Showing 6,241 - 6,260 results of 19,871 for search '"*** (novel)"', query time: 0.06s Refine Results
  1. 6241

    Challenging Class Barriers in Jane Austen’s Mansfield Park by Yalçın Erden

    Published 2020-12-01
    “…Jane Austen can be regarded as an author renowned for her conventional novels at first glance. Nevertheless, reading Austen in a profound way reveals that there lies a hidden critical voice against the irregularities of society. …”
    Get full text
    Article
  2. 6242

    A Self-Adaptive Technique for Solving Variational Inequalities: A New Approach to the Problem by Muhammad Bux, Saleem Ullah, Muhammad Shoaib Arif, Kamaleldin Abodayeh

    Published 2022-01-01
    “…The current study proposed a novel iterative scheme developed through a fixed-point scheme and formulation for solving variational inequalities. …”
    Get full text
    Article
  3. 6243

    La matière féerique dans Salammbô by Gesine Hindemith

    Published 2014-10-01
    “…This article approaches Flaubert’s historical novel Salammbô from the perspective of fantasy. We postulate that Flaubert, who was highly inspired by this popular theatrical genre, takes fantasy as a model for his deconstruction of the writing of History. …”
    Get full text
    Article
  4. 6244

    A general attack model based on Android system vulnerability by Xihai DENG, Weimiao FENG, Luping MA, Ying LI

    Published 2016-10-01
    “…The exploitation of several typical system vulnerabilities was analyzed, a general model of Android system vulnerability exploitation was proposed, and a novel evaluation framework for the effectiveness of vulnerability exploitation was presented. …”
    Get full text
    Article
  5. 6245

    Denoising Algorithm Based on Generalized Fractional Integral Operator with Two Parameters by Hamid A. Jalab, Rabha W. Ibrahim

    Published 2012-01-01
    “…In this paper, a novel digital image denoising algorithm called generalized fractional integral filter is introduced based on the generalized Srivastava-Owa fractional integral operator. …”
    Get full text
    Article
  6. 6246

    High energy efficient clock synchronization protocol for sensor networks using time division flooding by ZENG Yi, HU Bo, FENG Hui

    Published 2007-01-01
    “…In most synchronization protocols that based on classic flooding scheme,the arrival time of packets couldn’t be predicted,so nodes had to keep monitoring the channel.Therefore,idle listening was quite serious which leaded to low energy efficiency.A novel synchronization protocol focusing on reducing idle listening was proposed,where time division flooding scheme was adopted to spread messages.Unique transmitting and receiving slots would be assigned to each individual in localized and distributed way.Higher energy efficiency,lower clock compensation error and faster convergence speed could be achieved,as shown in the simulations.Furthermore,it could be easily modified to co-work with plenty of MAC protocols.…”
    Get full text
    Article
  7. 6247

    Fault localization approach for null pointer exception by Shu-juan JIANG, Xing-ya WANG, Yan-mei ZHANG, Wei LI, Xiao-lin JU, IUYing-qi L

    Published 2015-01-01
    “…A novel approach to locate the fault for null pointer exception is presented.The approach first computes the static slice guided by the runtime stack,then conducts a null-pointer analysis and aliases analysis on the sliced program and obtains the suspicious statements that throw null-pointer exceptions,and finally generates a fault localization report.The experimental study indicates that,although time spent in runtime stack information collecting and aliases transferring,the proposed approach can narrow the searching space of the problem with runtime stack,and discover the value transfer process with aliases analysis,thereby eliminating false negative and false positive,and improving the effectiveness of fault localization.…”
    Get full text
    Article
  8. 6248

    Fair and anonymous ID-based multi-receiver signcryption by Liao-jun PANG, Lu GAO, Qing-qi PEI, Yu-min WANG

    Published 2013-08-01
    “…In order to solve the identify information exposure problem and the decryption unfairness problem in Lal et al’s identity-based multi-receiver signcryption scheme,a novel identity-based multi-receiver signcryption scheme,using the Lagrange interpolation method,was proposed to meet the requirements of the identity anonymity and the decryption fairness.Based on the Bilinear Diffie-Hellman and computational Diffie-Hellman assumptions,the security of IND-sMIBSC-CCA2 and EUF-sMIBSC-CMA was proved formally under the random oracle model,which shows that the proposed scheme can achieve the confidentiality and the unforgeablity required.…”
    Get full text
    Article
  9. 6249

    The (im)possibility of communication by Bert Olivier

    Published 2022-10-01
    “…It is shown that the same aporia that confronts the reader of Ulysses, namely that a counter-signature to the text is possible as a novel event and is simultaneously not possible as such, faces participants in communication: communication is and is not possible. …”
    Get full text
    Article
  10. 6250

    That Sounds More Like Something Aarfy Would Do: Conflicting Portrayals of Sexual Assault in Catch-22 and Something Happened by Ian M. Rogers

    Published 2021-07-01
    “…The scene, however, contrasts with Heller’s clearer condemnations of assault elsewhere in the novel, particularly the rapes in the Eternal City and Aarfy’s escape from punishment. …”
    Get full text
    Article
  11. 6251

    A Convolutional Neural Network for Nonrigid Structure from Motion by Yaming Wang, Xiangyang Peng, Wenqing Huang, Meiliang Wang

    Published 2022-01-01
    “…In this study, we propose a reconstruction and optimization neural network (RONN), a novel neural network for nonrigid structure from motion, which is completed by an unsupervised convolution neural network. …”
    Get full text
    Article
  12. 6252

    Olivers Twisted: Urban Milieu from Text to Media by Mario Martino

    Published 2012-01-01
    “…Oliver & Company, emphasizing the fairy-tale elements of the novel, draws on Reed’s optimistic perception, with contemporary New York replacing nineteenth-century London. …”
    Get full text
    Article
  13. 6253

    Three-Point Boundary Value Problems for Conformable Fractional Differential Equations by H. Batarfi, Jorge Losada, Juan J. Nieto, W. Shammakh

    Published 2015-01-01
    “…We study a fractional differential equation using a recent novel concept of fractional derivative with initial and three-point boundary conditions. …”
    Get full text
    Article
  14. 6254

    Oblivious transfer based on physical unclonable function system by Yuan-bo GUO, Zi-nan ZHANG, Kui-wu YANG

    Published 2013-08-01
    “…According to the analysis of physical un-clonable function, a physical unclonable function system framework was defined, and a novel oblivious transfer (POT, PUFS based OT) protocol was proposed based on this framework. …”
    Get full text
    Article
  15. 6255

    Fabrication and characterization of ZrO nanofibers by critical bubble electrospinning for high-temperature-resistant adsorption and separation by Ya Li, Ji-Huan He

    Published 2019-07-01
    “…In this study, a novel and simple approach to fabricate zirconium dioxide (ZrO 2 ) nanofibers by critical bubble electrospinning and subsequent thermal treatment was reported. …”
    Get full text
    Article
  16. 6256

    PAPR reduction method for SFBC MIMO-OFDM systems by SHA Yi, CHEN Jun-xin, WANG Guang-xing

    Published 2009-01-01
    “…To deal with this problem, a novel method was proposed to reduce the PAPR of SFBC MIMO-OFDM systems. …”
    Get full text
    Article
  17. 6257

    Improved identity based multi-receiver anonymous signcryption scheme by Bo ZHANG, Tao SUN, Dai-rong YU

    Published 2015-09-01
    “…Recently,Pang,et al proposed a novel identity based multi-receiver anonymous signcryption scheme (IBMRASC),which put into consideration both the sender's anonymity and the receiver's anonymity simultaneously.However,the analysis with respect to this scheme indicated that,under existing security models the adversary can distin-guish the ciphertexts associated with different plaintexts.Therefore,Pang's approach did not satisfy the requirement of indistinguishability against chosen ciphertext attacks (CCA).An improved scheme which is selective identity secure in the random oracle model was proposed.Under the CDH and Gap-BDH hard problem assumption,the improved scheme is both existentially unforgetable against chosen message attack and indistinguishable against adaptive CCA.…”
    Get full text
    Article
  18. 6258

    A Temperature Field Based Routing Algorithm in Content-Centric Networking by Zonghai Liu, Peng Wang, Xiaohui Zhang, Feicai Jin

    Published 2015-12-01
    “…Content-centric networking(CCN)is a novel network architecture which presents new challenges for the design of routing. …”
    Get full text
    Article
  19. 6259

    Analytical Solutions for the Nonlinear Partial Differential Equations Using the Conformable Triple Laplace Transform Decomposition Method by Shailesh A. Bhanotar, Mohammed K. A. Kaabar

    Published 2021-01-01
    “…In this paper, a novel analytical method for solving nonlinear partial differential equations is studied. …”
    Get full text
    Article
  20. 6260

    A Theoretical Investigation Based on the Rough Approximations of Hypergraphs by Musavarah Sarwar

    Published 2022-01-01
    “…In this research paper, the notion of a rough set is applied to hypergraphs to introduce the novel concept of rough hypergraphs based on rough relations. …”
    Get full text
    Article