Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
36141
Handbook of Florida Water Regulation: Table of Contents
Published 2019-05-01“… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
Get full text
Article -
36142
Sentiment Analysis as a Tool for Optimizing Educational Strategies and Business Communication
Published 2024-10-01“…Specifically, it examines the integration of sentiment analysis into business English lessons at tertiary level, suggesting two lesson plans designed to equip students with practical skills in employing sentiment data for effective communication. …”
Get full text
Article -
36143
Antibiotic Therapy for Crohn’s Disease: A Review
Published 2006-01-01“…While there are data to suggest that antibiotics may be effective in treating active luminal, particularly colonic, and/or perianal CD, evidence for their use in these settings is hampered by the lack of well-designed, adequately powered, placebo-controlled trials. …”
Get full text
Article -
36144
Study on self-similar call admission control algorithm in WiM AX
Published 2012-09-01“…As to the self-similarity of WiMAX network traffic,M/Pareto model was proposed to model network traf-fic.Through the statistical nature between the M/Pareto model and FBM traffic model,the parameters of the M/Pareto were mapped to the ones of FBM traffic model.The effective bandwidth formula was derived for M/Pareto model para-meters.Whereby,a self-similar call admission control algorithm(SS-CAC)was designed.It avoided getting the parame-ter values of FBM traffic flow model with the measurem method and adapted to the self-similarity of WiMAX traffic.Since the calculation of the effective bandwidth was accurate and convenient,simulation results show that SS-CAC greatly reduces the call blocking rate and improves the bandwidth utilization.…”
Get full text
Article -
36145
Multi-service differentiated traffic management optimization strategy in cloud data center
Published 2019-11-01“…In order to cope with the traffic management for multi-service differentiated in cloud data centers,improving network performance and service experience,the multi-service differentiated (MSD) traffic management model was designed that can suit operational requirements in cloud data center.Fibonacci tree optimization (FTO) algorithm was improved according to the MSD model.MSD-FTO traffic management strategy was proposed in SDN cloud data center.Simulation results show that the strategy takes advantage of FTO global optimization ability and multi-modal adaptive performance.Through the global local alternating optimization of the algorithm,differentiation traffic management schemes are obtained as needed,the problem of multi-services differentiated traffic management is solved in operator cloud data center that improve network performance and service experience in cloud data center effectively.…”
Get full text
Article -
36146
POL-INTEL
Published 2024-06-01“…Abstract Since the adoption of Section 2a of the Danish Police Act in 2017, the police have been able to conduct cross-sectional information analyses in IT systems designed for this purpose, and thus process personal data for purposes other than those for which they were originally collected. …”
Get full text
Article -
36147
Study on Probable Maximum Typhoon Storm Surge in Maozhou Estuary
Published 2021-01-01“…Based on the analysis of the statistical characteristics of storm surges which have a great impact on the Maozhou estuary,this paper constructs a typhoon storm surge model based on ADCIRC storm surge model and jetsner wind pressure model,calibrates and verifies the parameters of the model through three typical months and ten typical typhoons,calculates the probable maximum typhoon storm surge when the typhoon lands in Macau with the heading direction of 340° by designing different parameter combinations among typhoon center pressure,moving speed,maximum wind speed radius and typhoon path,and simulates the water augmentation process of Maozhou estuary under the probable maximum storm surge.The calculation results can provide a reference for storm surge prevention and mitigation in Maozhou estuary engineering construction.…”
Get full text
Article -
36148
Message forwarding based on periodically evolving social characteristics in opportunistic mobile networks
Published 2015-03-01“…Moreover, a social-aware routing algorithm, PerEvo, was then designed based on them. Extensive trace-driven simulation results show that PerEvo achieves higher message delivery ratio than the existing social-based forwarding schemes, while keep-ing similar routing overhead.…”
Get full text
Article -
36149
Esclaves et affranchis chez les Voconces au Haut-Empire : l’apport des inscriptions
Published 2017-12-01“…We have in this paper successively studied the documents, the chronological and geographical distribution, the designation, status and functions, the private life, relationship with the master/mistress or patronus/-a, the religious behaviour and taking part to the civic life of slaves and freedslaves of Roman citizens and of peregrines.…”
Get full text
Article -
36150
Two-level cache based streaming media scheduling algorithm for mobile network
Published 2007-01-01“…A novel caching system architecture for mobile streaming was proposed,which was named 2CMSA(two-level cache mobile streaming architecture).In this system,limitations for mobile streaming system such as small memory size in mobile terminal and low bandwidth in wireless access network were avoided.According to the 2CMSA,a scheduling algorithm of 2CMSS(two-level cache based mobile streaming scheduling) was designed;mathematical models were also achieved to analyze the performance of this scheduling algorithm.Simulation experiment proves that,comparing to the original mobile streaming system,by using the new two-level cache architecture and cache based scheduling algorithm,the network transmission cost and the client startup delay of the mobile streaming services can be decreased effectively.…”
Get full text
Article -
36151
Carnaval et patriotisme ou le paradoxe d’une festivité institutionnalisée rejetée
Published 2017-06-01“…This re-invention of the Uruguayan identity and of the social links, was passing by the reclamation of the criollo and rural Uruguay designated by the dictatorial regime as one of the depositories of the tradition and of the historic continuity. …”
Get full text
Article -
36152
AONT-and-NTRU-based rekeying scheme for encrypted deduplication
Published 2021-10-01“…Rekeying is a good way to protect against key exposure.Most of the existing encrypted deduplication systems are implemented based on message-locked-encryption, in which multiple users with the identical data share the same encryption key.When a user updates keys, that update must be followed by all other data owners, which will incur large computational and communicational overheads.To solve this problem, an AONT-and-NTRU-based rekeying scheme was proposed, a variant of AONT was designed to solve the synchronization problem of multi-user rekeying, and a proxy re-encryption algorithm based on NTRU was introduced to reduce the communicational overhead for the system and computational overhead for clients during rekeying.The efficiency analysis and experimental results show that the proposed scheme has better encryption and decryption efficiency than existing schemes and the time cost of rekeying is significantly reduced.…”
Get full text
Article -
36153
Research on active defense based on multi-stage cyber deception game
Published 2020-08-01“…In view of the characteristic that attacker depended on the detected information to decide the next actions,the non-cooperative signal game theory was applied to analyze cyber attack and defense.The signal deception mechanism in the process of cyber attack and defense was considered deeply by constructing a multi-stage cyber deception game model,and the dynamic analysis and deduction of the multi-stage cyber attack and defense was realized by considering the attenuation of cyber deception signals.A solution for multi-stage cyber deception game equilibrium was improved based on analysis of cyber attack and defense,and an optimal algorithm for selecting cyber deception defense strategies was designed.The effectiveness of the model is verified by simulations.The rules of multi-stage cyber deception games are summarized based on the results,which can provide effective guidance for the research on cyber active defense.…”
Get full text
Article -
36154
Protected Culture for Vegetable and Small Fruit Crops: Types of Structures
Published 2020-09-01“… A protective structure is defined as any structure designed to modify the environment in which plants are grown. …”
Get full text
Article -
36155
Bandwidth allocation games based on network selection for video communication
Published 2015-02-01“…A bandwidth allocation game based on network selection (BAG-NS) was proposed for video communication in heterogeneous wireless networks.Firstly,according to the video characteristics of different users and current network conditions,the algorithm calculated the weights of network factors and selected the optimum network by combining analytic hierarchy process and entropy theory.Secondly,the user’s utility function with payoff and cost was designed,and a distributed iterative algorithm is used to obtain the Nash equilibrium.Then the existence and uniqueness of the Nash equilibrium are proved.Simulation results show that the proposed algorithm enables different users to reasonably distribute in different networks and takes users’ fairness and network congestion control into consideration,which increases the utilization of network resources,reduces the users’ video distortion,and improves the users’ video quality.…”
Get full text
Article -
36156
Tourism in the Mountains of Central Kerala (South India): at the Crossroads of Attitudes Towards Forest Populations
Published 2018-01-01“…In South India the term “Adivasi” (original inhabitants) designates forest dwellers, defined in the Constitution of India as Scheduled Tribes, who live in the Ghat mountains and their foothills. …”
Get full text
Article -
36157
Scraper Conveyor Sprocket Tooth Sequence Images Acquisition Device based on Shape From Focus
Published 2020-04-01“…Due to the problems of complicated process,low accuracy and efficiency of the existing wear measurement method of scraper conveyor sprocket tooth,a sprocket tooth sequence images acquisition device is designed based on shape from focus.By controlling the movement module of the device,the axial and circumferential alignment between an industrial camera and a sprocket tooth is realized,then control the sprocket tooth radial stepping motor every step,collect a image,repeat the cycle 100 times.And the sequence images acquisition of the sprocket tooth is completed.Test results show that sequence images acquisition device can quickly acquire clear sequence images of the sprocket tooth and provide hardware support and image data samples for the sprocket wear measurement of the scraper conveyor.…”
Get full text
Article -
36158
The Art of Goodbye: Planning Final Arrangements
Published 2016-08-01“…This 7-page fact sheet, part of a new series entitled The Art of Goodbye: End of Life Education series, is designed to help in the development of a final arrangements plan using a coordinated approach. …”
Get full text
Article -
36159
Analysis of the Thermo-elastic for Involute Spur Gear Transmission with Logarithmic Modification
Published 2015-01-01“…Aiming at the involute spur gear with logarithmic modification,according to the heat conduction differential equation and the basic equations of thermo-elasticity,the thermal and thermo-elastic fields of involute spur gear at any meshing position are obtained by using the FFT and IFFT programming calculation,the influence of the torque and rotational speed on temperature field and thermal elastic field is discussed.The results show that,the logarithmic modification can reduce the strong thermal at the edges of the gear tooth caused by the edge effect,thus the scuffing resistance,accuracy and thermal fatigue life of gears are improved.The rising of either torque or rotational speed can intensify the temperature field and thermo-elastic field of gear,and the modification amount should be designed in terms of torque in order to avoid the edge effect.…”
Get full text
Article -
36160
Dual-granularity lightweight model for vulnerability code slicing method assessment
Published 2021-11-01“…Aiming at the problems existing in the assessment of existing vulnerability code slicing method, such as incomplete extraction of slicing information, high model complexity and poor generalization ability, and no feedback in the evaluation process, a dual-granularity lightweight vulnerability code slicing evaluation (VCSE) model was proposed.Aiming at the code snippet, a lightweight fusion model of TF-IDF and N-gram was constructed, which bypassed the OOV problem efficiently, and the semantic and statistical features of code slices were extracted based on the double granularity of words and characters.A heterogeneous integrated classifier with high accuracy and generalization performance was designed for vulnerability prediction and analysis.The experimental results show that the evaluation effect of lightweight VCSE is obviously better than that of the current widely used deep learning model.…”
Get full text
Article