Suggested Topics within your search.
Suggested Topics within your search.
- History 61
- English language 32
- Management 23
- Research 23
- methods 22
- Politics and government 20
- Rhetoric 19
- Study and teaching 19
- Methodology 17
- Report writing 17
- Social aspects 17
- Moral and ethical aspects 15
- Social conditions 15
- Economic conditions 14
- Economic development 14
- Economic policy 14
- Law 14
- Philosophy 14
- Grammar 13
- History and criticism 12
- Anesthesia 11
- Mass media 11
- Constitutional court 10
- Biochemistry 9
- Court of Appeal 9
- Handbooks, manuals, etc 9
- Law reports, digests, etc 9
- Psychological aspects 9
- Education 8
- Medicine 8
-
419821
پهنهبندی حساسیت فرسایش خندقی با استفاده از مدلهای CART, ANN و RF
Published 2023-06-01Get full text
Article -
419822
تجدید تجربه ی تربیت عقلانی اخوان الصفا به عنوان برون رفتی از چالش های موجود در نظام تعلیم و تربیت
Published 2024-12-01Get full text
Article -
419823
Editorial independence needs to be protected and preserved at all cost
Published 2025-01-01“…N/A…”
Get full text
Article -
419824
Borderlands/Chemins de traverse
Published 2022-12-01“…A bilingual creative writing project on the theme of crossing borders, memory and observation written in prose poetry.…”
Get full text
Article -
419825
Erratum to: On universal splittings of tree-level particle and string scattering amplitudes
Published 2025-01-01“…A correction to this paper has been published: https://doi.org/10.1007/JHEP09(2024)049…”
Get full text
Article -
419826
Boundary value problems for the diffusion equation with piecewise continuous time delay
Published 1997-01-01“…A study is made of partial differential equations with piecewise constant arguments. …”
Get full text
Article -
419827
Improvement of the blockchain protocol based on memory-hard function
Published 2020-10-01“…A new blockchain chain protocol was proposed,which allowed adjusting the loading time of the mining process.This strategy reduced the ASIC and CPU mining rate of the gap,so that the using of ASIC mining is limited.Finally,the safety of this new chain structure was analyzed and compared to the original chain protocol.…”
Get full text
Article -
419828
Subcontra-continuous functions
Published 1998-01-01“…A weak form of contra-continuity, called subcontra-continuity, is introduced. …”
Get full text
Article -
419829
Composable information flow verification for service chain based on model checking
Published 2014-11-01“…A composable information verification approach is proposed for the secure service chain composition.Based on the secure service component,the security constraints for the component’s composibility is specified and the information flow verification algorithms is proposed.Through the experiments and simulation,it shows that the approach can decrease the verification cost effectively and improve the efficiency of the verification.…”
Get full text
Article -
419830
Lessons from the History of Internet Studies
Published 2021-01-01“…A Keynote Presentation given at the Open Literacy Digital Games, Social Responsibility and Social Innovation Symposium in celebration of the 20-year anniversary of the founding of Internet Studies at Curtin University. …”
Get full text
Article -
419831
Collision resolution algorithm based on time-series forecasting for cognitive wireless networks
Published 2011-11-01“…A novel prediction-based collision resolution algorithm for self-similar traffic in cognitive wireless networks was formulated.The packet collision was resolved by combining the tree splitting scheme and the prediction theory.Through theoretical analysis and simulation experiments,the proposed prediction-based collision resolution algorithm performs better than the binary-tree splitting algorithm in terms of network throughput and collision resolution period.…”
Get full text
Article -
419832
Key nodes discovery in network graph based on Graphlab
Published 2016-03-01“…A distributed key nodes discovery algorithm was proposed(DABC) which was implemented on Graphlab.Due to the good scalability,the scale of graph supported by algorithm was enlarged significantly.The parallel processing also enhances the speed of calculation.Experiment results show that proposed algorithm can achieve up to 4 times per-formance improvement compared with the traditional centralized key node discovery algorithm.…”
Get full text
Article -
419833
Towards Donors’ Responsibility in Monitoring Budget Support: Political and Technical Considerations
Published 2013-06-01“…A very thin line separates the donor’s role as an active agent in the development process from his complementary role. …”
Get full text
Article -
419834
Anonymous authentication scheme based on one-off public key in pervasive computing environments
Published 2012-02-01“…A signature scheme with the one-off public key was proposed based on identity-based cryptography,which had less calculating and communicating expense compared with available schemes.An anonymous authentication scheme was designed based on the proposed signature scheme.When users committed,service provider together with the trusted center could reveal the malicious user's identity.The proposed scheme can realize strong anonymity and prevent the user committing.…”
Get full text
Article -
419835
High-Order Compact Implicit Difference Methods For Parabolic Equations in Geodynamo Simulation
Published 2009-01-01“…A series of compact implicit schemes of fourth and sixth orders are developed for solving differential equations involved in geodynamics simulations. …”
Get full text
Article -
419836
ESTILOS DE INTERAÇÃO EM INTERFACES PARA DISPOSITIVOS MÓVEIS
Published 2010-01-01“…A era do processamento digital da informação trouxe mudanças na maneira das pessoas se comunicarem por meio de artefatos digitais. …”
Get full text
Article -
419837
Research on simple query algorithm during mobile terminal disconnection
Published 2014-03-01“…A simple query processing algorithm SQPID (simple query processing in disconnection),was proposed.Main idea of SQPID is to build integrated related semantic cache item about current query through combining and clipping operations.In order to simplify the procedure,SQPID's combine does not involve indirect relativity estimation.The results of simulated experiments show that SQPID's query response time and degree of accuracy better meet client's requirements than QPID algorithm.…”
Get full text
Article -
419838
Distributed interference coordination based on multi-agent deep reinforcement learning
Published 2020-07-01“…A distributed interference coordination strategy based on multi-agent deep reinforcement learning was investigated to meet the requirements of file downloading traffic in interference networks.By the proposed strategy transmission scheme could be adjusted adaptively based on the interference environment and traffic requirements with limited amount of information exchanged among nodes.Simulation results show that the user satisfaction loss of the proposed strategy from the optimal strategy with perfect future information does not exceed 11% for arbitrary number of users and traffic requirements.…”
Get full text
Article -
419839
Novel role analysis method for network domain users
Published 2017-03-01“…A novel role analysis method for network domain users was proposed.Firstly,the algorithm used ISODATA algorithm to cluster network events for user behavior analysis,on the basis of conditions,the method search relationships between varieties of grouping sets in the network instance,and identify each user role in the performing process of network instance.Finally,simulation results show that the effectiveness of the proposed algorithm can distinguish the network user hierarchy and obtain the dominant roles about network users.…”
Get full text
Article -
419840
Researches on efficient transmission protocol for multi-cell system based on interference toleration
Published 2016-05-01“…A two-time-slot transmission protocol was designed according to the cell-edge users' interference problem.The precoder closed expressions under the proposed transmission protocol were derived based on the well-known precoder scheme of the signal-to-leakage-plus-noise ratio(SLNR).Furthermore,an adaptive receiver was based on the non-linear minimum mean square error criterion.Simulation results demonstrated that the proposed transmission protocol has significant sum-rate gains compared with traditional system.…”
Get full text
Article