Suggested Topics within your search.
Suggested Topics within your search.
- novel 11
- History 4
- Appreciation 3
- History and criticism 3
- kiswahili novel 3
- Experimental fiction 2
- FICTION / Literary 2
- Novel 2
- Swahili fiction 2
- Swahili literature 2
- Themes, motives 2
- African fiction 1
- African literature 1
- American 1
- American Literature 1
- American literature 1
- Anesthesia 1
- Anesthesiology 1
- Authors, Nigerian 1
- Beauty operators 1
- Bed and breakfast accommodations 1
- Blue collar workers 1
- Brothers 1
- Brothers and sisters 1
- Celebrities 1
- Chemical weapons 1
- Coming of Age 1
- Courtship 1
- Criticism and interpretation 1
- Elias (Fictitious character) 1
-
6241
Challenging Class Barriers in Jane Austen’s Mansfield Park
Published 2020-12-01“…Jane Austen can be regarded as an author renowned for her conventional novels at first glance. Nevertheless, reading Austen in a profound way reveals that there lies a hidden critical voice against the irregularities of society. …”
Get full text
Article -
6242
A Self-Adaptive Technique for Solving Variational Inequalities: A New Approach to the Problem
Published 2022-01-01“…The current study proposed a novel iterative scheme developed through a fixed-point scheme and formulation for solving variational inequalities. …”
Get full text
Article -
6243
La matière féerique dans Salammbô
Published 2014-10-01“…This article approaches Flaubert’s historical novel Salammbô from the perspective of fantasy. We postulate that Flaubert, who was highly inspired by this popular theatrical genre, takes fantasy as a model for his deconstruction of the writing of History. …”
Get full text
Article -
6244
A general attack model based on Android system vulnerability
Published 2016-10-01“…The exploitation of several typical system vulnerabilities was analyzed, a general model of Android system vulnerability exploitation was proposed, and a novel evaluation framework for the effectiveness of vulnerability exploitation was presented. …”
Get full text
Article -
6245
Denoising Algorithm Based on Generalized Fractional Integral Operator with Two Parameters
Published 2012-01-01“…In this paper, a novel digital image denoising algorithm called generalized fractional integral filter is introduced based on the generalized Srivastava-Owa fractional integral operator. …”
Get full text
Article -
6246
High energy efficient clock synchronization protocol for sensor networks using time division flooding
Published 2007-01-01“…In most synchronization protocols that based on classic flooding scheme,the arrival time of packets couldn’t be predicted,so nodes had to keep monitoring the channel.Therefore,idle listening was quite serious which leaded to low energy efficiency.A novel synchronization protocol focusing on reducing idle listening was proposed,where time division flooding scheme was adopted to spread messages.Unique transmitting and receiving slots would be assigned to each individual in localized and distributed way.Higher energy efficiency,lower clock compensation error and faster convergence speed could be achieved,as shown in the simulations.Furthermore,it could be easily modified to co-work with plenty of MAC protocols.…”
Get full text
Article -
6247
Fault localization approach for null pointer exception
Published 2015-01-01“…A novel approach to locate the fault for null pointer exception is presented.The approach first computes the static slice guided by the runtime stack,then conducts a null-pointer analysis and aliases analysis on the sliced program and obtains the suspicious statements that throw null-pointer exceptions,and finally generates a fault localization report.The experimental study indicates that,although time spent in runtime stack information collecting and aliases transferring,the proposed approach can narrow the searching space of the problem with runtime stack,and discover the value transfer process with aliases analysis,thereby eliminating false negative and false positive,and improving the effectiveness of fault localization.…”
Get full text
Article -
6248
Fair and anonymous ID-based multi-receiver signcryption
Published 2013-08-01“…In order to solve the identify information exposure problem and the decryption unfairness problem in Lal et al’s identity-based multi-receiver signcryption scheme,a novel identity-based multi-receiver signcryption scheme,using the Lagrange interpolation method,was proposed to meet the requirements of the identity anonymity and the decryption fairness.Based on the Bilinear Diffie-Hellman and computational Diffie-Hellman assumptions,the security of IND-sMIBSC-CCA2 and EUF-sMIBSC-CMA was proved formally under the random oracle model,which shows that the proposed scheme can achieve the confidentiality and the unforgeablity required.…”
Get full text
Article -
6249
The (im)possibility of communication
Published 2022-10-01“…It is shown that the same aporia that confronts the reader of Ulysses, namely that a counter-signature to the text is possible as a novel event and is simultaneously not possible as such, faces participants in communication: communication is and is not possible. …”
Get full text
Article -
6250
That Sounds More Like Something Aarfy Would Do: Conflicting Portrayals of Sexual Assault in Catch-22 and Something Happened
Published 2021-07-01“…The scene, however, contrasts with Heller’s clearer condemnations of assault elsewhere in the novel, particularly the rapes in the Eternal City and Aarfy’s escape from punishment. …”
Get full text
Article -
6251
A Convolutional Neural Network for Nonrigid Structure from Motion
Published 2022-01-01“…In this study, we propose a reconstruction and optimization neural network (RONN), a novel neural network for nonrigid structure from motion, which is completed by an unsupervised convolution neural network. …”
Get full text
Article -
6252
Olivers Twisted: Urban Milieu from Text to Media
Published 2012-01-01“…Oliver & Company, emphasizing the fairy-tale elements of the novel, draws on Reed’s optimistic perception, with contemporary New York replacing nineteenth-century London. …”
Get full text
Article -
6253
Three-Point Boundary Value Problems for Conformable Fractional Differential Equations
Published 2015-01-01“…We study a fractional differential equation using a recent novel concept of fractional derivative with initial and three-point boundary conditions. …”
Get full text
Article -
6254
Oblivious transfer based on physical unclonable function system
Published 2013-08-01“…According to the analysis of physical un-clonable function, a physical unclonable function system framework was defined, and a novel oblivious transfer (POT, PUFS based OT) protocol was proposed based on this framework. …”
Get full text
Article -
6255
Fabrication and characterization of ZrO nanofibers by critical bubble electrospinning for high-temperature-resistant adsorption and separation
Published 2019-07-01“…In this study, a novel and simple approach to fabricate zirconium dioxide (ZrO 2 ) nanofibers by critical bubble electrospinning and subsequent thermal treatment was reported. …”
Get full text
Article -
6256
PAPR reduction method for SFBC MIMO-OFDM systems
Published 2009-01-01“…To deal with this problem, a novel method was proposed to reduce the PAPR of SFBC MIMO-OFDM systems. …”
Get full text
Article -
6257
Improved identity based multi-receiver anonymous signcryption scheme
Published 2015-09-01“…Recently,Pang,et al proposed a novel identity based multi-receiver anonymous signcryption scheme (IBMRASC),which put into consideration both the sender's anonymity and the receiver's anonymity simultaneously.However,the analysis with respect to this scheme indicated that,under existing security models the adversary can distin-guish the ciphertexts associated with different plaintexts.Therefore,Pang's approach did not satisfy the requirement of indistinguishability against chosen ciphertext attacks (CCA).An improved scheme which is selective identity secure in the random oracle model was proposed.Under the CDH and Gap-BDH hard problem assumption,the improved scheme is both existentially unforgetable against chosen message attack and indistinguishable against adaptive CCA.…”
Get full text
Article -
6258
A Temperature Field Based Routing Algorithm in Content-Centric Networking
Published 2015-12-01“…Content-centric networking(CCN)is a novel network architecture which presents new challenges for the design of routing. …”
Get full text
Article -
6259
Analytical Solutions for the Nonlinear Partial Differential Equations Using the Conformable Triple Laplace Transform Decomposition Method
Published 2021-01-01“…In this paper, a novel analytical method for solving nonlinear partial differential equations is studied. …”
Get full text
Article -
6260
A Theoretical Investigation Based on the Rough Approximations of Hypergraphs
Published 2022-01-01“…In this research paper, the notion of a rough set is applied to hypergraphs to introduce the novel concept of rough hypergraphs based on rough relations. …”
Get full text
Article