Suggested Topics within your search.
Suggested Topics within your search.
- History 11
- Management 6
- Purchasing 5
- Social conditions 5
- Philosophy 4
- Politics and government 4
- Business logistics 3
- Civilization 3
- History and criticism 3
- Information technology 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Marketing 3
- Methodology 3
- Nutrition 3
- Social life and customs 3
- Sociolinguistics 3
- Tourism 3
- Colonial influence 2
- Common law 2
- Diet Therapy 2
- Diet therapy 2
- Economic conditions 2
- Health 2
- Industrial procurement 2
- Internet in public administration 2
- Interpretation and construction 2
- Juvenile literature 2
-
11441
FDA-MIMO Beampattern Synthesis with an Analytical Method
Published 2021-01-01“…However, on the basis of fully understanding the time parameters, the relationship between the array element frequency offset and the beampattern performance still needs to be clarified. …”
Get full text
Article -
11442
Documentary film politics and the politics of documentary film
Published 2022-10-01“… This paper sets out to consider the production of political documentary films in post-apartheid South Africa at a time when massification of the media and state capture of the South African Broadcasting Corporation, the country’s public broadcaster, silenced oppositional voices. …”
Get full text
Article -
11443
A Critique on the Book Pre-Islamic Sculpture and Iconography in Iran
Published 2021-10-01“…Each of these works had its own consumption and special application according to human needs at the same time and the changes in attitude, religion, beliefs, and daily life of the time made the figurines with different coverings, arrangements, decorations, exaggerations, and accents. …”
Get full text
Article -
11444
Dynamics between FinTech and financial market: Supply-driven or Demand-guided?
Published 2024-10-01“…This paper examined the dynamic relationship between FinTech development and financial development using the time-varying parameter structural vector autoregression (TVP-SV-VAR) model to analyze their impulse response relationship. …”
Get full text
Article -
11445
Hip Fracture. A Nine-Year Study.
Published 2007-08-01“…Variable such as age, sex, and topographical diagnosis, and surgical modality, scale of disability, comorbidity, complications, lethality, and second time of admission were taken into account and collected in the analyzed period of time and in specific clinical records elaborated for this purpose. …”
Get full text
Article -
11446
Structural integrity analysis of the pre-stressed concrete dome of the Belgrade fair hall 1
Published 2024-01-01“…In this paper the Finite Element Method (FEM) was performed to analyze different loading and supporting conditions. At the same time, crack growth in a support column was simulated by the extended FEM (XFEM). …”
Get full text
Article -
11447
Instantaneous Impact Point Guidance with Coast Arcs for Solid Rockets
Published 2021-01-01“…In terms of the “Hohmann transfer” principle, a pointing algorithm is deduced in depth to establish the theoretical relations among the ignition time, the required velocity vector, and the orbital element constraints and provides the analytical expression of the ignition time. …”
Get full text
Article -
11448
‘Avoidance Preening’, Displacement Behavior and Co-Dependency in Professional Team Sport: When Wants Become More Important Than Needs
Published 2022-08-01“…In the professional era, over utilization of resources, in pursuit of physical optimization, can detract from time spent on priorities. Athletes’ non-strategic, time-demanding focus on physical preparation/treatments resembles avian ‘avoidance preening’, whereby stressful situations trigger birds to excessively preen in place of more productive activities. …”
Get full text
Article -
11449
Quality of Service Comparison of DSDV and DSR Routing Protocols for V2V Communication in VANET
Published 2024-12-01“…These findings underscore the importance of matching routing protocols to the specific requirements of V2V applications, such as real-time data exchange or traffic safety, to ensure informed decision-making. …”
Get full text
Article -
11450
The Influence of the Chemistry of an Organosilica Surface on the Adsorption of Proteins from Water—Salt Solutions
Published 1999-03-01“…It has been shown that the principal surface chemical features of the organosilica which influence the adsorption of protein molecules on its surface are the ratio of alternating hydrophilic and hydrophobic groups present, the ampholitic character of the silanol groups, the pH value of the point of zero charge (pzc), the pH of the medium, the concentration of the modifying reagent (Cu π ion) employed, the contact time and the solid/liquid phase ratio of the system. …”
Get full text
Article -
11451
Determining the Factors of Social Phobia Levels of University Students: A Logistic Regression Analysis
Published 2016-01-01“…In respect to Odds rates, the most crucial factor about PEF of students is the time spent daily on the internet. Students who spend their time on the internet have PEF 2.4 times more than those who do not. …”
Get full text
Article -
11452
Multipath inter-domain routing for named data networking
Published 2015-10-01“…To facilitate content retrieval among NDN domains,a multipath inter-domain routing for named data networking(MIRNDN)was proposed.Under MIRNDN,an AS(autonomous system)maintained merely the routing state of content reachable from its own network or from its customers’ networks and aggregated routing information to mitigate routing scalability issue; “valley free”routing policy was applied to guide Interest packets that solicit content unreachable from the AS’s own network nor from its customers’ networks to explore matching data packets via multiple paths,and NDN’s requests aggregation,in-network caching and adaptive forwarding optimized such exploration; the reachability information of content from multiple paths was collected to support Interest multipath forwarding.The properties of FIB size and the convergence time and communication cost of routing update under MIRNDN were analyzed in theory.The experimental results in the AS level topology of current Internet validates that MIRNDN mitigates the scalability issue of NDN inter-domain routing,has relative short convergence time and moderate communication cost for routing update,and effectively reduces unnecessary Interest forwarding.…”
Get full text
Article -
11453
Machine learning mathematical models for incidence estimation during pandemics.
Published 2024-12-01“…Here, we propose a machine learning approach to estimate the incidence of a pandemic in real-time, using reported cases and the overall test rate. …”
Get full text
Article -
11454
Detection for Dangerous Goods Vehicles in Expressway Service Station Based on Surveillance Videos
Published 2021-01-01“…Finally, we mark the detection result in the aerial view surveillance model and then use that model to monitor the service station in real time. Experiments show that our aerial view surveillance model can achieve the real-time detection of dangerous goods vehicles in the main areas of the service station, thereby effectively reducing the workload of the monitoring personnel.…”
Get full text
Article -
11455
Detection method of LDoS attack based on ACK serial number step-length
Published 2018-07-01“…Low-rate denial of service (LDoS) attack is a potential security threat to big data centers and cloud computing platforms because of its strong concealment.Based on the analysis of network traffic during the LDoS attack,statistical analysis was given of ACK packets returned by the data receiver to the sender,and result reveals the sequence number step had the characteristics of volatility during the LDoS attack.The permutation entropy method was adopted to extract the characteristics of volatility.Hence,an LDoS attack detection method based on ACK serial number step permutation entropy was proposed.The serial number was sampled and the step length was calculated through collecting the ACK packets that received at the end of sender.Then,the permutation entropy algorithm with strong time-sensitive was used to detect the mutation step time,and achieve the goal of detecting LDoS attack.A test-bed was designed and built in the actual network environment for the purpose of verifying the proposed approach performance.Experimental results show that the proposed approach has better detection performance and has achieved better detection effect.…”
Get full text
Article -
11456
BOLD Noise Assumptions in fMRI
Published 2006-01-01“…Subtracting a resting-state time series from the first results in symmetric and nearly Gaussian noise. …”
Get full text
Article -
11457
DS+: Reliable Distributed Snapshot Algorithm for Wireless Sensor Networks
Published 2013-01-01“…We analyzed the performance of the algorithm in terms of snapshot success ratio and response time in simulation and experimental small test bed environment. …”
Get full text
Article -
11458
Accurate Finite Element Modeling Method of Herringbone Gear based on Multipoint Constraint Method
Published 2022-01-01“…While ensuring the accuracy of finite element analysis results,it is one of the hot research issues to reduce the solution time and the requirements on computer performance. …”
Get full text
Article -
11459
Judith Rebecca von Wrbna and Maria Sophia von Dietrichstein: Two Imperial Ambassadresses from the Kingdom of Bohemia at the Court of Madrid (1653–1674)
Published 2017-02-01“… This article focuses on the diplomatic activity of two ambassadors’s wives from the Kingdom of Bohemia at the court of Madrid between (1653–1674). In that time, the spouse of a diplomat was called “ambassadress”. …”
Get full text
Article -
11460
Risk Intelligence: Making Profit from Uncertainty in Data Processing System
Published 2014-01-01“…Proactive fault tolerance scheme (such as the speculative execution in MapReduce framework) is introduced to dramatically improve the response time of job executions when the failure becomes a norm rather than an exception. …”
Get full text
Article