Showing 2,981 - 3,000 results of 6,432 for search '"memory"', query time: 0.06s Refine Results
  1. 2981

    Troy Is Burning: Epic Archetypes by Alberto Camerotto

    Published 2023-12-01
    “…Through seminars, conferences, and public actions, the project aims to enhance civil consciousness and collective memory, particularly focusing on the fall of Troy as a universal symbol of violence and its consequences. …”
    Get full text
    Article
  2. 2982

    Song folklore of the Crimean Tatars: the aspect of identification (part 1) by Rustem Komurdzhi

    Published 2023-12-01
    “…The article is devoted to the issue of displaying the self-name of the Crimean Tatars in his musical and song creativity, as a carrier of the historical memory of the people. For this, the songs were analyzed and the results described. …”
    Get full text
    Article
  3. 2983

    Between revolution and human rights: the testimonies of Brazilian exiles at the Russell Tribunal II by Felipe Magaldi, Cynthia Sarti

    Published 2025-01-01
    “…The article analyses their testimonies based on documents published by the Amnesty Commission’s Marks of Memory Project and others consulted at the Basso Foundation (Italy) and the National Archives (Brazil), as well as other dispersed records. …”
    Get full text
    Article
  4. 2984

    Drawing Theory. An Introduction by Marc Schoonderbeek, Stefano Milani

    Published 2010-10-01
    “…This singular character probably belongs to drawing’s structural duality of being simultaneously a simulacrum of a reality and reality itself, memory and anticipation, subject and object, by being in essence the measure of two different facets inherent to architectural thinking. …”
    Get full text
    Article
  5. 2985

    Sostenibilità del ‘classico’ nell’educazione musicale scolastica by Luca Aversano

    Published 2024-12-01
    “…This locution is both generic in terms of stylistic evaluation and specific in designating a series of compositions from the past that are still alive in the public memory. The paper explores the possible relationship between this founding idea of Western school culture and a contemporary and global concept that is very much in vogue today, that of ‘sustainability’: how much, and in what way, is ‘classical music’ sustainable in music education in schools?…”
    Get full text
    Article
  6. 2986

    Class imbalance learning–driven Alzheimer’s detection using hybrid features by Ran Baik

    Published 2019-02-01
    “…Alzheimer’s is the main reason which leads to memory loss of a human being. The living style of an affected person also varies. …”
    Get full text
    Article
  7. 2987

    Des œuvres en morceaux et des trous sur les murs. La difficulté d’écrire la vie des œuvres du Pérugin au XIXe siècle by Éloïse Dumas

    Published 2024-05-01
    “…In Perugia, their absence gave way to a memory that froze scholarship and contributed to the crystallisation of the collective consciousness. …”
    Get full text
    Article
  8. 2988

    Stability optimization of dynamic migration algorithm for Post-Copy of virtual machine based on KVM by Shuangxi CHEN, Ruoyan ZHAO, Hui LIU, Chunming WU, Wei RUAN

    Published 2021-07-01
    “…The dynamic migration technology of virtual machine provides a strong support for the resource scheduling of virtualization system.As one of the two core algorithms of virtual machine dynamic migration, Post-Copy algorithm has been a hot issue for scholars at home and abroad for its advantages of stable migration time and short migration downtime.The fault tolerance mechanism of virtual machine, the connection between the transfer mode of memory page and the page missing error during the migration process, and the source code of QEMU-KVM platform were studied.A fault tolerant method based on transaction synchronization was proposed to improve the stability of the Post-Copy migration algorithm.The experimental results show that the proposed algorithm can ensure the fast repair of deep end virtual machine failure, target virtual machine failure and network fault during the migration process, and solve the stability problem at a small cost.The method proposed effectively improves the stability of the Post-Copy migration algorithm, and provides reference for the future optimization research direction.…”
    Get full text
    Article
  9. 2989

    Application of Sports Clustering Deconstruction Based on Neural Network by Xiaobing Ma

    Published 2022-01-01
    “…The neural network had a good memory function, and it can be used to integrate physical education resources in sports. …”
    Get full text
    Article
  10. 2990

    Automatic Pipelining and Vectorization of Scientific Code for FPGAs by Syed Waqar Nabi, Wim Vanderbauwhede

    Published 2019-01-01
    “…The backend first creates fine and coarse-grained pipelines and then automatically vectorizes both the memory access and the datapath based on a cost model, generating an OpenCL-HDL hybrid working solution for FPGA targets on the Amazon cloud. …”
    Get full text
    Article
  11. 2991

    Le récit de vie comme trajectoire. Une comparaison des (auto)biographies de Jean Paul et de Stendhal by Aurélie Moioli

    Published 2014-05-01
    “…We argue that the overlap of heterogeneous life trajectories create a tension between reality and fiction into the narrative. The ambiguity of memory appears: remembering the past can’t do without the creative activity of imagination and without imagining the future. …”
    Get full text
    Article
  12. 2992

    Tourism and writers’ houses, in between places and literature by Aurore Bonniot-Mirloup

    Published 2017-07-01
    “…In particular, the writer’s house, this meaningful place of memory, already invested by the history and literature specialists, also resonates with local authorities, which consider it as a heritage to be promoted, and a way to reinforce their territory’s attractiveness.As a testimony to the past, as a renowned as well as private house, the writer’s house merges times and spaces, imaginaries and private memories. …”
    Get full text
    Article
  13. 2993

    La femme d’origine maghrébine en immigration. Dynamiques identitaires, genre et personnalisation by Abdelhak Qribi

    Published 2017-06-01
    “…Despite the temporal discrepancy regarding parents acculturation activity and young generations cross-cultural activities, both seem to make their way through legacy and desire, memory and the adaptation requirements of this world. …”
    Get full text
    Article
  14. 2994

    Diffusion of heavy quarks in the early stage of high-energy nuclear collisions by Pooja, Das Santosh Kumar, Greco Vincenzo, Ruggieri Marco

    Published 2025-01-01
    “…This non-Markovian diffusion of heavy quarks in the early stages is explained by the memory effect present in the gluon fields.…”
    Get full text
    Article
  15. 2995

    Documenting the Social and Historical Margins in the Films of Philip Donnellan by Ieuan Franklin

    Published 2014-02-01
    “…More than a document of the contemporary condition of the marginalized however, Donnellan’s films persistently convey a sense of the weight of history, exploring memory and archival evidence in order to pose difficult questions about the construction of history. …”
    Get full text
    Article
  16. 2996

    Emerging Roles of Immune Cells in Postoperative Cognitive Dysfunction by Yue Liu, Yiqing Yin

    Published 2018-01-01
    “…Neurons in the hippocampus, which is responsible for learning and memory, can be damaged by cytokines transmitted to the brain parenchyma. …”
    Get full text
    Article
  17. 2997

    An LSTM auto-encoder based anomaly detection for industrial system by Xiaojun SHEN, Yanan GE, Zhihao SHEN, Yangdan NI, Mingqi LV, Zhengqiu WENG

    Published 2020-07-01
    “…In the context of the industrial internet,automatic and effective anomaly detection methods are of great significance to the safe and stable production of industrial systems.Traditional anomaly detection methods have the disadvantages of requiring a large number of labeled samples,and not adapting to high-dimensional time series data.Aiming at these limitations,an industrial system anomaly detection method based on LSTM (long short-term memory)auto-encoder was proposed.Firstly,to address the limitation of relying on labeled samples,an encoder used to learn the features and patterns of a large number of normal samples in an unsupervised manner.Then,anomaly detection was performed via reconstructing samples and calculating the reconstruction error.Secondly,to adapt to high-dimensional time series data,a BiLSTM (bidirectional LSTM) was used as an encoder,and then the potential characteristics of multi-dimensional time series data were mined.Experiments based on a real paper industry data set which demonstrate this method has improved the existing unsupervised anomaly detection methods in various indicators,and the overall accuracy of the detection has reached 93.4%.…”
    Get full text
    Article
  18. 2998

    Keyword-aware optimal route planning method for large-scale graph data by Ziyang LI, Pengcheng CHEN, Jiong YU, Yonglin PU, Zhenzhen HE, Xue LI, Shijie ZHENG

    Published 2023-09-01
    “…Focused on the problem that the planned routes cannot meet the personalized demand of different users in route planning of personalized self-driving tour, a keyword-aware optimal route planning method based on different user interests was proposed.Firstly, the road network information preprocessing model was set up and the road network information query graph was built by the road network information preprocessing algorithm.Secondly, the inverted index algorithm was proposed to prune the road network information query graph according to the personalized requirements from users, which improved the execution efficiency of keyword-aware optimal route planning method and reduced the memory cost of large-scale data processing effectively.Finally, the keyword-aware optimal route planning algorithm was proposed to realize personalized recommendation according to user interest by bidirectional parallel extension.The experimental results show that the method not only realizes the route planning to meet the individual needs of users but also improves the execution efficiency of the method through pruning and bidirectional parallel extension.…”
    Get full text
    Article
  19. 2999

    Bus Admittance Matrix Revisited: Performance Challenges on Modern Computers by Hantao Cui

    Published 2024-01-01
    “…This paper also analyzes the impact of the width of vector instructions and memory speed to predict the trend for future computers.…”
    Get full text
    Article
  20. 3000

    WSN key recovery attack based on symmetric matrix decomposition by Xiangmin JI, Bo ZHAO, Jinhui LIU, Jianwei JIA, Huanguo ZHANG, Shuang XIANG

    Published 2018-10-01
    “…The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key recovery attack scheme against this protocol was proposed by using the properties of symmetric matrix and permutation matrix.Based on intercepting the row and column vector of the node,elementary transformation was performed to construct a linear algebraic attack algorithm and the equivalent key was obtained.The computational complexity is O(N<sup>6</sup>).Experimental results show that the method can recover the equivalent key of the above protocol within the polynomial computational complexity and the memory consumption is within an acceptable range.In addition,an improved scheme for key agreement was proposed to resist the linear algebraic attack by using a random disturbance matrix,and the correctness and security analysis were also carried out.…”
    Get full text
    Article