-
2341
Les difficultés de la filière brésilienne face à la nouvelle organisation mondiale du négoce des pierres de couleur
Published 2012-11-01“…Nevertheless, with an increasing number of people reaching good standards of living through the world, the gemstones trade will probably continue to grow in the near future, keeping the door open to new opportunities for countries like Brazil, which one can count on a growing middle class that may represent soon a new chance for its gem industry.…”
Get full text
Article -
2342
Violência de gênero em áreas rurais: o caso de Santana do Livramento (RS)
Published 2018-01-01“…Rural women who suffer violence can count on a support network in town, which is essential, although some improvement is still necessary in the structural scope and in the integration of the work.…”
Get full text
Article -
2343
Integration of a Quantum Voting Scheme into Grayscale Images Using the Novel Enhanced Quantum Representation and Qiskit Framework
Published 2022-01-01“…A server is also used, not only to count but also to guarantee the integrity of the votes (which is done inherently, by its design and quantum properties). …”
Get full text
Article -
2344
Data-driven modeling of background radiation structure utilizing matrix profile in nuclear security
Published 2025-01-01“…Additionally, MP modeling outperformed the traditional method of using raw measurement averages, particularly in generating distinct models for low-count backgrounds from different locations.…”
Get full text
Article -
2345
The Persistence of Buildings and the Context Problem
Published 2017-07-01“…I also try to explain why the change from thirteenth century Paris to contemporary Paris proved not to be lethal to Notre Dame’s persistence, in spite of its being more significant than other imaginary context changes that we would easily count as fatal.…”
Get full text
Article -
2346
(1→3)-β-D-glucan in patients with pulmonary aspergilloma
Published 1997-01-01“…Other parameters, such as galactomannan, immunodiffusion and a radio-allergosorbent test, as well as inflammatory m arkers such as C-reactive protein and the leukocyte count, did not show any consistent tendency in regard to the activity of the disease. …”
Get full text
Article -
2347
A Recurrent Headache
Published 2006-01-01“…The peripheral white blood cell count was 10.5x109/L, with 8.0x109/L neutrophils.…”
Get full text
Article -
2348
Comparative Dynamic Seismic Analyses of RC Minarets Strengthened with FRP and Buttresses
Published 2020-01-01“…These structures can be counted as the most common constructed slender structures in Turkey. …”
Get full text
Article -
2349
App-DDoS detection method using partial binary tree based SVM algorithm
Published 2018-03-01“…As it ignored the detection of ramp-up and pulsing type of application layer DDoS (App-DDoS) attacks in existing flow-based App-DDoS detection methods,an effective detection method for multi-type App-DDoS was proposed.Firstly,in order to fast count the number of HTTP GET for users and further support the calculation of feature parameters applied in detection method,the indexes of source IP address in multiple time windows were constructed by the approach of Hash function.Then the feature parameters by combining SVM classifiers with the structure of partial binary tree were trained hierarchically,and the App-DDoS detection method was proposed with the idea of traversing binary tree and feedback learning to distinguish non-burst normal flow,burst normal flow and multi-type App-DDoS flows.The experimental results show that compared with the conventional SVM-based and naïve-Bayes-based detection methods,the proposed method has more excellent detection performance and can distinguish specific App-DDoS types through subdividing attack types and training detection model layer by layer.…”
Get full text
Article -
2350
Effects of Ischemic Acute Kidney Injury on Lung Water Balance: Nephrogenic Pulmonary Edema?
Published 2011-01-01“…Pro-inflammatory gene upregulation, chemokine over-expression, altered biochemical channel function, and apoptotic dysregulation manifest in the lung are now understood as “extra-renal” and pulmonary effects of AKI. AKI should be counted as a disease process that alters the endothelial integrity of the alveolar capillary barrier and has the potential to overpower the ability of the lung to regulate fluid balance. …”
Get full text
Article -
2351
A Morphological Model for Extracting Road Networks from High-Resolution Satellite Images
Published 2013-01-01“…The positional accuracy of the extracted road features compared to the manual digitized ones, the counted number of detected road segments, and the percentage of completely closed and partially closed curves prove the efficiency and accuracy of the new model.…”
Get full text
Article -
2352
A combined method for the treatment of grade IV internal haemorrhoidal disease
Published 2022-01-01“…Digital palpation of the rectum returned stool of normal consistency, as well as ample fresh blood. Complete blood count report returned hemoglobin (Hb) values of 7.0 g/dl and hematocrit (Hct) of 24.3% in addition to marked neutrophilia (73.9%), indicating severe acute blood loss.…”
Get full text
Article -
2353
Goal-line oracles: Exploring accuracy of wisdom of the crowd for football predictions.
Published 2025-01-01“…Participants predicted team goal counts, which were then compared to actual expected goals (XG) and match results. …”
Get full text
Article -
2354
Die Waardes, Verwagtings en Bevredigings van Suid-Afrikaanse T elevisienuuskykers
Published 2022-11-01“…To cast addi tional light on the relative lower correlation between expectations and gratifications, the degree of dependence on television news as primary source was taken into ac count. …”
Get full text
Article -
2355
L’historiographie des actes de la pratique : l’écriture de la conquête normande dans les actes de Sicile et de Calabre du milieu du XIe siècle au début du XIIIe siècle
Published 2015-06-01“…The only cases of historiographical writing are actually those of revision, that is to say they are the result of documentary manipulation, such as forgery or interpolation found in Count Roger Ist’s diplomatic production. In general, not the rulers but the monasteries housing the charters in their archives were responsible for the re-writing. …”
Get full text
Article -
2356
Video Traffic Flow Analysis in Distributed System during Interactive Session
Published 2016-01-01“…The proposed session based optimum storage finding algorithm reduces the search hop count towards the remote storage-data server. The modeling and simulation result shows the better impact over the distributed system architecture. …”
Get full text
Article -
2357
Dissolved State and Identity in John Maxwell Coetzee’s Life and Times of Michael K within the scope of the Postcolonial Other
Published 2022-10-01“…It makes no difference if Michael K is conscious of his heroic resistance or not; what counts is that he says very little because he has nothing to say. …”
Get full text
Article -
2358
A survey on the microbiological quality of mixed feeds and feedstuffs l'sed in hatay province
Get full text
Article -
2359
Network threat situation assessment based on unsupervised multi-source data feature analysis
Published 2020-02-01“…Aiming at the limitations of supervised neural network in the network threat testing task relying on data category tagging,a network threat situation evaluation method based on unsupervised multi-source data feature analysis was proposed.Firstly,a variant auto encoder-generative adversarial network (V-G) for security threat assessment was designed.The training data set containing only normal network traffic was input to the network collection layer of V-G to perform the model training,and the reconstruction error of the network output of each layer was calculated.Then,the reconstruction error learning was performed by the three-layer variation automatic encoder of the output layer,and the training abnormal threshold was obtained.The packet threat was tested by using the test data set containing the abnormal network traffic,and the probability of occurrence of the threat of each group of tests was counted.Finally,the severity of the network security threat was determined according to the probability of threat occurrence,and the threat situation value was calculated according to the threat impact to obtain the network threat situation.The simulation results show that the proposed method has strong characterization ability for network threats,and can effectively and intuitively evaluate the overall situation of network threat.…”
Get full text
Article -
2360
Zero trust management of data flow between IoT edge nodes based on SDN
Published 2024-07-01“…In the forwarding path, the security verification of packets was performed by the switching node, and the verification information was counted to ensure the security of the data flow transmission and the consistency of the path. …”
Get full text
Article