Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
37361
Zhýralci a psychopati Trestání homosexuality za první republiky a česká medicína
Published 2013-01-01“… In this paper it is shown how during the interwar period the Czech medicine embraced in explaining of homosexuality the distinction between so-called “inborn” and “acquired” homosexuality (under the second designation was meant homosexual behavior of people, which were described by the physicians as straight from the nature) and how she gradually managed to establish this dichotomy as a valid category also in the theory and practice of criminal law. …”
Get full text
Article -
37362
Arthropod Pest Management Practices of Strawberry Growers in Florida: A Survey of the 2019-2020 Field Season
Published 2023-02-01“…But strawberry growers have developed an awareness of IPM tools available to them and are already using these tools such as releasing biological control agents for mite management, cover cropping, and considering planting banker (flowering) crops in designated spaces in and around their fields. …”
Get full text
Article -
37363
Historiciser les langues en classe de français langue étrangère à travers des démarches de croisement de récits
Published 2024-12-01“…The didactic approaches designed and presented in this article place the historicity of language comprehension and production at the heart of teaching/learning French as a Foreign Language. …”
Get full text
Article -
37364
Handbook of Florida Agricultural Laws: Related Non-Crop or Product Agricultural Topics
Published 2022-06-01“… This revised document is part of the Handbook of Florida Agricultural Laws, which was designed to provide an accurate, current, and authoritative summary of the principal Florida laws that directly or indirectly relate to agriculture. …”
Get full text
Article -
37365
zIncubascope: Long-term quantitative imaging of multi-cellular assemblies inside an incubator.
Published 2025-01-01“…We present here an imaging platform designed to be accommodated inside an incubator which provides high-throughput monitoring of cell assemblies over days and weeks. …”
Get full text
Article -
37366
Handbook of Florida Water Regulation: Clean Water Act
Published 2019-05-01“… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
Get full text
Article -
37367
STUDY OF VIBRATION SUPPRESSION SYSTEM OF HIGH ALTITUDE PLATFORM BASED ON MR DAMPER
Published 2018-01-01“…The paper analyzes the vibration characteristics and designs a kind of rotary MR damper based on a shear mode of magneto rheological fluid. …”
Get full text
Article -
37368
Research on Avoidance of Energy Hole Scheme in the Wireless Mesh Network
Published 2013-11-01“…In order to avoid the energy hole problem in wireless mesh network, the non-uniform distribution strategy about the cluster nodes was put forward, the energy efficiency optimization equilibrium routing algorithm was designed. When the distribution of cluster nodes in the wireless mesh network met the certain relations, the network could optimize the energy consumption efficiency equilibrium. …”
Get full text
Article -
37369
Highways and Wildlife: Problems and Solutions
Published 2004-01-01“…Increased knowledge of wildlife movements, use of habitat, and reactions to highways, in addition to greater experience with innovative roadway designs, offer opportunities to lessen the negative impacts of roads on native fauna. …”
Get full text
Article -
37370
Urban Tree Selection for Diversity
Published 2020-10-01“…This new 4-page fact sheet is intended to provide urban foresters, arborists, landscape designers, and others in charge of tree planting with a process for introducing new species into the urban environment. …”
Get full text
Article -
37371
Full duplex secret transmission scheme based on user cooperation
Published 2017-01-01“…Full-duplex artificial noise scheme can achieve a limited improvement while the interference power keeps increasing and the full-duplex gain is null.To solve these two problems,a full-duplex secure transmission scheme based on user cooperation was proposed,in which the full-duplex receiver used partial power to send artificial noise,and transmitted the downlink signal by the remaining power to the user who shared the same frequency.In order to maximize the system secrecy rate,the beam vector of the desired signal and the artificial noise were designed.Besides,the optimal power allocation factor was obtained by one-dimensional search simply.Simulation results show that compared with the RS-ref and HD methods,the proposed method can achieve an approximate linear growth in high power and can obtain the full-duplex gain.…”
Get full text
Article -
37372
Statistical ineffective fault analysis of the lightweight authenticated cipher algorithm Saturnin-Short
Published 2023-04-01“…On the random single byte-oriented fault model and the assumption of ciphertext-only attack, a statistical ineffective fault analysis of the Saturnin-Short cipher was proposed.The analysis combined the statistical distribution with the ineffective analysis, and discussed the difference between intermediate states before and after fault injections.A variety of dual distinguishers was designed, such as the probabilistic symmetric Chi-square-maximum likelihood estimate, and harmonic mean-Hamming weight.It only required at least 1 097 ineffective faults to recover the 256 bit secret key with a success rate of at least 99%.The experimental results show that the proposed distinguishers can not only decrease fault injections, but also reduce the attacking time and complexities.Therefore, the Saturnin-Short cipher cannot resist against the statistical ineffective fault analysis.It provides an important reference for the security analysis of other lightweight authenticated ciphers.…”
Get full text
Article -
37373
Applications on Bipolar Vague Soft Sets
Published 2023-01-01“…Furthermore, a bipolar vague soft set-designed decision-making algorithm is provided generalizing Roy and Maji method. …”
Get full text
Article -
37374
La querelle des noms. Chaînes et strates ethnonymiques dans le Chaco boréal
Published 2011-12-01“…The ethnic names, still in use in 1940, to designate the indigenous peoples of the Chaco Boreal (Chulupi, Moro, Chamacoco, Lenguas…) were gradually replaced over the following decades by a new layer of names (Nivaclé, Ayoreo, Ishir, Enlhet…) all of which can be translated as « men », or « humans ». …”
Get full text
Article -
37375
Task collaborative offloading scheme in vehicle multi-access edge computing network
Published 2019-03-01“…In order to solve the problem that traditional mobile edge computing network can’t be straightforwardly applied to the Internet of vehicles (IoV) due to high speed mobility and dynamic network topology,a vehicular edge multi-access computing network (VE-MACN) was introduced to realize collaborative computing offloading between roadside units and smart vehicles.In this context,the collaborative computation offloading was formulated as a joint multi-access model selection and task assignment problem to realize the good balance between long-term system utility,diverse needs of IoV applications and energy consumption.Considering the complex joint optimization problem,a deep reinforcement learning-based collaborative computing offloading scheme was designed to overcome the curse of dimensionality for Q-learning algorithm.The simulation results demonstrate that the feasibility and effectiveness of proposed offloading scheme.…”
Get full text
Article -
37376
A Logistic Growth Model with Discrete-Time Delay and a Restriction on Harvesting
Published 2024-01-01“…However, if the system is designed so that harvesting is carried out in accordance with the fish’s sustainable growth level, then we have the partial restriction condition where no ban is imposed on fishing. …”
Get full text
Article -
37377
A Compendium of Magnetic Nanoparticle Essentials: A Comprehensive Guide for Beginners and Experts
Published 2025-01-01“…Emphasis is placed on routine characterization methods, including X-ray diffraction, electron microscopy, and magnetometry, as well as advanced concepts like magnetic hyperthermia and self-regulated heating. Designed for newcomers and experts alike, this review serves as both an educational guide and a quick-reference resource, ensuring clarity while maintaining scientific rigor.…”
Get full text
Article -
37378
A study of the user experience while working with mobile applications cooperating with sports bands
Published 2023-12-01“… The article analyses user experience while using two mobile applications, FitPro and Zepp Life that work with sports bands designed to monitor physical activity. As part of the study, the users were asked to perform tasks during which they used each app’s features. …”
Get full text
Article -
37379
Handbook of Florida Water Regulation: Emergency Planning and Community Right-to-Know Act
Published 2019-05-01“… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
Get full text
Article -
37380
Impossible statistical fault analysis of the PRIDE lightweight cryptosystem
Published 2024-01-01“…To analyze the implementation security of the PRIDE lightweight cryptosystem proposed at CRYPTO in 2014, a novel method of impossible statistical fault analysis on the ciphertext-only attack assumption was proposed.Furthermore, new distinguishers were designed, such as the Chi-square goodness-of-fit test-Hamming weight, and Chi-square goodness-of-fit test-maximum likelihood estimation.The proposed method had a random nibble-oriented fault model, and combined the statistical distribution states with the impossible relationship.On the difference among the intermediate states before and after the fault injections, at least 432 faults were required to recover the 128 bit secret key of PRIDE with a reliability of at least 99%.The experimental analysis demonstrates that the proposed method can not only reduce injected faults and latency, but also increase the accuracy.The results provide a vital reference for exploring the implementation security of lightweight cryptosystems.…”
Get full text
Article