Showing 6,521 - 6,540 results of 19,871 for search '"*** (novel)"', query time: 0.10s Refine Results
  1. 6521

    Ruggedizing Printed Circuit Boards Using a Wideband Dynamic Absorber by V.C. Ho, A.M. Veprik, V.I. Babitsky

    Published 2003-01-01
    “…This paper addresses a novel approach towards ruggedizing commercial-off-the-shelf PCBs using a miniature wideband dynamic absorber. …”
    Get full text
    Article
  2. 6522

    Thyrotoxicosis Associated with a Hypopharyngeal Toxic Nodular Thyroid by S. Ali Imran, Adam Hinchey, Rob Hart, Martin Bullock, Andrew Ross, Steven Burrell

    Published 2017-01-01
    “…Ectopic thyroid is a rare developmental anomaly which may be either asymptomatic or present with thyroid dysfunction as well as pressure symptoms. Here we present a novel case of thyrotoxicosis associated with a hypopharyngeal multinodular thyroid in a female. …”
    Get full text
    Article
  3. 6523

    CdTe Quantum Dots Embedded in Multidentate Biopolymer Based on Salep: Characterization and Optical Properties by Ghasem Rezanejade Bardajee, Zari Hooshyar

    Published 2013-01-01
    “…This paper describes a novel method for surface modification of water soluble CdTe quantum dots (QDs) by using poly(acrylic acid) grafted onto salep (salep-g-PAA) as a biopolymer. …”
    Get full text
    Article
  4. 6524

    Dracula Gramophone by Marc Porée

    Published 2009-03-01
    “…Based on various scriptural and semantic devices (e.g. the C/K divide modeled on the Barthesian S/Z) and organized around four emblematic citations lifted from the novel, it ends on an emphatic vindication of the “tone of the revenant”, in the words of Baudelaire (freely) translating Thomas de Quincey’s Suspiria De Profundis.…”
    Get full text
    Article
  5. 6525

    Automated intrusion response system model based on danger theory by Ling-xi PENG, Dong-qing XIE, Ying-fang FU, Wei XIONG, Yu-li SHEN

    Published 2012-01-01
    “…A novel automated response system model based on the danger theory (AIRSDT) was given.With the descriptions of self,non-self,immunocyte,memory detector,mature detector and immature detector of the network transactions,network danger evaluation equations for host and network were built up.Then,the automated response actions were taken or adjusted according to the danger of each network attack,including holistic risk degrees of the host and network.Both the theory analysis and experimental results prove that AIRSDT not only helps to solve the problem that the current automated response models could not detect the ‘true’ intrusion or attack action,but also greatly reduces the response times and response cost.…”
    Get full text
    Article
  6. 6526

    Um sentido para o fim: espaços migratórios e melancolia em Hanói, de Adriana Lisboa by Júlia Braga Neves

    Published 2015-01-01
    “…In discussingliterature as a space for representation, I will argue that the spaces of migrationin Lisboa’s novel are constructed in relation to the protagonists’, Alex andDavid, reflections and memories. …”
    Get full text
    Article
  7. 6527

    Result merging method based on combined kernels for distributed information retrieval by WANG Xiu-hong1, JU Shi-guang3

    Published 2011-01-01
    “…To enhance the performance of result merging for distributed information retrieval(DIR),a novel merging method was put forward,which was based on relevance between retrieved results and query.Improved latent semantic kernel(LSK) was combined with analysis of variance(ANOVA) kernel to calculate the relevance.Experimental results showed that the result merging precision of the combination of LSK and ANOVA kernel(CLA) is 16.79%,30.73%,20.37%,24.17%,14.25%,13.50% and 7.53% higher than that of Round-robin,ComMNZ,Bayesian,Borda,SDM,MEM and regression SVM respectively.CLA kernel method has better performance for result merging and is a practical method for result merging in DIR.…”
    Get full text
    Article
  8. 6528

    Valency-Based Topological Properties of Linear Hexagonal Chain and Hammer-Like Benzenoid by Yi-Xia Li, Abdul Rauf, Muhammad Naeem, Muhammad Ahsan Binyamin, Adnan Aslam

    Published 2021-01-01
    “…In this paper, we give explicit expressions of two recently defined novel ev-degree- and ve-degree-based topological indices of two classes of benzenoid, namely, linear hexagonal chain and hammer-like benzenoid.…”
    Get full text
    Article
  9. 6529

    Integral fault analysis of the ARIA cipher by Yu SHEN, Wei LI, Dawu GU, Yixin WU, Shan CAO, Ya LIU, Zhiqiang LIU, Zhihong ZHOU

    Published 2019-02-01
    “…ARIA is a Korean standard block cipher,which is flexible to provide security for software and hardware implementation.Since its introduction,some research of fault analysis is devoted to attacking the last two rounds of ARIA.It is an open problem to know whether provoking faults at some former rounds of ARIA allowed recovering the secret key.An answer was given to solve this problem by showing a novel integral differential fault analysis on two rounds earlier of ARIA.The mathematical analysis and simulating experiments show that the attack can successfully recover its secret key by fault injections.The results in this study describe that the integral fault analysis is a strong threaten to the security of ARIA.The results are beneficial to the analysis of the same type of other block ciphers.…”
    Get full text
    Article
  10. 6530

    Robust Exponential Synchronization of a Class of Chaotic Systems with Variable Convergence Rates via the Saturation Control by Meichun Huang, Runzi Luo, Jiaojiao Fu, Haipeng Su

    Published 2020-01-01
    “…By using the Lyapunov stability theory, a novel sufficient condition which possesses the exponential convergence rate λ is presented. …”
    Get full text
    Article
  11. 6531

    A New Framework of Multiphase Segmentation and Its Application to Partial Volume Segmentation by Fuhua Chen, Yunmei Chen, Hemant D. Tagare

    Published 2011-01-01
    “…We proposed a novel framework of multiphase segmentation based on stochastic theory and phase transition theory. …”
    Get full text
    Article
  12. 6532

    A Modified Key Generation Algorithm to Rebalanced-RSA and RPower-RSA by İsrafil Okumuş, Ercan Celık

    Published 2024-12-01
    “…This paper presents a novel key generation algorithm for Rebalanced-RSA and RPower-RSA that accelerates encryption and decryption processes by utilizing smaller modular exponents. …”
    Get full text
    Article
  13. 6533

    IEDR:an infrastructure enhanced DTN routing protocol by Zhen YU, Jing-dong XU, Jian-zhong ZHANG, Yu ZHANG

    Published 2013-08-01
    “…To cope with un-ideal conditions in mobile network where connectivity is only intermittent,a novel DTN (delay tolerant network) routing protocol,IEDR,was proposed,which incorporates experiences gained before and strives to fully utilize node contacts for data exchange,in order to maximize delivery ratio and minimize delivery delay,while still with controlled overhead.Additionally,IEDR attempted to use wireless access points for data propagation,as access points were supposed to be widely deployed and interconnected with high speed,providing an opportunity to efficiently distribute data in large areas.The evaluation proves that IEDR is better than many classic DTN routing protocols.…”
    Get full text
    Article
  14. 6534

    Stuart Cloete's construction of Voortrekker religion in Turning Wheels by F. Hale

    Published 2001-06-01
    “… Stuart Cloete’s novel of 1937, Turning Wheels, was unquestionably the most controversial of many fictional reconstructions of the Great Trek, a book which fell foul of Afrikaner nationalism and whose further importation into the Union of South Africa was long consequently banned. …”
    Get full text
    Article
  15. 6535

    Adaptive Fuzzy Super-Twisting Sliding Mode Control for Microgyroscope by Juntao Fei, Zhilin Feng

    Published 2019-01-01
    “…This paper proposes a novel adaptive fuzzy super-twisting sliding mode control scheme for microgyroscopes with unknown model uncertainties and external disturbances. …”
    Get full text
    Article
  16. 6536

    Making Progress: Ellison, Rinehart, and the Critic by Cheryl Alison

    Published 2015-08-01
    “…Since Ralph Ellison’s death, the draft materials of his second, unfinished novel have become available, in addition to his notes for Invisible Man (1952). …”
    Get full text
    Article
  17. 6537

    Improved speech enhancement based on spectral subtraction and auditory masking effect by ZHAO Xiao-qun, HUANG Xiao-shan

    Published 2008-01-01
    “…Taking into account the masking properties of human auditory system and the uncertainty of the speech pres-ence,the novel algorithm modifies the log-spectral amplitude estimation and the speech absence probability(SAP) pa-rameter.Then,the smoothing parameters in noise estimation and prior SNR estimation are adaptively adjusted to modi-fied SAP parameter which reflects the degree of stationary of the measured signal.The change of smoothing parameters allows for automatic adaptation with various noisy environments and obtains the best trade-off.Experimental results demonstrate that the proposed algorithm has better performance of speech articulation without any perceptional musical-ity,compared to another modified spectral subtraction algorithms under the same level of noise reduction,and this supe-riority is more significant at very low SNR.…”
    Get full text
    Article
  18. 6538

    Attribute-based revocable collaborative access control scheme by Changgen PENG, Zongfeng PENG, Hongfa DING, Youliang TIAN, Rongfei LIU

    Published 2021-05-01
    “…To solve the dynamic update of access rights in attribute-based collaborative access control, a novel scheme was proposed with the revocation of attribute, user and collaborative policy.A formal definition and a security model were presented, the group-based attribute group were changed to reflect the update of rights, and further, an efficient re-encryption algorithm was used to realize the immediate revocation of attributes and users.The translation value was used to achieve the revocation of collaborative policy by update corresponding ciphertext.The security analysis shows the scheme can guarantee data confidentiality, forward/backward security, and resist collusion attack under chosen plaintext attack.Compared with the related works, the proposal achieved more complete and efficient revocation scheme.…”
    Get full text
    Article
  19. 6539

    Antibiotic Therapy for Crohn’s Disease: A Review by Simon Lal, A Hillary Steinhart

    Published 2006-01-01
    “…There is a current need for rigorous multicentre studies looking into the role of antibiotics in treating perianal and luminal CD, as well as a need for the large-scale assessment of novel antibiotics, with low systemic absorption, which may improve patient tolerance.…”
    Get full text
    Article
  20. 6540

    Stability Analysis of Nonlinear Systems with Slope Restricted Nonlinearities by Xian Liu, Jiajia Du, Qing Gao

    Published 2014-01-01
    “…The problem of absolute stability of Lur’e systems with sector and slope restricted nonlinearities is revisited. Novel time-domain and frequency-domain criteria are established by using the Lyapunov method and the well-known Kalman-Yakubovich-Popov (KYP) lemma. …”
    Get full text
    Article