Suggested Topics within your search.
Suggested Topics within your search.
- Biochemistry 3
- Word processing 3
- Building, Iron and steel 2
- Cytodiagnosis 2
- Domestic relations 2
- Domestic relations courts 2
- Human anatomy 2
- Management 2
- Mathematics 2
- Steel, Structural 2
- 44.83 rheumatology, orthopedics 1
- Accounting 1
- Act of the general application 1
- Agriculture 1
- BASIC (Computer program language) 1
- Blood 1
- Business 1
- Business- finance 1
- Calculus 1
- Chemical reactions 1
- Chemistry 1
- Chemistry, Organic 1
- Child psychology 1
- Civil engineering 1
- Civilization 1
- Coloring books 1
- Communication 1
- Communication policy 1
- Computer networks 1
- Computer programs 1
-
6641
Reflections on the Importance of the Leonhardi Euleri Opera Omnia, Volume IV A (2016) and Volume VIII (2018)
Published 2024-09-01“…We consider selected topics from this correspondence reflecting various branches of mathematics and demonstrate, where possible, the connection of the ideas and results presented there with modern mathematical research. …”
Get full text
Article -
6642
WSN malware infection model based on cellular automaton and static Bayesian game
Published 2019-06-01“…The theoretical model for the malware infection in wireless sensor networks (WSN) based on cellular automaton and static Bayesian game was studied.Firstly,the malware infection model of WSN based on cellular automaton was built.Secondly,the malware infection dynamics in WSN was predicted based on the static Bayesian game,through which malware and WSN systems would determine their optimal actions by Bayesian Nash equilibrium (BEN).Then the BEN was applied to the malware infection model to study the spatiotemporal dynamics characteristics of malware infection.Research results show that the proposed model can effectively predict the infection dynamics propagation process of malware in WSN,and the evolution trend of sensor nodes in various states with time,which are of significance for people to formulate measures to reduce the propagation speed of malware.…”
Get full text
Article -
6643
Satellite phased arrays for direct-to-handset satellite: key technologies and future vision
Published 2024-04-01“…By analyzing the practical requirements of direct-to-handset satellite, the advantages and disadvantages of various beamforming architectures were outlined, then the proper selection strategy of beamforming architecture was proposed. …”
Get full text
Article -
6644
A Ground Beetle, Calleida decora (Fabricius) (Insecta: Coleoptera: Carabidae)
Published 2005-05-01“… Calleida decora (Fabricius) is a small arboreal ground beetle, predaceous both as larva and adult. Common on various cultivated crops, it is apparently the only carabid to complete its larval development on Florida soybean foliage (Neal 1974). …”
Get full text
Article -
6645
Combined Diagnosis of PD Based on the Multidimensional Parameters
Published 2016-01-01“…In addition, integrate the diagnostic results, which are the probability of fault of various defects and matrix, of different PD diagnosis signals, and analysis with Sugeno fuzzy integral to get the final diagnosis.…”
Get full text
Article -
6646
The funerary and architectural history of an ancient Maya residential group: Group 5N6, Naachtun, Guatemala
Published 2020-06-01“…The results question the way the inhabitants envisioned and planned their living space and allow us to illustrate the existence of various funerary pathways among the ancient Maya.…”
Get full text
Article -
6647
Expenditure Effects of Intergovernmental Transfers – the Case of Slovenia
Published 2011-12-01“…Empirical research for Slovenian municipalities provides the evidence that the magnitude of expenditure effects of various categories of intergovernmental transfers is substantially lower compared to international findings, and in some cases the effect is even smaller than the effect of per-capita income.…”
Get full text
Article -
6648
Modification of Nonlinear Conjugate Gradient Method with Weak Wolfe-Powell Line Search
Published 2017-01-01“…In this paper, we modified CG method to achieve the global convergence with various line searches. In addition, it passes the sufficient descent condition without any line search. …”
Get full text
Article -
6649
Some Properties of Multiple Generalized q-Genocchi Polynomials with Weight and Weak Weight
Published 2012-01-01“…The present paper deals with the various q-Genocchi numbers and polynomials. We define a new type of multiple generalized q-Genocchi numbers and polynomials with weight α and weak weight β by applying the method of p-adic q-integral. …”
Get full text
Article -
6650
A Comparative Analysis of the Public and Private Water Supply and Sanitation Service Providers’ Work in Brazil
Published 2016-01-01“…The analysis was based on various economic-financial and operational indices related to water supply and sewage collection and treatment between 2000 and 2010. …”
Get full text
Article -
6651
Coopération des enseignants et nouvelles approches de l’organisation du travail dans les établissements scolaires
Published 2011-03-01“…We finally conclude by presenting the "professional learning community" within which the practices of cooperation depend on five "pillars" which are at the results of the attempts that various actors undertake to develop the quality of teaching and learning.…”
Get full text
Article -
6652
Data security protection schema of telecom operators under the environment of big data
Published 2017-05-01“…With the popularity of big data and cloud computing technology,data of telecom operators collected is increa-singly larger,and much more various.The data faces the risk of broken security management,hacker attacks,and imper-fection of risk assessment,etc.The current situation of data security in the environment was analyzed,and a more com-plete data security implementation plan was put forward.From the two aspects of data security technology and manage-ment,several strategies were proposed,including security classification,privacy protection,data desensitization encryption and security protection.The proposed schema has been implemented in China Telecom data security protection project.…”
Get full text
Article -
6653
‘For he has his pictures, ancient and modern’: Likenesses in Bleak House
Published 2012-01-01“…Browne generally neglected physical resemblance and tried to offer a feeling of overall likeness involving all the various elements in his pictures (objects, décor, light and shade), Peake’s illustrations, concentrating on close-up faces and resorting to strong lighting effects, use a totally different strategy to reach the same objective: depicting a reality beyond the appearances mentioned in the text.…”
Get full text
Article -
6654
Digital technlogies in supply chain management of the fashion industry
Published 2019-04-01“…It has been revealed, that digital technologies are actively applied at various stages of logistic process in the companies of this industry. …”
Get full text
Article -
6655
Regulation Theory and Transformation of Agriculture: a Literature Review
Published 2016-12-01“…However, we argue that the new international context of agriculture and food is an opportunity to renew RT research on this sector and to understand its different economic regimes and their transitions in various national contexts.…”
Get full text
Article -
6656
Pratiques nautiques en Bretagne : rivalités plurielles, représentations et pratiques en concurrence
Published 2021-12-01“…Based on a collection of statements made by inhabitants, sports practitioners, and the managers of natural spaces, this article attempts to analyse the interrelationships between the various groups of users sharing these spaces. Such interrelationships usually involve competition and rivalry thus constantly modifying the relationship each group has with the landscape and nature, constantly changing the ways they mark the landscape and the uses they make of these spaces.…”
Get full text
Article -
6657
THEORY AND PRACTICE OF RUSSIAN PUBLIC DEBT MANAGEMENT
Published 2021-05-01“…The article considers the approaches to public debt management in Russia, describes the time requirements for the use of various tools. The paper evaluates the dynamics of changes in public debt and its transformation, which consists in the transition from external to internal borrowing. …”
Get full text
Article -
6658
Les avatars de la toponymie dans les confins géographiques, exemple du canal « Messier » en Patagonie chilienne
Published 2018-04-01“…This article shows that the name has undergone various modifications during its appearances on different cartographic supports between the seventeenth and nineteenth century and would be originally from the Spanish term "Merced", which means "Grace". …”
Get full text
Article -
6659
User demanded policy routing for multi-homing campus network
Published 2013-09-01“…Edge router must use policy routing for multi-homing campus network.The flexibility of source address based policy routing defined by network administrator is not sufficient to meet the changing needs of diverse users.One scheme using Linux system was proposed to do user demanded policy routing,which was more flexible and convince than the traditional administrator defined source address based policy routing.Through 10 years of actual use in campus network,It proves that this method can meet the various needs of users,operating stabely and reliablely.…”
Get full text
Article -
6660
CONSTRAINTS OF PROJECT MANAGEMENT IN THE NIGERIAN CONSTRUCTION INDUSTRY
Published 2024-03-01“… This study addresses the various challenges causing the ineffective practice of project management in Nigeria and proffered possible and workable solutions to them. …”
Get full text
Article