Showing 34,581 - 34,600 results of 44,324 for search '"Design"', query time: 0.18s Refine Results
  1. 34581

    Des féministes qui ne sont pas féministes ? by Audrey Lasserre

    Published 2018-07-01
    “…Drawing from research in literary history dedicated to the Women's Liberation Movement in France, this contribution tells a story that is specific to radical women writers in France at this time: the story of their refusal, for some in the early 1970s, for others at the turn of the 1980s, to designate themselves as feminists. This refusal is mapped out differently for the writers close to Psychoanalysis and Politics, whose project it was to "deconstruct feminism as an ideology and to bring out a female subject", and for the materialist writers who sought to deconstruct “woman” as an ideology and to bring out a subject rid of the feminine. …”
    Get full text
    Article
  2. 34582

    Specification and enforcement of personalized privacy policy for social network by Yuan WANG, Yu-qing SUN, Le-le MA

    Published 2012-09-01
    “…An authorization model was proposed to support personalized privacy preferences in the first-logic privacy preference language.The language allowed users to express personalized privacy preferences.Visitor-role authorization rules based on the attributes of visitors and role-permission assignment rules based on the tags of objects were introduced,which resolve dynamic authorization and fine-grained rights assignment problems.Analyzed privacy policy conflict cases and realized policy consistency verification by Prolog logic programming.Designed a personalized privacy policy management and implementation middleware for social network.In the middleware,it integrated the management of personalized policy into access control system on the existing resources.The experiments show that the policy conflict analysis has good efficiency in the implementation.…”
    Get full text
    Article
  3. 34583

    Fair and efficient opportunistic interference alignment algorithm based on round-robin scheduling by Xian-zhong XIE, Hua-bing LU, Zhao-yuan SHI

    Published 2017-10-01
    “…Opportunistic interference alignment (OIA) algorithm was proposed for the practical implementation of interference alignment (IA).A fair and efficient OIA algorithm was presented for the unfairness in resource allocation and high dependence of tremendous users in the existing OIA algorithms.Firstly,the users with the best channel was selected in the primary cell based on round-robin scheduling after the coordinate cluster was determined.Then,the interference from the primary users was eliminated by skillfully designing the useful signal spaces in the subordinate cells.Furthermore,the users with the minimum interference leakage was selected in the subordinate cells.Finally,the fairness performance was theoretically analyzed.Simulation results show that both the sum-rate and fairness of the proposed algorithm are significantly higher than that of the conventional algorithm with less interference leakage.Besides,the users can achieve a quick access.…”
    Get full text
    Article
  4. 34584

    Membership inference attacks against transfer learning for generalized model by Jinyin CHEN, Wenchang SHANGGUAN, Jingjing ZHANG, Haibin ZHENG, Yayu ZHENG, Xuhong ZHANG

    Published 2021-10-01
    “…For the problem of poor performance of exciting membership inference attack (MIA) when facing the transfer learning model that is generalized, the MIA for the transfer learning model that is generalized was first systematically studied, the anomaly detection was designed to obtain vulnerable data samples, and MIA was carried out against individual samples.Finally, the proposed method was tested on four image data sets, which shows that the proposed MIA has great attack performance.For example, on the Flowers102 classifier migrated from VGG16 (pretraining with Caltech101), the proposed MIA achieves 83.15% precision, which reveals that in the environment of transfer learning, even without access to the teacher model, the MIA for the teacher model can be achieved by visiting the student model.…”
    Get full text
    Article
  5. 34585

    Kitsch as Experience of the World by Darío Hernández Guerra

    Published 2025-01-01
    “…The term ‘kitsch’, widely laden with negative connotations, has often been used to designate worthless art, synonymous with artistic failure. …”
    Get full text
    Article
  6. 34586

    ALTERNATIVE VERSIONS OF PERIODIC SYSTEM OF CHEMICAL ELEMENTS IN THE EDUCATIONAL PROCESS by Oleg V. Mikhailov

    Published 2016-12-01
    “…The author proposes a modification of the table version of the periodic table of chemical elements designed to overcome the disadvantages of the two most common variants now interpreting the periodic law of Dmitri Mendeleev, which may be used in the educational process.…”
    Get full text
    Article
  7. 34587

    Environmental risks and impacts of mountain reservoirs for artificial snow production in a context of climate change by André Evette, Laurent Peyras, Hugues François, Stéphanie Gaucherand

    Published 2011-10-01
    “…Mountain reservoirs are hydraulic structures established in recreational mountain resorts designed to provide a water reserve mainly used for the production of artificial snow. …”
    Get full text
    Article
  8. 34588

    Labor remuneration for higher education teachers: economic and legal issues of incentive and compensation payments by P. V. Zobov, M. V. Erkhova

    Published 2022-02-01
    “…For each problem area, proposals have been developed to improve the provision of incentive and compensation payments in higher education institutions. The proposals are designed to increase the demand for pedagogical work and the competitiveness of domestic universities and enterprises.…”
    Get full text
    Article
  9. 34589

    Nouvelles proxémies en Europe ? by Pierre Donadieu

    Published 2010-07-01
    “…The article presents an analysis of practices of landscape designers in Europe from two books Fieldwork (2006) and On Site (2009). …”
    Get full text
    Article
  10. 34590

    Dynamics Analysis of a Single Leg of Quadruped Robots Based on Udwadia-Kalaba Theory by Liang Bin, Yuan Liang, Ran Teng, Xiao Wendong, He Li

    Published 2022-12-01
    “…Considering the uncertainty of the realistic environment, a nonlinear controller is designed to track the motion trajectory using the principle of sliding mode control. …”
    Get full text
    Article
  11. 34591

    Password-based three-party authenticated key exchange protocol from lattices by Jinxia YU, Huanhuan LIAN, Yongli TANG, Mengyao SHI, Zongqu ZHAO

    Published 2018-11-01
    “…Password-based three-party authenticated key exchange protocol allow clients to establish a protected session key through a server over insecure channels.Most of the existing PAKE protocols on lattices were designed for the two parties,which could not be applied to large-scale communication systems,so a novel three-party PAKE protocol from lattices was proposed.The PAKE protocol was constructed by using a splittable public-key encryption scheme and an associated approximate smooth projective Hash function,and message authentication mechanism was introduced in the protocol to resist replay attacks.Compared with the similar protocols,the new protocol reduces the number of communication round and improves the efficiency and the security of protocol applications.…”
    Get full text
    Article
  12. 34592

    Development and Performance Evaluation of a Rain Shade for a low scale Agricultural Produce by MN Akhaze, AA Bamidele

    Published 2015-07-01
    “…C motor, 12V battery, sensor, a roller tube in which a polyester fabric is wound, two extension arms attached directly to the roller tube that pulls out the fabric when the device is open to protect a designated area from rain and pulls it back when the rain stops and a stand. …”
    Get full text
    Article
  13. 34593

    Evaluation System of Mobile Internet User Experience Based on Big Data Analysis by Sen Chen, Chao Chen, Xiaoyong Zhang, Lei Wang, Peng Sun

    Published 2015-04-01
    “…Following the evolution of mobile network and the development of smart devices,the mobile internet services emerge rapidly with fierce competitions,in which,improving the users' perception is quite important to win the victory in the competition.A users' experience evaluation mechanism for the main stream mobile internet services was developed and a set of KQI(key quality indicator)with authentication,inspection,and calculation methods were designed.The evaluation system of mobile internet user experience employs the big data analysis to restore the online behaviors of users,and calculates the KQI values from different dimensions of the indexes.The system realizes the comprehensive,in time,and accurate evaluation for the user experience,and thus provides strong value-added supports to the network operators and mobile internet companies.…”
    Get full text
    Article
  14. 34594

    Den europæiske unions harmonisering af strafferetten by Thomas Elholm

    Published 2002-06-01
    “…As crime becomes more globalised, legal instruments designed to combat crime at the international level have flourished. …”
    Get full text
    Article
  15. 34595

    Du réservoir des Gallets à la piscine Saint-Georges by Isabelle Baguelin

    Published 2023-09-01
    “…This swimming pool was designed by the city’s architect Emmanuel Le Ray and is characteristic of the monumental hygienic architecture of the first half of the twentieth century. …”
    Get full text
    Article
  16. 34596

    An Improved Group-Based Neighbor Discovery Algorithm for Mobile Sensor Networks by Qiang Niu, Weiwei Bao, Shixiong Xia

    Published 2014-04-01
    “…Due to high mobility of nodes, it is a challenging issue to reduce discovery delay. Most discovery designs are based on pairwise and fixed duty cycle, in which discovery is passively achieved when two nodes wake up at the same time. …”
    Get full text
    Article
  17. 34597

    Pesticide Safety Miniposter: Labels and Material Safety Data Sheets (MSDSs) by Rebecca W. Baldwin, Stephanie K. Larrick Hill, Philip Koehler, P. A. Mitola, J. C. Medley

    Published 2012-10-01
    “…The poster has quick response (QR) codes that direct smartphones to short, online videos explaining how to read pesticide labels and MSDSs. Designed by R.W. Baldwin, S.K. Hill, Philip Koehler, P.A. …”
    Get full text
    Article
  18. 34598

    Fault diagnosis of nonlinear analog circuits using generalized frequency response function and LSSVM. by Jialiang Zhang, Yaowang Yang

    Published 2024-01-01
    “…After obtaining the fault features, a multi-fault classifier is designed based on the LSSVM. In order to improve the training speed and reduces storage, a simplified LSSVM model is used to construct the classifier, and the conjugate gradient algorithm is used for training. …”
    Get full text
    Article
  19. 34599

    Using an Experiential Model in 4-H by Marilyn M. Norman, Joy C. Jordan

    Published 2006-05-01
    “…This model requires that the “teacher/leader” be very clear about the skill or concept targeted and that the experience and the processing questions are designed to support that learner goal. The experiential learning process engages the learners in all phases of the activity, resulting in the ability to generalize this learning to new situations. …”
    Get full text
    Article
  20. 34600

    Les Temps des territoires. Introduction du dossier thématique by Céline Clauzel, Jean Gardin, Catherine Carré, Anne Sourdril, Rhoda Fofack

    Published 2018-06-01
    “…These approaches from different disciplines question the categories and the tools designed by experts, to measure the time and to analyze the spatio-temporal dynamics. …”
    Get full text
    Article