Showing 501 - 520 results of 3,402 for search '"Mannerism', query time: 0.07s Refine Results
  1. 501

    Intersigmoid Internal Hernia: Laparoscopic Repair of a Rare Cause of Bowel Obstruction by Ebrahim Almahmeed, Hasan Shawqi Aljawder, Mohamed Khalid Fadhul, Abdulmenem Abualsel

    Published 2022-01-01
    “…Managing this condition relies mainly on surgical intervention (open or laparoscopic) in a timely manner to prevent further complications, such as bowel ischemia. …”
    Get full text
    Article
  2. 502

    Signs of Innovation in European Cinema. Electronic Music in Antonioni and Tarkovsky by Gabriele

    Published 2025-02-01
    “…Tarkovsky’s well-established relationship with Eduard Artemiev, matured within the Moscow studio, allowed Tarkovsky to use electronic sounds in some of his films, such as Solaris, in a manner far removed from the worn-out standards of science-fiction cinema. …”
    Get full text
    Article
  3. 503

    Anonymous survey system based on NIZK by Lu LIU, Yu-xi LI, Fu-cai ZHOU

    Published 2016-12-01
    “…Aiming at the security problem that the existing in electronic surveys,such as information fraud,privacy security etc.An anonymous electronic survey scheme based on non-interactive zero knowledge proofs (NIZK) was constructed,which had the characteristics of self-organization,non-interactive,anti-replay,and high efficiency.The system uses the NIZK protocol and the Boneh-Boyen signature scheme to verify the user's identity in non-interactive manner,which guarantees the authenticity of the scheme.The system also uses the Pedersen commitment scheme and the pseudo random function to hide the user's identity and the related information,which guarantees the ano-nymity.Security analysis show that the system has security features such as malicious users attack resistance and anonymity.Finally,the function of the system was also verified and the result show that the system can accomplish all the functions correctly and guarantee the anonymity and authenticity of the system effectively.…”
    Get full text
    Article
  4. 504

    Overview of How to Stop Damage Caused by Nuisance Wildlife in Your Yard by Holly K. Ober, Arlo Kane

    Published 2012-11-01
    “…These suggestions should help reduce wildlife damage in a practical, humane, and environmentally responsible manner. Written by Holly K. Ober and Arlo Kane, and published by the UF Department of Wildlife Ecology and Conservation, October 2012. …”
    Get full text
    Article
  5. 505

    Les femmes du NPD au Römer : Quand l’extrême droite fait son entrée au parlement de Francfort (1989-1993) by Valérie Dubslaff

    Published 2022-03-01
    “…Their dissident political practice, their refusal to accept conventions and their insolence showed a stark contrast with the good manners of the other representatives ; by systematically challenging the democratic consensus, they destabilized the parliamentary process. …”
    Get full text
    Article
  6. 506

    Blockchain-based access control mechanism for data traceability by Rongna XIE, Hui LI, Guozhen SHI, Yunchuan GUO, Ming ZHANG, Xiuze DONG

    Published 2020-12-01
    “…To improve the transparency and traceability of access control, a blockchain-based access control mechanism for data traceability and provenance was proposed.The proposed access control policy was transferred to the smart contract and deployed on the blockchain, and the access authorization evaluation was realized by executing the smart contract deployed on the blockchain to ensure the decentralization, transparency and traceability of the access control process.The manner of combining off-chain and on-chain was adopted, the object was stored in off-chain data server, and the object index was generated by the object storage address and hash value, and deployed on the object blockchain.The log of object access authorization and access were recorded in the log blockchain, any misbehavior was immutably recorded.The security analysis show that, the proposed mechanism achieve the properties of decentralization, transparency and traceability while ensuring the privacy of data.…”
    Get full text
    Article
  7. 507

    A density clustering-based network performance failure big data analysis algorithm by Xiang LI, Yuan LI, Zifei ZHANG, Zhe YANG

    Published 2020-09-01
    “…Facing frequent network security incidents,how to quickly find abnormal data in massive monitoring database and carry out network failure analysis becomes a research difficulty.A density-based network performance failure big data analysis algorithm was proposed,which extracted key performance characteristic indicators through entropy weight analysis,implemented data shaping through data cleaning and standardization,and extracted abnormal performance data on the basis of DBSCAN clustering algorithm.Relying on the real-time massive backbone network link performance data of multiple domestic operators to validated this algorithm,the results shows that compared with the manually manner,the recognition accuracy of the algorithm proposed to the network performance abnormal data is more than 90%,which can well fit for the analysis of real-time Internet network operation failure.…”
    Get full text
    Article
  8. 508

    5G-Advanced: network-controlled repeater by Nan ZHANG, Ziyang LI, Ruyue LI, Wei CAO

    Published 2022-09-01
    “…Radio frequency (RF) repeaters have been deployed in 2G, 3G and 4G to improve the coverage of cellular system.While it is treated as a cost effective solution to extend the network coverage, conventional RF repeaters simply perform amplify-and-forward operation based on the set-up without the capability of doing flexible adjustments based on control and scheduling indication from network.An overview on the new study item in 5G-Advanced was given, i.e.network-controlled repeater.As an enhancement over conventional RF repeaters, network-contrdled repeater will enable the repeater to receive and process repeater control information from the network and perform its amplify-and-forward operation in a more efficient manner including the directive forwarding of the signal, dynamic on-/off of transmissions and receptions, and simplified network integration.…”
    Get full text
    Article
  9. 509

    Dorosły w świadomości przedszkolaka. Esej prawie naukowy by Alicja Jurgiel-Aleksander

    Published 2016-03-01
    “… The aim of the following text is to present various manners of thinking about adults by five-year olds. …”
    Get full text
    Article
  10. 510

    Telecommunication Networks in Germany — Expanding with a Public Company by Cordelius Ilgmann, André Störr

    Published 2020-08-01
    “…It should plan and construct nationwide fibre optic and mobile networks in a coordinated manner, based on a coherent analysis of demand and supply. …”
    Get full text
    Article
  11. 511

    Novel spectrum sharing strategy based on QoS support in cognitive vehicular network by Lei ZHANG, Tao LUO, Wei LIU

    Published 2011-11-01
    “…A two-step spectrum sharing strategy consisting of inter-cell allocation and intra-cell allocation was developed to guarantee the system quality of service(QoS)in the cognitive vehicular network(CVN).Simulation results indicate that the proposed GNBS scheme considering both the fairness and utility can obtain larger transmission rate than Max-min scheme and achieve much better fairness than Max-rate scheme.Considering the difference of spectrum requirements between cognitive cells,GNBS scheme can allocate the spectrum resource dynamically in a weighted fairness manner.Furthermore,the cognitive cooperative spectrum sharing scheme outperforms than the non-cooperative scheme,and it can greatly improve the system utility and fairness between OBU than the non-cooperative schemes.…”
    Get full text
    Article
  12. 512

    Risk, Disappointment and Distraction in Keith Gessen’s All the Sad Young Literary Men by James Peacock

    Published 2014-01-01
    “…Keith Gessen’s debut novel is not a “post-9/11” text in the manner of Falling Man or Terrorist. It is not concerned, explicitly, with the aftermath of the attacks. …”
    Get full text
    Article
  13. 513

    Cloud resource prediction model based on triple exponential smoothing method and temporal convolutional network by Xiaolan XIE, Zhengzheng ZHANG, Jianwei WANG, Xiaochun GHENG

    Published 2019-08-01
    “…The container cloud represented by Docker and Kubernetes has the advantages of less additional resource overhead and shorter start-up and destruction time.However there are still resource management issues such as over-supply and under-supply.In order to allow the Kubernetes cluster to respond “in advance” to the resource usage of the applications deployed on it,and then to schedule and allocate resources in a timely,accurate and dynamic manner based on the predicted value,a cloud resource prediction model based on triple exponential smoothing method and temporal convolutional network was proposed,based on historical data to predict future demand for resources.To find the optimal combination of parameters,the parameters were optimized using TPOT thought.Experiments on the CPU and memory of the Google dataset show that the model has better prediction performance than other models.…”
    Get full text
    Article
  14. 514

    Écrire avec Flaubert by Anne Herschberg Pierrot

    Published 2024-06-01
    “…I am interested in the way in which many writers of the 20th and 21st centuries, from Kafka to Claude Simon, Roland Barthes, Pierre Michon, or Jean-Philippe Toussaint, have demonstrated in their writings, their correspondence, or their interviews, an interest in Flaubert’s manner of writing, based on their reading of Flaubert’s correspondence, or on direct or indirect knowledge of Flaubert’s manuscripts. …”
    Get full text
    Article
  15. 515

    Proceso de recolección y comercialización de hongos comestibles silvestres en el Valle de Toluca, México

    Published 2001-01-01
    “…Historians of the sixteenth century and beyond have described the use of fungi as well as the manner in which they were classified. Presently, in the rural areas of Mexico, more than two hundred edible varieties are registered as being harvested, with different ethnic groups having a vast knowledge about them. …”
    Get full text
    Article
  16. 516

    Joint optimization of trajectory and resource allocation for UAV integrated radar and communication system by Shaoshuai FAN, Yufei WANG, Hui TIAN, Jie Zhang, Jinxin SHI

    Published 2021-11-01
    “…For the flexible and efficient area detection and data transmission tasks, the joint optimization of time resource allocation, power resource allocation and the trajectory for UAV (unmanned aerial vehicle) trajectory for airborne IRCS (integrated radar and communication system) was studied in a TDM (time division multiplexing) manner, in order to maximize the total weighted capacity of the system’s radar detection link and communication transmission link.To solve the non-convex optimization problem, the BCD (block coordinate descent) and the SCP (successive convex programming) techniques were adopted to iteratively optimize the time resource allocation, power resource allocation and UAV trajectory.The simulation results demonstrate that the proposed method can obtain a convergent solution, and can effectively improve the capacity of the system.…”
    Get full text
    Article
  17. 517

    Are Cows Comfortable in Modern Dairy Facilities? by Izabella Toledo

    Published 2018-12-01
    “…It is crucial to provide dairy cattle with basic shelter needs and allow farm staff to manage these animals in an effective manner. In addition, cows need to accomplish certain natural behavioral activities daily. …”
    Get full text
    Article
  18. 518

    Die Afrikaans van die Bybelvertaling van 1933 by J. C. Steyn

    Published 2009-12-01
    “…Not one of the translators considered the imperfect seriously; only in the 1933 translation was the historical present tense used in a stylistically satisfactory manner. The plurals of adjectives in a substantive function, and the negative imperative, were not used consistently in the 1933 translation. …”
    Get full text
    Article
  19. 519

    Pulse engineering via projection of response functions by Nicolas Heimann, Lukas Broers, Ludwig Mathey

    Published 2025-01-01
    “…Our method extends methods such as gradient-ascent pulse engineering (GRAPE) and variational quantum algorithms, by determining the fidelity gradient in a hyperparameter-free manner, and using it for a multiparameter update, capitalizing on the multimode overlap of the perturbation and the mode functions. …”
    Get full text
    Article
  20. 520

    Declarative Programming with Temporal Constraints, in the Language CG by Lorina Negreanu

    Published 2015-01-01
    “…In CG, users are able to develop time-dependent programs, in a flexible and straightforward manner. Such programs can, in turn, be coupled with evolving environments, thus empowering users to control the environment’s evolution. …”
    Get full text
    Article