Suggested Topics within your search.
Suggested Topics within your search.
- Citizen participation 1
- Collectors and collecting 1
- Cultural property 1
- Electronics 1
- Film adaptations 1
- Historic preservation 1
- Historiography 1
- History 1
- History and criticism 1
- Human-computer interaction 1
- Intangible property 1
- Mass media 1
- Mass media and technology 1
- Mnemonics 1
- Motion pictures and literature 1
- Museums and community 1
- Nursing 1
- Pharmacology 1
- Philosophy 1
- Protection 1
- Slavery--Religious aspects 1
- Social aspects 1
- Sound recording industry 1
- Sound recordings 1
- Study and teaching 1
- Technological innovations 1
-
2641
Single password authentication method for remote user based on mobile terminal assistance
Published 2019-02-01“…To address the issue that users frequently reuse their weak passwords in password-based authentication system,single password authentication based on secret sharing between server and mobile terminal (SPASS) was proposed,which allows a remote user to use a single password to authenticate to multiple services securely and has no need to store any secret of the user in the client PC.Even when the mobile device is lost or stolen,no damage to the user’s information will be induced.Security analysis and performance test show that SPASS greatly improves the security of the user’s secret information and resists dictionary attacks,honeypot attacks,cross-site scripting attacks etc.Furthermore,the proposed scheme can lighten burden of the user’s memory,reduce the storage pressure and easy to be deployed.…”
Get full text
Article -
2642
T-Cell Traffic Jam in Hodgkin's Lymphoma: Pathogenetic and Therapeutic Implications
Published 2011-01-01“…This is particularly true in Hodgkin's lymphoma (HL), in which T lymphocytes surrounding Hodgkin's Reed-Sternberg cells are essentially polarized towards a memory T-helper type 2 phenotype. In this paper we will first evaluate the main processes modulating T-cell recruitment towards the lymph node microenvironment in HL, especially focusing on the role played by cytokines. …”
Get full text
Article -
2643
Hippocampal Neurogenesis, Depressive Disorders, and Antidepressant Therapy
Published 2007-01-01“…Neurogenesis is involved in processes such as learning and memory and accumulating evidence implicates hippocampal neurogenesis in the physiopathology of depression. …”
Get full text
Article -
2644
Cardinality-constrained structured data-fitting problems
Published 2024-05-01“…A memory-efficient solution framework is proposed for the cardinality-constrained structured data-fitting problem. …”
Get full text
Article -
2645
Automated intrusion response system model based on danger theory
Published 2012-01-01“…A novel automated response system model based on the danger theory (AIRSDT) was given.With the descriptions of self,non-self,immunocyte,memory detector,mature detector and immature detector of the network transactions,network danger evaluation equations for host and network were built up.Then,the automated response actions were taken or adjusted according to the danger of each network attack,including holistic risk degrees of the host and network.Both the theory analysis and experimental results prove that AIRSDT not only helps to solve the problem that the current automated response models could not detect the ‘true’ intrusion or attack action,but also greatly reduces the response times and response cost.…”
Get full text
Article -
2646
Electronic and Optical Properties of Sodium Niobate: A Density Functional Theory Study
Published 2018-01-01“…In recent years, much effort has been devoted to replace the most commonly used piezoelectric ceramic lead zirconate titanate Pb[ZrxTi1−x]O3 (PZT) with a suitable lead-free alternative for memory or piezoelectric applications. One possible alternative to PZT is sodium niobate as it exhibits electrical and mechanical properties that make it an interesting material for technological applications. …”
Get full text
Article -
2647
A New Framework of Multiphase Segmentation and Its Application to Partial Volume Segmentation
Published 2011-01-01“…In this way, it saves memory space and also avoids the general simplex constraint problem for soft segmentations. …”
Get full text
Article -
2648
« Never Meet Your Heroes ». Généalogie cinématographique et matrice science-fictionnelle dans The Boys
Published 2022-06-01“…Similarly, the authors will show how the use of the science- fictional imaginary, notably through the use of the film-matrix Scanners (David Cronenberg, 1981), composes a clear genealogical source while, at the same time, The Boys renews its relationship to cinephilic memory and to media and political criticism in a formal synthesis of New Hollywood.…”
Get full text
Article -
2649
Les « règlements intérieurs » de village en Kabylie : entre maintien d’un droit coutumier et dynamiques nouvelles des communautés villageoises
Published 2017-06-01“…But they also include many explanations showing the work of reflexivity led by stakeholders who rely on old principles such as the importance of the village personality, but also integrate modern references to politics, identity and memory.…”
Get full text
Article -
2650
FORMATION OF METHODICAL BASE IN THE COST-NAVIGATION SYSTEM
Published 2017-01-01“…For descriptive reasons authors offer use of the hybrid analytical cards comprising various technologies and providing a possibility of symbiosis of traditional systems of the business analysis and the new approaches providing a possibility of high-performance work with continuously growing volumes of data, keeping them in random access memory.…”
Get full text
Article -
2651
Les Archives de la planète, entre ressource documentaire et matière à récits
Published 2022-03-01“…This article shows to what extent the heterogeneous character of the initial aims are found in current uses of the archives, between a simple documentary reservoir on the world at that time, a scientific contextualisation project, and appropriations by memory and art.…”
Get full text
Article -
2652
“Nothing could stop it, nothing”: The Burden of Postsouthern History in Barry Hannah’s “Uncle High Lonesome”
Published 2018-07-01“…This paper argues for Hannah’s unique currency in ongoing critical debates, both in the new southern studies and in southern literary studies more broadly, about the future of “South” and the concept of inherited historical memory in a post-regional and post-historical culture. …”
Get full text
Article -
2653
De la petite chanson aux rafales du vent : le parcours de la ritournelle dans l’œuvre poétique d’Emily Brontë
Published 2010-06-01“…The incantatory resurgence of the ritornello punctuates the poetic mind’s trip from fancy to imagination, along which the idea of return applies less to the memory than to the repressed.…”
Get full text
Article -
2654
Le poids de l’instant dans le récit ferroviaire contemporain
Published 2015-06-01“…The instant thus takes on the weight of time, maybe even of memory.…”
Get full text
Article -
2655
The State, the Museum and the Ethnographer in Constructing National Heritage: Defining Estonian National Costumes in the 1930s
Published 2011-03-01“…The Estonian National Museum (ENM) as a repository of memory and knowledge availed its resources to support cultural propaganda. …”
Get full text
Article -
2656
Past deformations of "Brezhnevian stagnation" in Lithuanian cinema and TV fiction films (1968-1980)
Published 2008-12-01“… The objective of this work is to identify collective memory shapes in Lithuanian fiction TV and cinema film during the Brezhnevian period (1968-1980). …”
Get full text
Article -
2657
Comparative study of power analysis attacks based on template and KNN algorithm
Published 2022-04-01“…Power analysis attack is still the most threatening type of side channel attack on cryptographic hardware.The template analysis attack with the attack of KNN algorithm was compared.Firstly, three dimensionality reduction methods of Pearson correlation coefficient, mutual information and maximum information coefficient and distance correlation coefficient were studied.Then, the effects of the number of feature points on the attack success rate of the two power analysis attacks under the same number of power consumption curves were compared.At the same time, the effects of different dimensionality reduction techniques on the two power analysis attacks when the number of power curves is the same and different.The results show that the template attack is better than the KNN algorithm attack in running speed, memory occupation and robustness, and the KNN algorithm attack has better performance in attack success rate.…”
Get full text
Article -
2658
Two-level cache based streaming media scheduling algorithm for mobile network
Published 2007-01-01“…A novel caching system architecture for mobile streaming was proposed,which was named 2CMSA(two-level cache mobile streaming architecture).In this system,limitations for mobile streaming system such as small memory size in mobile terminal and low bandwidth in wireless access network were avoided.According to the 2CMSA,a scheduling algorithm of 2CMSS(two-level cache based mobile streaming scheduling) was designed;mathematical models were also achieved to analyze the performance of this scheduling algorithm.Simulation experiment proves that,comparing to the original mobile streaming system,by using the new two-level cache architecture and cache based scheduling algorithm,the network transmission cost and the client startup delay of the mobile streaming services can be decreased effectively.…”
Get full text
Article -
2659
Immunotherapeutic Strategies for Alzheimer's Disease Treatment
Published 2009-01-01“…Moreover, these antibodies protected the mice from learning and age-related memory deficits. Active and/or passive immunization against the amyloid-β peptide has been proposed as a method for preventing and/or treating AD. …”
Get full text
Article -
2660
Daily Precipitation Prediction Based on SVM-CEEMDAN-BiLSTM Model
Published 2023-01-01“…In order to solve the problem of low prediction accuracy of the maximum value and rain-free days in daily precipitation series,a coupled model of precipitation prediction based on a support vector machine (SVM),complete ensemble empirical modal decomposition (CEEMDAN),and bi-directional long and short-term memory neural network (BiLSTM) was proposed. This paper applied the coupled model to predict the daily precipitation at Jingdezhen Station and Ganxian Station in the Poyang Lake Basin, and the results were compared with those of traditional model combinations. …”
Get full text
Article