Showing 6,901 - 6,920 results of 19,871 for search '"*** (novel)"', query time: 0.10s Refine Results
  1. 6901

    Kitsch as Experience of the World by Darío Hernández Guerra

    Published 2025-01-01
    “…However, there is something in kitsch that, beyond its apparent poor quality, distinguishes it from other art forms as something novel, peculiar, and even profoundly interesting. …”
    Get full text
    Article
  2. 6902

    Performance analysis and improvement of link adaptation techniques in TDD-HSDPA/SA system by CHEN Shu-ping, DU Jiu-hui, WANG Wen-bo

    Published 2006-01-01
    “…The wireless channel fluctuation resulted from smart antennas in TDD-HSDPA/SA(time division duplex-high speed downlink packet access /smart antennas)system,which caused traditional link adaptation technologies invalid,was theoretically investigated.Two kinds of novel link adaptation schemes were proposed to deal with this issue.A dynamic system level simulator was established to evaluate the performances of the two schemes.Simulation results indicate that both of them have great improvement in system residual BLER and have certain system throughput gain.The first one suits for the hybrid networking case of TDD and FDD(frequency division duplex)mode,while the second one can serve the case of alone TDD networking.…”
    Get full text
    Article
  3. 6903

    Transactions en eaux troubles : résurgences de la voix shakespearienne dans Moby-Dick by Ronan Ludot-Vlasak

    Published 2009-02-01
    “…This resurgence of the Shakespearean voice is double: although the dramatic element in the novel is often associated with the figure of Ahab, Ishmael also incorporates Shakespearean lines into his narrative. …”
    Get full text
    Article
  4. 6904

    AC Optimal Power Flow: a Conic Programming relaxation and an iterative MILP scheme for Global Optimization by Oustry, Antoine

    Published 2022-11-01
    “…We introduce valid inequalities to strengthen the Semidefinite Programming relaxation, yielding a novel Conic Programming relaxation. Leveraging these Conic Programming constraints, we dynamically generate Mixed-Integer Linear Programming (MILP) relaxations, whose solutions asymptotically converge to global minimizers of the AC Optimal Power Flow problem. …”
    Get full text
    Article
  5. 6905

    Subjective affective experience under threat is shaped by environmental affordances. by Song Qi, Dylan M Nielson, Daniele Marcotulli, Daniel S Pine, Argyris Stringaris

    Published 2024-01-01
    “…For this purpose, we introduce a novel behavioral paradigm using horror movie stimuli to simulate threats. …”
    Get full text
    Article
  6. 6906

    « Ever step you take is forever » : fin de l’héroïsme et vacuité spirituelle dans No Country for Old Men by Martin Berny

    Published 2023-01-01
    “…As a philosophical step orchestrated by the Coens, what seems to be missing or elided from the novel by Cormac McCarthy elicits a tumble into chaos. …”
    Get full text
    Article
  7. 6907

    The Shipwreck and the Wreath. Dissolution of Identities in Ruta Sepetys’ Salt to the Sea by Ewa Lukaszyk

    Published 2025-01-01
    “… The article presents a reading of Ruta Sepetys’ novel Salt to the Sea in the context of the philosophical proposal of Hans Blumenberg, who tried to capture the dynamics of European cultural and intellectual history through the metaphor of shipwreck. …”
    Get full text
    Article
  8. 6908

    A new solution to the rational voter paradox by Mladenović Ivan, Vasić Miljan

    Published 2024-01-01
    “…In response to the paradox, this paper proposes a novel solution based on Goldman’s causal responsibility approach, which asserts that voters make a partial causal contribution to the electoral outcome even if their vote is not decisive. …”
    Get full text
    Article
  9. 6909

    Subcutaneous EEG Monitoring Reveals AED Response and Breakthrough Seizures by Sigge Weisdorf, Ivan C. Zibrandtsen, Troels W. Kjaer

    Published 2020-01-01
    “…We present a case in which a novel, subcutaneous EEG device was utilized to provide an objective seizure count. …”
    Get full text
    Article
  10. 6910

    Comprehensive Review of Analytical Approaches for the Detection of Diphenhydramine: A Systematic Analysis by Alphonsa Tom, Tina Sharma, Mahipal Singh Sankhla, Archana Gautam

    Published 2024-12-01
    “…The review also points out gaps in the body of knowledge and recommends areas for future study to provide novel and reliable analytical techniques for detecting DPH. …”
    Get full text
    Article
  11. 6911

    Location Strategy for Traffic Emission Remote Sensing Monitors to Capture the Violated Emissions by Mahmoud Owais

    Published 2019-01-01
    “…The problem is formulated into a graph theory problem, and then a novel adapted metaheuristic algorithm is used to solve the problem. …”
    Get full text
    Article
  12. 6912

    Password-based three-party authenticated key exchange protocol from lattices by Jinxia YU, Huanhuan LIAN, Yongli TANG, Mengyao SHI, Zongqu ZHAO

    Published 2018-11-01
    “…Password-based three-party authenticated key exchange protocol allow clients to establish a protected session key through a server over insecure channels.Most of the existing PAKE protocols on lattices were designed for the two parties,which could not be applied to large-scale communication systems,so a novel three-party PAKE protocol from lattices was proposed.The PAKE protocol was constructed by using a splittable public-key encryption scheme and an associated approximate smooth projective Hash function,and message authentication mechanism was introduced in the protocol to resist replay attacks.Compared with the similar protocols,the new protocol reduces the number of communication round and improves the efficiency and the security of protocol applications.…”
    Get full text
    Article
  13. 6913

    Le récit plantigrade (sur Madame Bovary) by Guy Larroux

    Published 2024-01-01
    “…We also understand how Flaubert’s intention to “paint the below and the above” is precisely and topologically expressed in the novel.…”
    Get full text
    Article
  14. 6914

    Research on service-driven network technologies for space-air-ground-sea integration by FAN Kexin, AN Lirong, ZHANG Qinyu

    Published 2024-06-01
    “…Facing the emerging novel applications and service demands, space-air-ground-sea integrated network offers advantages such as global coverage, high efficiency, flexibility, elasticity, and reliability. …”
    Get full text
    Article
  15. 6915

    Paradox of Enrichment in a Stochastic Predator-Prey Model by Jawdat Alebraheem

    Published 2020-01-01
    “…We propose a stochastic predator-prey model to study a novel idea that involves investigating random noises effects on the enrichment paradox phenomenon. …”
    Get full text
    Article
  16. 6916

    A Numerical and Analytical Study of a Stochastic Epidemic SIR Model in the Light of White Noise by Shah Hussain, Elissa Nadia Madi, Hasib Khan, Mohammed S. Abdo

    Published 2022-01-01
    “…This study examines a novel SIR epidemic model that takes into account the impact of environmental white noise. …”
    Get full text
    Article
  17. 6917

    Routing protocol based on energy aware in ad hoc networks by Shi ZHENG, Wei-qiang WU, Qin-yu ZHANG, Nai-tong ZHANG

    Published 2012-04-01
    “…An energy-aware routing protocol (EARP) was presented to minimize the effect of limit energy supply of terminals in ad hoc network.In the novel protocol,different transmission paths based on service state of single node and energy consumption of the whole network could be chosen.When transmission path was broken,local maintaining strategy was evoked to reduce re-transmission of data packets and therefore route efficiency was improved.Moreover,node energy levels were introduced to avoid transmission link brake caused by energy exhaustion.Simulations were carried out on NS2 platform.The results show that,in the same simulation environment,comparing to other routing protocols,this routing protocol performs more effectively on balancing the traffic load,protecting low energy nodes and prolonging the network lifetime.…”
    Get full text
    Article
  18. 6918

    Aging and the Detection of Visual Errors in Scenes by Lori E. James, Toni M. Kooy

    Published 2011-01-01
    “…Results are interpreted as reflecting older adults' decreased ability to form representations for novel information, even though the task did not require the creation of new episodic memories.…”
    Get full text
    Article
  19. 6919

    Integrated intrusion detection model based on rough set and artificial immune by Ling ZHANG, Zhong-ying BAI, Shou-shan LUO, Kang XIE, Guan-ning CUI, Mao-hua SUN

    Published 2013-09-01
    “…According to the problems of intrusion detection,an integrated intrusion detection model based on rough set and artificial immune (RSAI-IID) was proposed by using rough set and integrating misuse detection and anomaly detection.The rough set method was used to achieve the vaccine which was injected in the model,to get better vaccine,and to optimum the performances of detection; misuse detection was used to get off the known intrusions; anomaly detection was used to detect the novel intrusions.RSAI-IID model was validated on KDD 99 dataset.The experimental results show its feasibility and effectiveness.…”
    Get full text
    Article
  20. 6920

    De l’histoire à la fiction : la réception des Memoirs of the Life of Colonel Hutchinson by Claire Gheeraert-Graffeuille

    Published 2024-06-01
    “…From the 1830s onwards, abridged versions of the Memoirs, biographies of Lucy Hutchinson, but also novels and plays derived from the Memoirs were published. …”
    Get full text
    Article