Suggested Topics within your search.
Suggested Topics within your search.
- History 11
- Management 6
- Purchasing 5
- Social conditions 5
- Philosophy 4
- Politics and government 4
- Business logistics 3
- Civilization 3
- History and criticism 3
- Information technology 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Marketing 3
- Methodology 3
- Nutrition 3
- Social life and customs 3
- Sociolinguistics 3
- Tourism 3
- Colonial influence 2
- Common law 2
- Diet Therapy 2
- Diet therapy 2
- Economic conditions 2
- Health 2
- Industrial procurement 2
- Internet in public administration 2
- Interpretation and construction 2
- Juvenile literature 2
-
1001
Amplitude Death in Extended Time-Delay Coupled Oscillator Networks
Published 2025-01-01Subjects: Get full text
Article -
1002
Continuous in time bubble decomposition for the harmonic map heat flow
Published 2025-01-01“…It is known that solutions to the initial value problem exhibit bubbling along a well-chosen sequence of times. We prove that every sequence of times admits a subsequence along which bubbling occurs. …”
Get full text
Article -
1003
Multiple redundant flow fingerprint model based on time slots
Published 2023-02-01“…With the increasingly widespread use of the Internet, various network security problems are frequently exposed, while the “patching” style security enhancement mechanisms cannot effectively prevent the growing security risks.The researchers in the field of network security believe that the future Internet architecture should take security as a basic attribute to provide the native security support which is also called as endogenous safety and security.In order to support the data trustworthiness of endogenous security, a time-slot based multiple redundant flow fingerprint model was designed and implemented based on the research of the watermark (or fingerprint) mechanism.The proposed model used only three time slot intervals and operated the packets within the specified time slots, so that the fingerprint can be embedded without conflicting with the adjacent bit operations.Redundant coding was introduced to improve the fingerprint robustness, and the behaviors such as jitter or malicious disruptions by attackers in the network were considered.Furthermore, the impacts of delayed interference, spam packet interference and packet loss interference were analyzed.The analytical results show that the robustness of the fingerprint model improves with increasing redundant bits when the packet distribution in the network stream is given.Besides, in order to reduce the consumption of time and space and improve the efficiency and accuracy of packet operations, a flow fingerprinting prototype system was designed and implemented based on the kernel, and its efficiency and robustness were evaluated.The experimental result show that the model has high robustness.Additionally, the application scenario of the model was elaborated, which can effectively detect man-in-the-middle attacks and prevent network identity spoofing with the help of the flow fingerprinting model.…”
Get full text
Article -
1004
Ocean Acidification: pH Variability Across Space and Time
Published 2020-09-01Get full text
Article -
1005
Timing for Pacing after Acquired Conduction Disease in the Setting of Endocarditis
Published 2015-01-01“…However, because of the relative nature of the disease process and the acuity at which intervention needs to be done, a true assessment of the duration of antibiotic therapy prior to surgical intervention, timing of pacemaker placement, and the type of pacemaker is controversial.…”
Get full text
Article -
1006
Thematic Review of Endocrine Disruptors and Their Role in Shaping Pubertal Timing
Published 2025-01-01“…This review examines the inconsistent effects of endocrine-disrupting chemicals (EDCs) and pollutants on pubertal timing, emphasizing the methodological challenges contributing to variability in findings. …”
Get full text
Article -
1007
Distributed scheduling for real-time convergecast in wireless sensor networks
Published 2007-01-01“…In some applications of wireless sensor networks,data packets generated by every node have to reach the sink node in short time.It resulted in a many-to-one communication paradigm referred to as convergecast.For the real-time of convergecast,a distributed scheduling algorithm was proposed.According to the algorithm,every node was scheduled by itself with information of one-hop range neighbor nodes.Some simulation and analysis prove that the algorithm can avoid data collisions,and the total number of timeslots needed to complete the convergecast once was around 1.6N to 1.8N,where N represents the number of nodes in the network.…”
Get full text
Article -
1008
Survey of deterministic service assurance technology in time sensitive networking
Published 2024-08-01Subjects: Get full text
Article -
1009
Fragmentary time and personal crisis in Ivana Mladenovic’s Ivana the Terrible.
Published 2025-01-01Get full text
Article -
1010
Doctor and patient’s relationship at the present time and value of the clinical method
Published 2010-12-01Get full text
Article -
1011
Production-Distribution of Perishable Food considering Customer Time Window
Published 2021-01-01“…An improved ant colony algorithm-mixed ant colony algorithm based on the change of customer time window for perishable food production-distribution problem was designed to solve the problem. …”
Get full text
Article -
1012
Klein–Gordon Oscillator in a Topologically Nontrivial Space-Time
Published 2019-01-01“…In this study, we analyze solutions of the wave equation for scalar particles in a space-time with nontrivial topology. Solutions for the Klein–Gordon oscillator are found considering two configurations of this space-time. …”
Get full text
Article -
1013
Real-Time Hardware-in-the-Loop Tests of Star Tracker Algorithms
Published 2013-01-01“…Also, a test campaign is presented, in which a star sensor prototype with real-time, fully autonomous capability is exploited. Results that assess star field scene simulation performance and show the achievable validation for the sensor algorithms and performance in different operating modes (autonomous attitude acquisition, attitude tracking, and angular rate-only) and different aspects (coverage, reliability, and measurement performance) are discussed.…”
Get full text
Article -
1014
Comparison of Frequency Domain and Time-Domain Methods for Aeromechanical Analysis
Published 2016-01-01“…They also show the great advantage of significant CPU time saving by the frequency methods over the nonlinear time method. …”
Get full text
Article -
1015
Is city of residence a factor differentiating sitting time in adolescents?
Published 2018-08-01“…Adolescents with very good perception of general fitness had -65.29 minutes of sitting time on weekday and -70.1 minutes of sitting time on weekend. …”
Get full text
Article -
1016
An intrinsic temporal dimension of DNA: the new concept of time-island
Published 2023-05-01“…In particular, the conditions were sought so that a perturbation, in addition to moving in a coherent and complete manner, remained enclosed within a DNA fragment for a life time similar to those of biological interest of hundreds of picoseconds or in the time scale of nanoseconds. …”
Get full text
Article -
1017
Numerical Treatment of the Modified Time Fractional Fokker-Planck Equation
Published 2014-01-01“…A numerical method for the modified time fractional Fokker-Planck equation is proposed. …”
Get full text
Article -
1018
Bifurcation Analysis of a Discrete-Time Two-Species Model
Published 2020-01-01“…We study the local dynamics and bifurcation analysis of a discrete-time modified Nicholson–Bailey model in the closed first quadrant R+2. …”
Get full text
Article -
1019
Ocean Acidification: pH Variability Across Space and Time
Published 2020-09-01Get full text
Article -
1020
A review of research on optical true time delay technology
Published 2025-01-01Subjects: Get full text
Article