Suggested Topics within your search.
Suggested Topics within your search.
- novel 11
- History 4
- Appreciation 3
- History and criticism 3
- kiswahili novel 3
- Experimental fiction 2
- FICTION / Literary 2
- Novel 2
- Swahili fiction 2
- Swahili literature 2
- Themes, motives 2
- African fiction 1
- African literature 1
- American 1
- American Literature 1
- American literature 1
- Anesthesia 1
- Anesthesiology 1
- Authors, Nigerian 1
- Beauty operators 1
- Bed and breakfast accommodations 1
- Blue collar workers 1
- Brothers 1
- Brothers and sisters 1
- Celebrities 1
- Chemical weapons 1
- Coming of Age 1
- Courtship 1
- Criticism and interpretation 1
- Elias (Fictitious character) 1
-
6841
Ramón Vinyes y Jacques Gilard. Dos sabios para el Grupo de Barranquilla
Published 2009-12-01“…The tremendous impact that the publication of One Hundred Years of Solitude had on the world of letters was a lure to scrutinize and understand García Márquez’s personal background, from his group of friends in the Colombian coast to the teachings of playwright and storyteller from Barcelona, Ramon Vinyes, portrayed in the celebrated novel as the «Catalan Wise Man». Over nearly two decades, Professor Jacques Gilard tracked everything related to illustrious Vinyes, exiled because of Franco’s regime and mentor of García Márquez and the rest of the members of the group of Barranquilla. …”
Get full text
Article -
6842
Renaissance à Bulawayo, Zimbabwe : la ville dans The Stone Virgins de Yvonne Vera
Published 2009-12-01“…Specifically, through Nonceba’s gradual journey out of her abysmal pain and destructive solitude to the welcoming potentiality of the city, the novel, unemphatically combining horror and beauty, testifies to the fragile—yet abiding—power of human bonds, and to the infinite resilience of the Zimbabwean people.…”
Get full text
Article -
6843
New approach against Sybil attack in wireless sensor networks
Published 2008-01-01“…A particularly harmful attack against many sensor network applications is known as the Sybil attack.A novel approach which is sensor node identity witness information validation for random secret information predistribution to defend against the Sybil attack was proposed,and their comprehensive performance was analyzed.In random secret in-formation predistribution,new secret information assignment schemes were proposed and assign a random set of key-related information to each sensor node based on one-way accumulators.In the common keys set-up phase,node-to-node identity witness authentication and key exchange protocols(IDW-AKE)which are provably secure against the active adversaries in universally composable model was proposed.Using IDW-AKE protocols,each node can com-pute the unique common keys it shares with its neighbors.…”
Get full text
Article -
6844
Florida Cultivation Guide for Malabar Spinach
Published 2020-09-01“…Malabar spinach has long been established in cultivation in China and India. This spinach is a novel crop to Florida and is currently grown only for niche markets. …”
Get full text
Article -
6845
Pseudo chaotic pulse position modulation in UWB communications
Published 2009-01-01“…A novel pseudo chaotic pulse position modulation(PCPPM) was proposed which was suitable for ultrawide-bandwith impulse radio communication systems,in this scheme,symbolic dynamics of a chaotic map was used for chaotic pulse position modulation(CPPM),the separation between the adjacent pulses were determined by chaotic dynamics and binary information was modulated onto this carrier by the pulse position modulation method.System could acquire synchronization automatically without any specific "hand shaking"protocol.The advantages of PCPPM are decrease of the measurement precision of interpulse intervals and suitable for all digital solution.Since a random distribution of interpulse intervals,the resulting spectrum is a noise like spectrum.Finally,the performances of PCPPM were analyzed and simulated.…”
Get full text
Article -
6846
Recurrent Aneurysmal Bone Cyst of the Distal Fibula Treated with Denosumab and Curettage
Published 2018-01-01“…Aneurysmal bone cysts are locally aggressive lesions with high rates of recurrence. The novel use of denosumab with curettage in a long bone showed a favorable outcome with no adverse events or signs of recurrence three years after treatment.…”
Get full text
Article -
6847
UHF RFID anti-collision algorithm based on blind separation and dynamic bit-slot grouping
Published 2012-04-01“…A novel ultra high frequency(UHF)radio frequency identification(RFID)anti-collision algorithm based on independent components analysis(ICA)and dynamic bit-slot grouping technology was proposed.The ICA algorithm was used for identifying several tags simultaneously.The dynamic bit-slot tags grouping technology was used for ensuring the number of tags read by a reader at the same time was less than or equal to its antennas’number,and enabling the ICA wouldn’t work in an underdetermined state.Theoretical analysis and simulated experimental results show that the tags identification rate of the proposed algorithm is far more than that of traditional stochastic or deterministic TDMA RFID anti-collision algorithms.…”
Get full text
Article -
6848
Fabians Flanieren und der Müßiggang in der Krise
Published 2023-12-01“…Jakob Fabian, the protagonist of Erich Kästner’s 2013 novel Der Gang vor die Hunde [Fabian. Die Geschichte eines Moralisten, 1931], is examined in this article as a pessimistic idler, a flâneur experiencing a crisis. …”
Get full text
Article -
6849
Cooperative Spectrum Sensing Based on Dempter-Shafer Theory of Evidence in Cognitive Radio Network
Published 2013-08-01“…Cognitive radio has the advantage of high spectrum utilization since the spectrum can be shared by primary and secondary user.Meanwhile,the new adaptable characteristic is required for the secondary user.On the basis of analyzing D-S theory of evidence,a novel distributed cooperative spectrum sensing scheme was presented,which modified the combination equation for conflicting evidence source,and the BPA function based on fuzzy degree calculation was redefined.Simulation results show that the proposed scheme can sense the available spectrum in the cognitive radio networks very well,and can be used as a general spectrum sensing scheme in AWGN and Rayleigh fading channel when compared with the traditional "and","or" fusion rules and other D-S theory of evidence schemes in the previous literature.…”
Get full text
Article -
6850
Ciphertext-only fault analysis of the SIMON lightweight cipher
Published 2019-11-01“…The ciphertext-only fault analysis on the SIMON cipher was proposed by injecting a random nibble fault under the random nibble fault model.After injecting faults,every faulty ciphertext could be decrypted and the statistical distribution of all intermediate states were analyzed by the attackers.On the basis of the previous distinguishers of SEI,GF,MLE,MLE-SEI,GF-SEI and GF-MLE,four novel distinguishers of GF-MAP,HW-MLE,GF-HW and HW-MAP were proposed to reduce faults.The results show that the SIMON cipher cannot resist against the ciphertext-only fault analysis.It provides an important reference for security analysis of other ciphers.…”
Get full text
Article -
6851
Global Finite-Time Output Feedback Stabilization for a Class of Uncertain Nonholonomic Systems
Published 2013-01-01“…By using backstepping recursive technique and the homogeneous domination approach, a constructive design procedure for output feedback control is given. Together with a novel switching control strategy, the designed controller renders that the states of closed-loop system are regulated to zero in a finite time. …”
Get full text
Article -
6852
Combinatorial double auction-based allocation of retrieval tasks in Internet of Things
Published 2015-12-01“…Task allocation mechanism was greatly important to the success of the search service in Internet of Things (IoT).On basis of analyzing the real time characteristics of the IoT data,and the dynamic characteristics of the users,a combinatorial double auction-based retrieval tasks allocation model was introduced,which described the relationships between the workers,the requesters and the system from the perspective of supply and demand.Firstly,a novel metric to evaluate the value of the users’ queries was introduced and a greedy heuristic algorithm to determine the winning requesters and workers was proposed.Then,a critical payment scheme was proposed,which guaranteed that submitted bids of the users reflect their real value.Finally,both the rigid theoretical analysis and simulation result show that the proposed mechanism achieves truthfulness,individual rationality and the efficiency of the service provider is improved.…”
Get full text
Article -
6853
Galerkin Spectral Method of Stochastic Partial Differential Equations Driven by Multivariate Poisson Measure
Published 2024-01-01“…In this paper, we introduce a Galerkin spectral method tailored for addressing SPDEs driven by multivariate Poisson variables. Our novel numerical method is applied to solve the one- and two-dimensional stochastic Poisson equations, as well as the one and two-dimensional stochastic heat equation, stochastic KdV equation, and stochastic Burgers equation, respectively. …”
Get full text
Article -
6854
Positive Solutions of a Two-Point Boundary Value Problem for Singular Fractional Differential Equations in Banach Space
Published 2013-01-01“…First, by constructing a novel cone and using the fixed point index theory, a sufficient condition is established for the existence of at least two positive solutions to the approximate problem of the considered singular BVP. …”
Get full text
Article -
6855
Empirical likelihood based heteroscedasticity diagnostics for varying coefficient partially nonlinear models
Published 2024-12-01“…This paper is concerned with the statistical diagnostics for the varying coefficient partially nonlinear model. We propose a novel diagnostic approach for heteroscedasticity of error variance in the model by combining it with the empirical likelihood method. …”
Get full text
Article -
6856
WmFall: WiFi-based multistage fall detection with channel state information
Published 2018-10-01“…In this article, we introduce a novel multistage fall detection system using the channel state information from WiFi devices. …”
Get full text
Article -
6857
Network traffic detection based on multi-resolution low rank model
Published 2012-01-01“…Because network traffic was usually characterized by its higher-dimensional features,related detectors and classifiers for identifying traffic anomalies were suffering the increased complexity.Several key observations given by existing studies showed that network anomalies were distributed typically in a sparse way,and each of anomalies was essentially characterized by its lower-dimensional features.Based on this important finding,a novel model detecting traffic anomalies—multi-resolution low rank (MRLR) was developed.The proposed MRLR allowed us to dynamically filter the “proper”feature sets and then to classify anomalies accurately.The validation shows that MRLR can accurately reduce the dimensions of flow features to lower than 10%,on the other hand,the complexity of MRLR-classifiers is O(n).…”
Get full text
Article -
6858
Array gain and phase calibration in the presence of multipath based on weighted spatial smoothing
Published 2004-01-01“…Based on the idea underlying weighted spatial smoothing algorithm for coherent sources DOA estimation, a novel cost function is constructed in this paper to achieve favorable array calibration in the presence of multipath. …”
Get full text
Article -
6859
A Comparative Study on Qualification Criteria of Nonlinear Solvers with Introducing Some New Ones
Published 2022-01-01“…In order to compare different solvers for systems of nonlinear equations, some novel goodness and qualification criteria are defined in this paper. …”
Get full text
Article -
6860
The Genetics of Parkinson’s Disease
Published 2024-02-01“…The identification of genes linked to PD and their functions has uncovered novel biological pathways and treatment options that play a role in the development of PD. …”
Get full text
Article