Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
38041
Le site emporté par l’image ?
Published 2024-07-01“…These notions will be developed in the light of the experience of the last three years of teaching (2021-2024) at the École nationale supérieure de paysage de Versailles, specifically through the productions of and the process designed for the Fond d’écran workshop. We will demonstrate how, by working the image, students initiate a landscape project and discuss contemporary representations of a new city using digital practices.…”
Get full text
Article -
38042
Research on RTF array overflow vulnerability detection
Published 2017-05-01“…When the virtual function was executed,it could cause array overflow vulnerability due to error operation of the virtual function table of C++ object.By attacking the virtual function,it could cause the system crash,or even the attacker to control the execution of program directly was allowed,which threatened user’s security seriously.In order to find and fix this potential security vulnerability as soon as possible,the technology for detecting such security vulnerability was studied.Based on the analysis of the virtual function call during the MS Word parsing RTF files,the array overflow vulnerability generated by MS Word parsing abnormal RTF files,and a new RTF array overflow vulnerability detection method based on the file structure analytical Fuzzing was proposed.Besides,an RTF array overflow vulnerability detection tool (RAVD,RTF array vulnerability detector) was designed.The test results show RAVD can detect RTF array overflow vulnerabilities correctly.Moreover,the Fuzzing results show RAVD has higher efficiency in comparison with traditional file Fuzzing tools.…”
Get full text
Article -
38043
A hybrid unsupervised machine learning model with spectral clustering and semi-supervised support vector machine for credit risk assessment.
Published 2025-01-01“…Furthermore, a multi-view combined unsupervised method is designed to thoroughly mine data and enhance the robustness of label predictions. …”
Get full text
Article -
38044
Bedside Teaching in Undergraduate Surgical Education: A Pilot Study of Students’ Perspective
Published 2024-03-01“…An anonymous questionnaire was designed and students were requested to register the response offline. …”
Get full text
Article -
38045
ABOUT THE POSSIBILITY FOR MEDICAL UNIVERSITIES TO ENTER WORLD UNIVERSITY RANKINGS
Published 2017-06-01“…Leading ranking positions of the Russian higher education institutions in the world university rankings is designated as one of the priorities of the Russian universities in the concept of modernization of the Russian higher professional education. …”
Get full text
Article -
38046
John Dewey : la démocratie comme forme de vie et ses implications éducatives.
Published 2024-12-01“…It receives three fundamental meanings from him. It designates a political regime, but also a way of life and even more fundamentally, it is confused with education as self-contrôle. …”
Get full text
Article -
38047
Effect of Rotor Faults on Wind Turbine Shutdown or Continued Operation
Published 2024-01-01“…Understanding these impacts provides control system designers with valuable insights to develop strategies for mitigating faults and enhancing WT performance. …”
Get full text
Article -
38048
Downlink hierarchical scheduling method for relay-enhanced cellular network based on TG-PF
Published 2013-12-01“…Hierarchical scheduling model for relay-enhanced cellular network was designed to divide the w e process of resource scheduling in relay-enhanced cell into two parts,which are high-level scheduling accomplished by eNode B and low-level scheduling accomplished by Relay Node.Based on this,a throughput guaranteed proportional fair (TG-PF) scheduling algorithm was also proposed.The algorithm fully takes the advantages of Max C/I algorithm and PF algorithm consideration,so that it can effectively improve cell lay-enhanced cellular network based on TG-PF,PF algorithm and TG-PF algorithm are separately used in high-level and low-level scheduling process to satisfy the system throughput and scheduling fairness requirements of relay-enhanced cell.Simulation results suggest that the proposed method can tremendously improve cell edge throughput with a small size sa-crifice in scheduling fairness.…”
Get full text
Article -
38049
Handbook of Florida Water Regulation: Emergency Planning and Community Right-to-Know Act
Published 2019-05-01“… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
Get full text
Article -
38050
Hybrid precoding with sub-connected architecture for millimeter wave massive MIMO system
Published 2020-02-01“…A hybrid precoding scheme in the millimeter wave massive MIMO system was proposed with sub-connected architecture at the transmitter and digital combining at the receiver.In this scheme,the digital precoder and combiner were designed based on the singular value decomposition (SVD) of the equivalent channel matrix,while the optimal analog precoder was obtained by blocking the equivalent channel to maximize spectral efficiency according to the block diagonalization.Considering the hardware cost and power consumption,the precoding scheme with sub-connected architecture at the receiver was further proposed.Otherwise,the analog precoder and combiner were iteratively updated.Simulation results show that the proposed scheme which focuses on the digital combining at the receiver has better performance than successive interference cancelation (SIC)-based hybrid precoding.In addition,though the proposed scheme which focuses on the hybrid combining with sub-connected architecture at the receiver has worse performance than SIC-based hybrid precoding,the power consumption and hardware cost are greatly reduced.…”
Get full text
Article -
38051
Avian Paramyxovirus Serotype-1: A Review of Disease Distribution, Clinical Symptoms, and Laboratory Diagnostics
Published 2012-01-01“…Classification systems have been designed to group isolates based on their genetic composition. …”
Get full text
Article -
38052
Ce qu’observer veut dire
Published 2016-12-01“…To be able to read this article properly, it is necessary to set aside theoretical approaches which have already revealed the existence of some variations in landscaping practices such as landscape designer, landscape developer, landscape mediator, landscape planner, and landscape gardener. …”
Get full text
Article -
38053
Cross-Border Cooperation and the European Administrative Space – Prospects from the Principle of Mutual Recognition
Published 2015-06-01“…Four fields of application are designed, allowing for a new quality of transnational administrative cooperation and a new understanding of the laboratory role that cross-border territories might play both for the EAS and further European integration. …”
Get full text
Article -
38054
Adaptive multiple-modalities data compression algorithm using wavelet for wireless sensor networks
Published 2009-01-01“…Wireless sensor networks usually have limited resources, such as energy, bandwidth and processing and so on.And they can’t match the transmission of a large number of data.So, it is necessary to perform in-network compression of the raw data sampled by sensors.The data sensor node collected normally have multiple-modalities pertinence.Multiple-modalities pertinence refers to the different types of data which the same node sampled have some correlation.A adaptive multiple-modalities data compression algorithm using wavelet was designed.In a given threshold of the correlation, the data can be adaptive classified using this algorithm.the relevant data can be estimated using the least square estimation.The characteristics data are abstracted as a matrix, then can be exploited the spatial and temporal corrections using wavelet transform.Theoretically and experimentally, the proposed algorithm can effectively exploit the correlation of the data, the compression ratio of the algorithm has improved.Effectively, it can provide a significant reduction in energy consumption.…”
Get full text
Article -
38055
Psychotherapeutic Effect of Listening to Quran Recitation on Dental Anxiety: A Randomized Controlled Trial
Published 2024-12-01“…Methods: This research was designed as a randomized controlled trial in which 30 participants (20 females and 10 males) were assigned randomly to either an experimental (Quran listening) or a control group. …”
Get full text
Article -
38056
Børns møde med det danske straffesystem
Published 2023-10-01“…Children in conflict with the law are treated within the same system as adults, albeit with specific regulations and sanctions designed specifically for them. The fact that children are handled within the same system as adults raises the question of whether and how the ‘punitive turn, Nordic style’, which, according to criminological scholars, emerged during the 1990s, has influenced the treatment and punishment of children within the criminal justice system. …”
Get full text
Article -
38057
MODELLING ROUNDABOUT ENTRY CAPACITY FOR MIXED TRAFFIC FLOW USING ANN: A CASE STUDY IN INDIA
Published 2024-06-01“…Roundabouts, as an unsignalized intersection, have an effective preventative measure designed to control straight-line crashes. Efficient traffic flow in cities depends upon appropriate capacity estimation of roundabouts. …”
Get full text
Article -
38058
Research and realization of the Trojan detection engine based on Android
Published 2016-10-01“…The Trojan detection engine called TDE, with the assistance of this feature code library, would be able to take out a quick scan among the files in the cell phone and detect malicious programs in mobile applications. Finally, the designed Trojan detection engine provided a secure environment for the user of the phone.…”
Get full text
Article -
38059
Network Simulation of Low Earth Orbit Satellite Communication System Based on SNS3
Published 2024-12-01“…On the basis of SNS3, by constructing an accurate satellite orbit model, physical layer link model and network protocol model, an antenna model suitable for LEO satellite communication system was proposed and designed, and a network simulation platform suitable for low-orbit satellite communication was built, which realized the comprehensive simulation of low-orbit satellite communication network. …”
Get full text
Article -
38060
Le théâtre baroque du corps démembré dans The Duchess of Malfi
Published 2019-01-01“…Webster plays on the over-determination of these images, as the text consistently draws attention to these repetitions; the words used to designate body parts become unstable, potentially proleptic signs pointing to imminent death and foreshadowing the sudden appearance of actual, dismembered bodies. …”
Get full text
Article