Showing 6,641 - 6,660 results of 34,905 for search '"The Various"', query time: 0.13s Refine Results
  1. 6641

    Reflections on the Importance of the Leonhardi Euleri Opera Omnia, Volume IV A (2016) and Volume VIII (2018) by Stanisław Domoradzki, Mykhailo Zarichnyi

    Published 2024-09-01
    “…We consider selected topics from this correspondence reflecting various branches of mathematics and demonstrate, where possible, the connection of the ideas and results presented there with modern mathematical research. …”
    Get full text
    Article
  2. 6642

    WSN malware infection model based on cellular automaton and static Bayesian game by Hong ZHANG, Shigen SHEN, Xiaojun WU, Qiying CAO

    Published 2019-06-01
    “…The theoretical model for the malware infection in wireless sensor networks (WSN) based on cellular automaton and static Bayesian game was studied.Firstly,the malware infection model of WSN based on cellular automaton was built.Secondly,the malware infection dynamics in WSN was predicted based on the static Bayesian game,through which malware and WSN systems would determine their optimal actions by Bayesian Nash equilibrium (BEN).Then the BEN was applied to the malware infection model to study the spatiotemporal dynamics characteristics of malware infection.Research results show that the proposed model can effectively predict the infection dynamics propagation process of malware in WSN,and the evolution trend of sensor nodes in various states with time,which are of significance for people to formulate measures to reduce the propagation speed of malware.…”
    Get full text
    Article
  3. 6643

    Satellite phased arrays for direct-to-handset satellite: key technologies and future vision by JIAO Lingxiao, LI Wenjing, TONG Jianfei, LI Jifeng

    Published 2024-04-01
    “…By analyzing the practical requirements of direct-to-handset satellite, the advantages and disadvantages of various beamforming architectures were outlined, then the proper selection strategy of beamforming architecture was proposed. …”
    Get full text
    Article
  4. 6644

    A Ground Beetle, Calleida decora (Fabricius) (Insecta: Coleoptera: Carabidae) by D. L. Harris, W. H. Whitcomb

    Published 2005-05-01
    “… Calleida decora (Fabricius) is a small arboreal ground beetle, predaceous both as larva and adult. Common on various cultivated crops, it is apparently the only carabid to complete its larval development on Florida soybean foliage (Neal 1974). …”
    Get full text
    Article
  5. 6645

    Combined Diagnosis of PD Based on the Multidimensional Parameters by Mohammad Heidari

    Published 2016-01-01
    “…In addition, integrate the diagnostic results, which are the probability of fault of various defects and matrix, of different PD diagnosis signals, and analysis with Sugeno fuzzy integral to get the final diagnosis.…”
    Get full text
    Article
  6. 6646

    The funerary and architectural history of an ancient Maya residential group: Group 5N6, Naachtun, Guatemala by Hemmamuthé Goudiaby, Philippe Nondédéo

    Published 2020-06-01
    “…The results question the way the inhabitants envisioned and planned their living space and allow us to illustrate the existence of various funerary pathways among the ancient Maya.…”
    Get full text
    Article
  7. 6647

    Expenditure Effects of Intergovernmental Transfers – the Case of Slovenia by Primož Pevcin

    Published 2011-12-01
    “…Empirical research for Slovenian municipalities provides the evidence that the magnitude of expenditure effects of various categories of intergovernmental transfers is substantially lower compared to international findings, and in some cases the effect is even smaller than the effect of per-capita income.…”
    Get full text
    Article
  8. 6648

    Modification of Nonlinear Conjugate Gradient Method with Weak Wolfe-Powell Line Search by Ahmad Alhawarat, Zabidin Salleh

    Published 2017-01-01
    “…In this paper, we modified CG method to achieve the global convergence with various line searches. In addition, it passes the sufficient descent condition without any line search. …”
    Get full text
    Article
  9. 6649

    Some Properties of Multiple Generalized q-Genocchi Polynomials with Weight and Weak Weight by J. Y. Kang

    Published 2012-01-01
    “…The present paper deals with the various q-Genocchi numbers and polynomials. We define a new type of multiple generalized q-Genocchi numbers and polynomials with weight α and weak weight β by applying the method of p-adic q-integral. …”
    Get full text
    Article
  10. 6650

    A Comparative Analysis of the Public and Private Water Supply and Sanitation Service Providers’ Work in Brazil by Fernando Antonio Perrone Pinheiro, José Roberto Ferreira Savoia, Claudio Felisoni de Angelo

    Published 2016-01-01
    “…The analysis was based on various economic-financial and operational indices related to water supply and sewage collection and treatment between 2000 and 2010. …”
    Get full text
    Article
  11. 6651

    Coopération des enseignants et nouvelles approches de l’organisation du travail dans les établissements scolaires by Laëtitia Progin Romanato, Monica Gather Thurler

    Published 2011-03-01
    “…We finally conclude by presenting the "professional learning community" within which the practices of cooperation depend on five "pillars" which are at the results of the attempts that various actors undertake to develop the quality of teaching and learning.…”
    Get full text
    Article
  12. 6652

    Data security protection schema of telecom operators under the environment of big data by Shengli ZHOU, Bin CHEN, Lifa WU

    Published 2017-05-01
    “…With the popularity of big data and cloud computing technology,data of telecom operators collected is increa-singly larger,and much more various.The data faces the risk of broken security management,hacker attacks,and imper-fection of risk assessment,etc.The current situation of data security in the environment was analyzed,and a more com-plete data security implementation plan was put forward.From the two aspects of data security technology and manage-ment,several strategies were proposed,including security classification,privacy protection,data desensitization encryption and security protection.The proposed schema has been implemented in China Telecom data security protection project.…”
    Get full text
    Article
  13. 6653

    ‘For he has his pictures, ancient and modern’: Likenesses in Bleak House by Laurent Bury

    Published 2012-01-01
    “…Browne generally neglected physical resemblance and tried to offer a feeling of overall likeness involving all the various elements in his pictures (objects, décor, light and shade), Peake’s illustrations, concentrating on close-up faces and resorting to strong lighting effects, use a totally different strategy to reach the same objective: depicting a reality beyond the appearances mentioned in the text.…”
    Get full text
    Article
  14. 6654

    Digital technlogies in supply chain management of the fashion industry by N. Yu. Barkova

    Published 2019-04-01
    “…It has been revealed, that digital technologies are actively applied at various stages of logistic process in the companies of this industry. …”
    Get full text
    Article
  15. 6655

    Regulation Theory and Transformation of Agriculture: a Literature Review by Jean-Marc Touzard and Pierre Labarthe

    Published 2016-12-01
    “…However, we argue that the new international context of agriculture and food is an opportunity to renew RT research on this sector and to understand its different economic regimes and their transitions in various national contexts.…”
    Get full text
    Article
  16. 6656

    Pratiques nautiques en Bretagne : rivalités plurielles, représentations et pratiques en concurrence by Marion Florez

    Published 2021-12-01
    “…Based on a collection of statements made by inhabitants, sports practitioners, and the managers of natural spaces, this article attempts to analyse the interrelationships between the various groups of users sharing these spaces. Such interrelationships usually involve competition and rivalry thus constantly modifying the relationship each group has with the landscape and nature, constantly changing the ways they mark the landscape and the uses they make of these spaces.…”
    Get full text
    Article
  17. 6657

    THEORY AND PRACTICE OF RUSSIAN PUBLIC DEBT MANAGEMENT by O. A. Revzon

    Published 2021-05-01
    “…The article considers the approaches to public debt management in Russia, describes the time requirements for the use of various tools. The paper evaluates the dynamics of changes in public debt and its transformation, which consists in the transition from external to internal borrowing. …”
    Get full text
    Article
  18. 6658

    Les avatars de la toponymie dans les confins géographiques, exemple du canal « Messier » en Patagonie chilienne by Frédéric Aitken, Jean-Numa Foulc, Pascal Mao, Nicolas Robinet

    Published 2018-04-01
    “…This article shows that the name has undergone various modifications during its appearances on different cartographic supports between the seventeenth and nineteenth century and would be originally from the Spanish term "Merced", which means "Grace". …”
    Get full text
    Article
  19. 6659

    User demanded policy routing for multi-homing campus network by Huan-jie ZHANG, Yu-liang XIA

    Published 2013-09-01
    “…Edge router must use policy routing for multi-homing campus network.The flexibility of source address based policy routing defined by network administrator is not sufficient to meet the changing needs of diverse users.One scheme using Linux system was proposed to do user demanded policy routing,which was more flexible and convince than the traditional administrator defined source address based policy routing.Through 10 years of actual use in campus network,It proves that this method can meet the various needs of users,operating stabely and reliablely.…”
    Get full text
    Article
  20. 6660

    CONSTRAINTS OF PROJECT MANAGEMENT IN THE NIGERIAN CONSTRUCTION INDUSTRY by LATEEF AKINTOLA, OLUFIKAYO ADERINLEWO, SUNMBO AKANDE

    Published 2024-03-01
    “… This study addresses the various challenges causing the ineffective practice of project management in Nigeria and proffered possible and workable solutions to them. …”
    Get full text
    Article