-
341
Generation, structure and properties of the modified welding seams
Published 2018-10-01“…The use of electrodes with an experimental coating containing a mechanically alloyed, composite ligature to resolve transcrystalline type of structure of the weld metal and reduce the grain size by 2,5–3,0 times (from № 8–9 to № 11–12) reduces by 20–30% the threshold of cold brittleness and increase by 15–25% of mechanical properties of the weld metal.…”
Get full text
Article -
342
Distributed dynamic mapping scheme based on cost function
Published 2014-10-01“…For supporting efficient host mobility and mapping identifiers onto locators,a distributed dynamic mobility mapping scheme based on cost function was proposed.In the scheme,depending on the mobility pattern and communication feature,the communication of mobile node is divided into three communication models,namely,moving update model,balanced transmission model and resolving query model.In order to minimize the total resolving cost,three mapping approach are proposed based on distributed multicast,consistent hash functions and proactive sharing respectively in the mobile domain.For each mapping approach,corresponding registration update,resolution query and packet delivery strategies are designed.Simulation results show that the scheme can achieve the minimum resolving cost,and can have low resolve latency and good adaptability for network topology dynamic changing.…”
Get full text
Article -
343
Le bornage de l’alpage de la Grassaz à Peisey (Tarentaise, xv e siècle)
Published 2020-12-01“…On July 3, 1412, representatives from the communities of Landry and Peisey, in the Tarentaise Valley, claim in front of arbitrators and mediators responsible to bring peace and resolve conflicts that the source of the tensions between the two parishes is the property lines deemed obscuri, dark. …”
Get full text
Article -
344
Finite-difference and pseudo-spectral methodsfor the numerical simulations of in vitro human tumor cellpopulation kinetics
Published 2009-05-01“…The spectralaccuracy of the pseudo-spectral method allows us to resolve themodel with a much smaller number of spatial grid-points thanrequired for the finite-difference method to achieve comparableaccuracy. …”
Get full text
Article -
345
Lecteur méfiant de science-fiction et développement de savoir-faire en lecture
Published 2024-06-01“…While any literary reading in general requires this kind of investigation, if only to resolve the inferences necessary for comprehension, SF would require more effort because of the semantic oddities designed to represent the science-fictional universe more or less distanced from the readers’ real reference point. …”
Get full text
Article -
346
ATTEMPTS OF THE AGRARIAN REFORM AT THE BEGINNING OF THE XX CENTURY, OR OPPOSITION OF THE MINISTRY OF INTERNAL AFFAIRS AND THE MINISTRY OF FINANCE IN SOLVING THE PEASANT QUESTION
Published 2019-11-01“…It has been substantiated, that at the beginning of the 20th century the state authorities did not develop a unified course in resolving the peasant issue and only the events of the 1905 revolution forced the government to take emergency measures in the development of agricultural legislation.…”
Get full text
Article -
347
Template attack of Crypto chip based on clustering
Published 2018-08-01“…The known-key establishment template and others full control of experimental equipment preconditions are required to implement the traditional template attack.The preconditions restrict the application scenario of template attack.The template attack is only applied to the device that the key input can be controlled.In order to resolve the restrictive preconditions,a novel method of template attack based on clustering was proposed.The clustering EM algorithm was modified according to the characteristics of information leakage model in the method.The modified clustering methods accurately fitted the leaked information probability model in the case of unknown key,the location of information leakage could be determined.Then the attack established the templates in the location,and implemented template matching.The proposed method eliminates the dependence of traditional template attacks on per-conditions and expand the application scenario of template attack.…”
Get full text
Article -
348
A narrowing digital divide
Published 2022-10-01“…As such, without the digital divide, would the Internet be able to resolve the issue of low political involvement among youth? …”
Get full text
Article -
349
Les eaux transfrontalières fédératrices d’une hydro-diplomatie environnementale ? Analyse comparée du Danube et du Jourdain
Published 2021-02-01“…We show that while these agreements do not directly resolve the obstacle of the territorial sovereignty of States and political issues as in the case of the Jordan River basin, nor that of the quantitative sharing of transboundary waters, they do create spaces for dialogue federated by environmental issues as shown in the case of the Danube River basin, tempering unilateral actions and contributing smoothly to a redistribution of roles towards non-state actors.…”
Get full text
Article -
350
Machine politics: The cultural science of permissionless systems
Published 2022-12-01“…The survival of permissionless blockchains is typically cast as a cryptoeconomic security problem for mechanism designers to resolve. This essay argues that, long-term, these networks may require something that looks more like a UNESCO protection convention for machine culture than an equation. …”
Get full text
Article -
351
Le « zéro déchet », tou(te)s dans le même bocal ? Profils, pratiques, et formes d’engagement
Published 2021-12-01“…Yet, this Zero Waste mobilization does not resolve some social issues, such as the unequal repartition of wealth and work.…”
Get full text
Article -
352
A Defense Approach of DAD Attack in Stateless Auto Configuration
Published 2014-04-01“…In the detection process, once a malicious node claims that the resolve IP address is occupied, the node's address configuration will fail. …”
Get full text
Article -
353
Research on the security audit model in intrusion prevention based on write-related support vector data description
Published 2007-01-01“…The security audit model based on write-related SVDD was designed to resolve the one-class problem.Once the classifier has been trained using the write-related subset,all activities deviated from the normal patterns are classified as potential intrusion.The proposed one-class classification algorithms can be implemented to build up an anomaly detection system by using only normal samples and the algorithms also makes the security audit system detect the new anomaly behaviors.In the experiments,the One-class classifier acquires nearly 100% detection rate and average zero false alarm rate for sequences of system calls based on a small training dataset.…”
Get full text
Article -
354
Use of an Amplatzer ASD Occlusion Device for the Closure of an Ascending Aortic Pseudoaneurysm Presenting as Hemoptysis
Published 2022-01-01“…This report seeks to describe a case in which hemoptysis was the symptom unveiling the finding of a thoracic ascending aortic pseudoaneurysm and the use of an Amplatzer atrial septal defect (ASD) occlusion device as a viable option to safely resolve the disease process.…”
Get full text
Article -
355
Yorùbá Proverbial Metaphor: A Rhetoric tool and Guiding Principle to Conflict Resolution
Published 2023-11-01“…To amplify this belief, Yorùbá at different occasions incorporate some of the proverbs that are relevant and applicable to conflicting situations in their attempt to resolve conflicts. This essay examines some of the selected proverbs while synthesized them as a rhetoric tools and guiding principles to constructive conflict resolution in the Yorùbá traditional Society. …”
Get full text
Article -
356
Comparison of ARIMA and Artificial Neural Networks Models for Stock Price Prediction
Published 2014-01-01“…The findings further resolve and clarify contradictory opinions reported in literature over the superiority of neural networks and ARIMA model and vice versa.…”
Get full text
Article -
357
Transferensi dalam Proses Konseling
Published 2023-03-01“…For this reason, a counselor must know what the causes and strategies are to resolve transference in the counseling relationship. …”
Get full text
Article -
358
Imposed information seeking in public libraries and school library media centers: a common behaviour?
Published 2001-01-01“…It does this by making a distinction between questions that are self-generated (internally motivated by personal context) and those that are imposed (thought up by one person then given to someone else to resolve). While the imposed query model represents familiar behaviour, it is a dimension of information seeking that has only recently been explicitly addressed and isolated for study. …”
Get full text
Article -
359
Mine Land Reclamation and Eco-Reconstruction in Shanxi Province I: Mine Land Reclamation Model
Published 2014-01-01“…However because of the heavy development of the coal resource, the ecological environment is worsening and the farmland is reducing continuously in Shanxi Province. How to resolve the contradiction between coal resource exploitation and environmental protection has become the imperative. …”
Get full text
Article -
360
Uma proposta de construção geométrica usando a linguagem Logo
Published 2014-06-01“…Este artigo apresenta uma possibilidade de desenvolvimento da atividade, pois outras podem surgir quando os alunos se engajarem para resolvê-la. …”
Get full text
Article