Suggested Topics within your search.
Suggested Topics within your search.
- Civilization 2
- Colonial influence 2
- History 2
- Manners and customs 2
- Politics and government 2
- Social conditions 2
- Social life and customs 2
- Analysis 1
- Church history 1
- Manufacturing processes 1
- Molecular structure 1
- Nuclear magnetic resonance spectroscopy 1
- Organic compounds 1
- SCIENCE / Mechanics / General 1
- TECHNOLOGY & ENGINEERING / Manufacturing 1
- TECHNOLOGY & ENGINEERING / Material Science 1
-
501
Intersigmoid Internal Hernia: Laparoscopic Repair of a Rare Cause of Bowel Obstruction
Published 2022-01-01“…Managing this condition relies mainly on surgical intervention (open or laparoscopic) in a timely manner to prevent further complications, such as bowel ischemia. …”
Get full text
Article -
502
Signs of Innovation in European Cinema. Electronic Music in Antonioni and Tarkovsky
Published 2025-02-01“…Tarkovsky’s well-established relationship with Eduard Artemiev, matured within the Moscow studio, allowed Tarkovsky to use electronic sounds in some of his films, such as Solaris, in a manner far removed from the worn-out standards of science-fiction cinema. …”
Get full text
Article -
503
Anonymous survey system based on NIZK
Published 2016-12-01“…Aiming at the security problem that the existing in electronic surveys,such as information fraud,privacy security etc.An anonymous electronic survey scheme based on non-interactive zero knowledge proofs (NIZK) was constructed,which had the characteristics of self-organization,non-interactive,anti-replay,and high efficiency.The system uses the NIZK protocol and the Boneh-Boyen signature scheme to verify the user's identity in non-interactive manner,which guarantees the authenticity of the scheme.The system also uses the Pedersen commitment scheme and the pseudo random function to hide the user's identity and the related information,which guarantees the ano-nymity.Security analysis show that the system has security features such as malicious users attack resistance and anonymity.Finally,the function of the system was also verified and the result show that the system can accomplish all the functions correctly and guarantee the anonymity and authenticity of the system effectively.…”
Get full text
Article -
504
Overview of How to Stop Damage Caused by Nuisance Wildlife in Your Yard
Published 2012-11-01“…These suggestions should help reduce wildlife damage in a practical, humane, and environmentally responsible manner. Written by Holly K. Ober and Arlo Kane, and published by the UF Department of Wildlife Ecology and Conservation, October 2012. …”
Get full text
Article -
505
Les femmes du NPD au Römer : Quand l’extrême droite fait son entrée au parlement de Francfort (1989-1993)
Published 2022-03-01“…Their dissident political practice, their refusal to accept conventions and their insolence showed a stark contrast with the good manners of the other representatives ; by systematically challenging the democratic consensus, they destabilized the parliamentary process. …”
Get full text
Article -
506
Blockchain-based access control mechanism for data traceability
Published 2020-12-01“…To improve the transparency and traceability of access control, a blockchain-based access control mechanism for data traceability and provenance was proposed.The proposed access control policy was transferred to the smart contract and deployed on the blockchain, and the access authorization evaluation was realized by executing the smart contract deployed on the blockchain to ensure the decentralization, transparency and traceability of the access control process.The manner of combining off-chain and on-chain was adopted, the object was stored in off-chain data server, and the object index was generated by the object storage address and hash value, and deployed on the object blockchain.The log of object access authorization and access were recorded in the log blockchain, any misbehavior was immutably recorded.The security analysis show that, the proposed mechanism achieve the properties of decentralization, transparency and traceability while ensuring the privacy of data.…”
Get full text
Article -
507
A density clustering-based network performance failure big data analysis algorithm
Published 2020-09-01“…Facing frequent network security incidents,how to quickly find abnormal data in massive monitoring database and carry out network failure analysis becomes a research difficulty.A density-based network performance failure big data analysis algorithm was proposed,which extracted key performance characteristic indicators through entropy weight analysis,implemented data shaping through data cleaning and standardization,and extracted abnormal performance data on the basis of DBSCAN clustering algorithm.Relying on the real-time massive backbone network link performance data of multiple domestic operators to validated this algorithm,the results shows that compared with the manually manner,the recognition accuracy of the algorithm proposed to the network performance abnormal data is more than 90%,which can well fit for the analysis of real-time Internet network operation failure.…”
Get full text
Article -
508
5G-Advanced: network-controlled repeater
Published 2022-09-01“…Radio frequency (RF) repeaters have been deployed in 2G, 3G and 4G to improve the coverage of cellular system.While it is treated as a cost effective solution to extend the network coverage, conventional RF repeaters simply perform amplify-and-forward operation based on the set-up without the capability of doing flexible adjustments based on control and scheduling indication from network.An overview on the new study item in 5G-Advanced was given, i.e.network-controlled repeater.As an enhancement over conventional RF repeaters, network-contrdled repeater will enable the repeater to receive and process repeater control information from the network and perform its amplify-and-forward operation in a more efficient manner including the directive forwarding of the signal, dynamic on-/off of transmissions and receptions, and simplified network integration.…”
Get full text
Article -
509
Dorosły w świadomości przedszkolaka. Esej prawie naukowy
Published 2016-03-01“… The aim of the following text is to present various manners of thinking about adults by five-year olds. …”
Get full text
Article -
510
Telecommunication Networks in Germany — Expanding with a Public Company
Published 2020-08-01“…It should plan and construct nationwide fibre optic and mobile networks in a coordinated manner, based on a coherent analysis of demand and supply. …”
Get full text
Article -
511
Novel spectrum sharing strategy based on QoS support in cognitive vehicular network
Published 2011-11-01“…A two-step spectrum sharing strategy consisting of inter-cell allocation and intra-cell allocation was developed to guarantee the system quality of service(QoS)in the cognitive vehicular network(CVN).Simulation results indicate that the proposed GNBS scheme considering both the fairness and utility can obtain larger transmission rate than Max-min scheme and achieve much better fairness than Max-rate scheme.Considering the difference of spectrum requirements between cognitive cells,GNBS scheme can allocate the spectrum resource dynamically in a weighted fairness manner.Furthermore,the cognitive cooperative spectrum sharing scheme outperforms than the non-cooperative scheme,and it can greatly improve the system utility and fairness between OBU than the non-cooperative schemes.…”
Get full text
Article -
512
Risk, Disappointment and Distraction in Keith Gessen’s All the Sad Young Literary Men
Published 2014-01-01“…Keith Gessen’s debut novel is not a “post-9/11” text in the manner of Falling Man or Terrorist. It is not concerned, explicitly, with the aftermath of the attacks. …”
Get full text
Article -
513
Cloud resource prediction model based on triple exponential smoothing method and temporal convolutional network
Published 2019-08-01“…The container cloud represented by Docker and Kubernetes has the advantages of less additional resource overhead and shorter start-up and destruction time.However there are still resource management issues such as over-supply and under-supply.In order to allow the Kubernetes cluster to respond “in advance” to the resource usage of the applications deployed on it,and then to schedule and allocate resources in a timely,accurate and dynamic manner based on the predicted value,a cloud resource prediction model based on triple exponential smoothing method and temporal convolutional network was proposed,based on historical data to predict future demand for resources.To find the optimal combination of parameters,the parameters were optimized using TPOT thought.Experiments on the CPU and memory of the Google dataset show that the model has better prediction performance than other models.…”
Get full text
Article -
514
Écrire avec Flaubert
Published 2024-06-01“…I am interested in the way in which many writers of the 20th and 21st centuries, from Kafka to Claude Simon, Roland Barthes, Pierre Michon, or Jean-Philippe Toussaint, have demonstrated in their writings, their correspondence, or their interviews, an interest in Flaubert’s manner of writing, based on their reading of Flaubert’s correspondence, or on direct or indirect knowledge of Flaubert’s manuscripts. …”
Get full text
Article -
515
Proceso de recolección y comercialización de hongos comestibles silvestres en el Valle de Toluca, México
Published 2001-01-01“…Historians of the sixteenth century and beyond have described the use of fungi as well as the manner in which they were classified. Presently, in the rural areas of Mexico, more than two hundred edible varieties are registered as being harvested, with different ethnic groups having a vast knowledge about them. …”
Get full text
Article -
516
Joint optimization of trajectory and resource allocation for UAV integrated radar and communication system
Published 2021-11-01“…For the flexible and efficient area detection and data transmission tasks, the joint optimization of time resource allocation, power resource allocation and the trajectory for UAV (unmanned aerial vehicle) trajectory for airborne IRCS (integrated radar and communication system) was studied in a TDM (time division multiplexing) manner, in order to maximize the total weighted capacity of the system’s radar detection link and communication transmission link.To solve the non-convex optimization problem, the BCD (block coordinate descent) and the SCP (successive convex programming) techniques were adopted to iteratively optimize the time resource allocation, power resource allocation and UAV trajectory.The simulation results demonstrate that the proposed method can obtain a convergent solution, and can effectively improve the capacity of the system.…”
Get full text
Article -
517
Are Cows Comfortable in Modern Dairy Facilities?
Published 2018-12-01“…It is crucial to provide dairy cattle with basic shelter needs and allow farm staff to manage these animals in an effective manner. In addition, cows need to accomplish certain natural behavioral activities daily. …”
Get full text
Article -
518
Die Afrikaans van die Bybelvertaling van 1933
Published 2009-12-01“…Not one of the translators considered the imperfect seriously; only in the 1933 translation was the historical present tense used in a stylistically satisfactory manner. The plurals of adjectives in a substantive function, and the negative imperative, were not used consistently in the 1933 translation. …”
Get full text
Article -
519
Pulse engineering via projection of response functions
Published 2025-01-01“…Our method extends methods such as gradient-ascent pulse engineering (GRAPE) and variational quantum algorithms, by determining the fidelity gradient in a hyperparameter-free manner, and using it for a multiparameter update, capitalizing on the multimode overlap of the perturbation and the mode functions. …”
Get full text
Article -
520
Declarative Programming with Temporal Constraints, in the Language CG
Published 2015-01-01“…In CG, users are able to develop time-dependent programs, in a flexible and straightforward manner. Such programs can, in turn, be coupled with evolving environments, thus empowering users to control the environment’s evolution. …”
Get full text
Article