Showing 2,461 - 2,480 results of 12,255 for search '"Greats"', query time: 0.08s Refine Results
  1. 2461

    Design and Analysis of Target Simulator Using All Spherical System with High Matching Rate by Shijie Li, Xiaojing Zhang, Kai Zhao, Zihuai Li, Xiong Li, Lumin Zhao, Jin Zhang, Changlong Cai

    Published 2023-01-01
    “…Only spherical mirror element is used in this target simulator, which not only reduces the difficulty of manufacturing and cost but also greatly reduces the difficulty of assembling and adjusting. …”
    Get full text
    Article
  2. 2462

    A survey on recent advances in digital video technology by HU Dong1, ZHENG Bao-yu2

    Published 2003-01-01
    “…The study on robust video transmission over IP and wireless network is the most challenging topic and of great importance. Besides, video stream analysis, image database technology and video watermark also possess bright application prospect. …”
    Get full text
    Article
  3. 2463

    Research on a dynamic self-learning efficient intrusion detection model by YANG Wu1, ZHANG Bing2, ZHOU Yuan2, WANG Wei1

    Published 2007-01-01
    “…A dynamic self-learning efficient intrusion detection model was proposed based on inductive reasoning.Ap-plying the method of inductive reasoning into intrusion detection,an incremental inductive reasoning algorithm for intru-sion detection was proposed.This model produced by this algorithm can make self-learning over the ever-emerged new network behavior examples and dynamically modify behavior profile of the model,which overcomes the disadva-ntage that the traditional static detecting model must relearn over all the old and new examples,even can not relearn because of limited memory size.And at the same time,the learning efficiency and detecting efficiency of intrusion detection model are improved greatly.…”
    Get full text
    Article
  4. 2464

    Research and Implication of Traffic Analyzing Technology in Mobile Packet Network Based on DPI Technology by Yanrong Zhang, Zhizhong Zhang, Mingzhi Jiang, Xiaoping Zheng

    Published 2014-04-01
    “…According to the test of current network data, this scheme works well for xDR synthesizing and service identification, with high efficiency and accuracy. It is of great significance to optimization of mobile packet network in 4G era.…”
    Get full text
    Article
  5. 2465

    D’un musée de collectionneur à un musée historico-artistique, la collection et la muséographie du Museo Napoleonico de Rome de 1927 à nos jours by Lena-Maria Perfettini

    Published 2015-04-01
    “…Although it was planned to become a museum dedicated to the private lives of the Bonapartes having lived in Rome, it was used as a propaganda tool by the Fascist regime, which saw the institution as a means of affirming the greatness of Italy. Then it experienced a fall in interest before modernising and being considered a historical-art museum. …”
    Get full text
    Article
  6. 2466

    A STUDY ON EQUIVALENT FLEXURAL RIGIDITY OF COMPLEX POLYGONAL HONEYCOMB STRUCTURE by GUO YuChao, WANG LiKai, DUAN ShiHui

    Published 2017-01-01
    “…The angle and length of walls has a great influence on equivalent flexural stiffness,the changes of angle and length will lead to positive and negative changes of the coupling stiffness,the absolute value of flexural stiffness increases with the increase of the wall’s height and thickness. …”
    Get full text
    Article
  7. 2467

    Cloudstreet : a novel / by Winton, Tim

    Published 2013
    View in OPAC
    Book
  8. 2468

    Essential mathematics for economic analysis / by Hammond, Peter J., 1945-

    Published 2021
    View in OPAC
    Electronic eBook
  9. 2469

    Traduire Flaubert : Madame Bovary en version roumaine by Florica Courriol

    Published 2012-02-01
    “…In the meantime, other publishers saw fit to print additional versions in great haste. However, a mere examination of the problematic passages is sufficient enough to realize that the authors of the new versions only limited themselves to take up the first one. …”
    Get full text
    Article
  10. 2470

    Les Guilhem de Montpellier et leur entourage urbain (1090-1204) : les apports de l’approche prosopographique  by Alexandre Vergos

    Published 2021-06-01
    “…The Guilhem family, lords of Montpellier, were one of the great feudal families of Languedoc in the 12th century. …”
    Get full text
    Article
  11. 2471

    A Collaborative Self-Governing Privacy-Preserving Wireless Sensor Network Architecture Based on Location Optimization for Dynamic Service Discovery in MANET Environment by Cong Gao, Jianfeng Ma, Shangwei Zhang

    Published 2015-08-01
    “…Simulation results show that the proposed architecture can greatly improve the performance of service discovery.…”
    Get full text
    Article
  12. 2472

    Le pays normand. Paysages et peuplement (IXe-XIIIe siècles) by Mathieu Arnoux, Christophe Maneuvrier

    Published 2003-02-01
    “…It is also to this continuous population that one owes strange survivals in terms of administration and public tax system inherited from the Carolingian period, the homines liberi group having succeeded in defending itself against the gradual establishment of feudal institutions, as indicated by the famous episode of the great revolt of 996.…”
    Get full text
    Article
  13. 2473

    Guardiniho dvojznačný postoj ku Kierkegaardovi pri interpretácii Pascala by Šajda, Peter

    Published 2024-12-01
    “…Thus we encounter in his works a specific image of Pascal that reflects in great measure contemporary intellectual tendencies.…”
    Article
  14. 2474

    A Primer on Exporting to Paraguay by Christina D. Storz, Timothy G. Taylor, Gary F. Fairchild

    Published 2005-04-01
    “…These guides provide a great deal of information useful to individuals interested in developing export markets either through direct exports or through direct foreign investment. …”
    Get full text
    Article
  15. 2475

    Research and implementation of the IBN for cloud-network convergence service of operators by Xin ZHANG

    Published 2021-08-01
    “…Faced with the development of cloud computing technology and the increasing business needs, cloud-network convergence has become the inevitable choice of network architecture reform.The era of cloud-network convergence brought great challenges to the traditional network operation and maintenance, and the network needs to evolve to a more intelligent and convenient mode.The intent-based networking(IBN), which is widely studied by the scholars, has become the best choice to solve this problem.The development process, architecture and key steps of IBN were introduced.Combined with the needs of operator’s services, the business scenario of cloud-network convergence was taken as an example to analyze the implementation process of IBN for cloud-network convergence.It is expected to provide a reference for the future practice of IBN and cloud-network convergence services.…”
    Get full text
    Article
  16. 2476

    REJECTION OF DOGMA by Henrikas Zabulis

    Published 1998-01-01
    “…Later on, his ability to question everything what was officially accepted in the Marxist theory has formed a gighly original school of the University philosophers, which attracted strong enough criticism of official institutions, but made a great impact on academic youth. Eugenijus MEŠKAUSKAS himself and through his pupils, due to the universal character of the subject he taught and his non-dogmatic thinking, has coloured at least two generations of Lithuanian intellectuals - graduates of Vilnius University. …”
    Get full text
    Article
  17. 2477
  18. 2478

    Secure outsource computing scheme of modular exponentiation based on single server by Weijie DING

    Published 2018-01-01
    “…At present,in discrete-log based cryptographic protocols,most of the computational models of modular exponentiation are for primes,while less work has been done for composite.What’s more,most schemes are based on two servers,in which it requires at least one server to be honest.However,there may not be a fully trusted cloud server in the actual environment.Then a new secure method for outsourcing exponentiation modular a composite which based on a single server was proposed.The scheme used a new mathematical division method,it could ensure the privacy of the base and exponentiation.Compared with the existing schemes,the checkability of our scheme can be greatly improved.The user can detect the error result with the probability of 119/120.…”
    Get full text
    Article
  19. 2479
  20. 2480