Suggested Topics within your search.
Suggested Topics within your search.
- Sociolinguistics 4
- Criminal law 3
- Philosophy 3
- Effective teaching 2
- Elementary school teaching 2
- English language 2
- History 2
- History and criticism 2
- Rhetoric 2
- Academic writing 1
- African American psychologists 1
- Anatomy 1
- Anthropometry 1
- Benefactors 1
- Black people 1
- Clinical cases 1
- Consumers 1
- Consumption (Economics) 1
- Criticism 1
- Diabetes 1
- Diabetes Mellitus, Type 2 1
- Dissertations, Academic 1
- Economics 1
- Electrocardiography 1
- English 1
- Ethnopsychology 1
- Etiology 1
- Ex-convicts 1
- Fathers and sons 1
- Genanalyse 1
-
2081
Obtaining shape memory alloy thin layer using PLD technique
Published 2014-01-01“…Copper-based shape memory alloy (SMA) was obtained through a classic melting method. The material was analyzed in heat treated and deformed states using scanning electrons microscopy (SEM), dilatometry (DIL), differential scanning calorimetry (DSC), dynamic mechanical analyzer (DMA) and energy dispersive X-ray analyze (EDAX) to establish the material microstructure, memory properties like martensitic transformation domain and rate or damping capacity. …”
Get full text
Article -
2082
-
2083
Open Water Jumping: Clearing Obstacles in the Negotiation of French Rights to The Black Stallion
Published 2023-06-01“…The story of the introduction of the series in France in the aftermath of World War II, and its inclusion in this now-classic library of children’s texts, is largely unknown. …”
Get full text
Article -
2084
Implementation of a big data anonymization system based on Spark
Published 2018-04-01“…Group based anonymization is a classical data anonymization framework,which achieves the effect of privacy protection by constructing groups of anonymized data records ensuring that records in the same group cannot be distinguished with each other.The electric power industry big data analysis involves the core data of the power enterprises and the user privacy data,the data sensitivity is stronger,traditional data anonymization systems are unable to meet the needs of big data business applications and safety protection of electric power industry.A new big data anonymization system based on Spark was designed and implemented,which could provide the support for multiple data formats stored on Hadoop and substantially improve the processing efficiency for big data.…”
Get full text
Article -
2085
Risque et vulnérabilité dans la recherche en santé urbaine
Published 2006-12-01“…Building on this research we suggest an innovative approach combining the risk perspective of classic epidemiology with the vulnerability perspective of the social sciences. …”
Get full text
Article -
2086
About some limitations in researching the human being. Theological perspective
Published 2019-08-01“… The concept of a person has gone through several stages of development in the history of thought. In the classical tradition, a person is considered to be a substance. …”
Get full text
Article -
2087
Terracotta Figurines and the Acrolithic Statues of Demeter and Kore from Morgantina
Published 2018-04-01“…Both the throne and the acrolithic sculptures may represent a built, rather than a glyptic, approach to sculpture making, which would anticipate the achievements of the Classical period in chryselephantine sculpture on a much larger scale.…”
Get full text
Article -
2088
The Making of The Tourist
Published 2018-09-01“…The author reflects on the historical context and intellectual and institutional foundations for his (1976) study The Tourist: A New Theory of the Leisure Class, especially its connections to classic social and critical theory, and its fit with post structuralism and deconstruction. …”
Get full text
Article -
2089
The Contours of Locke’s General Substance Dualism
Published 2022-03-01“…My way of establishing Locke as a general substance dualist is to be as minimally committal as possible at the outset, especially with respect to the classic debates on Locke’s positions in this domain, including those concerning substrata, real essences, and the like. …”
Get full text
Article -
2090
“Depth of field” or “negative forms”: space/syntax from HDR digital photography to hypermedia navigation
Published 2016-12-01“…It then looks at the broader chronological context of the interplay of distance and foreground, such as framing structures and brushwork texture in classical landscapes, the role of shadows in painting from Leonardo to Enlightenment theories on perception, the exploration of atmospheric effects and of lighting by Victorian artists and scientists ranging from stage sets to physicists’ experiments. …”
Get full text
Article -
2091
Soul-foods as pharmaka: female bodies and poisons in the Upper Rio Negro
Published 2024-09-01“…Setting out from the mythical genesis of tobacco, coca, paricá, and caapi (ayahuasca), we examine the relationship between these substances and diverse aspects of female bodies and their reproductive powers, suggesting that these psychoactives can be conceived as pharmaka in the classic sense of the term, acting both to increase a person’s vital force and/or to harm and kill. …”
Get full text
Article -
2092
La subsistance de l’homme : l’économie selon Karl Polanyi
Published 2012-12-01“…It discusses the theoretical foundations of neoclassical, or classical schools in some respects, and offers: firstly a battery concepts to explain the embedding or disembedding of the economy; secondly different models to explain institutional differences between old economies and economies where the market system plays a crucial role. …”
Get full text
Article -
2093
Simple criterion for predicting fatigue life under combined bending and torsion loading
Published 2017-06-01“…The comparison with similar classical stressbased approaches using data on diverse materials (several steels, aluminium alloy, and nickel base superalloy) reveals very good agreement with experimental data.…”
Get full text
Article -
2094
Research on clustering algorithm based 6G typical usage scenarios
Published 2022-01-01“…Compared with the three classic 5G usage scenarios, the content and types of 6G typical usage scenarios will be more abundant and diverse.How to refine 6G usage scenarios objectively and efficiently has become a major challenge.Based on this, the clustering algorithm was used to study the 6G usage scenarios.Firstly, the 6G service and performance indicators were considered.Then, the demand values of 6G service were collected and the indicators were scored.Finally, the sample data were analyzed by different clustering algorithms.According to the clustering results, eight typical usage scenarios of 6G were proposed, which could provide some reference for 6G research in the industry.…”
Get full text
Article -
2095
A dimensional analysis approach to fatigue in quasi-brittle materials
Published 2013-04-01“…In this study, a generalized Barenblatt and Botvina dimensional analysis approach to fatigue crack growth is proposed in order to highlight and explain the deviations from the classical power-law equations used to characterize the fatigue behaviour of quasi-brittle materials. …”
Get full text
Article -
2096
Research on the IP alias resolution technology
Published 2019-07-01“…IP alias resolution,the procedure of identifying IP addresses belonging to the same router,is a critical step in Internet topology inference.It can convert the Internet logical topology into physical topology,and bridge the gap between the virtual world and real world.First the concept of IP alias resolution was introduced and the classical IP alias relationships were analyzed.Then the IPv4 alias resolution algorithms and the IPv6 alias resolution algorithms were discussed in detail separately.Finally,through the comprehensive analysis and comparison of all the algorithms,the research directions in the future especially in IPv6 alias resolution were pointed out in three folds such as alias target set selection,fingerprint selection and inference methods.…”
Get full text
Article -
2097
Chaotic image encryption algorithm based on single image local scrambling and dynamic feedback diffusion
Published 2016-11-01“…A novel chaotic image encryption algorithm based on single image local scrambling and dynamic feedback diffusion was presented.Firstly,a single image local scrambling algorithm was proposed.Secondly,a novel dynamic feedback diffusion strategy was proposed to change the pixel values of the scrambled image in the phase of diffusion,by which improved the results of image encryption.Finally,the simulation results and performance analysis show that the number pixels change rate(NPCR)values and unified average changing intensity(UACI)values of the proposed algorithm can be close to 99.6% and 33.4%,showing that the proposed algorithm has better resistance to differential attacks and saves time compared with the other three classic algorithms.…”
Get full text
Article -
2098
Price Forecasting Through Multivariate Spectral Analysis: Evidence for Commodities of BM&Fbovespa
Published 2016-01-01“…ABSTRACT This study aimed to forecast the prices of a group of commodities through the multivariate spectral analysis model and compare them with those obtained by classical forecasting and neural network models. The choice of commodities such as ethanol, cattle, corn, coffee and soy was due to the emphasis in the exports in 2013. …”
Get full text
Article -
2099
Dov’è la libertà?
Published 2024-04-01“…After a preliminary analytical distinction between political contents and regulatory path, classical liberalism is then recognized as a first form of translation of the emancipatory aspirations inscribed in the spirit of modernity. …”
Get full text
Article -
2100
Mary as the Ark of the Covenant in the Scene of the Visitation (Luke 1:39-56) Reconsidered
Published 2018-03-01Get full text
Article