Suggested Topics within your search.
Suggested Topics within your search.
- novel 11
- History 4
- Appreciation 3
- History and criticism 3
- kiswahili novel 3
- Experimental fiction 2
- FICTION / Literary 2
- Novel 2
- Swahili fiction 2
- Swahili literature 2
- Themes, motives 2
- African fiction 1
- African literature 1
- American 1
- American Literature 1
- American literature 1
- Anesthesia 1
- Anesthesiology 1
- Authors, Nigerian 1
- Beauty operators 1
- Bed and breakfast accommodations 1
- Blue collar workers 1
- Brothers 1
- Brothers and sisters 1
- Celebrities 1
- Chemical weapons 1
- Coming of Age 1
- Courtship 1
- Criticism and interpretation 1
- Elias (Fictitious character) 1
-
6721
Nonlinear Uncertainties Canceling in Multi-Agent Systems Enabled by Cooperative Adaptation
Published 2018-01-01“…This paper deals with uncertainties problem in multi-agent systems with novel cooperative adaptation approach. Since uncertainties in multi-agent systems are interconnected, local agent often faces uncertainties not only from itself but also from neighbors. …”
Get full text
Article -
6722
Optimal Algorithms for Nonlinear Equations with Applications and Their Dynamics
Published 2022-01-01“…In the present work, we introduce two novel root-finding algorithms for nonlinear scalar equations. …”
Get full text
Article -
6723
Application of X-Ray Computed Tomography in Monitoring Chloride Ion Penetration Paths in Recycled Aggregate Concrete
Published 2018-01-01“…This study used X-ray computed tomography (X-CT) as a novel approach to investigate chloride ion penetration paths in RAC. …”
Get full text
Article -
6724
Anomaly detection of large scale network based on data streams
Published 2006-01-01“…The anomaly detection algorithms of the large scale network(LSN) were required to analysis the vast network traffic of G bit level in real-time and on-the-fly.A novel monitoring mechanism of LSN anomaly detection based on the data stream approach was proposed.The main contributions included: the sketch data structure and the frequent sketch algorithm of data streams were designed for anomaly detection of LSN.Optimized query methods were designed for customizing the security monitoring and detection policy with the correlations of multi data streams.The data reduction was proposed to make it possible that the whole network traffic character could be got using a few of special data streams.The experiments of the real networking environments validate the effectivity of LSN anomaly detection methods.…”
Get full text
Article -
6725
Research on Spectrum Access Mechanism Based on Polling Scheduling
Published 2013-11-01“…The spectrum access mechanism based on polling control tends to realize the effective utilization of spectrum resources and rational allocation. A novel polling queuing model, in which the authorized users employ exhaustive service while the cognitive users employ loss service, was proposed. …”
Get full text
Article -
6726
DDoS defense with IP traceback and path identification
Published 2011-01-01“…A novel idea to combine both IP traceback and path identification(Pi) was proposed,and malicious packets could be identified and filtered at located upstream nodes.Then a practical packet marking and filtering scheme was proposed.The nodes along the path out of the destination domain deployed Pi.Meanwhile the border router of the destination domain deployed the traceback marking scheme.The victim could retrieve related information from arrived malicious packets.Then Pi-based filtering could be implemented at the border ingresses.A practical marking,storing and filtering scheme was provided in detail.The results of large-scale simulations with authoritative Internet topologies show the scheme is effective to alleviate attack impacts on the victim and upstream links in the destination domain.…”
Get full text
Article -
6727
RFID dynamic positioning method
Published 2013-04-01“…A novel proximity method-RFID dynamic positioning method was presented,using a moving radio frequency identification (RFID) reader to accurately position the target based on reference tag arrays.The major advantage of the method was that through reading tags without any measurement data,e.g.…”
Get full text
Article -
6728
Spectrum Handoff with Channel Sensing Sequencing in Cognitive Radio Network
Published 2013-04-01“…In the cognitive radio network,when the primary users show up,the secondary users should vacate the channel and find another free channel for data transmissions.This is the so-called spectrum handoff.There are two most important performance metrics for spectrum handoff:handoff delay and handoff times.A novel spectrum handoff scheme with channel sensing sequencing was proposed in order to decrease both handoff delay and handoff times.When designing the channel sensing sequence,the channel free probability was considered,and the probability that no handoff will happen in a channel was considered as well.The simulation results show that the method not only can get the minimum handoff delay as the traditional method does,but also can decrease the handoff times were significantly compared with the traditional method.…”
Get full text
Article -
6729
Conventional versus ultrasound and microwave assisted synthesis: Some new environmentally friendly functionalized picolinium-based ionic liquids with potential antibacterial activi...
Published 2015-09-01“…The antimicrobial profile of the novel ionic liquids was evaluated and the minimum inhibitory concentration (MIC) showed their moderate to low antimicrobial activity against eight types of human pathogens.…”
Get full text
Article -
6730
An Energy-Efficient Collaborative Target Tracking Framework in Distributed Wireless Sensor Networks
Published 2014-07-01“…To obtain a benefit from those issues, most of the recent work tends to reduce the spatial redundancy, while ignoring utilizing the attribute of time redundancy. In this paper, a novel energy-efficient framework of collaborative signal and information fusion is proposed for acoustic target tracking. …”
Get full text
Article -
6731
Recent Advances in the Recognition and Management of Eosinophilic Esophagitis
Published 2015-01-01“…Dietary therapy, topical steroid therapy, proton pump inhibitors and endoscopic dilation are the main approaches to therapy; however, novel targeted therapies are being developed. Among the food items commonly implicated are wheat, dairy, nuts, soy, shellfish and eggs. …”
Get full text
Article -
6732
Fast dynamic channel allocation algorithm based on priority channel reservation
Published 2009-01-01“…Aiming at overcoming the shortages of the current fast dynamic channel allocation algorithm in TD-SCDMA system,a novel fast dynamic channel allocation algorithm based on priority channel reservation was proposed.This algorithm defined call priority by equipment attribution of baton handover user,reserved channels for baton handover calls.Combining with grouping borrowed algorithm,the algorithm made MB DCA strategy more flexible.Simulation results show that,comparing to the mixed-data rate grouping borrowed algorithm,the proposed algorithm achieves the preferential access of VIP and high rate mobile user,reduces the call failure probability resulted from the baton handover,improves the performance of data service,and increases the channel utilization efficiency.…”
Get full text
Article -
6733
Research on multi-source application level multicast for awareness driven virtual space teleconferencing
Published 2007-01-01“…Virtual space teleconferencing is a novel CSCW tool that has abroad application perspective.There is no effi-cient communication mechanism to realize virtual space teleconferencing on Internet because most of end hosts in today’s Internet have limited access bandwidth and the Internet does not support IP multicast.Adopting mesh-first and centralized strategies,a multi-source application level multicast method ESMVST for awareness driven virtual space teleconferenc-ing on Internet was devised.The research focused on ESMVST method’s application level multicast routing model VSTMMR and proposed a heuristic routing algorithm MDMM.The result of experiment shows that MDMM algorithm could reduce both algorithm’s rejection rate and data distribution trees’ maximal delay effectively,and ESMVST method is feasible.…”
Get full text
Article -
6734
Trasvasijes poéticos y literarios en el cine chileno.Entre Raúl Ruiz e Ignacio Agüero
Published 2024-12-01“…We are interested in examining the ways in which both directors relate to literature: both from the novel and the story, as well as from poetry and the essay, and the ways in which from there they enrich their audiovisual narratives. …”
Get full text
Article -
6735
Les images d’enfermement dans John Marchmont’s Legacy de Mary Elizabeth Braddon
Published 2006-12-01“…Mary Elizabeth Braddon’s novel John Marchmont’s Legacy was serialized in Temple Bar from December 1862 to January 1864. …”
Get full text
Article -
6736
A Geography of Cultures: Or, Why New York’s Lower East Side Is an Important Case Study
Published 2010-03-01“…During the 19th century, but especially in the crucial turn-of-the-century decades, the quarter—an immigrant ghetto of appalling living and working conditions as well as a hotbed of radical politics—also functioned as a sort of cultural laboratory, a key factor in the development of such diverse but distinctive American arts such as the realist and naturalist novel, the budding movie making, the Ash Can School of painting, theatre, etc.…”
Get full text
Article -
6737
Optimal Control of Anti-Angiogenesis and Radiation Treatments for Cancerous Tumor: Hybrid Indirect Solver
Published 2023-01-01“…By combining steepest descent, conjugate gradient, and Armijo techniques, a novel hybrid indirect iterative solver is designed. …”
Get full text
Article -
6738
Du simulacre à la simulation : la vérité de l’artifice dans Galatea 2.2 de Richard Powers
Published 2009-12-01“…This interactive feed-back loop, which simulates our sense of being caught in the ecosystem of the world, is not only the subject matter of the novel, it is also the active principle of the text. …”
Get full text
Article -
6739
The gospel contra Nietzsche: a South African literary critique of Wille zur Macht
Published 2017-06-01“…The present article explores how Joseph Doke, a scholarly, transplanted Englishman who served as a Baptist pastor in Johannesburg and elsewhere and wrote the first biography of Gandhi, used fiction to criticise Nietzsche early in the twentieth century. His novel The queen of the secret city (1916) embodies an explicit rejection of this German philosopher’s pivotal notion of Wille zur Macht (will to power). …”
Get full text
Article -
6740
Impact socio-économique de l’aménagement hydro-rizicole de Guiguidou dans la sous-préfecture de Divo (Côte d’Ivoire)
Published 2018-03-01“…The analysis of the data collected shows the recipients had access to farming novel methods and the socio-economic impact is remarkable with job creation. …”
Get full text
Article