Suggested Topics within your search.
Suggested Topics within your search.
- Law 9
- Administrative law 6
- Contracts 5
- History 5
- Constitutional law 4
- literature 4
- Corporation law 3
- Economic policy 3
- Evidence (Law) 3
- Philosophy 3
- Social conditions 3
- Social service 3
- Actions and defenses 2
- Administration 2
- Cardiovascular - life support 2
- Civil rights 2
- Crimes against 2
- Droit 2
- Economic development 2
- Education, Higher 2
- Educational leadership 2
- Effective teaching 2
- Electric equipment 2
- Electric wiring 2
- Electric wiring, Interior 2
- Elementary school teaching 2
- Histoire 2
- Human rights 2
- Insurance requirements 2
- Law and legislation 2
-
3521
L’art engagé : images de résistance, de résilience et de reconstruction humanitaire.
Published 2018-11-01“…In this interview, Dima Nachawi discusses her commitment to the artistic work and demonstrates how the conflict and the obligation for her to leave the Syrian territory to go to Great Britain as a refugee brought about an artistic turning point. …”
Get full text
Article -
3522
Data update algorithm based on secure network coding in cloud environment
Published 2017-05-01“…In the cloud environment for data storage,the use of secure network coding technology can be a good solution to the data privacy and reliability issues.However,each coding block usually has a high correlation after network coding,very few updates to the file need to be re-encoded which is extremely easy to cause information leakage and serious consumption of system resources.To solve this problem,a network coding cloud storage data updating algorithm was proposed.Just by sending files change difference matrix,the storage node could update parts of the coding block accordingly which could complete the entire update files.Experimental results show that compared with RS coding and Tornado coding,the algorithm can not only ensure data security,but also greatly improve the efficiency of data update and data reconstruction.…”
Get full text
Article -
3523
CRITICAL SPEED AND UNBALANCE RESPONSE OF TRACTION MOTOR FOR RAILWAY LOCOMOTIVE
Published 2017-01-01“…Rotor disc thickness has a great effect on the bending stiffness. The finite element software ANSYS is used to establish one-dimensional and threedimensional models of the traction motor rotor system for railway locomotive. …”
Get full text
Article -
3524
“A good deal about California does not, on its own preferred terms, add up”: Joan Didion between Dawning Apocalypse and Retrogressive Utopia
Published 2011-09-01“…Identity and landscape fuse into an auto-psychoanalysis, which at the same time reveals a great deal about the American condition, its constantly strained relationship between rhetoric or auto-mythology and lived reality. …”
Get full text
Article -
3525
Insights into the Prevalence of Software Project Defects
Published 2014-01-01“…It is expected that the use of similar estimations might greatly improve the awareness of project managers on the risks at hand.…”
Get full text
Article -
3526
"Abba" revisited: merging the horizons of history and rhetoric through the new rhetoric structure for metaphors
Published 2007-12-01“…In this recipient-oriented reading, it is shown that Paul used the metaphor to exhort with great urgency those on the fringe to return to the fold. …”
Get full text
Article -
3527
A survey of neural architecture search
Published 2019-05-01“…Recently,deep learning has achieved impressive success on various computer vision tasks.The neural architecture is usually a key factor which directly determines the performance of the deep learning algorithm.The automated neural architecture search methods have attracted more and more attentions in recent years.The neural architecture search is the automated process of seeking the optimal neural architecture for specific tasks.Currently,the neural architecture search methods have shown great potential in exploring high-performance and high-efficiency neural architectures.In this paper,a survey in this research field and categorize existing methods based on their performance estimation methods,search spaces and architecture search strategies were presented.Specifically,there were four performance estimation methods for computation cost reduction,two typical neural architecture search spaces and two types of search strategies based on discrete and continuous spaces respectively.Neural architecture search methods based on continuous space are becoming the trend of researches on neural architecture search.…”
Get full text
Article -
3528
Événement et trauma dans Doctor Atomic de John Adams
Published 2011-04-01“…Thus, the writer argues that a theory and/or poetics of event, however alien to the Freudian tradition, would benefit greatly by paying close attention to the lessons it teaches in this respect. …”
Get full text
Article -
3529
Synthesis of a Polymer Covering on Al(OH) and BaSO Surfaces by Means of Radical Polymerization in Water Medium
Published 2000-03-01“…When both the adsorption of the macroinitiator and the graft polymerization of the monomer proceed in water medium, the efficiency of the process and its ecological cleanliness are increased greatly.…”
Get full text
Article -
3530
FATIGUE STRENGTH ANALYSIS OF CONNECTING ROD BOLT FOR LARGE POWER DIESEL ENGINE
Published 2016-01-01“…Diesel engine connecting rod bolt withstands pre-tightening force and tensile load in working process,its strength and stiffness have great effect on the performance. An assembly model of the connecting rod which had considered the detail of threaded portion was built,and the strength of those bolts were analyzed with the finite element method. …”
Get full text
Article -
3531
Precursor-Like Anomalies prior to the 2008 Wenchuan Earthquake: A Critical-but-Constructive Review
Published 2012-01-01“…These retrospective case studies would have provided heuristic clues about the preparation process of this inland great earthquake and the predictability of this destructive event if the standards for the rigorous test of earthquake forecast schemes were strictly observed. …”
Get full text
Article -
3532
Une nouvelle approche du Morte d’Arthur de Malory au XXe siècle : la réécriture musicale de Lerner et Loewe
Published 2015-01-01“…Camelot gives a musical life to the great and idyllic Arthurian reign, clouded by internal conflicts and deeply-rooted rivalries within the court. …”
Get full text
Article -
3533
Dynamic load balancing algorithm based on queuing theory comprehensive index evaluation
Published 2018-07-01“…Internet communication,computer cluster and cloud environment have complex and dynamic characteristics,which can cause load imbalance easily,reduce the service efficiency and increase the energy consumption.Therefore,the load balancing technology becomes the focus of research.The existing load balancing strategy uses the occupancy of CPU,memories,processes to estimate the current load of each server.But it is hard to guarantee its accuracy.Aiming at this problem,a dynamic load balancing algorithm based on queuing theory comprehensive index evaluation was proposed.Firstly,queuing theory model was introduced to estimate the real-time load of each server,and then the tasks of input queue was distributed to each server separately according to the load comprehensive index of each server.Experimental results show that this method can balance the load of each server effectively and reduce the average waiting time of the task requests,which is of great application value.…”
Get full text
Article -
3534
Effect of the difference enumeration attack on LowMC instances
Published 2021-06-01“…The LowMC is an algorithm with low multiplicative complexities.For the parameter with limited data complexities and low number of S-boxes, the difference enumeration attack was proposed, which could theoretically attack all rounds of the LowMC.Considering that the original attack is based on the random linear layer,the strength of LowMC algorithm against differential enumeration attacks under a specific linear layer deserves more study.The difference enumeration attack cannot reach theoretical rounds through the research on the so-called key initial round.In terms of some LowMC instances, the key initial round is smaller than the theoretical value, which leads to the failure of the difference enumeration attack.Since the number of rounds of the LowMC is completely based on existing attacks, the analysis is of great significance to the rounds design of the LowMC.…”
Get full text
Article -
3535
Gearbox Fault Diagnosis based on GAF-inceptionResNet
Published 2022-05-01“…Through the stem-block, residual inception, residual module and classification layer, the residual inception network can broaden the network depth and improve the training time and accuracy, the residual block uses identity mapping to greatly reduce the training difficulty of the model. …”
Get full text
Article -
3536
US Consumer Preferences for Home Lawn Fertilizers
Published 2016-02-01“…Knowing consumer preferences greatly reduces stakeholders’ risks and improves efficiency in determining future product and promotional strategies. …”
Get full text
Article -
3537
Assessing quality of life in German, French, Italian and Polish smart cities: Identifying the need for further development
Published 2024-01-01“…While the concept of smart cities holds great promise for urban development and enhancing residents' well-being, the current methodologies for comparing smart cities and assessing quality of life require refinement and standardization. …”
Get full text
Article -
3538
Quand Le Caire se révèle copte…
Published 2005-09-01“…This is also true as regards the great religious edifices of the last decades, which are strongly marking the Coptic presence, operating in the same time a symbolic appropriation of Cairo’s territory. …”
Get full text
Article -
3539
Research on Load Characteristic of Star Gear Transmission System of Turbofan Engine
Published 2021-06-01“…The results show that the position and arrangement of the bearings on the input shaft and output shaft have great influence on the floating amount of the sun gear and ring gear,but almost no effect on the floating amount of the star gear. …”
Get full text
Article -
3540
Optimization method for attribute-based cryptographic access control in mobile cloud computing
Published 2018-07-01“…For the problem of secure data sharing and access control in mobile cloud,the drawback of traditional cryptographic access control schemes was deeply analyzed.Considering the truth that mobile devices were usually equipped with limited resources,an optimized attribute-based cryptographic access control scheme was proposed in this study.In the proposed scheme,a third party proxy was introduced into the system model,and the two-layer encryption method was applied.Combining traditional attribute-based encryption (ABE) algorithm with multi-secret sharing and split measurement of ABE encryption,the scheme could greatly reduce the cost of mobile users in terms of data publish and access management.Theoretical and experimental analysis shows that the contribution can well meet the requirements of mobile cloud in terms of security,computational complexity and communication cost,which means that it is promising for future applications.…”
Get full text
Article