Suggested Topics within your search.
Suggested Topics within your search.
- History 2
- Algerian literature (French) 1
- American essays 1
- Beauty, Personal 1
- Chest 1
- Clothing and dress 1
- Criticism and interpretation 1
- Doctrine and Covenants 1
- Electric circuit analysis 1
- Electric network analysis 1
- English essays 1
- History and criticism 1
- Juvenile literature 1
- Lawyers 1
- Legal ethics 1
- Novelists, English 1
- Psychophysiology 1
- Sex role in literature 1
- Surgery 1
- Women authors 1
- Women in literature 1
-
881
A Frequency-Tracking and Impedance-Matching Combined System for Robust Wireless Power Transfer
Published 2017-01-01“…The characteristics of the improved WPT system are investigated theoretically based on the two-port network model. Simulation and experimental studies are carried out to validate the proposed system. …”
Get full text
Article -
882
Epizooties et géographie du commerce du bétail dans la Corne d’Afrique
Published 2009-03-01“…Exports through Berbera, the former main livestock port, have seriously decreased, for the benefit of emerging Djibouti and Bosaaso. …”
Get full text
Article -
883
Dites 33. Les huit incipit allemands de Bouvard et Pécuchet (3)
Published 2012-06-01“…Dans ce troisième volet de notre article, nous prenons l’occasion du dernier mot de l’incipit français pour entrer, par la porte des traductions, dans l’œuvre tout entière. …”
Get full text
Article -
884
Science et Fiction à Peyresq
Published 2013-04-01“…Depuis cet entretien, la sixième édition des Journées Interdisciplinaires Sciences et Fictions de Peyresq (17-20 mai 2012) a porté sur le thème de l’Intelligence artificielle.…”
Get full text
Article -
885
La Palestine comme écran, ou comment passer « de l’autre côté du miroir »
Published 2013-12-01“…Our study is based on one of the most convincing creations in this production; in Port of Memory [2009], Kamal Aljafari uses sequences taken from Israeli and Hollywood films shot in Jaffa in the 1970s and 1980s where Palestinian inhabitants were excluded. …”
Get full text
Article -
886
Caminhos históricos sob o olhar de Rugendas: a ligação entre Rio de Janeiro e Minas Gerais
Published 2022-12-01“…Initially opened as gold drain route from the hinterlands of Minas Gerais through the port of Rio de Janeiro, the Caminho do Proença established itself as one of the main routes of circulation, settlement, and supply of this portion of the territory during the 18th century and in the first decades of the 19th century. …”
Get full text
Article -
887
Supply Chain Management Skills in Business and Humanitarian Contexts
Published 2024-12-01“…Significant discrepancies were found: humanitarian SCM prioritizes functional logistics, while business SCM places a larger emphasis on information technology, customs, transportation, and port/airport management. These findings suggest a dynamic skillset evolution, where functional skills, essential at entry-level positions, give way to general management capabilities as one progresses. …”
Get full text
Article -
888
Study on privacy preserving encrypted traffic detection
Published 2021-08-01“…Existing encrypted traffic detection technologies lack privacy protection for data and models, which will violate the privacy preserving regulations and increase the security risk of privacy leakage.A privacy-preserving encrypted traffic detection system was proposed.It promoted the privacy of the encrypted traffic detection model by combining the gradient boosting decision tree (GBDT) algorithm with differential privacy.The privacy-protected encrypted traffic detection system was designed and implemented.The performance and the efficiency of proposed system using the CICIDS2017 dataset were evaluated, which contained the malicious traffic of the DDoS attack and the port scan.The results show that when the privacy budget value is set to 1, the system accuracy rates are 91.7% and 92.4% respectively.The training and the prediction of our model is efficient.The training time of proposed model is 5.16 s and 5.59 s, that is only 2-3 times of GBDT algorithm.The prediction time is close to the GBDT algorithm.…”
Get full text
Article -
889
Simple Methods to Approximate CPC Shape to Preserve Collection Efficiency
Published 2012-01-01“…The compound parabolic concentrator (CPC) is the most efficient reflective geometry to collect light to an exit port. Anyway, to allow its actual use in solar plants or photovoltaic concentration systems, a tradeoff between system efficiency and cost reduction, the two key issues for sunlight exploitation, must be found. …”
Get full text
Article -
890
Dynamic Performance Analysis of Semiactive Vehicle ISD Suspension Based on the Power-Driven-Damper Strategy
Published 2024-01-01“…The dynamic models of the passive suspension S1 and two semiactive ISD suspensions S2 and S3 are established. Based on the port-controlled Hamiltonian theory, the power-driven-damper semiactive control strategy is designed by analyzing the power transfer of suspension S3. …”
Get full text
Article -
891
Mobile AR/VR in 5G based on convergence of communication and computing
Published 2018-08-01“…Oriented to 5Gmobile communication network combining with communication and computation,the characteristics ofmobile AR/VR information processing and transmission were analyzed,and the ability to integrate communication and computation was proposed,and the capability of integrating communication and computing was proposed.In the future 5Gmobile communication network,multi-level computing will be used to solve the problem of limited computing capacity ofmobile terminals by the capability ofmulti-level computing nodes in collaborative network.Intelligent transmissionmechanism could overcome the problem of unstable transmission capacity ofmobile channel by efficient spectrum sensing,layered coding and adaptive space port transmission,and themobile AR/VR service delay was ensured by using delay guaranteemechanism and cooperativemanagement of communication and computing resources.The research status and development trend ofmobile AR/VRmulti-level computingmodel,intelligent transmissionmechanism and service delay guarantee was reviewed,the existing problems were summarized and the next research direction was put forward.…”
Get full text
Article -
892
Design of Rectangular Compensation Mechanism based on the Cross Double-slider Model
Published 2016-01-01“…The speed curve of the center of outlet port of the feed tube is obtained,which provides the basis for improving the uniformity of the protection slag in the crystal. …”
Get full text
Article -
893
Jerry ou comment faire parler autrement les murs
Published 2016-05-01“…In 2007, the inhabitants of Port-au-Prince discovered on various walls inscriptions and drawings, signed by «Jerry», which sometimes delivered social or moral messages, and sometimes supported the opposite view by distorting them. …”
Get full text
Article -
894
Supply Chain Management Skills in Business and Humanitarian Contexts
Published 2024-12-01“…Significant discrepancies were found: humanitarian SCM prioritizes functional logistics, while business SCM places a larger emphasis on information technology, customs, transportation, and port/airport management. These findings suggest a dynamic skillset evolution, where functional skills, essential at entry-level positions, give way to general management capabilities as one progresses. …”
Get full text
Article -
895
DC MOTOR ANGULAR POSITION CONTROL SYSTEM USING ARDUINO PLATFORM
Published 2024-09-01“…To test the system, a LabVIEW interface was used, which communicates with the Arduino Uno platform through the serial port. This technical solution, using PID controller, can be applied for robotic arm position control system and many other industrial applications.…”
Get full text
Article -
896
Web plug-in paradigm for anti-DoS attack based on end hopping
Published 2017-10-01“…The end hopping technology is a proactive network defense technology proposed to mitigate the network attack.By changing the IP address,port and other information in the communication pseudo-randomly to achieve the purpose of confusing the attacker.The plug-in mechanism based on the end hopping technology was introduced,and it was applied to the field of Web protection.This plug-in was designed to confuse and interfere with attackers.The plug-in model was divided into two working modes,which are non-end-hopping mode and end hopping mode.The plug-in according to the instructions of the UDP spokesman to switch its own work mode and when the communication link is safe and reliable,it choose the fist mode which can reduce the cost of services.Another,when the network is attacked,the plug-in switches to the end hopping mode to ensure the safety of communications.The experimental results show that the plug-in mechanism based on end hopping has high service and security performance under SYN Flood attack and UDP Flood attack.…”
Get full text
Article -
897
Dual-Polarized Crossed Bowtie Dipole Array for Wireless Communication Applications
Published 2014-01-01“…Moreover, the proposed array achieves high port isolation, the stable antenna gain over the entire operating band. …”
Get full text
Article -
898
New Evaluations and Restitution Suggestions for the Small Bath Structure at Phaselis
Published 2023-11-01“…The objective of this article is to analyse and interpret in conjunction with other examples from Eastern Mediterranean port cities the building, which was first identified as a bath by the director of Antalya Museum (head of the excavation) Kayhan Dörtlük in 1980. …”
Get full text
Article -
899
Les HP aussi ! Une institution battue en brèche : antipsychiatrie et désaliénation en France
Published 2009-01-01“…Les conséquences ont été importantes, à la fois pour les malades – puisque s’est accéléré le processus d’humanisation de l’hôpital qui était depuis les années cinquante porté par les désaliénistes et par les anti-psychiatres, mais aussi pour les personnels soignants et les médecins. …”
Get full text
Article -
900
« Hier sur tous les fronts… Demain sur tous les mondes ». Mobilisation météorologique et reconfigurations disciplinaires, militaires et aéronautiques durant la Première Guerre mond...
Published 2015-04-01“…Cet article porte sur la mobilisation de la science météorologique durant la Première Guerre mondiale, et sur les mutations induites par celle-ci au sein des pratiques de prévision météorologique et des sphères militaires et industrielles. …”
Get full text
Article