Suggested Topics within your search.
Suggested Topics within your search.
- Citizen participation 1
- Collectors and collecting 1
- Cultural property 1
- Electronics 1
- Film adaptations 1
- Historic preservation 1
- Historiography 1
- History 1
- History and criticism 1
- Human-computer interaction 1
- Intangible property 1
- Mass media 1
- Mass media and technology 1
- Mnemonics 1
- Motion pictures and literature 1
- Museums and community 1
- Nursing 1
- Pharmacology 1
- Philosophy 1
- Protection 1
- Slavery--Religious aspects 1
- Social aspects 1
- Sound recording industry 1
- Sound recordings 1
- Study and teaching 1
- Technological innovations 1
-
2961
Inhibition of Germinal Centre Apoptotic Programmes by Epstein-Barr Virus
Published 2011-01-01“…Only cells receiving adequate survival signals will differentiate fully to be released into the periphery as long-term memory B cells (the site of persistence). In this review, we detail the apoptotic pathways potentially encountered by EBV-infected B cells during the process of infection, and we describe the functions of those EBV-regulated cellular and viral genes that help promote survival of the host B cell.…”
Get full text
Article -
2962
A Simple Mathematical Model of Cyclic Circadian Learning
Published 2014-01-01“…The model is based on known memory retention functions that are in good agreement with experimental results. …”
Get full text
Article -
2963
Sampling method for IDS in high bandwidth network
Published 2009-01-01“…A novel sampling method,IDSampling,was developed to solve the performance unbalance problem that IDS could not scale well in G+bit/s link,which was adaptive with the consumption of the memory bottleneck.With the help of the heuristic messages,such as the entropy of the single-packet flow and the flow length,IDSampling applied the simple sampling strategy based on the entropy of the single-packet flow when the large-scale anomaly occurred,or another complicated one instructed by the feedback of the rear detection results by default.In both cases IDSampling tried to guaran-tee the equal security with detection cost as low as it could.The results of experiment show that ①IDSampling keeps IDS effective by cutting off its load significantly when it is overloaded,at the same time it can guarantee the detection accuracy of the large-scale attack;②Comparing with the other two overwhelming sampling methods,the random packet sampling and the random flow sampling,the number of attack packets sampled by IDSampling is higher than that of the former two,the number outweighs the former two one order of magnitude especially in the large-scale anomaly case.…”
Get full text
Article -
2964
Comparing ChatGPT And LSTM In Predicting Changes In Quarterly Financial Metrics
Published 2024-06-01“…The performance of ChatGPT is compared against Long Short-Term Memory (LSTM) neural network models developed as part of this research. …”
Get full text
Article -
2965
Ozone Treatment Improved the Resistive Switching Uniformity of HfAlO2 Based RRAM Devices
Published 2015-01-01“…HfAlO2 based resistive random access memory (RRAM) devices were fabricated using atomic layer deposition by modulating deposition cycles for HfO2 and Al2O3. …”
Get full text
Article -
2966
Machine Learning-Based Multitarget Tracking of Motion in Sports Video
Published 2021-01-01“…According to the requirements of real time, accuracy, and occupying less video memory space in intelligent video surveillance systems, this paper improves the streamlined version of the algorithm. …”
Get full text
Article -
2967
Hagiographie liturgique et construction identitaire dans un néo-diocèse (XVIIIe-XIXe siècles). Le Proprium Sanctorum dans les bréviaires des diocèses français créés sous Louis XIV...
Published 2013-07-01“…Liturgical hagiography allows the constituting of an official religious memory in the clergy of each diocese and makes the idealization and standardization process of holiness easier. …”
Get full text
Article -
2968
Subject in the age of technological domination: Fahrenheit 451 by Ray Bradbury
Published 2024-01-01“…In Bradbury's novel, the subject is determined by participation in one of the most strongly confronted processes: forgetting and technology stand in opposition to memory and high culture.…”
Get full text
Article -
2969
RP-Ring: A Heterogeneous Multi-FPGA Accelerator
Published 2018-01-01“…The dividing of workload is based on the logic resource, memory access bandwidth, and communication bandwidth of each FPGA chip. …”
Get full text
Article -
2970
Spatial “Artistic” Networks: From Deconstructing Integer-Functions to Visual Arts
Published 2018-01-01“…Here, we identify some general characteristics of this style, such as decomposition of the whole into parts, superposition of layers, and conservation of the memory of the whole. Using these attributes, we propose a method to deconstruct functions based on integers. …”
Get full text
Article -
2971
Performance evaluation of designated containerization and virtualization solutions using a synthetic benchmark
Published 2024-09-01“…The comparative criteria on which the analysis is based include aspects of computing and memory performance. Tests conducted on selected technologies included testing CPU performance, RAM efficiency and disk speed for reading and writing data. …”
Get full text
Article -
2972
An intrusion detection method based on depthwise separable convolution and attention mechanism
Published 2023-03-01“…In order to improve the accuracy of multi-classification in network intrusion detection, an intrusion detection method was proposed based on depthwise separable convolution and attention mechanism.By constructing a cascade structure combining depthwise separable convolution and long-term and short-term memory networks, the spatial and temporal features of network traffic data can be better extracted.A mixed-domain attention mechanism was introduced to enhance the detection performance.To solve the problem of low detection rate in some samples, a data balance strategy based on the combination of the variational auto-encoder (VAE) the generative adversarial network (GAN) and was designed, which can effectively cope with imbalanced datasets and improve the adaptability of the proposed detection method.The experimental results show that the proposed method is able to achieve 99.80%, 99.32%, and 83.87% accuracy on the CICIDS-2017, NSL-KDD and UNSW-NB15 datasets, which is improved by 0.6%, 0.5%, and 2.3%, respectively.…”
Get full text
Article -
2973
Cheeses Lying Fallow. The Difficult Revival of Cheese Production in a Post-industrial Ariège Valley (Pyrenees, France)
Published 2022-12-01“…It analyzes the conditions of the decline of its production and the blurring of its memory. While, for the last twenty years, this post-industrial valley has turned towards the development of tourism, the article provides an understanding of the constraints that have prevented any renewal of cheese production until recently. …”
Get full text
Article -
2974
Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
Published 2023-01-01“…The time complexity is 248 encryptions; the memory complexity is 245 bytes. Because the vulnerabilities are identified in the round function and the key scheduling part, we propose some improvements for RBFK against these attacks.…”
Get full text
Article -
2975
Is Kazan an oriental city? (Based on the guidebook of 1873)
Published 2018-12-01“…The theoretical basis of the research is the methods of structural analysis, semiotics and memory studies. Based on the results of the analysis of the text of the “Index”, the following methods were distinguished as the characteristic methods of creating the image of Kazan: selection of objects, marking them from more to less significant ones, the historical ideology of the discourse of the events and places described, the use of a certain presentation style and ideological antitheses “ours” – “foreign”. …”
Get full text
Article -
2976
A Class of Three-Step Derivative-Free Root Solvers with Optimal Convergence Order
Published 2012-01-01“…Each method of the class reaches the optimal efficiency index according to the Kung-Traub conjecture concerning multipoint iterative methods without memory. Moreover, the class is free from derivative calculation per full iteration, which is important in engineering problems. …”
Get full text
Article -
2977
Introduction: Indentured bodies/embodiments of indenture
Published 2024-11-01“…Recruitment processes, along with the harrowing conditions of transport and labour, radically reshaped the material and physical realities of indentured labourers, influencing not only their immediate bodily experiences but also the socio-cultural practices and embodied memories they would pass down to future generations. …”
Get full text
Article -
2978
Purging the Past and Gauging the Future: Stage Puritans as Manifestations of Religious Trauma in Restoration Comedies Adapted from European Sources (1660-1689)
Published 2024-12-01“…Looking at this corpus through the prism of religious figures, in particular that of the stage Puritan, this paper aims to show how Restoration comedies both deal with the trauma of the Interregnum and use its memory to question ongoing and potentially upcoming religious troubles. …”
Get full text
Article -
2979
Les marges renaissantes : Amazigh, Juif, Noir. Ce que la révolution a changé dans ce « petit pays homogène par excellence » qu’est la Tunisie
Published 2012-10-01“…The phase of remodeling of the “nation’s” representations leads to the emergence of new insights on discrimination, recognition or plural memory : where does the Jewish heritage stand in a country dominated by political Islam ? …”
Get full text
Article -
2980
Simple-Random-Sampling-Based Multiclass Text Classification Algorithm
Published 2014-01-01“…Supported by a token level memory to store labeled documents, the SRSMTC algorithm uses a text retrieval approach to solve text classification problems. …”
Get full text
Article