Suggested Topics within your search.
Suggested Topics within your search.
- novel 11
- History 4
- Appreciation 3
- History and criticism 3
- kiswahili novel 3
- Experimental fiction 2
- FICTION / Literary 2
- Novel 2
- Swahili fiction 2
- Swahili literature 2
- Themes, motives 2
- African fiction 1
- African literature 1
- American 1
- American Literature 1
- American literature 1
- Anesthesia 1
- Anesthesiology 1
- Authors, Nigerian 1
- Beauty operators 1
- Bed and breakfast accommodations 1
- Blue collar workers 1
- Brothers 1
- Brothers and sisters 1
- Celebrities 1
- Chemical weapons 1
- Coming of Age 1
- Courtship 1
- Criticism and interpretation 1
- Elias (Fictitious character) 1
-
6701
Community detection in multiplex networks via consensus matrix
Published 2017-09-01“…In complex network of real world,there are many types of relationships between individuals,and the more effective research ways for this kind of network is to abstract these relationship as a multiplex network.More and more researchers are attracted to be engaged in multiplex network research.A novel framework of community detection of multiplex network based on consensus matrix was presented.Firstly,this framework merges the structure of multiplex network and the information of link between each node into monoplex network.Then,the community structure information of each layer network was obtained through consensus matrix,and the traditional community division algorithm was utilized to carry out community detection of combine networks.The experimental results show that the proposed algorithm can get better performance of community partition in the real network datasets.…”
Get full text
Article -
6702
D’Emma Bovary à Gemma Bovery : une approche traductologique
Published 2022-06-01“…Among the various ways of looking at this graphic reinterpretation of Flaubert’s novel, I will adopt a translational perspective. …”
Get full text
Article -
6703
Provable secure mutual authentication protocol for RFID in the standard model
Published 2013-04-01“…The security issue of RFID is becoming more and more serious,in order to protect the RFID's information security and privacy,a mutual authentication protocol for RFID based on HB protocol was proposed in the standard model.The security proofs for this novel protocol was given by using the reduction method,and attacker's hardness was reduced to the indistinguishability between pseudo-random function and real random function.The implementation of proposed protocol only required lightweight pseudo-random generator and vector dot product operation and provided higher security and efficiency.The comparisons of security and performance were also given with other authentication protocols,the results show that the proposed protocol is feasible for RFID tags which are low cost and resource-constrained.…”
Get full text
Article -
6704
TOC: Lightweight Event Tracing Using Online Compression for Networked Embedded Systems
Published 2015-11-01“…In this paper, we propose TOC, a novel event tracing technique using online compression. …”
Get full text
Article -
6705
Wyner-Ziv spatial scalable video coding using compressive sensing in ubiquitous networks
Published 2010-01-01“…A novel Wyner-Ziv spatial scalable video coding using compressive sensing was proposed for the ubiquitous networks.At the encoder,both the base layer and enhancement layer encode the video signal independent,in which down-sampling video was coded by H.264 in the based layer and original video was coded with adaptive compressive sensing measurement,quantization and entropy coding in the enhancement layer.At the decoder,the base layer and enhancement layer jointly recovered the video signal using compressive sensing approach based on joint sparse model of inter frames.Theoretical analysis and experimental results show that the proposed video coding method can flexibly adjust the bit stream,and has better rate-distortion performance and the robustness of transmission.…”
Get full text
Article -
6706
Mechanism Design and Simulation Analysis of Deformable Wheeled Mobile Robot
Published 2021-08-01“…Aiming at the problems of the deformation wheel posture adjustment and lower step buffering of the current deformable wheel mobile robot, a novel deformable wheel mobile robot is designed based on the mechanical self-locking principle. …”
Get full text
Article -
6707
Measurement of Baseline and Orientation between Distributed Aerospace Platforms
Published 2013-01-01“…In this paper, we propose an improved pulsed duplex microwave ranging approach, which allows determining the spatial baseline and orientation between distributed aerospace platforms by the proposed high-precision time-interval estimation method. This approach is novel in the sense that it cancels the effect of oscillator frequency synchronization errors due to separate oscillators that are used in the platforms. …”
Get full text
Article -
6708
Micro-blog topic detection algorithm based on topic model
Published 2016-05-01“…Micro-blog data has the characteristic of real-time,volume,short-text,and noise-rich.So it is a challenge for the traditional topic detection technology.A novel micro-blog topic detection algorithm based on topic model was proposed.Firstly,the micro-blog data was expressed as text word matrix and word relation matrix.The topic word was extracted from the two vectors.Secondly,the topic model was obtained with clustering.Finally,the topic detection of micro-blog was obtained by clustering text and topic model.Experimental results show that the algorithm proposed can effectively detection the text topic,and with the best parameter group of precision,recall rate,F,and the value F is about 95%.…”
Get full text
Article -
6709
The French aire in Jane Eyre
Published 2013-09-01“…This article examines how Brontë makes French into a kind of licence for freedom of speech issued to both the eponymous heroine of the novel and the novelist herself. Jane’s knowledge of French qualifies her for the post of governess to Parisian born Adèle, and thus offers her an income and some independence. …”
Get full text
Article -
6710
The Modulation Instability Analysis and Analytical Solutions of the Nonlinear Gross−Pitaevskii Model with Conformable Operator and Riemann Wave Equations via Recently Developed Sch...
Published 2023-01-01“…This method is based on the general properties of the SGEM which uses the fundamental properties of trigonometric functions. Many novel analytical solutions such as dark, bright, mixed dark–bright, hyperbolic, and periodic wave solutions are successfully extracted. …”
Get full text
Article -
6711
Analysis on the research progress of space division multiplexing in optical fiber communication
Published 2017-09-01“…The evolution of optical fiber communication technology is driven by the ceaseless growth of capacity demand of Internet.Space division multiplexing (SDM) based on multi-core fiber,few-mode fiber,few-mode multi-core fibers and orbital angular momentum has become the focus of academy and industry.Key technologies and latest research progress were reviewed,including novel fiber design,spatial mode conversion,spatial channel de/multiplexing and optical amplification.Based on the comparison and analysis of four kinds of SDM technologies,their bottlenecks and potential future application were also discussed.…”
Get full text
Article -
6712
« Faire clair et vif avec des éléments complexes »
Published 2010-12-01“…In the novel Salammbô and the short story Hérodias, Flaubert turns to pre-Christian antiquity in order to present modernity its complexity, its entwinement in religious and historiographical discourses of power, in a « clair et vif » manner. …”
Get full text
Article -
6713
A Gauged Open 2-Brane String in the p-Brane Background
Published 2016-01-01“…For this purpose, we introduce some tensor fields to convert ungauged theory into the gauged one. This is the novel part of our research, while mostly scalar and vector fields are used to convert second-class constraints into first ones.…”
Get full text
Article -
6714
From Lonely to Resilient through Humanoid Robots: Building a New Framework of Resilience
Published 2018-01-01“…From these scientific considerations, solutions to design challenges are pinpointed, proposing novel interaction schemes that enhance the feeling of support and companionship. …”
Get full text
Article -
6715
Trust model based on reputation for peer-to-peer networks
Published 2008-01-01“…A novel trust model for P2P networks was proposed,in which the trust value of a given peer was computed using its local trust information and recommendation from other nodes. …”
Get full text
Article -
6716
Robust Inventory System Optimization Based on Simulation and Multiple Criteria Decision Making
Published 2014-01-01“…For simulation model optimization, a novel multicriteria and robust surrogate model is designed based on multiple attribute decision making (MADM) method, design of experiments (DOE), and principal component analysis (PCA). …”
Get full text
Article -
6717
Research on cloud native based distributed IoT operating system architecture
Published 2022-07-01“…Complex application development, various types of IoT devices, diverse network technology and different types of IoT edge are the major problems of IoT.The novel concept and architecture of the cloud native based distributed IoT operating system were proposed with 8 core features, which extended the scope of operating system from IoT devices to the edge and cloud, followed the trend analysis of IoT industry and technology.The cloud native based distributed IoT operating system has been utilized to decoupling the complexity and differences of massive heterogeneous resources of cloud (platform), edge gateway, devices and the one-stop full life cycle support of intelligent Internet of things applications development, deployment and hosting.The research and development practices of CTWing OS as well as testing and applications were also introduced.…”
Get full text
Article -
6718
Germanys’ strategies to contribute to a European Information Society
Published 2007-03-01“…A German particularity of translating these programs into national law is the federal structure, i.e. the national state has just a basic condition to promote novel ideas on the sector of ICT. Execution actually takes place at the level of the federal states. …”
Get full text
Article -
6719
Explicit construction of girth-eight QC-LDPC codes and its application in CRT method
Published 2012-03-01“…For arbitrary code lengths of the form PL(P≥3L<sup>2</sup>/4+L-1),a new family of (4,L)-regular quasi-cyclic (QC) low-density parity-check (LDPC) codes was proposed explicitly with girth ight.Employing the new code as a component code in the construction method of Chinese remainder theorem (CRT),a novel class of compound QC-LDPC codes was presented with both girth at least eight and very flexible code lengths.Simulation results show that the new compound codes with rate 1/2 and moderate code lengths perform very well over the additive white Gaussian noise (AWGN) channel.…”
Get full text
Article -
6720
The Perspectival Nature of Leibnizian Relations
Published 2023-03-01“…Perspective can thus explain how relations only inhere in one subject while nevertheless really relating one thing to another. This leads to a novel understanding of the rejection of purely extrinsic denominations and the supposed isolation of substances.…”
Get full text
Article