Suggested Topics within your search.
Suggested Topics within your search.
- Law 9
- Administrative law 6
- Contracts 5
- History 5
- Constitutional law 4
- literature 4
- Corporation law 3
- Economic policy 3
- Evidence (Law) 3
- Philosophy 3
- Social conditions 3
- Social service 3
- Actions and defenses 2
- Administration 2
- Cardiovascular - life support 2
- Civil rights 2
- Crimes against 2
- Droit 2
- Economic development 2
- Education, Higher 2
- Educational leadership 2
- Effective teaching 2
- Electric equipment 2
- Electric wiring 2
- Electric wiring, Interior 2
- Elementary school teaching 2
- Histoire 2
- Human rights 2
- Insurance requirements 2
- Law and legislation 2
-
2461
Design and Analysis of Target Simulator Using All Spherical System with High Matching Rate
Published 2023-01-01“…Only spherical mirror element is used in this target simulator, which not only reduces the difficulty of manufacturing and cost but also greatly reduces the difficulty of assembling and adjusting. …”
Get full text
Article -
2462
A survey on recent advances in digital video technology
Published 2003-01-01“…The study on robust video transmission over IP and wireless network is the most challenging topic and of great importance. Besides, video stream analysis, image database technology and video watermark also possess bright application prospect. …”
Get full text
Article -
2463
Research on a dynamic self-learning efficient intrusion detection model
Published 2007-01-01“…A dynamic self-learning efficient intrusion detection model was proposed based on inductive reasoning.Ap-plying the method of inductive reasoning into intrusion detection,an incremental inductive reasoning algorithm for intru-sion detection was proposed.This model produced by this algorithm can make self-learning over the ever-emerged new network behavior examples and dynamically modify behavior profile of the model,which overcomes the disadva-ntage that the traditional static detecting model must relearn over all the old and new examples,even can not relearn because of limited memory size.And at the same time,the learning efficiency and detecting efficiency of intrusion detection model are improved greatly.…”
Get full text
Article -
2464
Research and Implication of Traffic Analyzing Technology in Mobile Packet Network Based on DPI Technology
Published 2014-04-01“…According to the test of current network data, this scheme works well for xDR synthesizing and service identification, with high efficiency and accuracy. It is of great significance to optimization of mobile packet network in 4G era.…”
Get full text
Article -
2465
D’un musée de collectionneur à un musée historico-artistique, la collection et la muséographie du Museo Napoleonico de Rome de 1927 à nos jours
Published 2015-04-01“…Although it was planned to become a museum dedicated to the private lives of the Bonapartes having lived in Rome, it was used as a propaganda tool by the Fascist regime, which saw the institution as a means of affirming the greatness of Italy. Then it experienced a fall in interest before modernising and being considered a historical-art museum. …”
Get full text
Article -
2466
A STUDY ON EQUIVALENT FLEXURAL RIGIDITY OF COMPLEX POLYGONAL HONEYCOMB STRUCTURE
Published 2017-01-01“…The angle and length of walls has a great influence on equivalent flexural stiffness,the changes of angle and length will lead to positive and negative changes of the coupling stiffness,the absolute value of flexural stiffness increases with the increase of the wall’s height and thickness. …”
Get full text
Article -
2467
-
2468
-
2469
Traduire Flaubert : Madame Bovary en version roumaine
Published 2012-02-01“…In the meantime, other publishers saw fit to print additional versions in great haste. However, a mere examination of the problematic passages is sufficient enough to realize that the authors of the new versions only limited themselves to take up the first one. …”
Get full text
Article -
2470
Les Guilhem de Montpellier et leur entourage urbain (1090-1204) : les apports de l’approche prosopographique
Published 2021-06-01“…The Guilhem family, lords of Montpellier, were one of the great feudal families of Languedoc in the 12th century. …”
Get full text
Article -
2471
A Collaborative Self-Governing Privacy-Preserving Wireless Sensor Network Architecture Based on Location Optimization for Dynamic Service Discovery in MANET Environment
Published 2015-08-01“…Simulation results show that the proposed architecture can greatly improve the performance of service discovery.…”
Get full text
Article -
2472
Le pays normand. Paysages et peuplement (IXe-XIIIe siècles)
Published 2003-02-01“…It is also to this continuous population that one owes strange survivals in terms of administration and public tax system inherited from the Carolingian period, the homines liberi group having succeeded in defending itself against the gradual establishment of feudal institutions, as indicated by the famous episode of the great revolt of 996.…”
Get full text
Article -
2473
Guardiniho dvojznačný postoj ku Kierkegaardovi pri interpretácii Pascala
Published 2024-12-01“…Thus we encounter in his works a specific image of Pascal that reflects in great measure contemporary intellectual tendencies.…”
Article -
2474
A Primer on Exporting to Paraguay
Published 2005-04-01“…These guides provide a great deal of information useful to individuals interested in developing export markets either through direct exports or through direct foreign investment. …”
Get full text
Article -
2475
Research and implementation of the IBN for cloud-network convergence service of operators
Published 2021-08-01“…Faced with the development of cloud computing technology and the increasing business needs, cloud-network convergence has become the inevitable choice of network architecture reform.The era of cloud-network convergence brought great challenges to the traditional network operation and maintenance, and the network needs to evolve to a more intelligent and convenient mode.The intent-based networking(IBN), which is widely studied by the scholars, has become the best choice to solve this problem.The development process, architecture and key steps of IBN were introduced.Combined with the needs of operator’s services, the business scenario of cloud-network convergence was taken as an example to analyze the implementation process of IBN for cloud-network convergence.It is expected to provide a reference for the future practice of IBN and cloud-network convergence services.…”
Get full text
Article -
2476
REJECTION OF DOGMA
Published 1998-01-01“…Later on, his ability to question everything what was officially accepted in the Marxist theory has formed a gighly original school of the University philosophers, which attracted strong enough criticism of official institutions, but made a great impact on academic youth. Eugenijus MEŠKAUSKAS himself and through his pupils, due to the universal character of the subject he taught and his non-dogmatic thinking, has coloured at least two generations of Lithuanian intellectuals - graduates of Vilnius University. …”
Get full text
Article -
2477
-
2478
Secure outsource computing scheme of modular exponentiation based on single server
Published 2018-01-01“…At present,in discrete-log based cryptographic protocols,most of the computational models of modular exponentiation are for primes,while less work has been done for composite.What’s more,most schemes are based on two servers,in which it requires at least one server to be honest.However,there may not be a fully trusted cloud server in the actual environment.Then a new secure method for outsourcing exponentiation modular a composite which based on a single server was proposed.The scheme used a new mathematical division method,it could ensure the privacy of the base and exponentiation.Compared with the existing schemes,the checkability of our scheme can be greatly improved.The user can detect the error result with the probability of 119/120.…”
Get full text
Article -
2479
KEY ISSUES OF CONTEMPORARY EDUCATIONAL POLICY AND PRACTICE
Published 2017-10-01Get full text
Article -
2480
RETRACTED: Fundamentals of forecasting explosive gas accumulation formation in working areas of coal mines
Published 2024-01-01Get full text
Article