Showing 3,721 - 3,740 results of 12,255 for search '"Greats"', query time: 0.06s Refine Results
  1. 3721

    5G/B5G oriented intelligent cloud network architecture by Xu ZHOU, Zhuo LI, Yifang QIN

    Published 2019-10-01
    “…The emergence of 5G/B5G technology has greatly improved the key capabilities of mobile networks including bandwidth,latency and connectivity.Faced with the prosperous development of mobile access side capabilities,the existing centralized architecture for internet cloud service was prone to bottlenecks and could not fully exploit the advantage of 5G/B5G.The technology named Network 5.0 was proposed to address the demand for data networks from future typical network applications through a complete set of innovative protocol systems and control management architecture.A new type of intelligent cloud network based on the protocol system of Network 5.0 was proposed,which could bridge the gap between the internet service model and 5G/B5G access capability through the deep integration of cloud network,and promote further the continuous evolution of the network.…”
    Get full text
    Article
  2. 3722

    Research of the Law and Control Method of Automatic Shift for Engineering Vehicle by Ying Chen

    Published 2019-07-01
    “…The simulation shows that the optimal dynamic shift strategy can improve the acceleration and dynamic performance of the vehicle and greatly improve the shift quality of the vehicle. …”
    Get full text
    Article
  3. 3723

    Impact of climatic change on alpine ecosystems: inference and prediction by Nigel G. Yoccoz, Anne Delestrade, Anne Loison

    Published 2011-01-01
    “…Alpine ecosystems will be greatly impacted by climatic change, but other factors, such as land use and invasive species, are likely to play an important role too. …”
    Get full text
    Article
  4. 3724

    Evolution of machine learning in financial risk management: A survey by Lu Kuan-I

    Published 2025-01-01
    “…Given its reliance on data, financial risk management can greatly benefit from the application of machine learning tools. …”
    Get full text
    Article
  5. 3725

    Conceptual analysis of the relationship between culture and education by Monika Veronika, Firman Firman, Riska Ahmad

    Published 2021-02-01
    “…Education is the process by which each person is civilized, which is created by a great desire to learn, which is created to become a full member of a community, living and upholding the values expressed in a specific culture by a group of people. …”
    Get full text
    Article
  6. 3726

    Performance Evaluation of LMS and CM Algorithms for Beamforming by Mossaab Atzemourt, Abdelmajid Farchi, Younes Chihab, Zakaria Hachkar

    Published 2022-01-01
    “…In addition, their use brings a great frequency of diversity even to respond quickly to the increasing spectral demand. …”
    Get full text
    Article
  7. 3727

    Torque Dynamic Coordinated Control for HEV based on the ISG Motor Torque Compensation by Deng Tao, Lu Renzhi, Li Yanan, Lin Chunsong

    Published 2015-01-01
    “…For the fluctuations problem of driveline torque which results from working-mode switching of dual-clutch parallel hybrid electric vehicles with integrated starter / Generator( ISG),focusing on study the process of transferring from pure electric working model to only engine working model.Based on the method of optimal the total efficiency of hybrid electric vehicle,the steady-state energy management control strategy is established,and then steady torque distribution area is achieved,which is the basis of coordination and control of dynamic torque.For the problem adopted the engine dynamic torque estimate genetic algorithm based on BP neural network algorithm,and ISG motor torque compensation method is proposed for dynamic torque coordinated control strategy.The simulation results show that the method proposed above can significantly decreases the torque fluctuations of working model transferring process,at the same time,the jerk to driveline is greatly reduced.…”
    Get full text
    Article
  8. 3728

    Universally composable secure trusted access protocol for WLAN Mesh networks by MA Zhuo1, MA Jian-feng1, ZENG Yong1, SHEN Yu-long1

    Published 2008-01-01
    “…The current access protocols of WLAN Mesh network and trusted network could not satisfy the requirements of performance and security when the trusted access is needed in WLAN Mesh networks.Then,a provably secure trusted access protocol MN-TAP for the WLAN Mesh networks was proposed.Such protocol will achieve authentication and key confirmation among the access requestor,policy enforcement point and policy decision point.At the same time,the protocol could realize the platform authentication and platform integrity verification in the first round of protocol interaction,which would improve the efficiency of the protocol and decrease the overhead of the servers.A provably secure model was used,named universally composable secure model,to analyze the security of the protocol.And the performance of the protocol was analyed.The results show that: the protocol is a UC-secure protocol,and the performance has great advantages over the current protocols.…”
    Get full text
    Article
  9. 3729

    Découverte d’une culture africaine et fantasmes d’un missionnaire. Le Dictionnaire français-kirundi du Père Van der Burgt (1903) entre ethnographie, exégèse biblique et orientalism... by Jean-Pierre Chrétien

    Published 2010-04-01
    “…One of the first exogenous looks on the Great Lakes region of Africa came from a missionary in Burundi, the Dutch White Father Van der Burgt. …”
    Get full text
    Article
  10. 3730

    Bilocation - Dislocation - Xlocation : The Apocalypse of Place in Eamonn Wall’s Poetry by Pascale Guibert

    Published 2020-05-01
    “…His innovative poetry thereby taps and continues the great Romantic tradition of Wordsworthian “Nature” writing. …”
    Get full text
    Article
  11. 3731

    Modelling and Regularity of Nonlinear Impulsive Switching Dynamical System in Fed-Batch Culture by Lei Wang

    Published 2012-01-01
    “…However, the on-off switching of alkali is too frequent, which greatly increases the computational cost of the numerical solution to the system so as to locate the state-based switchings in strict time order and implement the correct mode changes. …”
    Get full text
    Article
  12. 3732

    Novel watermarking based on DIBR 3D image by Chen CUI, Shen WANG, Qiong LI

    Published 2016-05-01
    “…Depth-image-based rendering (DIBR) has become an important technology in 3D displaying with its great advantages.As a result,more and more 3D products copyright problems turn out.Since either the center view with depth image or the synthesized virtual views could be illegally distributed,not only the center views but also the synthesized virtual views need to be protected.A watermarking method for DIBR 3D images was proposed.After applying three-level DWT to the center image,odd-even quantization was utilized to modify the coefficients of the sub-blocks of the center image,by this way the proposed method was made robust to typical signal distortions,such as JPEG compression,noise addition and median filter.As the experimental results shown,the proposed method is much more robust to the common signal distortion attacks with lower BER (bit error rate) compared with existing methods.…”
    Get full text
    Article
  13. 3733

    An Adaptive Subspace Similarity Search Approach by Jianxin Ren, Huahui Chen

    Published 2015-07-01
    “…In recent years,such database fields as multimedia information retrieval,similarity join and time series matching,where similarity search has attracted much attention.Existing researches mostly compute nearest neighbor to solve problems about search target set,such as kNN and kNNJ,by metric distance functions in the Euclidean space.But some studies showed that high dissimilarity dimensions had got great effect on the accuracy of answer and flexibility and robustness still were lacked in corresponding solutions.Thus centralized dynamic subspace or partial dimensions similarity search problem and algorithms were proposed at first.Furthermore,with the emerge of very large dataset,centralized algorithms can,t extend very well.Finally,the distributed ones under hadoop framework were proposed.Experiments prove that distributed algorithms outperform centralized ones in the performance without accuracy loss.…”
    Get full text
    Article
  14. 3734

    Genre et transgression du genre dans le récit de la Guerre des jeunes filles chez Cosmas de Prague by Adrien Quéret-Podesta

    Published 2021-12-01
    “…The episode of the Maiden’s War (in Czech Dívčí válka) is undoubtedly one of the most famous legends concerning the mythical past of the Czech state: this fictive conflict between maidens and men, which is said to have happened during the reign of Přemysl, the legendary ancestor of the Přemyslid dynasty which ruled over Bohemia from the end of the 9th century until 1306, had a great influence on the culture of this country. The first mention of the Maiden’s war appears in the ninth chapter of the first book of the Chronicle of the Czechs, a work which was written in Latin in 1125 by Cosmas of Prague, dean of the cathedral chapter of Prague, and which is also the oldest chronicle of this country: in his short narration of this event, the chronicler criticizes the customs of the maidens in the ancient (i.e. pagan) times and accuses them of being responsible for the conflict. …”
    Get full text
    Article
  15. 3735

    In Search of Gendabelo, the Ethiopian “Market of the World”of the 15th and 16th Centuries by Amélie Chekroun, Ahmed Hassen Omer, Bertrand Hirsch

    Published 2023-07-01
    “…This paper edits and translates three unpublished Ethiopian texts in Ajami, Arabic, and Amharic from the 19th and 20th centuries that mention nostalgically the now vanished great medieval market of Gendabelo. The market appears in the 15th and 16th century documentation, both endogenous and exogenous to the Horn of Africa, in which it is described as one of the main breakbulk points for caravans linking the Red Sea coasts to the Ethiopian highlands. …”
    Get full text
    Article
  16. 3736

    HybridFA:a memory reduction technique for the AC automata based on statistics by Gang XIONG, Hui-min HE, Jing YU, Yan-bing LIU, Li GUO

    Published 2015-07-01
    “…Despite the fast speed in multiple string matching tasks,the advanced Aho-Corasick(AC) automata wastes storage memory to a great extent.Study indicated that the automata states have specific statistical access characteristics in practice.Accordingly,a series of algorithms based on statistical characteristics for building hybrid finite automata,named HybridFA,are proposed.This work completes partial states of the AC automata according to different features,including access frequency,state hierarchy,and combined characteristics respectively.Experimental results on the real-world datasets like Snort,ClamAV,and URL show that the storage space of HybridAC is reduced to less than 5% of the space cost by the advanced AC automata.Furthermore,HybridFA based on combined characteristics achieves the superior performance on matching speed and robustness comparing to other proposed algorithms.…”
    Get full text
    Article
  17. 3737

    ANALYSIS OF THE INFLUENCE OF STIFFENER TYPE AND MANUFACTURING PROCESS ON MECHANICAL BEHAVIOR OF TITANIUM ALLOY STIFFENED PANEL UNDER AXIAL COMPRESSION by WANG ZhaoHui, MA YuE

    Published 2022-01-01
    “…Different manufacturing processes have great influence on the failure load and post-buckling load capacity, among which the post-buckling load capacity of welded stiffened plate is the largest one. …”
    Get full text
    Article
  18. 3738

    Secure topology protocol for mobile peer-to-peer networks by LI Zhi-yuan1, WANG Ru-chuan1

    Published 2010-01-01
    “…For the security problem in mobile peer to peer(MP2P) networks,an adaptive mobile peer-to-peer secure topology protocol(AMPSTP) was proposed.Firstly,Fortune algorithm was used to divide a large geographical region into some small sub regions.Secondly,temporary anchor node selection and update strategies were given.Thirdly,MP2P overlay network topology construction and maintenance mechanisms were also given.Fourthly,MP2P overlay network routing discovery algorithm and node selection mechanism based on game theory for MP2P networks were successively proposed.Finally,the performance of the AMPSTP protocol was theoretically analyzed and simulated on the platform of NS-2.Theoretical analysis and simulation results show that compared with MADPastry protocol,AMPSTP protocol not only can guarantee the network security and improve network performance,but also greatly reduce the control overhead.…”
    Get full text
    Article
  19. 3739

    Un objet d’histoire (presque) introuvable : les fourches patibulaires dans les sources tourangelles (xiiie-xviiie siècles) by Fabrice Mauclair

    Published 2015-09-01
    “…If in the studied territory the ancient places of performance and exhibition have greatly changed the landscape (by inspiring many names) it is clear that they hardly appear in the sources. …”
    Get full text
    Article
  20. 3740

    Elèves, apprentissages et « numérique » : regard rétrospectif et perspectives by Georges-Louis Baron

    Published 2014-01-01
    “…It first presents the evolution of the great theoretical visions produced by research on educational technology and then discusses the current tendencies regarding installing new curricula.…”
    Get full text
    Article