Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
37801
Derived Categories and the Analytic Approach to General Reciprocity Laws—Part II
Published 2007-01-01“…Upon assigning properly designed t-structures to three of seven specially chosen derived categories, the collapse just mentioned is enough to yield n-Hilbert reciprocity.…”
Get full text
Article -
37802
Sostenibilità del ‘classico’ nell’educazione musicale scolastica
Published 2024-12-01“…This locution is both generic in terms of stylistic evaluation and specific in designating a series of compositions from the past that are still alive in the public memory. …”
Get full text
Article -
37803
STUDENT AS “AN EDUCATION CONSUMER”: CONTENT OF THE CONCEPT
Published 2016-12-01“…The students’ opinion is presented as a competent position to account for their views for designing educational politics of the University. The dynamics of the post!…”
Get full text
Article -
37804
Publication ethics statement for the year 2025
Published 2025-01-01“…This document is part of the UNESCO Open Science Toolkit, designed to support implementation of the UNESCO Recommendation on Open Science. …”
Get full text
Article -
37805
Container Security Device Chain Network for Safe Railway Transportation
Published 2014-11-01“…The proposed protocol, CSD Chain Network Protocol (CCNP), was designed for a chain-form network of CSDs, each of which is attached to a container. …”
Get full text
Article -
37806
Integrated Weighted Distance Measure for Single-Valued Neutrosophic Linguistic Sets and Its Application in Supplier Selection
Published 2020-01-01“…Finally, an illustrative numerical case regarding selecting low-carbon supplier is used to test the performance of the designed method.…”
Get full text
Article -
37807
The effect of algoritmics government, artificial intelligence, and tax service on tax compliance
Published 2024-09-01“…The research instrument used was a questionnaire designed on a Likert scale with five response options. …”
Get full text
Article -
37808
واقع الهندرة فى مکتبات الکلیات بجامعة سوهاج دراسة استکشافیة تخطیطیة
Published 2016-04-01“…Amongst them arethe following: reinforcing the concept of managerial operationsreengineering, developing librarians' capacities, determining a clearmanagerial policy, and using IT skills in designing all managerialoperations reengineering…”
Get full text
Article -
37809
Following are the abstracts from the Fourth Annual Meeting of the Society for Molecular Imaging
Published 2005-07-01“…Declaration of Financial Interests or Relationships To insure balance, independence, objectivity and scientific rigor in all CME programs it is the policy of the meeting's joint sponsors that any speaker or poster presenter who makes a presentation at a program designated for AMA Physician's Recognition Award (PRA) Category 1 or 2 credit must disclose any real or apparent financial interest or other relationship (i.e., grants, research support, consultant, honoraria) that the presenter may have with the manufacturers, distributors or providers of any commercial products or services that may be discussed in the presentation. …”
Get full text
Article -
37810
Time Division Switching Scheme and Performance Analysis of Low Orbit Quantum Satellite Communication
Published 2014-04-01“…In certain channel conditions, by rational designing of these parameters, the quantum satellite communication system can meet the demanded service requirements.…”
Get full text
Article -
37811
Research and application of 5G lightweight hardware encryption module for power terminals
Published 2023-06-01“…With the accelerated deployment of 5G new infrastructure, terminal application business has been gradually extended to various vertical industries.Although 5G technology can also adapt to the differentiated communication requirement for power industry, the power industry currently lacks a kind of 5G module that not only meets the security access requirement for power grid, but also has the advantage of low hardware upgrade cost, flexibility and scalability.Therefore, a 5G lightweight hardware encryption module for power terminals was designed and developed.The module is connected with the power terminal in the form of pluggable interface, and the capability of 5G communication and encryption authentication could be quickly realized just by terminal software upgrade.The test results show that the module has chip-level security authentication capability, and can take into account 5G communication and security mechanism, which not only improves the security of terminal access to the power intranet, but also reduces the difficulty of terminal transformation and 5G communication hardware upgrade cost.…”
Get full text
Article -
37812
Robust deepfake detection method based on siamese network
Published 2024-04-01“…A novel approach leveraging a Siamese network was proposed, designed to learn common forgery features across both high-quality and low-quality images. …”
Get full text
Article -
37813
Finding provenance, seeking context
Published 2020-09-01“…Likewise, the term used to identify the culture of the artists, ‘Sapes’, does not correspond to any contemporary group using that designation.The objects are richly documented in late 16th- and 17th-century Portuguese sources. …”
Get full text
Article -
37814
Cache timing attack on SMS4
Published 2010-01-01“…Two access driven Cache timing analysis methods on both first four rounds and last four rounds of SMS4 encryption were proposed and discussed.On the precondition of not interfering SMS4 encryption,a spy process was designed to gather the un-accessed lookup table related Cache sets during first four rounds and last four rounds of SMS4 encryption,then transferred them into impossible lookup table indices,combing plaintext or cipher text to analyze the impossible key byte candidates,finally the initial SMS4 key was recovered.Experiment results demonstrate that multi-process sharing Cache space feature and SMS4 lookup table structure decide that SMS4 is vulnerable to Cache timing attack,for about 80 samples are enough to recover full 128bit SMS4 key during both first four rounds attack and last four rounds attack,so it’s necessary to take certain countermeasures to prevent this kind of attack.…”
Get full text
Article -
37815
The problems of economic accounting components disunity in Russian companies in the economy digitalisation
Published 2022-06-01“…It not only determined the relevance of the study, but it creates a precedent for discussion about the advisability of creating in an organisation a separate set of statistical information from accounting, designed to fill in and control reports of federal statistical observation.…”
Get full text
Article -
37816
KNOWLEDGE, ATTITUDE AND PRACTICES OF CONSUMPTION OFCARBONATED BEVERAGES: A CROSS SECTIONAL STUDY
Published 2024-10-01“…A questionnaire with 26 closed ended questions was designed for the present study which consists of questions regarding knowledge, attitude and practice of consumption of sweetened carbonated beverages. …”
Get full text
Article -
37817
Debt Relief as a Last Resort for the Lender of Last Resort?
Published 2021-08-01“…While the Pandemic Emergency Purchase Programme, which is designed as a monetary policy instrument, is regarded by some as a violation of the prohibition of monetary financing, the Next Generation EU recovery fund is likely to direct the fundamental structures of the European Union towards a fiscal union with considerable redistribution elements. …”
Get full text
Article -
37818
Trajectory Planning of Crossed Roller Bearing Automatic Assembly Robotic Arms Based on the Improved Gray Wolf Optimizer
Published 2024-11-01“…For crossed roller bearings, manual assembly has problems such as low efficiency, high cost and large error, a four-degree-of-freedom robotic arm was designed to automatically assemble cross roller bearings. …”
Get full text
Article -
37819
A Storage System for Image File in Cloud Computing
Published 2014-02-01“…As cloud computing enters the mainstream,the numbers of virtual machine in one cloud pool is becoming more and more.So,how to quickly and cheaply migrate virtual machines between different hosts for load balance and power savings is becoming one of the hot and tough problems in this filed for the researchers.A distributed storage system was presented,which was called IFSpool.The system was based on Lustre and was designed to achieve the following three goals:high capacity and high extensibility to support thousands of VM images,high I/O throughput for data access,and booting optimization for boot storm.IFSpool combined a queue mechanism and a cache mechanism in a seamless way,to improve I/O throughput and lighten the boot storm by coordinating data access order.The I/O bandwidth and storage capacity of IFSpool can be easily aggregated and extended by adding storage nodes and servers dynamically.The experimental results show that IFSpool is effective and efficient for VM migration.…”
Get full text
Article -
37820
Force/Position Hybrid Control for Cable-driven Parallel Robots Based on the System Stiffness
Published 2023-08-01“…The simulation results show that the position error of the mobile platform is effectively reduced by the force/position hybrid control strategy, which is designed based on the stiffness analysis. Finally, the accuracy and effectiveness of the stiffness model and the force/position hybrid control strategy are verified by experiments.…”
Get full text
Article