-
621
L’expérience de Parcoursup des néo-bacheliers
Published 2024-09-01“…Informed and supported, theses high school students are invited to reify their aspirations through non-hierarchical wishes. Borrowing from the sociology of experience (Dubet, 1994), this contribution questions the way in which high school students experienced this Parcoursup procedure which engages their orientation process. …”
Get full text
Article -
622
Estrutura e funcionamento das paisagens da área de proteção ambiental do estuário do rio Curu/CE
Published 2019-12-01“…The operational model designed shows the connections of landscapes with distinct hierarchical levels that are unified with the action of the lateral relationships. …”
Get full text
Article -
623
Big data architecture analysis and data security fusion technology
Published 2020-07-01“…First of all,the general technical architecture of big data was deeply analyzed,and the relevant processes of data processing were further summarized,Through the analysis and comparison of the two modes of data middle platform and hierarchical construction,the relevant business scenarios,management architecture,construction difficulty,technical requirements,data processing,etc.were summarized,and their adaptation scope,advantages and disadvantages were summarized.The multi-level architecture mode was focused on according to the security fusion technology problems.Then the corresponding solutions were put forward.Finally,for the industry big data construction mode,useful reference was provided.…”
Get full text
Article -
624
Sensitivity to Pain Traumatization: A Higher-Order Factor Underlying Pain-Related Anxiety, Pain Catastrophizing and Anxiety Sensitivity among Patients Scheduled for Major Surgery
Published 2011-01-01“…The first is an emerging conceptualization regarding the nature of the hierarchical organization of major pain-related anxiety constructs. …”
Get full text
Article -
625
CAR:a P2P content addressable andauto-retrievable algorithm for MANET
Published 2011-01-01“…To be directed at the unique features of mobile ad-hoc network(MANET) environment,a kind of mobile P2P(MP2P) index structure.Geographic-information-based hierarchical hash index structure(GH2I),was presented based on DHT(Distributed Hash Table).On the basis of GH2I,a MP2P resource search and retrieval algorithm CAR(content ad-dressable and auto-retrievable) was further proposed,and a scalable efficient and mobility adaptive MP2P overlay net-work was finally constructed.…”
Get full text
Article -
626
Modeling and analysis for an enhanced three-tier dynamic location management in 3G
Published 2006-01-01“…Based on 3G cellular networks where the home location registers, gateway location registers and visitor loca- tion registers formed a three-tier hierarchical mobility database structure, an enhanced movement-based location management scheme was presented. …”
Get full text
Article -
627
Conflitos e contradições no município de Ferros: o mineroduto Manabi
Published 2018-04-01“…The focus of the present article is to analyze the hierarchical social relations in some communities in Ferros county, which turned to get more complex since Manabi announced they intentions to build its pipeline there.…”
Get full text
Article -
628
BREAKTHROUGH ECONOMY: FEATURES OF FORMATION AND DEVELOPMENT IN RUSSIA
Published 2019-11-01“…The information economy implies radical changes in all its spheres and affects the activities of many economic entities at different hierarchical levels of management. The directions of creation of development institutions, combining elements of self-regulation and state regulation and providing formation of breakthrough economy have been highlighted. …”
Get full text
Article -
629
Researcb on Name Lookup in Named Data Networking
Published 2014-09-01“…Named data networking(NDN)proposed as a new future architecture for the internet, aims to satisfy the requirement of information sharing among the users. NDN applies the hierarchical names to identify contents, route packets and retrieve information. …”
Get full text
Article -
630
Needlework and John Ruskin’s “acicular art of nations”
Published 2018-12-01“…Paying particular attention to textiles in the opening and closing of Fors Clavigera (1871-1885), and highlighting educational texts by two women cited there (Kate Stanley and Millicent Garrett Fawcett), this paper argues that Ruskin blurs the boundaries of Victorian Britain’s hierarchical classifications of gender, class, nation and art. …”
Get full text
Article -
631
Fuzzy evaluation in the selecting for excellence of telecommunication engineering design
Published 2016-11-01“…In view of the faults in traditional communication engineering design assessment,such as general indicators,the lack of quantitative analysis etc,the comprehensive evaluation system was constructed,which combined with the hierarchical analysis and fuzzy evaluation.In the basis of studying the existing model of communication engineering design evaluation and the demand for communication engineering project design of the social development,the evaluation index system was established firstly by designing questionnaire and analyzing the investigation results.According to the importance of the indicators,it determined the index weight by the analytic hierarchy process.Then fuzzy evaluation matrix was obtained by membership degree calculation,the two stage fuzzy comprehensive evaluation was completed in the excellence selecting of telecommunication engineering.…”
Get full text
Article -
632
Construction of a SDN Driven Novel Service System for Operatiors
Published 2014-07-01“…Concept and methodology of SDN technology were analyzed, an extension of SDN concept to cover the upper applications, as well as an hierarchical, modular, loosely coupled, virtualization and open service system architecture based on SDN methodology were proposed, aimed at providing some references for further optimization and value-adding of operator's service system.…”
Get full text
Article -
633
La solennisation des fêtes dans la vie liturgique et temporelle des moines du Mont Saint-Michel (XIIIe-XVe siècles)
Published 2021-05-01“…Through a codicological and textual study of liturgical books in use between the thirteenth and fifteenth centuries at Mont Saint-Michel, this article examines the hierarchical categorisation of the feasts in the liturgy and the evolution of the degrees of solemnity on Mont Saint-Michel at the end of the Middle Ages, and the significance of the solemnization of a feast for the temporal life of the monks.…”
Get full text
Article -
634
THE CHOICE OF EFFECTIVE TYPES OF VIRTUAL ORGANIZATIONS FOR THE AEROSPACE INDUSTRY
Published 2018-08-01“…The author’s version of the hierarchical classication scheme of virtual organizations is considered. …”
Get full text
Article -
635
Ontology model based on security parameters capturing process for network systems
Published 2017-02-01“…A general security data capturing process for network system was proposed, which combined hierarchical capturing framework and ontology model to whole network architecture. …”
Get full text
Article -
636
Améliorer la performance en SST : les résultats vs les prédicteurs
Published 2005-05-01“…This article instead proposes the measuring of predictive variables that fall within a hierarchical model of OHS concerns based on a learning- instead of a performance-based philosophy. …”
Get full text
Article -
637
La question du « peuplement » campaniforme en Suisse occidentale. État de la question et apports de la morphologie dentaire et crânienne
Published 2002-12-01“…Multidimensional scaling and hierarchical clustering analysis of these two datasets made it possible to establish three models concerning the appearance of the Bell Beaker Culture in these areas: the arrival of foreigners in this region in two successive waves, the development of the funerary ritual, and a combination of the two latter proposals.…”
Get full text
Article -
638
Secure network coding scheme for scalable video streaming
Published 2013-05-01“…With the purpose to achieve hierarchical security levels for scalable video streaming in heterogeneous net-works,random function was used to randomize parts of the video streaming in each layer.Network coding scheme was also used to resist known-plaintext attacks.Moreover,network encoder was studied.Ordered random linear network en-coder was designed for scalable video transmission.It could achieve scalability in security levels with few random opera-tions and reduce communication overhead.Analysis shows that the scheme could effectively increase the network throughput.…”
Get full text
Article -
639
Les nouvelles monnaies numériques : au-delà de la dématérialisation de la monnaie et de la contestation des banques
Published 2015-12-01“…In the early 2000s, there were no more academic controversies, but with new monetary instruments new questions and analyses come to the fore. The hierarchical banking system is facing this new phenomena and the payment system that we are used to is at stake. …”
Get full text
Article -
640
Comparison of Language Models for English-Latvian Semantic Search
Published 2025-01-01“…A dataset of 77736 pairs of articles from Latvian and English Wikipedia was created, transformed into embedding vectors, and used for retrieval experiments with brute force search, Hierarchical Navigable Small World method, and Inverted File Indexing method. …”
Get full text
Article