Suggested Topics within your search.
Suggested Topics within your search.
- Foreign economic relations 2
- History 2
- YOUNG ADULT FICTION / Fantasy / Historical 2
- YOUNG ADULT FICTION / Historical / Asia 2
- Buddhism 1
- Chemical weapons 1
- Chinese 1
- Cultural assimilation 1
- Description and travel 1
- Diversity in the workplace 1
- Drawings 1
- Droit 1
- Economic aspects 1
- Economic conditions 1
- Economic development 1
- Economic policy 1
- Emigration and immigration 1
- Foreign workers, Chinese 1
- Immigrants 1
- Language 1
- Law 1
- Mass media 1
- Medical laws and legislation 1
- Moral and ethical aspects 1
- Murder 1
- Mystery and detective stories 1
- Médecine 1
- Occultism 1
- Painting 1
- Parapsychology 1
-
48021
Research on P2P streaming media identification based on UDP
Published 2012-12-01“…Several popular P2P networks TV were studied,and their differences in port usage and packet size distribution were analyzed thoroughly.By observing the above characteristics,the conclusions that network TV application employs only one port to generate most of UDP traffic in one communicat period were summarized,and the UDP packet sizes in various network TV differ significantly.Thus,a method that can identify P2P application’s UDP traffic accurately and effectively was proposed based on extended flow records.Through identifying and verifying the five P2P streaming application traffic which was called Trace data collected from the backbone channel of CERNET (China education and research network) border in Jiangsu Province,and traffic identification results compared with machine learning algorithms show that the proposed method has a high precision rate and recall rate,high time efficient,and not susceptible to the impact of the proportion of the sample.…”
Get full text
Article -
48022
Research progress of error correction coding in optical wireless communication system
Published 2022-09-01Get full text
Article -
48023
-
48024
-
48025
A hierarchical access control scheme based on Lagrange interpolation for mobile agents
Published 2018-07-01Get full text
Article -
48026
-
48027
Delay characteristics of time-sensitive services in 5G networks
Published 2022-12-01Get full text
Article -
48028
-
48029
U.S. NATIONAL MISSILE DEFENSE DEPLOYMENT IN THE ASIA-PACIFIC REGION
Published 2015-12-01“…The United States are developing military cooperation with its allies and partner countries in the Asia-Pacific region, excluding interests of China and Russia. That may only exacerbate a struggle for power between the three world largest countries and lead to negative consequences - involvement in the arms race.…”
Get full text
Article -
48030
Indoor localization method based on CSI in complex environment
Published 2018-12-01Get full text
Article -
48031
-
48032
-
48033
Joint resource allocation algorithm for clustering cognitive Internet of things
Published 2019-03-01Get full text
Article -
48034
Efficient Simulation Budget Allocation for Ranking the Top m Designs
Published 2014-01-01Get full text
Article -
48035
Desaparecidos en Marte: ciencia ficción y testimonio en la narrativa argentina de HIJOS
Published 2024-12-01“… El objetivo del artículo es proponer algunas reflexiones sobre cómo ciertas características del modo testimonial pueden combinarse con rasgos del género de la ciencia ficción a partir del análisis de dos novelas pertenecientes a la llamada “narrativa de HIJOS” argentinos: Las chanchas (2014) de Félix Bruzzone y Soy un bravo piloto de la Nueva China (2012) de Ernesto Semán. La reflexión sobre los elementos especulativos presentes en ambas novelas demostrará como la combinación de los dos discursos entrega a los escritores un abanico de posibilidades expresivas para iluminar de manera alternativa con respecto a las retóricas dominantes las permanencias traumáticas en la Argentina posdictatorial. …”
Get full text
Article -
48036
Efficient detection technology of DDoS attacks based onBF-DT-CUSUM algorithm in smart grid industrial control system
Published 2015-12-01“…Rapid development of information and communication technology has led China National Grid Corp into the era of intelligent,informational and automated,simultaneously with wide application of information and communication technology in smart grid also providing more ways for attackers to invade and attack power system.A DDoS attacks detection method based on modified CUSUM with dynamic threshold was proposed according to BloomFilter address statistics in smart grid.The proposed method used dynamic threshold technology based on BloomFilter normal traffic statistics,and optimized traditional EWMA algorithm to identify threshold of DDoS attacks,finally modified CUSUM algorithm in order to efficiently detect DDoS attacks in smart grid.Simulation experiments demonstrate that proposed method has high detection speed and precision for DDoS attacks in smart grid,and the system overhead is small.…”
Get full text
Article -
48037
Primary Lymphoepithelioma-Like Carcinoma of Lung
Published 2001-01-01“…Primary lymphoepithelioma-like carcinoma (LELC) of the lung is a neoplasm seen most commonly in the nasopharynx of individuals from south China and Taiwan, and is strongly associated with the Epstein-Barr virus. …”
Get full text
Article -
48038
Defining and preparing for diversity teacherhood—Chinese Minzu (“ethnic”) teacher education as an example
Published 2023-12-01“…AbstractThis qualitative study examines how teacher educators in Northwest China conceive of teacherhood and teacher preparation for working with diverse “Minzu” (“ethnic”) students. …”
Get full text
Article -
48039
Stem cells (neoblasts) and positional information jointly dominate regeneration in planarians
Published 2025-01-01Get full text
Article -
48040
Some well-known inequalities of Ostrowski like for Caputo derivatives
Published 2025-12-01Get full text
Article