Showing 6,341 - 6,360 results of 19,871 for search '"*** (novel)"', query time: 0.11s Refine Results
  1. 6341

    Fractal Derivative Model for Air Permeability in Hierarchic Porous Media by Jie Fan, Jihuan He

    Published 2012-01-01
    “…The fractal derivative model has been successfully applied to explain the novel air permeability phenomenon of cocoon. The theoretical analysis was in agreement with experimental results.…”
    Get full text
    Article
  2. 6342

    A plenitude de um vazio em que a pobreza não é mais paisagem: a periferia em Paulo Lins e Ferréz by Alva Martínez Teixeiro

    Published 2013-01-01
    “…This article intends to place Paulo Lins’ novel Cidade de Deus and Ferréz’s novels Capão Pecado and Manual prático do ódio in the panorama of Brazilian contemporary “new-realisms”, evaluating thematic choices and narrative techniques and proce- dures. …”
    Get full text
    Article
  3. 6343

    Analysis and Kinematic Simulation of Adjustable Solar Panel Mechanism by Cui Bingyan, Chen Peng, Wu Xiaoxuan, Xie Yongtao, Xiao Shihao

    Published 2020-06-01
    “…According to the requirements of energy supply of lunar exploration engineering spacecraft, a novel adjustable solar panel with three degrees of freedom is proposed. …”
    Get full text
    Article
  4. 6344

    RWA algorithm based on cost of photoelectric conversion device by Daoyun HU, Zhentai YANG, Qianchun LU, Jin QI

    Published 2020-04-01
    “…Over the past decade,carrier operator implement fine-grained traffic scheduling in optical transport network(OTN) by deploying optical-electric conversion(OEO) devices on ROADM,which can improve the spectrum utilization.However,OEO device is very expensive,which will increase the CAPEX and OPEX of carrier operator.A problem about traffic scheduling and the deployment of OEO devices in OTN was proposed.Then,the ILP model of this problem was built and it was proved NP-hard.Additionally,two novel algorithms named OEO-RWA and SA-RWA were proposed.At last,these algorithms were demonstrated can not only ensure flexibility of traffic scheduling,but also can reduce the number of OEO device through simulation.…”
    Get full text
    Article
  5. 6345

    Le journal comme palimpseste ? Une hypothèse sur l’hétérogénéité de la poétique flaubertienne dans Bouvard et Pécuchet by Laure Demougin

    Published 2021-06-01
    “…Despite this fact, and in addition to the claimed influence of the encyclopedia, the very functioning of the novel suggests a polyphony which may lead to a journalistic influence, for example when it comes to the succession of discoveries – which can remind us of the newspaper’s headings. …”
    Get full text
    Article
  6. 6346

    The Effect of Pulse Vaccination and Treatment on SIR Epidemic Model with Media Impact by Zhi-Long He, Lin-Fei Nie

    Published 2015-01-01
    “…We propose a novel SIR epidemic dynamical control model with media impact, where the state dependent pulse vaccination and medication treatment control strategies are being introduced to prevent the spread of disease at different control threshold values. …”
    Get full text
    Article
  7. 6347

    The Evaluation Model of Network QoS Based on Intelligent Water Droplets Algorithm by Fang Li, Yunlan Wang, Peng Li

    Published 2020-01-01
    “…In order to solve the problem of the user demands to the quality of service (QoS) of network, this paper provides a novel QoS evaluation model based on the intelligent water droplets (IWD) algorithm. …”
    Get full text
    Article
  8. 6348

    Learning Discriminative Salient LBP for Cloud Classification in Wireless Sensor Networks by Shuang Liu, Zhong Zhang

    Published 2015-10-01
    “…We focus on the issue of ground-based cloud classification in wireless sensor networks (WSN) and propose a novel feature learning algorithm named discriminative salient local binary pattern (DSLBP) to tackle this issue. …”
    Get full text
    Article
  9. 6349

    Flaubert en Slovaquie : modèle ou mauvaise direction ? by Jana Truhlářová

    Published 2024-06-01
    “…Flaubert has had a thorny path in Slovakia : from the initial rejection of his novel Madame Bovary and its evaluation as “misdirection” at the turn of the nineteenth and twentieth centuries, through its reception as a model of writing in the 1930s (Pavel Bujnák, Juraj Slávik); the direct inspiration of writers in the 1960s (Pavel Vilikovský, Dušan Kužel), to serene reflection with deep understanding (Jozef Felix, Anton Vantuch, Albín Bagin) and the sensitive approach of translators in the 1980s-1990s (Soňa Hollá, Ladislav Franek and others) – this is the story of Flaubert in Slovakia. …”
    Get full text
    Article
  10. 6350

    LEACH protocol based security mechanism for Sybil attack detection by CHEN Shan-shan1, YANG Geng2, CHEN Sheng-shou2

    Published 2011-01-01
    “…Low energy adaptive clustering hierarchy(LEACH) could effectively reduce energy consumption of wireless sensor network(WSN).However,a novel security mechanism was proposed based on LEACH protocol called LEACH-S in order to improve the security performance of WSN.The mechanism adopted a received signal strength indicator(RSSI) based policy for Sybil attack detection in WSN,and a reasonable threshold was chosen to initialize Sybil attack detection strategy in which case attack may occur with high possibility.The simulation results show that the mechanism can detect Sybil attack effectively at the cost of low energy consumption.…”
    Get full text
    Article
  11. 6351

    Maximum likelihood self-calibration for direction-dependent gain-phase errors with carry-on instrumental sensors:case of deterministic signal model by WANG Ding1, PAN Miao2, WU Ying1

    Published 2011-01-01
    “…Aim at the self-calibration of direction-dependent gain-phase errors in case of deterministic signal model,the maximum likelihood method(MLM) for calibrating the direction-dependent gain-phase errors with carry-on instrumental sensors was presented.In order to maximize the high-dimensional nonlinear cost function appearing in the MLM,an improved alternative projection iteration algorithm,which could optimize the azimuths and direction-dependent gain-phase errors was proposed.The closed-form expressions of the Cramér-Rao bound(CRB) for azimuths and gain-phase errors were derived.Simulation experiments show the effectiveness and advantage of the novel method.…”
    Get full text
    Article
  12. 6352

    Cannibalism and Other Transgressions of the Human in The Road by Andrew Estes

    Published 2017-12-01
    “…The concept of cannibalism is essential for the dark vision laid out by Cormac McCarthy in his novel The Road (2006). This article sketches a brief history of the idea of anthropophagy in the Western intellectual tradition. …”
    Get full text
    Article
  13. 6353

    Approach to deep Web data acquiring based on circular strategy and dynamic knowledge by Xue-feng XIAN, Zhi-ming CUI, Peng-peng ZHAO, Yin-hong LIANG, Li-gang FANG

    Published 2012-10-01
    “…Concerning on the acquisition problems on deep Web data integration such as high cost and low efficiency of query selecting,a novel deep Web data acquiring method was proposed based on circular strategy and dynamic knowledge.According to the relationship between deep Web data sources from the same domain,the circulation strategic acquisition of data source in batches was applied in such method,as well as a designed method of query selecting on dynamic knowledge based on integrated systematic.Compared with current,the method reduces the acquisition cost and with more accuracy.Experimental results show that the method can raise the acquisition efficiency of deep Web data integration.…”
    Get full text
    Article
  14. 6354

    Bridging Explainability and Interpretability in AI-driven SCM Projects to Enhance Decision-Making by El Oualidi Taoufik, Assar Saïd

    Published 2024-01-01
    “…New AI-based systems implementation in companies is steadily expanding, paving the way for novel organizational sequences. The increasing involvement of end-users has also garnered interest in AI explainability. …”
    Get full text
    Article
  15. 6355

    Analysis of micro-slotline leaky wave antenna with FDTD by LI Yuan-xin, LONG Yun-liang

    Published 2006-01-01
    “…The FDTD method modeled the micro-slotline leaky wave antenna successfully.The traveling wave of micro-slotline leaky-wave antenna in leaky region had been shown up with FDTD method.A new and effective equation was proposed,to calculate the complex propagation constant of micro-slotline leaky wave antenna.The numerical result calculated by the new and efficient method agrees well with measured results and comparing data.Based on the model of FDTD and the novel equation,the character of micro-slotline leaky wave antenna is shown up.The numerical result points out that the width of micro-slotline leaky-wave antenna affect character of antenna.Based on it,that is a new way to make main lode scan at fix-frequency.…”
    Get full text
    Article
  16. 6356

    Internet of vehicles empowered by edge intelligence by Yan ZHANG, Ke ZHANG, Jiayu CAO

    Published 2018-12-01
    “…By pushing computing,storage and other resources to the proximity of end devices,edge intelligence empowers network edge entities powerful information processing and content delivery capabilities,while providing efficient and low-latency service support for the development and implementation of novel mobile services.Thus,edge intelligence is profoundly changing the functions of mobile applications and the utilization patterns of network resources.The application of edge intelligence technology in vehicular networks was studied firstly,and the core scientific problems that need to be solved in designing an efficient vehicular edge system was presented.Then,the technical challenges faced in solving these problems were analyzed and the corresponding solution strategies were given.…”
    Get full text
    Article
  17. 6357

    Ciphertext-only fault analysis of the TWINE lightweight cryptogram algorithm by Wei LI, Menglin WANG, Dawu GU, Jiayao LI, Tianpei CAI, Guangwei XU

    Published 2021-03-01
    “…The security analysis of TWINE against the ciphertext-only fault analysis was proposed.The secret key of TWINE could be recovered with a success probability at least 99% using a series of distinguishers of SEI、MLE、HW、GF、GF-SEI、GF-MLE、Parzen-HW、MLE-HE、HW-HE and HW-MLE-HE.Among them, the novel proposed distinguishers of MLE-HE、HW-HE and HW-MLE-HE can effectively reduce the faults and improve the attack efficiency in simulating experiments.It provides a significant reference for analyzing the security of lightweight ciphers in the Internet of Things.…”
    Get full text
    Article
  18. 6358

    Research on DNS authoritative server’s performance and security by WANG Yao, HU Ming-zeng, YUN Xiao-chun, LI Bin, YAN Bo-ru

    Published 2006-01-01
    “…Comparing with the top-level domains(TLD) such as the root servers,the local authoritative servers were more vulnerable to device failures and malicious attacks.It was described the existence of authoritative servers and presented a novel domain measurement tool named DNSAuth to collect the information of local authoritative servers automatically.Experiments to the real-life authoritative servers were conducted which highlighting three important aspects: the distribution,the geographic location and their impacts on performance and security.According to five representative attributes,the authoritative servers of China Top100 websites were evaluated and the result shows that only 32% of all the servers act better in performance and security.…”
    Get full text
    Article
  19. 6359

    Das Diktat der Toten by Zoë Ghyselinck

    Published 2024-07-01
    “…This article studies contemporary literary representations of communication with the dead as forms of unnatural narration. In Hagar Peeters’s novel Malva (2015), a dead child character-narrator, Malva, posthumously attempts to regain her voice which was suppressed by her father. …”
    Get full text
    Article
  20. 6360

    Do so replacement and the argument/adjunct distinction in Merge-based syntax by Yuji Shuhama

    Published 2022-12-01
    “… This study provides a novel look at do so replacement within the framework of the Bare Phrase Structure theory. …”
    Get full text
    Article