Suggested Topics within your search.
Suggested Topics within your search.
- History 11
- Management 6
- Purchasing 5
- Social conditions 5
- Philosophy 4
- Politics and government 4
- Business logistics 3
- Civilization 3
- History and criticism 3
- Information technology 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Marketing 3
- Methodology 3
- Nutrition 3
- Social life and customs 3
- Sociolinguistics 3
- Tourism 3
- Colonial influence 2
- Common law 2
- Diet Therapy 2
- Diet therapy 2
- Economic conditions 2
- Health 2
- Industrial procurement 2
- Internet in public administration 2
- Interpretation and construction 2
- Juvenile literature 2
-
8501
An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment
Published 2016-01-01“…The comparative analysis between proposed HCSA and the existing Distributed Hash Table (DHT) regarding execution time, computational overhead, and auditing time with auditing requests and servers confirms the effectiveness of HCSA in the cloud security model creation.…”
Get full text
Article -
8502
Machine-tool industry retrospective analysis in member countries of the Commonwealth of Independent States
Published 2023-10-01“…This gave impetus to industrial development on the periphery of the Soviet state, and by the time the domestic machine tool industry flourished in the late 1970s, the Russian Soviet Federative Socialist Republic accounted for less than half of the all-Union output. …”
Get full text
Article -
8503
Frequency Diverse Array Antennas: From Their Origin to Their Application in Wireless Communication Systems
Published 2018-01-01“…In addition, we consider the time-variant beampattern aspect of an FDA, which has normally been ignored in the literature. …”
Get full text
Article -
8504
Experimental study of the moisture content influence on CH adsorption and deformation characteristics of cylindrical bituminous coal core
Published 2018-10-01“…Drying experiments of coal samples showed that they lose the original moisture content following the exponential decay function of time. At wetting, the saturated moisture content in coal samples increased following the Exponential Association function of time. …”
Get full text
Article -
8505
A Network Traffic Prediction Model Based on Quantum-Behaved Particle Swarm Optimization Algorithm and Fuzzy Wavelet Neural Network
Published 2016-01-01“…Due to the fact that the fluctuation of network traffic is affected by various factors, accurate prediction of network traffic is regarded as a challenging task of the time series prediction process. For this purpose, a novel prediction method of network traffic based on QPSO algorithm and fuzzy wavelet neural network is proposed in this paper. …”
Get full text
Article -
8506
Seroprevalence of HCMV among Pregnant Women and Its relation to CD4 and CRP
Published 2018-09-01“…The results were (81 %), (9%) and (6%) for HCMV-IgG, HCMV-IgM and for both IgG & IgM at the same time respectively. The highest rates (41.66%) of decreased CD4 percentage were within seropositive pregnant women for both IgG & IgM at same time, while the highest rates (16.66%)of CRP positive were found within HCMV-IgM seropositive group. …”
Get full text
Article -
8507
Forest Ecological Diversity Change Prediction Discrete Dynamic Model
Published 2022-01-01“…By establishing the discrete dynamic model of forest ecological diversity change, this study finds a method that can keep the number of trees stable in a short time and ensure the sustainable development of forest resources. …”
Get full text
Article -
8508
Women in View West Law and Islamic Law
Published 2021-07-01“…Studies on women from time to time continue to emerge. Recently, with the proliferation of discourses on feminism in various parts of the world, women and their existence have returned to the lips of our society. …”
Get full text
Article -
8509
Impact of Radii Ratios on a Two-Dimensional Cloaking Structure and Corresponding Analysis for Practical Design at Optical Wavelengths
Published 2017-01-01“…This work is an extension to the evaluation and analysis of a two-dimensional cylindrical cloak in the Terahertz or visible range spectrum using Finite Difference Time-Domain (FDTD) method. It was concluded that it is possible to expand the frequency range of a cylindrical cloaking model by careful scaling of the inner and outer radius of the simulation geometry with respect to cell size and/or number of time steps in the simulation grid while maintaining appropriate stability conditions. …”
Get full text
Article -
8510
Evidence for a general cognitive structure in pigeons (Columba livia)
Published 2024-11-01“…When the reaction time task was excluded, there was a g-like component. …”
Get full text
Article -
8511
A Case Study of Anomalous Snowfall with an Alberta Clipper
Published 2017-01-01“…A postmortem analysis of this event, following an ingredients-based methodology, revealed that as the weak low approached the lower Great Lakes, it came under the influence of coupled 300-hPa jets that produced enhanced divergence and significant upward vertical motion over western New York, resulting in the enhanced convective snowfall over the region for a limited time. Instability and possible enhancement via the Great Lakes are also investigated, which show that while there was at least modest instability over the region during the time of heavy snowfall, lake enhancement was unlikely.…”
Get full text
Article -
8512
Pour une approche génétique de L’Éducation sentimentale (1869) : état présent, perspectives, démarches
Published 2009-01-01“…The genetic dossier of L’Éducation sentimentale (1869), almost complete but dispersed in several public institutions, has been open to research for the last thirty years. During this time the genetic approach to this manuscript corpus has produced numerous works, mainly by ITEM researchers. …”
Get full text
Article -
8513
Comparison of Neural Network Error Measures for Simulation of Slender Marine Structures
Published 2014-01-01“…The purpose of setting up the network is to reduce calculation time in a fatigue life analysis. Therefore, the networks trained on different error functions are compared with respect to accuracy of rain flow counts of stress cycles over a number of time series simulations. …”
Get full text
Article -
8514
Reliability Assessment of Steel-Concrete Composite Beams considering Metal Corrosion Effects
Published 2020-01-01“…This kind of structure has some advantages such as fast fabrication time and optimized weight. However, designers are often concerned about the initial reliability, while over time the structural reliability will be reduced, especially due to metal corrosion. …”
Get full text
Article -
8515
Chaotic Dynamics Analysis and FPGA Implementation Based on Gauss Legendre Integral
Published 2025-01-01“…We apply the Gauss–Legendre integral and the Runge–Kutta algorithm to the solution of dissipative chaotic systems for the first time and analyze and compare the differences between the two algorithms. …”
Get full text
Article -
8516
Why Current Doppler Ultrasound Methodology Is Inaccurate in Assessing Cerebral Venous Return: The Alternative of the Ultrasonic Jugular Venous Pulse
Published 2016-01-01“…In an attempt to improve accuracy, several authors alternatively measured the flow rate, based on the product of the time average velocity with the cross-sectional area (CSA). …”
Get full text
Article -
8517
France – Israel: consequences of the «October 7»
Published 2024-11-01“…It is emphasized that for the first time since the time of de Gaulle, they led to a short-term crisis at the interstate level between France and Israel. …”
Get full text
Article -
8518
A Novel Cost Based Model for Energy Consumption in Cloud Computing
Published 2015-01-01“…In this study, for cloud environments an energy consumption model is proposed for time-shared policy in virtualization layer. The cost and energy usage of time-shared policy were modeled in the CloudSim simulator based upon the results obtained from the real system and then proposed model was evaluated by different scenarios. …”
Get full text
Article -
8519
Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium
Published 2015-01-01“…The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. …”
Get full text
Article -
8520
Why aren’t we trusting one another? An autoethnography about third space leadership
Published 2025-01-01“…Key findings identify some of the critical leadership requirements needed in third spaces, including trust-building, understanding of roles, resource and time management, effective communication, and recognition of individual and collective contributions. …”
Get full text
Article