Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
35601
Mysticism and the Reformation: a brief survey
Published 2015-12-01“…Today a more adequate understanding of the mystical element of Christianity as a deeper awareness of God’s presence in the life of believers suggests a new evaluation of the relation of Protestantism and mysticism, beginning Martin Luther, and continuing with figures like Johann Arndt, and a number of the “Spiritual Reformers,” such as Andreas Karlstadt, Sebastian Franck, Valentin Weigel, as well as the theosophical Lutheran Jacob Boehme. This essay is designed to reopen the question of the relation between Protestantism and mysticism. …”
Get full text
Article -
35602
Buckling Analysis of Laminated Composite Panel with Elliptical Cutout Subject to Axial Compression
Published 2012-01-01“…The results give useful information into designing a laminated composite cylindrical panel, which can be used to improve the load capacity of cylindrical panels.…”
Get full text
Article -
35603
Towards edge-collaborative,lightweight and secure region proposal network
Published 2020-10-01“…Aiming at the problem of image privacy leakage and computing efficiency in edge environment,a lightweight and secure region proposal network (SecRPN) was proposed.A series of secure computing protocols were designed based on the additive secret sharing scheme.Two non-collusive edge servers cooperate to perform calculation modules such as secure feature processing,secure anchor transformation,secure bounding-box correction,and secure non-maximum suppression.Theoretical analysis guarantees the correctness and security of SecRPN.The actual performance evaluation shows that SecRPN is outstanding in the computational cost and communication overhead compared with the existing works.…”
Get full text
Article -
35604
Adaptive Fuzzy Synchronization of Fractional-Order Chaotic Neural Networks with Backlash-Like Hysteresis
Published 2018-01-01“…An adaptive fuzzy synchronization controller is designed for a class of fractional-order neural networks (FONNs) subject to backlash-like hysteresis input. …”
Get full text
Article -
35605
Strategies to Increase the Adoption of Residential Pollinator Gardening: Tackling Percieved Barriers
Published 2023-05-01“…However, research shows that urban, developed landscapes can be designed and maintained to successfully provide habitats for diverse, healthy pollinator populations, including bees. …”
Get full text
Article -
35606
Low failure recovery cost controller placement strategy in software defined networks
Published 2020-12-01“…The controller placement is an important problem in software defined networks.Existing researches pay more attention to deploying controller planning for node failures and ignore the fact that the link failure can also effect the network drastically.To solve the problem,a mathematical model for the controller placement that plans ahead for the link failures to avoid a drastic increase failure recovery cost was proposed.To solve the model,an algorithm based on simulated annealing was designed.The simulation results show that the proposed model and algorithm can improve the robustness of the network.The maximum failure recovery cost is significantly reduced when a link falls in failures.…”
Get full text
Article -
35607
Denotation and application mechanism of complicated network shared management information model
Published 2008-01-01“…At last, a prototype system was designed to prove the conclusions.…”
Get full text
Article -
35608
Internet of vehicles empowered by edge intelligence
Published 2018-12-01“…By pushing computing,storage and other resources to the proximity of end devices,edge intelligence empowers network edge entities powerful information processing and content delivery capabilities,while providing efficient and low-latency service support for the development and implementation of novel mobile services.Thus,edge intelligence is profoundly changing the functions of mobile applications and the utilization patterns of network resources.The application of edge intelligence technology in vehicular networks was studied firstly,and the core scientific problems that need to be solved in designing an efficient vehicular edge system was presented.Then,the technical challenges faced in solving these problems were analyzed and the corresponding solution strategies were given.…”
Get full text
Article -
35609
Static-analysis-based event input generation approach for Android application
Published 2017-06-01“…A static-analysis-based event input generation approach for Android applications was proposed.Based on the inter-component call graph and the system dependence graph of single component,the event inputs that security-related callbacks depend on were extracted.Furthermore,an event input algorithm was designed to automatically generate event inputs according to Android application runtime.The experimental results show that the proposed method can achieve higher coverage of permission methods and basic components,which can cover more security-related execution paths and help to collect more security-related runtime behaviors during the process of dynamic analysis.…”
Get full text
Article -
35610
The overcurrent protection characteristics testing digital substation intelligent electric devices
Published 2021-04-01“…A method for checking the electrical and time characteristics of the overcurrent protection of an intelligent electronic device is proposed. The device is designed in accordance with the IEC-61850 standard and operates in the local area network of a digital substation of architecture III.…”
Get full text
Article -
35611
Combination of Anterior and Posterior Subcutaneous Internal Fixation for Unstable Pelvic Ring Injuries: The “Hula Hoop Technique”
Published 2019-03-01“…The present study reports the association of anterior and posterior subcutaneous internal fixation by applying spine-designed implants on the pelvic ring disruption: supra-acetabular pedicle screws with an interconnecting rod (Infix), plus posterior transiliac fixation with the same system, which the authors have named the “Hula Hoop Technique”.…”
Get full text
Article -
35612
Doulas como "amortecedores afetivos" Notas etnográficas sobre uma nova acompanhante de parto
Published 2005-01-01“…In this article, I intend to present some recent ethnographic notes designed to provoke reflection (and inspire new research) about the doulas. …”
Get full text
Article -
35613
Digital transformation of Russian customs authorities’ activities on the example of automatic release technology
Published 2022-01-01“…In order to expand the coverage of the declaration array by automatic release technology, the main directions for improving the automation mechanism at the release of goods have been designated, trends of automation of customs operations and its influence on the development of foreign economic activity have been defined. …”
Get full text
Article -
35614
Distributed Asynchronous Fusion Algorithm for Sensor Networks with Packet Losses
Published 2014-01-01“…Then the fusion estimator is designed to fuse local estimates in the neighborhood. …”
Get full text
Article -
35615
Service selection approach for enhancing trustworthiness of Web service
Published 2011-01-01“…Making use of the game theory,a model of service selection based on Nash bargaining solution was build,and an approach for enhancing Web service trustworthiness was proposed.A bargaining algorithm is designed between ser-vice sides of both complete rationality,through adjusting service price,to achieve maximum utility for both service re-questor and provider,and increase the success rate of transactions and service trustworthiness.Results of experiments show that,on the basis of the game that according to quality of service,reputation and security between service provider and requestor,the service selection can promote the establishment of trustable service computing environment and en-hance credibility of the service.…”
Get full text
Article -
35616
Simple and Efficient Preconditioner for Surface Integral Solution of Scattering from Multilayer Dielectric Bodies
Published 2016-01-01“…A simple and efficient preconditioner is designed for the surface integral solution of multilayer dielectric bodies and validated by numerical experiments. …”
Get full text
Article -
35617
Thiamine Deficiency in Self-Induced Refeeding Syndrome, an Undetected and Potentially Lethal Condition
Published 2014-01-01“…Rapid restoration of nutrients and electrolytes after prolonged starvation could result in a life threatening condition characterized by sensory and neurological dysfunction and severe metabolic imbalance that has been designated as refeeding syndrome. Its diagnosis is frequently missed resulting in severe complications and even death. …”
Get full text
Article -
35618
Les Français de Londres, pas tous expatriés
Published 2024-03-01“…Underlying the measures deployed for them, the objectives of influence pursued by the nation-state sometimes compete with the objectives of support for the population. Designed from a modern and universalist perspective, the public policies are based on a valuable image of the population established abroad that can be used to capitalise on the pursuit of a soft power agenda. …”
Get full text
Article -
35619
The Entomological Collection of Thomas Say
Published 1993-01-01“…A protocol for the designation of Say lectotypes and neotypes is proposed.…”
Get full text
Article -
35620
Data outsourcing authentication model based on authenticated data structures for cloud computing
Published 2011-01-01“…The outsourcing authentication model based on authenticated data structures was proposed.The formal defini-tion,data query authentication protocol and data updating authentication protocol of the model was presented.The crucial problems when the authenticated data structures are being used were analyzed.With designing the new extended coher-ence proof generation algorithm and the new extended verifying algorithm,authenticated data structures in the model very well was used.Finally the model with others through the performance analysis including the security and efficiency,the results of which show that:the model is more efficient than others as well as the consistency and correctness require-ments are also guaranteed.…”
Get full text
Article