Showing 36,421 - 36,440 results of 46,768 for search '"Design"', query time: 0.19s Refine Results
  1. 36421

    Des féministes qui ne sont pas féministes ? by Audrey Lasserre

    Published 2018-07-01
    “…Drawing from research in literary history dedicated to the Women's Liberation Movement in France, this contribution tells a story that is specific to radical women writers in France at this time: the story of their refusal, for some in the early 1970s, for others at the turn of the 1980s, to designate themselves as feminists. This refusal is mapped out differently for the writers close to Psychoanalysis and Politics, whose project it was to "deconstruct feminism as an ideology and to bring out a female subject", and for the materialist writers who sought to deconstruct “woman” as an ideology and to bring out a subject rid of the feminine. …”
    Get full text
    Article
  2. 36422

    Specification and enforcement of personalized privacy policy for social network by Yuan WANG, Yu-qing SUN, Le-le MA

    Published 2012-09-01
    “…An authorization model was proposed to support personalized privacy preferences in the first-logic privacy preference language.The language allowed users to express personalized privacy preferences.Visitor-role authorization rules based on the attributes of visitors and role-permission assignment rules based on the tags of objects were introduced,which resolve dynamic authorization and fine-grained rights assignment problems.Analyzed privacy policy conflict cases and realized policy consistency verification by Prolog logic programming.Designed a personalized privacy policy management and implementation middleware for social network.In the middleware,it integrated the management of personalized policy into access control system on the existing resources.The experiments show that the policy conflict analysis has good efficiency in the implementation.…”
    Get full text
    Article
  3. 36423

    Le viol : un crime spécifique. Quelques pistes de réflexions issues de l’anthropologie by Véronique Nahoum-Grappe

    Published 2024-05-01
    “…These sexual crimes must then be seen as torture in a situation of impunity, in a logic of domination; they are crimes of defilement where shame and guilt fall on the side of the victim and whose deliberate political use as a tactic designed to destroy the social fabric of the enemy civilian population needs to be investigated in a specific way (as for example currently in the war in Ukraine (2022-20??).…”
    Get full text
    Article
  4. 36424

    Determinations of red cell rediıced glutathione levels in konya merino sheep by Leyla KALAYCIOĞLU

    “…They were divided into two groups designed GSH high and GSH low according to their erytlirocyte GSH concentrations. …”
    Get full text
    Article
  5. 36425

    Fair and efficient opportunistic interference alignment algorithm based on round-robin scheduling by Xian-zhong XIE, Hua-bing LU, Zhao-yuan SHI

    Published 2017-10-01
    “…Opportunistic interference alignment (OIA) algorithm was proposed for the practical implementation of interference alignment (IA).A fair and efficient OIA algorithm was presented for the unfairness in resource allocation and high dependence of tremendous users in the existing OIA algorithms.Firstly,the users with the best channel was selected in the primary cell based on round-robin scheduling after the coordinate cluster was determined.Then,the interference from the primary users was eliminated by skillfully designing the useful signal spaces in the subordinate cells.Furthermore,the users with the minimum interference leakage was selected in the subordinate cells.Finally,the fairness performance was theoretically analyzed.Simulation results show that both the sum-rate and fairness of the proposed algorithm are significantly higher than that of the conventional algorithm with less interference leakage.Besides,the users can achieve a quick access.…”
    Get full text
    Article
  6. 36426

    Membership inference attacks against transfer learning for generalized model by Jinyin CHEN, Wenchang SHANGGUAN, Jingjing ZHANG, Haibin ZHENG, Yayu ZHENG, Xuhong ZHANG

    Published 2021-10-01
    “…For the problem of poor performance of exciting membership inference attack (MIA) when facing the transfer learning model that is generalized, the MIA for the transfer learning model that is generalized was first systematically studied, the anomaly detection was designed to obtain vulnerable data samples, and MIA was carried out against individual samples.Finally, the proposed method was tested on four image data sets, which shows that the proposed MIA has great attack performance.For example, on the Flowers102 classifier migrated from VGG16 (pretraining with Caltech101), the proposed MIA achieves 83.15% precision, which reveals that in the environment of transfer learning, even without access to the teacher model, the MIA for the teacher model can be achieved by visiting the student model.…”
    Get full text
    Article
  7. 36427

    Kitsch as Experience of the World by Darío Hernández Guerra

    Published 2025-01-01
    “…The term ‘kitsch’, widely laden with negative connotations, has often been used to designate worthless art, synonymous with artistic failure. …”
    Get full text
    Article
  8. 36428

    ALTERNATIVE VERSIONS OF PERIODIC SYSTEM OF CHEMICAL ELEMENTS IN THE EDUCATIONAL PROCESS by Oleg V. Mikhailov

    Published 2016-12-01
    “…The author proposes a modification of the table version of the periodic table of chemical elements designed to overcome the disadvantages of the two most common variants now interpreting the periodic law of Dmitri Mendeleev, which may be used in the educational process.…”
    Get full text
    Article
  9. 36429

    Environmental risks and impacts of mountain reservoirs for artificial snow production in a context of climate change by André Evette, Laurent Peyras, Hugues François, Stéphanie Gaucherand

    Published 2011-10-01
    “…Mountain reservoirs are hydraulic structures established in recreational mountain resorts designed to provide a water reserve mainly used for the production of artificial snow. …”
    Get full text
    Article
  10. 36430

    Labor remuneration for higher education teachers: economic and legal issues of incentive and compensation payments by P. V. Zobov, M. V. Erkhova

    Published 2022-02-01
    “…For each problem area, proposals have been developed to improve the provision of incentive and compensation payments in higher education institutions. The proposals are designed to increase the demand for pedagogical work and the competitiveness of domestic universities and enterprises.…”
    Get full text
    Article
  11. 36431

    Nouvelles proxémies en Europe ? by Pierre Donadieu

    Published 2010-07-01
    “…The article presents an analysis of practices of landscape designers in Europe from two books Fieldwork (2006) and On Site (2009). …”
    Get full text
    Article
  12. 36432

    Dynamics Analysis of a Single Leg of Quadruped Robots Based on Udwadia-Kalaba Theory by Liang Bin, Yuan Liang, Ran Teng, Xiao Wendong, He Li

    Published 2022-12-01
    “…Considering the uncertainty of the realistic environment, a nonlinear controller is designed to track the motion trajectory using the principle of sliding mode control. …”
    Get full text
    Article
  13. 36433

    Password-based three-party authenticated key exchange protocol from lattices by Jinxia YU, Huanhuan LIAN, Yongli TANG, Mengyao SHI, Zongqu ZHAO

    Published 2018-11-01
    “…Password-based three-party authenticated key exchange protocol allow clients to establish a protected session key through a server over insecure channels.Most of the existing PAKE protocols on lattices were designed for the two parties,which could not be applied to large-scale communication systems,so a novel three-party PAKE protocol from lattices was proposed.The PAKE protocol was constructed by using a splittable public-key encryption scheme and an associated approximate smooth projective Hash function,and message authentication mechanism was introduced in the protocol to resist replay attacks.Compared with the similar protocols,the new protocol reduces the number of communication round and improves the efficiency and the security of protocol applications.…”
    Get full text
    Article
  14. 36434

    Development and Performance Evaluation of a Rain Shade for a low scale Agricultural Produce by MN Akhaze, AA Bamidele

    Published 2015-07-01
    “…C motor, 12V battery, sensor, a roller tube in which a polyester fabric is wound, two extension arms attached directly to the roller tube that pulls out the fabric when the device is open to protect a designated area from rain and pulls it back when the rain stops and a stand. …”
    Get full text
    Article
  15. 36435

    Evaluation System of Mobile Internet User Experience Based on Big Data Analysis by Sen Chen, Chao Chen, Xiaoyong Zhang, Lei Wang, Peng Sun

    Published 2015-04-01
    “…Following the evolution of mobile network and the development of smart devices,the mobile internet services emerge rapidly with fierce competitions,in which,improving the users' perception is quite important to win the victory in the competition.A users' experience evaluation mechanism for the main stream mobile internet services was developed and a set of KQI(key quality indicator)with authentication,inspection,and calculation methods were designed.The evaluation system of mobile internet user experience employs the big data analysis to restore the online behaviors of users,and calculates the KQI values from different dimensions of the indexes.The system realizes the comprehensive,in time,and accurate evaluation for the user experience,and thus provides strong value-added supports to the network operators and mobile internet companies.…”
    Get full text
    Article
  16. 36436

    Den europæiske unions harmonisering af strafferetten by Thomas Elholm

    Published 2002-06-01
    “…As crime becomes more globalised, legal instruments designed to combat crime at the international level have flourished. …”
    Get full text
    Article
  17. 36437

    Du réservoir des Gallets à la piscine Saint-Georges by Isabelle Baguelin

    Published 2023-09-01
    “…This swimming pool was designed by the city’s architect Emmanuel Le Ray and is characteristic of the monumental hygienic architecture of the first half of the twentieth century. …”
    Get full text
    Article
  18. 36438

    An Improved Group-Based Neighbor Discovery Algorithm for Mobile Sensor Networks by Qiang Niu, Weiwei Bao, Shixiong Xia

    Published 2014-04-01
    “…Due to high mobility of nodes, it is a challenging issue to reduce discovery delay. Most discovery designs are based on pairwise and fixed duty cycle, in which discovery is passively achieved when two nodes wake up at the same time. …”
    Get full text
    Article
  19. 36439

    Pesticide Safety Miniposter: Labels and Material Safety Data Sheets (MSDSs) by Rebecca W. Baldwin, Stephanie K. Larrick Hill, Philip Koehler, P. A. Mitola, J. C. Medley

    Published 2012-10-01
    “…The poster has quick response (QR) codes that direct smartphones to short, online videos explaining how to read pesticide labels and MSDSs. Designed by R.W. Baldwin, S.K. Hill, Philip Koehler, P.A. …”
    Get full text
    Article
  20. 36440

    Fault diagnosis of nonlinear analog circuits using generalized frequency response function and LSSVM. by Jialiang Zhang, Yaowang Yang

    Published 2024-01-01
    “…After obtaining the fault features, a multi-fault classifier is designed based on the LSSVM. In order to improve the training speed and reduces storage, a simplified LSSVM model is used to construct the classifier, and the conjugate gradient algorithm is used for training. …”
    Get full text
    Article