Suggested Topics within your search.
Suggested Topics within your search.
- novel 11
- History 4
- Appreciation 3
- History and criticism 3
- kiswahili novel 3
- Experimental fiction 2
- FICTION / Literary 2
- Novel 2
- Swahili fiction 2
- Swahili literature 2
- Themes, motives 2
- African fiction 1
- African literature 1
- American 1
- American Literature 1
- American literature 1
- Anesthesia 1
- Anesthesiology 1
- Authors, Nigerian 1
- Beauty operators 1
- Bed and breakfast accommodations 1
- Blue collar workers 1
- Brothers 1
- Brothers and sisters 1
- Celebrities 1
- Chemical weapons 1
- Coming of Age 1
- Courtship 1
- Criticism and interpretation 1
- Elias (Fictitious character) 1
-
6341
Fractal Derivative Model for Air Permeability in Hierarchic Porous Media
Published 2012-01-01“…The fractal derivative model has been successfully applied to explain the novel air permeability phenomenon of cocoon. The theoretical analysis was in agreement with experimental results.…”
Get full text
Article -
6342
A plenitude de um vazio em que a pobreza não é mais paisagem: a periferia em Paulo Lins e Ferréz
Published 2013-01-01“…This article intends to place Paulo Lins’ novel Cidade de Deus and Ferréz’s novels Capão Pecado and Manual prático do ódio in the panorama of Brazilian contemporary “new-realisms”, evaluating thematic choices and narrative techniques and proce- dures. …”
Get full text
Article -
6343
Analysis and Kinematic Simulation of Adjustable Solar Panel Mechanism
Published 2020-06-01“…According to the requirements of energy supply of lunar exploration engineering spacecraft, a novel adjustable solar panel with three degrees of freedom is proposed. …”
Get full text
Article -
6344
RWA algorithm based on cost of photoelectric conversion device
Published 2020-04-01“…Over the past decade,carrier operator implement fine-grained traffic scheduling in optical transport network(OTN) by deploying optical-electric conversion(OEO) devices on ROADM,which can improve the spectrum utilization.However,OEO device is very expensive,which will increase the CAPEX and OPEX of carrier operator.A problem about traffic scheduling and the deployment of OEO devices in OTN was proposed.Then,the ILP model of this problem was built and it was proved NP-hard.Additionally,two novel algorithms named OEO-RWA and SA-RWA were proposed.At last,these algorithms were demonstrated can not only ensure flexibility of traffic scheduling,but also can reduce the number of OEO device through simulation.…”
Get full text
Article -
6345
Le journal comme palimpseste ? Une hypothèse sur l’hétérogénéité de la poétique flaubertienne dans Bouvard et Pécuchet
Published 2021-06-01“…Despite this fact, and in addition to the claimed influence of the encyclopedia, the very functioning of the novel suggests a polyphony which may lead to a journalistic influence, for example when it comes to the succession of discoveries – which can remind us of the newspaper’s headings. …”
Get full text
Article -
6346
The Effect of Pulse Vaccination and Treatment on SIR Epidemic Model with Media Impact
Published 2015-01-01“…We propose a novel SIR epidemic dynamical control model with media impact, where the state dependent pulse vaccination and medication treatment control strategies are being introduced to prevent the spread of disease at different control threshold values. …”
Get full text
Article -
6347
The Evaluation Model of Network QoS Based on Intelligent Water Droplets Algorithm
Published 2020-01-01“…In order to solve the problem of the user demands to the quality of service (QoS) of network, this paper provides a novel QoS evaluation model based on the intelligent water droplets (IWD) algorithm. …”
Get full text
Article -
6348
Learning Discriminative Salient LBP for Cloud Classification in Wireless Sensor Networks
Published 2015-10-01“…We focus on the issue of ground-based cloud classification in wireless sensor networks (WSN) and propose a novel feature learning algorithm named discriminative salient local binary pattern (DSLBP) to tackle this issue. …”
Get full text
Article -
6349
Flaubert en Slovaquie : modèle ou mauvaise direction ?
Published 2024-06-01“…Flaubert has had a thorny path in Slovakia : from the initial rejection of his novel Madame Bovary and its evaluation as “misdirection” at the turn of the nineteenth and twentieth centuries, through its reception as a model of writing in the 1930s (Pavel Bujnák, Juraj Slávik); the direct inspiration of writers in the 1960s (Pavel Vilikovský, Dušan Kužel), to serene reflection with deep understanding (Jozef Felix, Anton Vantuch, Albín Bagin) and the sensitive approach of translators in the 1980s-1990s (Soňa Hollá, Ladislav Franek and others) – this is the story of Flaubert in Slovakia. …”
Get full text
Article -
6350
LEACH protocol based security mechanism for Sybil attack detection
Published 2011-01-01“…Low energy adaptive clustering hierarchy(LEACH) could effectively reduce energy consumption of wireless sensor network(WSN).However,a novel security mechanism was proposed based on LEACH protocol called LEACH-S in order to improve the security performance of WSN.The mechanism adopted a received signal strength indicator(RSSI) based policy for Sybil attack detection in WSN,and a reasonable threshold was chosen to initialize Sybil attack detection strategy in which case attack may occur with high possibility.The simulation results show that the mechanism can detect Sybil attack effectively at the cost of low energy consumption.…”
Get full text
Article -
6351
Maximum likelihood self-calibration for direction-dependent gain-phase errors with carry-on instrumental sensors:case of deterministic signal model
Published 2011-01-01“…Aim at the self-calibration of direction-dependent gain-phase errors in case of deterministic signal model,the maximum likelihood method(MLM) for calibrating the direction-dependent gain-phase errors with carry-on instrumental sensors was presented.In order to maximize the high-dimensional nonlinear cost function appearing in the MLM,an improved alternative projection iteration algorithm,which could optimize the azimuths and direction-dependent gain-phase errors was proposed.The closed-form expressions of the Cramér-Rao bound(CRB) for azimuths and gain-phase errors were derived.Simulation experiments show the effectiveness and advantage of the novel method.…”
Get full text
Article -
6352
Cannibalism and Other Transgressions of the Human in The Road
Published 2017-12-01“…The concept of cannibalism is essential for the dark vision laid out by Cormac McCarthy in his novel The Road (2006). This article sketches a brief history of the idea of anthropophagy in the Western intellectual tradition. …”
Get full text
Article -
6353
Approach to deep Web data acquiring based on circular strategy and dynamic knowledge
Published 2012-10-01“…Concerning on the acquisition problems on deep Web data integration such as high cost and low efficiency of query selecting,a novel deep Web data acquiring method was proposed based on circular strategy and dynamic knowledge.According to the relationship between deep Web data sources from the same domain,the circulation strategic acquisition of data source in batches was applied in such method,as well as a designed method of query selecting on dynamic knowledge based on integrated systematic.Compared with current,the method reduces the acquisition cost and with more accuracy.Experimental results show that the method can raise the acquisition efficiency of deep Web data integration.…”
Get full text
Article -
6354
Bridging Explainability and Interpretability in AI-driven SCM Projects to Enhance Decision-Making
Published 2024-01-01“…New AI-based systems implementation in companies is steadily expanding, paving the way for novel organizational sequences. The increasing involvement of end-users has also garnered interest in AI explainability. …”
Get full text
Article -
6355
Analysis of micro-slotline leaky wave antenna with FDTD
Published 2006-01-01“…The FDTD method modeled the micro-slotline leaky wave antenna successfully.The traveling wave of micro-slotline leaky-wave antenna in leaky region had been shown up with FDTD method.A new and effective equation was proposed,to calculate the complex propagation constant of micro-slotline leaky wave antenna.The numerical result calculated by the new and efficient method agrees well with measured results and comparing data.Based on the model of FDTD and the novel equation,the character of micro-slotline leaky wave antenna is shown up.The numerical result points out that the width of micro-slotline leaky-wave antenna affect character of antenna.Based on it,that is a new way to make main lode scan at fix-frequency.…”
Get full text
Article -
6356
Internet of vehicles empowered by edge intelligence
Published 2018-12-01“…By pushing computing,storage and other resources to the proximity of end devices,edge intelligence empowers network edge entities powerful information processing and content delivery capabilities,while providing efficient and low-latency service support for the development and implementation of novel mobile services.Thus,edge intelligence is profoundly changing the functions of mobile applications and the utilization patterns of network resources.The application of edge intelligence technology in vehicular networks was studied firstly,and the core scientific problems that need to be solved in designing an efficient vehicular edge system was presented.Then,the technical challenges faced in solving these problems were analyzed and the corresponding solution strategies were given.…”
Get full text
Article -
6357
Ciphertext-only fault analysis of the TWINE lightweight cryptogram algorithm
Published 2021-03-01“…The security analysis of TWINE against the ciphertext-only fault analysis was proposed.The secret key of TWINE could be recovered with a success probability at least 99% using a series of distinguishers of SEI、MLE、HW、GF、GF-SEI、GF-MLE、Parzen-HW、MLE-HE、HW-HE and HW-MLE-HE.Among them, the novel proposed distinguishers of MLE-HE、HW-HE and HW-MLE-HE can effectively reduce the faults and improve the attack efficiency in simulating experiments.It provides a significant reference for analyzing the security of lightweight ciphers in the Internet of Things.…”
Get full text
Article -
6358
Research on DNS authoritative server’s performance and security
Published 2006-01-01“…Comparing with the top-level domains(TLD) such as the root servers,the local authoritative servers were more vulnerable to device failures and malicious attacks.It was described the existence of authoritative servers and presented a novel domain measurement tool named DNSAuth to collect the information of local authoritative servers automatically.Experiments to the real-life authoritative servers were conducted which highlighting three important aspects: the distribution,the geographic location and their impacts on performance and security.According to five representative attributes,the authoritative servers of China Top100 websites were evaluated and the result shows that only 32% of all the servers act better in performance and security.…”
Get full text
Article -
6359
Das Diktat der Toten
Published 2024-07-01“…This article studies contemporary literary representations of communication with the dead as forms of unnatural narration. In Hagar Peeters’s novel Malva (2015), a dead child character-narrator, Malva, posthumously attempts to regain her voice which was suppressed by her father. …”
Get full text
Article -
6360
Do so replacement and the argument/adjunct distinction in Merge-based syntax
Published 2022-12-01“… This study provides a novel look at do so replacement within the framework of the Bare Phrase Structure theory. …”
Get full text
Article