Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
34581
Des féministes qui ne sont pas féministes ?
Published 2018-07-01“…Drawing from research in literary history dedicated to the Women's Liberation Movement in France, this contribution tells a story that is specific to radical women writers in France at this time: the story of their refusal, for some in the early 1970s, for others at the turn of the 1980s, to designate themselves as feminists. This refusal is mapped out differently for the writers close to Psychoanalysis and Politics, whose project it was to "deconstruct feminism as an ideology and to bring out a female subject", and for the materialist writers who sought to deconstruct “woman” as an ideology and to bring out a subject rid of the feminine. …”
Get full text
Article -
34582
Specification and enforcement of personalized privacy policy for social network
Published 2012-09-01“…An authorization model was proposed to support personalized privacy preferences in the first-logic privacy preference language.The language allowed users to express personalized privacy preferences.Visitor-role authorization rules based on the attributes of visitors and role-permission assignment rules based on the tags of objects were introduced,which resolve dynamic authorization and fine-grained rights assignment problems.Analyzed privacy policy conflict cases and realized policy consistency verification by Prolog logic programming.Designed a personalized privacy policy management and implementation middleware for social network.In the middleware,it integrated the management of personalized policy into access control system on the existing resources.The experiments show that the policy conflict analysis has good efficiency in the implementation.…”
Get full text
Article -
34583
Fair and efficient opportunistic interference alignment algorithm based on round-robin scheduling
Published 2017-10-01“…Opportunistic interference alignment (OIA) algorithm was proposed for the practical implementation of interference alignment (IA).A fair and efficient OIA algorithm was presented for the unfairness in resource allocation and high dependence of tremendous users in the existing OIA algorithms.Firstly,the users with the best channel was selected in the primary cell based on round-robin scheduling after the coordinate cluster was determined.Then,the interference from the primary users was eliminated by skillfully designing the useful signal spaces in the subordinate cells.Furthermore,the users with the minimum interference leakage was selected in the subordinate cells.Finally,the fairness performance was theoretically analyzed.Simulation results show that both the sum-rate and fairness of the proposed algorithm are significantly higher than that of the conventional algorithm with less interference leakage.Besides,the users can achieve a quick access.…”
Get full text
Article -
34584
Membership inference attacks against transfer learning for generalized model
Published 2021-10-01“…For the problem of poor performance of exciting membership inference attack (MIA) when facing the transfer learning model that is generalized, the MIA for the transfer learning model that is generalized was first systematically studied, the anomaly detection was designed to obtain vulnerable data samples, and MIA was carried out against individual samples.Finally, the proposed method was tested on four image data sets, which shows that the proposed MIA has great attack performance.For example, on the Flowers102 classifier migrated from VGG16 (pretraining with Caltech101), the proposed MIA achieves 83.15% precision, which reveals that in the environment of transfer learning, even without access to the teacher model, the MIA for the teacher model can be achieved by visiting the student model.…”
Get full text
Article -
34585
Kitsch as Experience of the World
Published 2025-01-01“…The term ‘kitsch’, widely laden with negative connotations, has often been used to designate worthless art, synonymous with artistic failure. …”
Get full text
Article -
34586
ALTERNATIVE VERSIONS OF PERIODIC SYSTEM OF CHEMICAL ELEMENTS IN THE EDUCATIONAL PROCESS
Published 2016-12-01“…The author proposes a modification of the table version of the periodic table of chemical elements designed to overcome the disadvantages of the two most common variants now interpreting the periodic law of Dmitri Mendeleev, which may be used in the educational process.…”
Get full text
Article -
34587
Environmental risks and impacts of mountain reservoirs for artificial snow production in a context of climate change
Published 2011-10-01“…Mountain reservoirs are hydraulic structures established in recreational mountain resorts designed to provide a water reserve mainly used for the production of artificial snow. …”
Get full text
Article -
34588
Labor remuneration for higher education teachers: economic and legal issues of incentive and compensation payments
Published 2022-02-01“…For each problem area, proposals have been developed to improve the provision of incentive and compensation payments in higher education institutions. The proposals are designed to increase the demand for pedagogical work and the competitiveness of domestic universities and enterprises.…”
Get full text
Article -
34589
Nouvelles proxémies en Europe ?
Published 2010-07-01“…The article presents an analysis of practices of landscape designers in Europe from two books Fieldwork (2006) and On Site (2009). …”
Get full text
Article -
34590
Dynamics Analysis of a Single Leg of Quadruped Robots Based on Udwadia-Kalaba Theory
Published 2022-12-01“…Considering the uncertainty of the realistic environment, a nonlinear controller is designed to track the motion trajectory using the principle of sliding mode control. …”
Get full text
Article -
34591
Password-based three-party authenticated key exchange protocol from lattices
Published 2018-11-01“…Password-based three-party authenticated key exchange protocol allow clients to establish a protected session key through a server over insecure channels.Most of the existing PAKE protocols on lattices were designed for the two parties,which could not be applied to large-scale communication systems,so a novel three-party PAKE protocol from lattices was proposed.The PAKE protocol was constructed by using a splittable public-key encryption scheme and an associated approximate smooth projective Hash function,and message authentication mechanism was introduced in the protocol to resist replay attacks.Compared with the similar protocols,the new protocol reduces the number of communication round and improves the efficiency and the security of protocol applications.…”
Get full text
Article -
34592
Development and Performance Evaluation of a Rain Shade for a low scale Agricultural Produce
Published 2015-07-01“…C motor, 12V battery, sensor, a roller tube in which a polyester fabric is wound, two extension arms attached directly to the roller tube that pulls out the fabric when the device is open to protect a designated area from rain and pulls it back when the rain stops and a stand. …”
Get full text
Article -
34593
Evaluation System of Mobile Internet User Experience Based on Big Data Analysis
Published 2015-04-01“…Following the evolution of mobile network and the development of smart devices,the mobile internet services emerge rapidly with fierce competitions,in which,improving the users' perception is quite important to win the victory in the competition.A users' experience evaluation mechanism for the main stream mobile internet services was developed and a set of KQI(key quality indicator)with authentication,inspection,and calculation methods were designed.The evaluation system of mobile internet user experience employs the big data analysis to restore the online behaviors of users,and calculates the KQI values from different dimensions of the indexes.The system realizes the comprehensive,in time,and accurate evaluation for the user experience,and thus provides strong value-added supports to the network operators and mobile internet companies.…”
Get full text
Article -
34594
Den europæiske unions harmonisering af strafferetten
Published 2002-06-01“…As crime becomes more globalised, legal instruments designed to combat crime at the international level have flourished. …”
Get full text
Article -
34595
Du réservoir des Gallets à la piscine Saint-Georges
Published 2023-09-01“…This swimming pool was designed by the city’s architect Emmanuel Le Ray and is characteristic of the monumental hygienic architecture of the first half of the twentieth century. …”
Get full text
Article -
34596
An Improved Group-Based Neighbor Discovery Algorithm for Mobile Sensor Networks
Published 2014-04-01“…Due to high mobility of nodes, it is a challenging issue to reduce discovery delay. Most discovery designs are based on pairwise and fixed duty cycle, in which discovery is passively achieved when two nodes wake up at the same time. …”
Get full text
Article -
34597
Pesticide Safety Miniposter: Labels and Material Safety Data Sheets (MSDSs)
Published 2012-10-01“…The poster has quick response (QR) codes that direct smartphones to short, online videos explaining how to read pesticide labels and MSDSs. Designed by R.W. Baldwin, S.K. Hill, Philip Koehler, P.A. …”
Get full text
Article -
34598
Fault diagnosis of nonlinear analog circuits using generalized frequency response function and LSSVM.
Published 2024-01-01“…After obtaining the fault features, a multi-fault classifier is designed based on the LSSVM. In order to improve the training speed and reduces storage, a simplified LSSVM model is used to construct the classifier, and the conjugate gradient algorithm is used for training. …”
Get full text
Article -
34599
Using an Experiential Model in 4-H
Published 2006-05-01“…This model requires that the “teacher/leader” be very clear about the skill or concept targeted and that the experience and the processing questions are designed to support that learner goal. The experiential learning process engages the learners in all phases of the activity, resulting in the ability to generalize this learning to new situations. …”
Get full text
Article -
34600
Les Temps des territoires. Introduction du dossier thématique
Published 2018-06-01“…These approaches from different disciplines question the categories and the tools designed by experts, to measure the time and to analyze the spatio-temporal dynamics. …”
Get full text
Article