-
761
La communication entre collègues bouleversée par la pandémie et le développement du télétravail
Published 2024-01-01“…In this paper, we analyze to what extent the pandemic period has altered interpersonal communication between colleagues with equal hierarchical status. We wonder whether ICTs have been used to extend the “spaces of discussion” necessary to the emergence of social support, and to the transmission of the rules of the profession? …”
Get full text
Article -
762
Design and Driving Characteristics of Rehabilitation Robot Flexible Joints Based on Polyvinylidene Fluoride
Published 2024-05-01“…The preparation and the electric deformation mechanism of PVDF gel are introduced, the monomer-muscle with the function of contraction and extension is designed based on electric deformation mechanism, and then multiple monomer-muscles are combined up and down in series to form a hierarchical artificial muscle. Based on the three-level artificial muscle for the flexible joint of the rehabilitation robot, the driving mathematical model is identified, and simulation and experiment are implemented. …”
Get full text
Article -
763
Survey of attack graph based network security metric
Published 2018-09-01“…One of the main challenges of network security metrics is how to accurately identify the intrusion of the intruders exploiting the dependence between the vulnerabilities for threat propagation in the target network system as well as to quantify the potential impact on the network system.Because of its superior performance of visual display,the attack graph becomes one of the effective ways to solve the problem.Firstly,the concept,development and general metric models of security metrics were introduced.Secondly,the related researches with respect to attack graph construction,classification and application were discussed.Thirdly,a hierarchical framework for security metric using attack graph was proposed,and then existing methods of network security metric were summarized from three levels (key “point”,attack “line” and situation “plane”).Finally,the difficult issues and development trends for the current research were discussed.…”
Get full text
Article -
764
UiO-66 Metal-Organic Framework Membranes: Structural Engineering for Separation Applications
Published 2025-01-01“…The influence of preferred orientation, membrane thickness, pore size, pore surface chemistry, and hierarchical structures on the separation performance is concluded. …”
Get full text
Article -
765
L’ordre scolaire local des établissements : analyse de différentes formes de travail institutionnel avec les élèves et leurs familles
Published 2019-09-01“…This contribution is based on an ethnographic survey conducted in two secondary schools of Brussels. In a hierarchical and very unequal school system, where schools faced new social and cultural issues, the school educational program is necessarily built in a particular articulation with the local environment. …”
Get full text
Article -
766
A Two-Phase Gradient Projection Algorithm for Solving the Combined Modal Split and Traffic Assignment Problem with Nested Logit Function
Published 2021-01-01“…Specifically, a two-phase GP algorithm is developed to handle the hierarchical structure of the NL model in the CMSTA problem. …”
Get full text
Article -
767
Research on the subtractive clustering algorithm for mobile ad hoc network based on the Akaike information criterion
Published 2019-09-01“…Large and dense mobile ad hoc networks often meet scalability problems, the hierarchical structures are needed to achieve performance of network such as cluster control structure. …”
Get full text
Article -
768
Defensa de Fray Servando Teresa de Mier, actor de la Independencia mexicana
Published 2013-06-01“…What he sees in Paris and Rome lead him to ignore completely the Church’s hierarchical aspects. His Historia de la Revolución de Nueva España (London, 1813) was widely read. …”
Get full text
Article -
769
Application of public key infrastructure in telecom operators
Published 2020-11-01“…With the implementation of cryptography law,the application of cryptography in information system in China has been promoted to the legal level,which requires the application of public key infrastructure in the mutual trust of network entities to be strengthened.A scheme of constructing unified telecom public key infrastructure with strict hierarchical structure was proposed,that is,establishing a national telecom root CA as a trust anchor,and each major telecom operator becomes an independent sub-ca,forming a certificate trust chain of “national telecom root CA- telecom operator sub-ca” and providing PKI security services.This scheme can not only realize the mutual recognition between telecom operators,but also help unify the telecom public key infrastructure to become a globally trusted electronic authentication service provider,so as to have more influence and say in the formulation of international certification standards.…”
Get full text
Article -
770
Tilings of the hyperbolic plane of substitutive origin as subshifts of finite type on Baumslag–Solitar groups $\mathit{BS}(1,n)$
Published 2024-05-01“…As an application we construct a strongly aperiodic SFT on $\mathit{BS}(1,n)$ with a hierarchical structure, which is an analogue of Robinson’s construction on $\mathbb{Z}^2$ or Goodman–Strauss’s on $\mathbb{H}^2$.…”
Get full text
Article -
771
Social Network Structure as a Moderator of the Relationship between Psychological Capital and Job Satisfaction: Evidence from China
Published 2021-01-01“…Factor analysis and hierarchical regression analysis were adopted to analyze the data of the survey. …”
Get full text
Article -
772
Research on FAHP based Trojan attack effect evaluation
Published 2016-07-01“…The particular characters of Trojan are not fully taken into consideration by existed network attack effect evaluation systems which mainly focus on DDoS and Warm.A few Trojan harm measurement systems is somewhat short for objectivity and completeness as the result of that its indicator values is confined to manually marked and qualitative values.Under the circumstances,the analysis of Trojan's features were started from,and a hierarchical index system which accepted both quantitative and qualitative values,and both manually marked and system col-lected values was built.Then,a FAHP based evaluation model was proposed to evaluate the Trojan attack effect.Meanwhile,a many-to-one method to ensemble multiple weight vectors was proposed.Finally,the rationality of proposed evaluation system was verified by comparison with others.…”
Get full text
Article -
773
Do human rights really protect us? The evolution of the concept of human rights influenced by the work of the Inter-American Court of Human Rights
Published 2023-12-01“…It argues that human rights have attained a status akin to a "secular religion," shaping the legitimacy of states globally. Criticizing the hierarchical and unaccountable nature of bodies issuing internationally recognized treaties, the text examines specific characteristics of the Inter-American Human Rights Law, such as autonomous treaty interpretation and the control of conventionality doctrine. …”
Get full text
Article -
774
Interconnected Dynamic Components of Learner Language
Published 2023-01-01“…Intrinsic to the view of Complex Dynamic Systems Theory (CDST), a system is composed of hierarchical, interdependent subcomponents (learner, learner language, and environment) in dynamic relations as learners develop their interlanguage over time. …”
Get full text
Article -
775
Mixing knowledge to negotiate with and on a volcano
Published 2014-04-01“…The Javanese world is organized in the form of hierarchical concentric circles, with one of its limits being in the mountains. …”
Get full text
Article -
776
DEEP NEURAL NETWORK-BASED APPROACH FOR COMPUTING SINGULAR VALUES OF MATRICES
Published 2025-01-01“…By leveraging the hierarchical feature extraction capabilities of CNNs, this approach aims to enhance the accuracy, efficiency, and scalability of SVD calculations. …”
Get full text
Article -
777
Survey on decentralized security-enhanced technologies for RPKI
Published 2024-07-01“…The resource public key infrastructure (RPKI) deploys a centralized and hierarchical infrastructure for the authorization of IP addresses. …”
Get full text
Article -
778
Knowledge Sharing Motivation, Behavior, and Creativity of Knowledge Workers in Virtual Organizations
Published 2022-01-01“…Based on review and analysis of relevant literature, this paper has constructed a moderating effect model including mediating factors relying on the social cognitive theory and tested the model by hierarchical multiple regression. The results show that there is a significant positive correlation between knowledge sharing motivation and creativity of members in a virtual organization. …”
Get full text
Article -
779
Effects of Duct Cross Section Camber and Thickness on the Performance of Ducted Propulsion Systems for Aeronautical Applications
Published 2016-01-01“…Not disregarding the more advanced CFD based methods, the proposed procedure is characterised by a very low computational cost that makes it very appealing as analysis tool in the preliminary steps of a design procedure of hierarchical type. The work focuses on the analysis of the effects of the camber and thickness of the duct cross section onto the performance of the device. …”
Get full text
Article -
780
Kinematics Analysis and Experimental Validation for a Hybrid Machining Unit with Redundantly Actuated Parallel Mechanism
Published 2021-07-01“…Thirdly, the workspace of the hybrid machining unit is predicted based on the hierarchical search idea, the distribution of the 5-axis reachable workspace is given. …”
Get full text
Article