Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
37041
Common Freshwater Fish Parasites Pictorial Guide: Dinoflagellates, Coccidia, Microsporidians, & Myxozoans
Published 2005-08-01“… This publication is one in a series of pictorial guides that is designed to assist in the identification of common freshwater fish parasites. …”
Get full text
Article -
37042
Handbook of Florida Water Regulation: Florida Pollutant Discharge Prevention and Control Act
Published 2019-05-01“… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
Get full text
Article -
37043
Passages adolescents : leurs matérialisations dans les espaces et les temps informels des institutions éducatives
Published 2010-04-01“…On the other hand, the ‘informal’ designates spaces that are left out of the formal rule, spaces that are not thought through or organized within the educational frame, but that teenagers occupy, thereby conferring new functions and attributes to those spaces left vacant. …”
Get full text
Article -
37044
Le développement professionnel en évaluation des apprentissages d’enseignants du supérieur
Published 2022-09-01“…This course is part of a microprogram designed from the perspective of the Scholarship of Teaching and Learning (Bélisle et al., 2016). …”
Get full text
Article -
37045
Handbook of Florida Water Regulation: Food Quality Protection Act
Published 2019-05-01“… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
Get full text
Article -
37046
A Cleaner Production Scheduling Model with Green Investment and Pandemic Effects
Published 2024-01-01“…This article designs a cleaner production scheduling model for defective products with flexible rework rate and shortages by considering the transportation cost as proportional to pandemic intensity. …”
Get full text
Article -
37047
Off-line emergency communication method of power internet of things based on edge computing
Published 2018-03-01“…A new multi-mode node was designed for the emergency communication with the demand of electricity.The node had the multi-mode communication capability of the private network and the public network technology,which could switch smoothly in three modes:the power private network,the wireless Ad Hoc network and the wireless public network.Data were automatically uploaded to the multi-mode terminal,multi-mode terminal through the mode of rapid switching,with the public network resources to achieve rapid network recovery and continuous transmission of data to achieve off-line emergency communications.Meanwhile,an intelligent routing algorithm based on smoothness was proposed,and the three principles of edge network communication were defined.Through the edge calculation method,the calculation and updating of the smoothness were realized to ensure the intelligent,efficient and reliable operation of the edge network in the offline state.…”
Get full text
Article -
37048
Research and Implementation of Agreement on a Recording Control
Published 2013-02-01“…Focusing on how to achieve the broadband multimedia cluster communication system in rea1-time media,and scheduling co11ege storage of information,an audio and video recording contro1 mechanism was researched and designed for efficient storage of multimedia data,through the coordination between switch &contro1 center and record server.…”
Get full text
Article -
37049
Quand l’anthropologie des mondes contemporains remonte le moral de l’anthropologie de la communication
Published 2015-04-01“…While Emmanuelle Lallement portrays research on market exchanges, Yves Winkin synthesizes how he designs the notion of enchantment. Yves Winkin deplores that, even when communication anthropology is taught, it is rarely taken into consideration by communication researchers, at least in France, while Emmanuelle Lallement proposes combining their efforts to address an urban anthropology which would assume an analysis of urban policies as festive and ephemeral projects. …”
Get full text
Article -
37050
Les Songes de la nef, pour une « prise de site » musicale et sonore
Published 2018-10-01“…Opposite to the hanging up, the “site taking” enables to think of the reception of contemporary works in heritage monuments as a dynamical relationship between both, as a “criticism” in the meaning of a remote comment between musics proposed by composer Luciano Berio. We have designed the sound installation Les Songes de la nef first of all as an instrument to build, referring to composer Helmut Lachenmann. …”
Get full text
Article -
37051
Optimum response scheme of intrusion detection based on information theory
Published 2020-07-01“…Intrusion detection system (IDS) often inevitably presents major security risks caused by FPs and FNs.However,at present,an effective solution has not been found.In order to solve this problem,an optimal response model of intrusion detection based on information theory was proposed.Firstly,the intruder and IDS in the process of intrusion detection were abstracted into random variables,and the attack and defense model of intruder and IDS was constructed according to the results of the confrontation.Secondly,the defense channel of IDS was designed according to the attack and defense model,then the correct detection of IDS was transformed into the problem of successful transmission of 1 bit information in defensive channel.Finally,the defensive capability of the system was measured by analyzing the channel capacity of the defensive channel,the maximum mutual information of the defensive channel was the defensive limit capability of the IDS,and the corresponding strategy distribution was the optimal response strategy of the defensive capability of the system.The experimental results show that the scheme can effectively reduce the loss caused by FPs and FNs.…”
Get full text
Article -
37052
Handbook of Florida Water Regulation: Florida Department of Agriculture and Consumer Services
Published 2019-05-01“… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
Get full text
Article -
37053
4-H Livestock Judging: Activity 4, What You See Is What You Get!
Published 2012-01-01“…It serves as a curriculum resource within the Florida 4-H program, specifically designed for teaching livestock judging to young people aged 11-18. …”
Get full text
Article -
37054
Using Reclaimed Water to Irrigate Turfgrass – Lessons Learned from Research with Nitrogen
Published 2013-11-01“…Reclaimed water treated by filtration and chlorination is safe to use for designated purposes, such as residential landscape irrigation. …”
Get full text
Article -
37055
Re-performing African Literature: A Review of Owonibi’s Translation of three Yoruba Literary works into English – Chief Gaa, Delusion of Grandeur and The Tight Game
Published 2022-07-01“…The dataset include Adébáyọ Fálétí’s Basọrun Gáà, Ọládẹjọ Òkédìjí’s Àjà Ló lerù, and Akínwùmí Ìsọlá’s Ó Le Kú. This is designed to investigate level of re-performance through linguistic equivalence and socio-cultural thematic preservation. …”
Get full text
Article -
37056
Socio-Cultural Dynamics of Education in the Context of the Post-Non-Classical Science
Published 2015-02-01“…The author emphasizes its inevitably rising priority due to sustained development of civilization bringing about the new environmentally-oriented meta-culture.The obtained results can be used in pedagogic research methodology, designing and modeling the educational process, its content, technology and organization.…”
Get full text
Article -
37057
Mimic defense authentication method for physical access control
Published 2020-06-01“…To address the security problem of the vulnerability of the authentication methods of traditional physical access control systems,a mimic defense authentication method was designed based on the principle of mimic defense technique and its dynamic heterogeneous redundant architecture (DHR),using mobile 2D code as the interface and dynamic password as the core.First,the actuator pool of the authentication server was constructed.Then,a central controller consisting of functional modules such as input distribution agent,selector and voter was used to dynamically schedule heterogeneous redundant actuators from the actuator pool.Finally,a multimode ruling on the heterogeneous redundant actuator output to determine the authentication result was made by the voter.The experimental results show that the proposed authentication method has higher security and reliability compared to the traditional physical access control system authentication method,and at the same time,it can be used in combination with other authentication methods.…”
Get full text
Article -
37058
Study on privacy preserving encrypted traffic detection
Published 2021-08-01“…Existing encrypted traffic detection technologies lack privacy protection for data and models, which will violate the privacy preserving regulations and increase the security risk of privacy leakage.A privacy-preserving encrypted traffic detection system was proposed.It promoted the privacy of the encrypted traffic detection model by combining the gradient boosting decision tree (GBDT) algorithm with differential privacy.The privacy-protected encrypted traffic detection system was designed and implemented.The performance and the efficiency of proposed system using the CICIDS2017 dataset were evaluated, which contained the malicious traffic of the DDoS attack and the port scan.The results show that when the privacy budget value is set to 1, the system accuracy rates are 91.7% and 92.4% respectively.The training and the prediction of our model is efficient.The training time of proposed model is 5.16 s and 5.59 s, that is only 2-3 times of GBDT algorithm.The prediction time is close to the GBDT algorithm.…”
Get full text
Article -
37059
Esthétique de la trace dans No Country for Old Men (Ethan et Joel Coen, 2007)
Published 2023-01-01“…Secondly, we will see that this system does not only designate a breach in the approach to reality, i.e. on a diegetic level, but that it influences the whole filmic enunciation, and particularly editing. …”
Get full text
Article -
37060
Program profilaktyki nadużywania Internetu i mediów elektronicznych: komunikat z badań ewaluacyjnych
Published 2021-09-01“…The risk of smartphone overuse is higher among youngsters; therefore, prevention programs should address this particular group. The evaluation was designed in a quasi-experimental scheme. Two measurements were conducted on a sample of 1207 students. …”
Get full text
Article