Criticism and interpretation 1
- Elias (Fictitious character) 1
-
6141
Role of Nanomedicine and Nanotechnology in Dentistry – A Narrative Review
Published 2024-12-01“…Nanomedicine integrates nanotechnology with medicine to develop novel approaches for targeted drug delivery, imaging, sensing, and regenerative medicine. …”
Get full text
Article -
6142
Colocar-se em palavras: memórias de um percurso íntimo
Published 2012-01-01“…Based on a rapprochement between the award-winning novel Nur na escuridão (Nur in darkness), by Salim Miguel, which tells his family’s saga during his immi- gration from Lebanon to Brazil, and the unpublished manuscripts of Jose Miguel, the author’s father, who tells the same story, this article discusses the reasons for writing and the use of narrative resources to build a meaning for his life. …”
Get full text
Article -
6143
Peut-on mesurer la vitesse du récit médiéval ? Réflexions sur le rythme, l’agencement et la lecture du roman en vers
Published 2021-07-01“…In Figures III, Gérard Genette considers the alternation of scenes and summaries as the traditional rhythmic pattern of the novel. The article considers the possible use of Genette’s theorical system on narrative speed, for the study of the writing process and for the understanding of the reading modes of the medieval narratives. …”
Get full text
Article -
6144
Fairness based channel borrowing strategy for multimedia LEO satellite communications
Published 2006-01-01“…A LEO satellite mobility model and user multimedia traffic model was first built,then a novel channel bor-rowing strategy(CBS)was proposed and its performance was evaluated and compared with several existing channel al-location schemes through computer simulation.Simulation results show this scheme can satisfy the QoS requirement of LEO satellite multimedia service very well,at the same time,keeping resource utilization high,finally discussed the fair-ness and system performance under three different channel borrowing strategies.…”
Get full text
Article -
6145
Authentication-based double images fractal watermarking model of vector maps
Published 2009-01-01“…To realize the invasion identification and copyright authentication, a novel digital watermarking model for vector maps based on authentication was introduced.A double images fractal coding technology was proposed for the compound images, namely, the map owner’s fingerprint was taken as the domain blocks and the vector map was taken as range blocks.The control parameters of fractal similarity computation were defined as watermarking, which could be embedded into the properties file of the map.Experiments and analysis show that, besides providing services of copyright protection, the model improves the robustness and the owners’ authentication probability.…”
Get full text
Article -
6146
Approximate Solutions of Fractional Riccati Equations Using the Adomian Decomposition Method
Published 2014-01-01“…The fractional derivative equation has extensively appeared in various applied nonlinear problems and methods for finding the model become a popular topic. Very recently, a novel way was proposed by Duan (2010) to calculate the Adomian series which is a crucial step of the Adomian decomposition method. …”
Get full text
Article -
6147
Method of data interleaving for H.264 video communication
Published 2007-01-01“…According to the NALU of H.264 and the characteristic of real-time video communication,a method of data interleaving for H.264 video communication was presented.Using forward erasure correction,this method could provide the unequal protection mechanism to the H.264 video stream.The more important the H.264 video stream,the stronger protection it could provide.Furthermore,a novel format of RTP payload and encapsulation was also proposed.Simulation results show that the quality of the reconstructed video can be greatly increased with similar bit rates by using the presented method.…”
Get full text
Article -
6148
Debating Igbo conversion to Christianity: a critical indigenous view
Published 2006-12-01“…Within the genre of the novel, West African writers like the Ibgos Chinua Achebe, John Munonye, and T. …”
Get full text
Article -
6149
Role and Function of T Cell-Derived Exosomes and Their Therapeutic Value
Published 2021-01-01“…In the more than three decades since the discovery of exosomes, several studies have revealed that T cell-derived exosomes play a novel role in cell-to-cell signaling, especially in inflammatory responses, autoimmunity, and infectious diseases. …”
Get full text
Article -
6150
COVID-19 Preventative Measures: Cleaning and Disinfecting Reusable Bags
Published 2020-03-01“… Current evidence suggests that novel coronavirus may remain viable for hours or days on a variety of surfaces. …”
Get full text
Article -
6151
Les Quotas
Published 2017-12-01“…In this universe, the choice of whom you have sexual relationships with, how and at which rate doesn’t belong to you anymore.This narrative is presented in three different forms: a comic, an audio recording and a novel, three ways (graphic, audio and textual) as three attempts to thwart Kimée and Djoa’s gender and sexuality—the characters, and their universe. …”
Get full text
Article -
6152
« This is Hell – Hell - Hell ! » : les éléments dans The Nether World de George Gissing
Published 2010-06-01“…Such evocations generate clusters of images which are first meant to convey some grim picture of reality but which also lead to a poetic and fleeting representation of the elements, a reverie on the « dung-heap » (a metaphor defining the naturalist novel) and on the flowers which grow from it.…”
Get full text
Article -
6153
Réflexion sur l’indécidable flaubertien : à partir de la traduction de Bouvard et Pécuchet en japonais
Published 2020-12-01“…In a second time, we will deal with the problem of editing in general and try to measure the meaning of the semantic ambiguities of which we find many examples in the novel. This will result in relativizing a little the received modernist idea on Flaubert’s undecidability.…”
Get full text
Article -
6154
« Comme à l’époque de Suzie Wong ». Les mutations du red-light district de Wan Chai
Published 2011-06-01“…The exotic novel, The World of Suzie Wong, and its many adaptations immortalized the red-light district of Wan Chai, Hong Kong with its American sailors, British Empire expatriates and Hong Kong prostitutes in the late 1950s. …”
Get full text
Article -
6155
Research on traffic identification and wavelength scheduling scheme in optical internet
Published 2008-01-01“…A conception of universal inter-arrival time (UIAT), and a traffic identification algorithm based on UIAT by using Bayesian network was presented. A novel wavelength scheduling scheme with traffic identification was proposed and numerically simulated. …”
Get full text
Article -
6156
A Madame Bovary’s Daughter: David Lean’s Visual Transliteration of Flaubert
Published 2014-11-01“…The impersonal narration and sensual expression of the novel are reassessed in light of this loose adaptation. …”
Get full text
Article -
6157
Research and applications of intelligent public security information system based on big data
Published 2016-12-01“…The rapid development of big data push the big changes to every industries and government agencies.The concept of big data and security intelligent system framework was cleared.Then,the serious problems of the devel-opment of intelligent public security were analyzed,the novel work model of public security was also studied,and the new paths and method were pointed ont.Next,the intelligent information system for public security was built up,and the effectiveness of this system were evaluated.The system can efficiently meet the requirements of the current public security,and serve the national security with great significance.…”
Get full text
Article -
6158
Non-interference trusted model based on processes
Published 2009-01-01“…A novel abstract model for the design of trusted computing platform system was proposed.By using the basic idea of non-interference theory as reference and introduces the reasoning method of process algebra, thus abstracting the system as processes, actions, states and outputs, and giving the formal definition of the trusted of process running.Process isolation trusted theorem was verified formally.Furthermore, by associating process with system state, the definition and the theorem of system running trusted was proposed.The model was established by logic reasoning and independent of special security mechanism and enforcement.The trust of the running system can be realized by any method which satisfies the conditions of the model.…”
Get full text
Article -
6159
Event-Triggered Consensus Control for Leader-Following Multiagent Systems Using Output Feedback
Published 2018-01-01“…The event-triggered consensus control for leader-following multiagent systems subjected to external disturbances is investigated, by using the output feedback. In particular, a novel distributed event-triggered protocol is proposed by adopting dynamic observers to estimate the internal state information based on the measurable output signal. …”
Get full text
Article -
6160
Optimal algorithm based on weight balancing for designing the logical topology of the optical network
Published 2006-01-01“…The design of an optimal logical topology in optical networks was reported.The traffic load matrix and the delay matrix were considered together and then two novel network weights were defined.Therefore,both the congestion and average delay were optimized simultaneously.Moreover,an optimal algorithm which based on the two kinds of weight definition was proposed.In the simulation part,the NSFNET was chosen as the network model and the heuristic algorithm was compared with two other kinds of designing algorithms.Finally,the effect on network performances,which was caused by four performance parameters including the congestion,blocking probability,delay and load balanc-ing states,was discussed in numerical results part.…”
Get full text
Article