Showing 3,521 - 3,540 results of 12,255 for search '"Greats"', query time: 0.12s Refine Results
  1. 3521

    L’art engagé : images de résistance, de résilience et de reconstruction humanitaire. by Dima Nachawi, Michela Villani

    Published 2018-11-01
    “…In this interview, Dima Nachawi discusses her commitment to the artistic work and demonstrates how the conflict and the obligation for her to leave the Syrian territory to go to Great Britain as a refugee brought about an artistic turning point. …”
    Get full text
    Article
  2. 3522

    Data update algorithm based on secure network coding in cloud environment by Hao WU, Cheng-zhe LAI, Jiu-lun FAN, Jian-hua LIU

    Published 2017-05-01
    “…In the cloud environment for data storage,the use of secure network coding technology can be a good solution to the data privacy and reliability issues.However,each coding block usually has a high correlation after network coding,very few updates to the file need to be re-encoded which is extremely easy to cause information leakage and serious consumption of system resources.To solve this problem,a network coding cloud storage data updating algorithm was proposed.Just by sending files change difference matrix,the storage node could update parts of the coding block accordingly which could complete the entire update files.Experimental results show that compared with RS coding and Tornado coding,the algorithm can not only ensure data security,but also greatly improve the efficiency of data update and data reconstruction.…”
    Get full text
    Article
  3. 3523

    CRITICAL SPEED AND UNBALANCE RESPONSE OF TRACTION MOTOR FOR RAILWAY LOCOMOTIVE by CHEN JuLong, WANG JunGuo, CHEN YueWei, ZHAO YongXiang

    Published 2017-01-01
    “…Rotor disc thickness has a great effect on the bending stiffness. The finite element software ANSYS is used to establish one-dimensional and threedimensional models of the traction motor rotor system for railway locomotive. …”
    Get full text
    Article
  4. 3524

    “A good deal about California does not, on its own preferred terms, add up”: Joan Didion between Dawning Apocalypse and Retrogressive Utopia by Eva-Sabine Zehelein

    Published 2011-09-01
    “…Identity and landscape fuse into an auto-psychoanalysis, which at the same time reveals a great deal about the American condition, its constantly strained relationship between rhetoric or auto-mythology and lived reality. …”
    Get full text
    Article
  5. 3525

    Insights into the Prevalence of Software Project Defects by Javier Alfonso-Cendón, Manuel Castejón Limas, Joaquín B. Ordieres Meré, Juan Pavón

    Published 2014-01-01
    “…It is expected that the use of similar estimations might greatly improve the awareness of project managers on the risks at hand.…”
    Get full text
    Article
  6. 3526

    "Abba" revisited: merging the horizons of history and rhetoric through the new rhetoric structure for metaphors by S. Tsang

    Published 2007-12-01
    “…In this recipient-oriented reading, it is shown that Paul used the metaphor to exhort with great urgency those on the fringe to return to the fold. …”
    Get full text
    Article
  7. 3527

    A survey of neural architecture search by Mingjie HE, Jie ZHANG, Shiguang SHAN

    Published 2019-05-01
    “…Recently,deep learning has achieved impressive success on various computer vision tasks.The neural architecture is usually a key factor which directly determines the performance of the deep learning algorithm.The automated neural architecture search methods have attracted more and more attentions in recent years.The neural architecture search is the automated process of seeking the optimal neural architecture for specific tasks.Currently,the neural architecture search methods have shown great potential in exploring high-performance and high-efficiency neural architectures.In this paper,a survey in this research field and categorize existing methods based on their performance estimation methods,search spaces and architecture search strategies were presented.Specifically,there were four performance estimation methods for computation cost reduction,two typical neural architecture search spaces and two types of search strategies based on discrete and continuous spaces respectively.Neural architecture search methods based on continuous space are becoming the trend of researches on neural architecture search.…”
    Get full text
    Article
  8. 3528

    Événement et trauma dans Doctor Atomic de John Adams by Mathieu Duplay

    Published 2011-04-01
    “…Thus, the writer argues that a theory and/or poetics of event, however alien to the Freudian tradition, would benefit greatly by paying close attention to the lessons it teaches in this respect. …”
    Get full text
    Article
  9. 3529

    Synthesis of a Polymer Covering on Al(OH) and BaSO Surfaces by Means of Radical Polymerization in Water Medium by V. Tokarev, V. Seredyuk, S. Voronov

    Published 2000-03-01
    “…When both the adsorption of the macroinitiator and the graft polymerization of the monomer proceed in water medium, the efficiency of the process and its ecological cleanliness are increased greatly.…”
    Get full text
    Article
  10. 3530

    FATIGUE STRENGTH ANALYSIS OF CONNECTING ROD BOLT FOR LARGE POWER DIESEL ENGINE by LU YaoHui, XIANG PengLin, XIE Ning, FENG Zhen

    Published 2016-01-01
    “…Diesel engine connecting rod bolt withstands pre-tightening force and tensile load in working process,its strength and stiffness have great effect on the performance. An assembly model of the connecting rod which had considered the detail of threaded portion was built,and the strength of those bolts were analyzed with the finite element method. …”
    Get full text
    Article
  11. 3531

    Precursor-Like Anomalies prior to the 2008 Wenchuan Earthquake: A Critical-but-Constructive Review by Tengfei Ma, Zhongliang Wu

    Published 2012-01-01
    “…These retrospective case studies would have provided heuristic clues about the preparation process of this inland great earthquake and the predictability of this destructive event if the standards for the rigorous test of earthquake forecast schemes were strictly observed. …”
    Get full text
    Article
  12. 3532

    Une nouvelle approche du Morte d’Arthur de Malory au XXe siècle : la réécriture musicale de Lerner et Loewe by Justine Breton

    Published 2015-01-01
    “…Camelot gives a musical life to the great and idyllic Arthurian reign, clouded by internal conflicts and deeply-rooted rivalries within the court. …”
    Get full text
    Article
  13. 3533

    Dynamic load balancing algorithm based on queuing theory comprehensive index evaluation by Wenbo WANG, Qingwei YE, Yu ZHOU, Zhihua LU

    Published 2018-07-01
    “…Internet communication,computer cluster and cloud environment have complex and dynamic characteristics,which can cause load imbalance easily,reduce the service efficiency and increase the energy consumption.Therefore,the load balancing technology becomes the focus of research.The existing load balancing strategy uses the occupancy of CPU,memories,processes to estimate the current load of each server.But it is hard to guarantee its accuracy.Aiming at this problem,a dynamic load balancing algorithm based on queuing theory comprehensive index evaluation was proposed.Firstly,queuing theory model was introduced to estimate the real-time load of each server,and then the tasks of input queue was distributed to each server separately according to the load comprehensive index of each server.Experimental results show that this method can balance the load of each server effectively and reduce the average waiting time of the task requests,which is of great application value.…”
    Get full text
    Article
  14. 3534

    Effect of the difference enumeration attack on LowMC instances by Xinxin GE, Zhihu LI, Meiqin WANG, Kai HU

    Published 2021-06-01
    “…The LowMC is an algorithm with low multiplicative complexities.For the parameter with limited data complexities and low number of S-boxes, the difference enumeration attack was proposed, which could theoretically attack all rounds of the LowMC.Considering that the original attack is based on the random linear layer,the strength of LowMC algorithm against differential enumeration attacks under a specific linear layer deserves more study.The difference enumeration attack cannot reach theoretical rounds through the research on the so-called key initial round.In terms of some LowMC instances, the key initial round is smaller than the theoretical value, which leads to the failure of the difference enumeration attack.Since the number of rounds of the LowMC is completely based on existing attacks, the analysis is of great significance to the rounds design of the LowMC.…”
    Get full text
    Article
  15. 3535

    Gearbox Fault Diagnosis based on GAF-inceptionResNet by Changwen Li, Peng Li, Hua Ding

    Published 2022-05-01
    “…Through the stem-block, residual inception, residual module and classification layer, the residual inception network can broaden the network depth and improve the training time and accuracy, the residual block uses identity mapping to greatly reduce the training difficulty of the model. …”
    Get full text
    Article
  16. 3536

    US Consumer Preferences for Home Lawn Fertilizers by Hayk Khachatryan, Alicia Rihn, Michael Dukes

    Published 2016-02-01
    “…Knowing consumer preferences greatly reduces stakeholders’ risks and improves efficiency in determining future product and promotional strategies. …”
    Get full text
    Article
  17. 3537

    Assessing quality of life in German, French, Italian and Polish smart cities: Identifying the need for further development by Brian F. G. FABRÈGUE, Andrea BOGONI

    Published 2024-01-01
    “…While the concept of smart cities holds great promise for urban development and enhancing residents' well-being, the current methodologies for comparing smart cities and assessing quality of life require refinement and standardization. …”
    Get full text
    Article
  18. 3538

    Quand Le Caire se révèle copte… by Anne-Sophie Vivier

    Published 2005-09-01
    “…This is also true as regards the great religious edifices of the last decades, which are strongly marking the Coptic presence, operating in the same time a symbolic appropriation of Cairo’s territory. …”
    Get full text
    Article
  19. 3539

    Research on Load Characteristic of Star Gear Transmission System of Turbofan Engine by Fanqiu Meng, Lianwang Gu, Changqing Ma

    Published 2021-06-01
    “…The results show that the position and arrangement of the bearings on the input shaft and output shaft have great influence on the floating amount of the sun gear and ring gear,but almost no effect on the floating amount of the star gear. …”
    Get full text
    Article
  20. 3540

    Optimization method for attribute-based cryptographic access control in mobile cloud computing by Jian LIU, Ming XIAN, Huimei WANG, Hong RONG

    Published 2018-07-01
    “…For the problem of secure data sharing and access control in mobile cloud,the drawback of traditional cryptographic access control schemes was deeply analyzed.Considering the truth that mobile devices were usually equipped with limited resources,an optimized attribute-based cryptographic access control scheme was proposed in this study.In the proposed scheme,a third party proxy was introduced into the system model,and the two-layer encryption method was applied.Combining traditional attribute-based encryption (ABE) algorithm with multi-secret sharing and split measurement of ABE encryption,the scheme could greatly reduce the cost of mobile users in terms of data publish and access management.Theoretical and experimental analysis shows that the contribution can well meet the requirements of mobile cloud in terms of security,computational complexity and communication cost,which means that it is promising for future applications.…”
    Get full text
    Article