Suggested Topics within your search.
Suggested Topics within your search.
- Citizen participation 1
- Collectors and collecting 1
- Cultural property 1
- Electronics 1
- Film adaptations 1
- Historic preservation 1
- Historiography 1
- History 1
- History and criticism 1
- Human-computer interaction 1
- Intangible property 1
- Mass media 1
- Mass media and technology 1
- Mnemonics 1
- Motion pictures and literature 1
- Museums and community 1
- Nursing 1
- Pharmacology 1
- Philosophy 1
- Protection 1
- Slavery--Religious aspects 1
- Social aspects 1
- Sound recording industry 1
- Sound recordings 1
- Study and teaching 1
- Technological innovations 1
-
2981
Troy Is Burning: Epic Archetypes
Published 2023-12-01“…Through seminars, conferences, and public actions, the project aims to enhance civil consciousness and collective memory, particularly focusing on the fall of Troy as a universal symbol of violence and its consequences. …”
Get full text
Article -
2982
Song folklore of the Crimean Tatars: the aspect of identification (part 1)
Published 2023-12-01“…The article is devoted to the issue of displaying the self-name of the Crimean Tatars in his musical and song creativity, as a carrier of the historical memory of the people. For this, the songs were analyzed and the results described. …”
Get full text
Article -
2983
Between revolution and human rights: the testimonies of Brazilian exiles at the Russell Tribunal II
Published 2025-01-01“…The article analyses their testimonies based on documents published by the Amnesty Commission’s Marks of Memory Project and others consulted at the Basso Foundation (Italy) and the National Archives (Brazil), as well as other dispersed records. …”
Get full text
Article -
2984
Drawing Theory. An Introduction
Published 2010-10-01“…This singular character probably belongs to drawing’s structural duality of being simultaneously a simulacrum of a reality and reality itself, memory and anticipation, subject and object, by being in essence the measure of two different facets inherent to architectural thinking. …”
Get full text
Article -
2985
Sostenibilità del ‘classico’ nell’educazione musicale scolastica
Published 2024-12-01“…This locution is both generic in terms of stylistic evaluation and specific in designating a series of compositions from the past that are still alive in the public memory. The paper explores the possible relationship between this founding idea of Western school culture and a contemporary and global concept that is very much in vogue today, that of ‘sustainability’: how much, and in what way, is ‘classical music’ sustainable in music education in schools?…”
Get full text
Article -
2986
Class imbalance learning–driven Alzheimer’s detection using hybrid features
Published 2019-02-01“…Alzheimer’s is the main reason which leads to memory loss of a human being. The living style of an affected person also varies. …”
Get full text
Article -
2987
Des œuvres en morceaux et des trous sur les murs. La difficulté d’écrire la vie des œuvres du Pérugin au XIXe siècle
Published 2024-05-01“…In Perugia, their absence gave way to a memory that froze scholarship and contributed to the crystallisation of the collective consciousness. …”
Get full text
Article -
2988
Stability optimization of dynamic migration algorithm for Post-Copy of virtual machine based on KVM
Published 2021-07-01“…The dynamic migration technology of virtual machine provides a strong support for the resource scheduling of virtualization system.As one of the two core algorithms of virtual machine dynamic migration, Post-Copy algorithm has been a hot issue for scholars at home and abroad for its advantages of stable migration time and short migration downtime.The fault tolerance mechanism of virtual machine, the connection between the transfer mode of memory page and the page missing error during the migration process, and the source code of QEMU-KVM platform were studied.A fault tolerant method based on transaction synchronization was proposed to improve the stability of the Post-Copy migration algorithm.The experimental results show that the proposed algorithm can ensure the fast repair of deep end virtual machine failure, target virtual machine failure and network fault during the migration process, and solve the stability problem at a small cost.The method proposed effectively improves the stability of the Post-Copy migration algorithm, and provides reference for the future optimization research direction.…”
Get full text
Article -
2989
Application of Sports Clustering Deconstruction Based on Neural Network
Published 2022-01-01“…The neural network had a good memory function, and it can be used to integrate physical education resources in sports. …”
Get full text
Article -
2990
Automatic Pipelining and Vectorization of Scientific Code for FPGAs
Published 2019-01-01“…The backend first creates fine and coarse-grained pipelines and then automatically vectorizes both the memory access and the datapath based on a cost model, generating an OpenCL-HDL hybrid working solution for FPGA targets on the Amazon cloud. …”
Get full text
Article -
2991
Le récit de vie comme trajectoire. Une comparaison des (auto)biographies de Jean Paul et de Stendhal
Published 2014-05-01“…We argue that the overlap of heterogeneous life trajectories create a tension between reality and fiction into the narrative. The ambiguity of memory appears: remembering the past can’t do without the creative activity of imagination and without imagining the future. …”
Get full text
Article -
2992
Tourism and writers’ houses, in between places and literature
Published 2017-07-01“…In particular, the writer’s house, this meaningful place of memory, already invested by the history and literature specialists, also resonates with local authorities, which consider it as a heritage to be promoted, and a way to reinforce their territory’s attractiveness.As a testimony to the past, as a renowned as well as private house, the writer’s house merges times and spaces, imaginaries and private memories. …”
Get full text
Article -
2993
La femme d’origine maghrébine en immigration. Dynamiques identitaires, genre et personnalisation
Published 2017-06-01“…Despite the temporal discrepancy regarding parents acculturation activity and young generations cross-cultural activities, both seem to make their way through legacy and desire, memory and the adaptation requirements of this world. …”
Get full text
Article -
2994
Diffusion of heavy quarks in the early stage of high-energy nuclear collisions
Published 2025-01-01“…This non-Markovian diffusion of heavy quarks in the early stages is explained by the memory effect present in the gluon fields.…”
Get full text
Article -
2995
Documenting the Social and Historical Margins in the Films of Philip Donnellan
Published 2014-02-01“…More than a document of the contemporary condition of the marginalized however, Donnellan’s films persistently convey a sense of the weight of history, exploring memory and archival evidence in order to pose difficult questions about the construction of history. …”
Get full text
Article -
2996
Emerging Roles of Immune Cells in Postoperative Cognitive Dysfunction
Published 2018-01-01“…Neurons in the hippocampus, which is responsible for learning and memory, can be damaged by cytokines transmitted to the brain parenchyma. …”
Get full text
Article -
2997
An LSTM auto-encoder based anomaly detection for industrial system
Published 2020-07-01“…In the context of the industrial internet,automatic and effective anomaly detection methods are of great significance to the safe and stable production of industrial systems.Traditional anomaly detection methods have the disadvantages of requiring a large number of labeled samples,and not adapting to high-dimensional time series data.Aiming at these limitations,an industrial system anomaly detection method based on LSTM (long short-term memory)auto-encoder was proposed.Firstly,to address the limitation of relying on labeled samples,an encoder used to learn the features and patterns of a large number of normal samples in an unsupervised manner.Then,anomaly detection was performed via reconstructing samples and calculating the reconstruction error.Secondly,to adapt to high-dimensional time series data,a BiLSTM (bidirectional LSTM) was used as an encoder,and then the potential characteristics of multi-dimensional time series data were mined.Experiments based on a real paper industry data set which demonstrate this method has improved the existing unsupervised anomaly detection methods in various indicators,and the overall accuracy of the detection has reached 93.4%.…”
Get full text
Article -
2998
Keyword-aware optimal route planning method for large-scale graph data
Published 2023-09-01“…Focused on the problem that the planned routes cannot meet the personalized demand of different users in route planning of personalized self-driving tour, a keyword-aware optimal route planning method based on different user interests was proposed.Firstly, the road network information preprocessing model was set up and the road network information query graph was built by the road network information preprocessing algorithm.Secondly, the inverted index algorithm was proposed to prune the road network information query graph according to the personalized requirements from users, which improved the execution efficiency of keyword-aware optimal route planning method and reduced the memory cost of large-scale data processing effectively.Finally, the keyword-aware optimal route planning algorithm was proposed to realize personalized recommendation according to user interest by bidirectional parallel extension.The experimental results show that the method not only realizes the route planning to meet the individual needs of users but also improves the execution efficiency of the method through pruning and bidirectional parallel extension.…”
Get full text
Article -
2999
Bus Admittance Matrix Revisited: Performance Challenges on Modern Computers
Published 2024-01-01“…This paper also analyzes the impact of the width of vector instructions and memory speed to predict the trend for future computers.…”
Get full text
Article -
3000
WSN key recovery attack based on symmetric matrix decomposition
Published 2018-10-01“…The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key recovery attack scheme against this protocol was proposed by using the properties of symmetric matrix and permutation matrix.Based on intercepting the row and column vector of the node,elementary transformation was performed to construct a linear algebraic attack algorithm and the equivalent key was obtained.The computational complexity is O(N<sup>6</sup>).Experimental results show that the method can recover the equivalent key of the above protocol within the polynomial computational complexity and the memory consumption is within an acceptable range.In addition,an improved scheme for key agreement was proposed to resist the linear algebraic attack by using a random disturbance matrix,and the correctness and security analysis were also carried out.…”
Get full text
Article