Suggested Topics within your search.
Suggested Topics within your search.
- Citizen participation 1
- Collectors and collecting 1
- Cultural property 1
- Electronics 1
- Film adaptations 1
- Historic preservation 1
- Historiography 1
- History 1
- History and criticism 1
- Human-computer interaction 1
- Intangible property 1
- Mass media 1
- Mass media and technology 1
- Mnemonics 1
- Motion pictures and literature 1
- Museums and community 1
- Nursing 1
- Pharmacology 1
- Philosophy 1
- Protection 1
- Slavery--Religious aspects 1
- Social aspects 1
- Sound recording industry 1
- Sound recordings 1
- Study and teaching 1
- Technological innovations 1
-
1801
La memoria histórica de la Guerra Civil, la dictadura franquista, y la Transición, en España. Síntesis histórica e iniciativas legislativas recientes
Published 2020-01-01“…This article surveys the historical memory of Spanish Civil War, Franco regime, and transition to democracy in Spain. …”
Get full text
Article -
1802
Brief Overview on Nitinol as Biomaterial
Published 2016-01-01“…Shape memory alloys remember their shape due to thermoelastic martensitic phase transformation. …”
Get full text
Article -
1803
Single-cell RNA sequencing highlights the role of distinct natural killer subsets in sporadic amyotrophic lateral sclerosis
Published 2025-01-01“…We also identified gene expression changes in other immune cells, such as classical monocytes, and distinct CD8 + effector memory T cells which suggested enhanced antigen presentation via major histocompatibility class-II (adj. p-value = 1.23 × 10− 8) in ALS. …”
Get full text
Article -
1804
Software protection technology based on code fragmentation
Published 2020-12-01“…Aiming at the shortcomings of the current software protection technology,a code fragmentation technology was proposed.This technology is a new software protection technology that takes functions as units,shells functions,randomizes memory layout,and performs dynamic linking.The code shellization realizes the position-independent morphing of code fragments,the memory layout randomizes the random memory loading of the code fragments,the dynamic linking realizes the dynamic execution of the code fragments,and the program fragmentation processing is achieved through the above three links.The experiments show that the code fragmentation technology can not only realize the randomization of the memory location of function fragments during program execution,but also the dynamic link execution of function fragments,increasing the difficulty of static reverse analysis and dynamic reverse debugging of the program,and improving the anti-reverse analysis ability of the program.…”
Get full text
Article -
1805
Od diecezji lubuskiej do Ziemi Lubuskiej. Kościół i region w re-konstrukcji
Published 2024-01-01“…In the case of the Zielona Góra-Gorzów diocese, we can talk about layers of memory or a kind of cultural palimpsest, which consists of: reconstructed memory, inherited memory and displaced memory. …”
Get full text
Article -
1806
Entre document immédiat et fiction de mémoire : Histoire et enjeux du désenchantement des actualités visuelles
Published 2011-08-01“…Under the reign of self-presentation of information (Rancière, 1999), memory can only be built by the demonstration of a lack or overflow of information. …”
Get full text
Article -
1807
Optimization strategy of virtual machine online migration with awareness of application characteristics and network bandwidth migration
Published 2017-11-01“…Firstly the experiments to verify the relationship between the number of dirty memory pages and application characteristics which exist in virtual machine migration was conducted.Then,different virtual machine application characteristics were perceived,with which the number of dirty memory pages produced during the migrations was predicted by the use of GM(1,N) grey prediction model.At the same time,using residual correction to adjust error makes results more reliable.According to the prediction of memory dirty pages,network bandwidth was adjusted and reserved.Compared with the traditional pre-copy strategy,the given experiments show that the optimized strategy proposed can improve the performance of network and reduce migratory cost for the memory-intensive and network-intensive applications.…”
Get full text
Article -
1808
-
1809
Metabolism Is a Key Regulator of Induced Pluripotent Stem Cell Reprogramming
Published 2019-01-01“…However, induced pluripotent stem cells (iPSC) retain transcriptional memory, epigenetic memory, and metabolic memory from their somatic cells of origin and acquire aberrant characteristics distinct from either other pluripotent cells or parental cells, reflecting incomplete reprogramming. …”
Get full text
Article -
1810
Fractional Order Stochastic Differential Equation with Application in European Option Pricing
Published 2014-01-01“…Memory effect is an important phenomenon in financial systems, and a number of research works have been carried out to study the long memory in the financial markets. …”
Get full text
Article -
1811
Age-Related Decline in Controlled Retrieval: The Role of the PFC and Sleep
Published 2012-01-01“…In this paper we discuss the influence of the prefrontal cortex on memory retrieval, and the specific memory processes associated with the prefrontal cortex that decline in late adulthood. …”
Get full text
Article -
1812
-
1813
Case Report of Jingyun Platform's Cognitive Training on Cognitive Impairment with Aphasia
Published 2019-08-01“…The total score of MoCA, subitem score in MoCA, the correct number of words in memory and delayed recall, total time of MoCA evaluation and time-consuming changes in memory were calculated.Results:Compared with before treatment, the memory and delayed recall in traditional cognitive training stage and Jingyun platform cognitive training stage were improved. …”
Get full text
Article -
1814
Monuments flaubertiens
Published 2019-12-01“…Fiction, here, is at one and the same time the space in which a ‘memory crisis’ is unfolding and the very object of this crisis.…”
Get full text
Article -
1815
Dementia Improvement after Plasma Exchange for Familial Hypercholesterolemia
Published 2016-01-01“…Worldwide dementia related memory issues affect a great number of patients and families. …”
Get full text
Article -
1816
Le revenant dans l’œuvre de Toni Morrison : ou le corps hanté de la mémoire
Published 2016-06-01“…When memory is stopped, and bodies mutilated are threatened by annihilation, ghost character give flesh and body to memory, a body maybe hunted but determined to, to not let itself sink in “oblivion”.…”
Get full text
Article -
1817
Beyond the Hit: The Hidden Costs of Repetitive Head Trauma
Published 2025-02-01“…Furthermore, deficits in working memory may contribute to decreased performance during play. …”
Get full text
Article -
1818
From Epiphylogenesis to General Organology
Published 2022-07-01“…In addition to primary memory as the genetic information expressed in DNA and secondary memory acquired epigenetically through a complex nervous system, there is also tertiary memory, which Stiegler named ‘epiphylogenetic’. …”
Get full text
Article -
1819
The representational instability in the generalization of fear learning
Published 2024-12-01“…Abstract Perception and perceptual memory play crucial roles in fear generalization, yet their dynamic interaction remains understudied. …”
Get full text
Article -
1820
CBFM:cutted Bloom filter matrix for multi-dimensional membership query
Published 2016-03-01“…In order to improve the flexibility and accuracy of mu i-dimensional membership query,a new indexing structure called CBFM(cutted Bloom filter matrix)was proposed.CBFM built the bit matrix by the Cartesian product of different bloom filters,each representing one attribute of primary data.In this way,the proposed matrix supported by-attribute membership query.Besides,the attribute combinations in the bit matrix could be reduced and weighted on demand to further enhance memory utilization rate.Theoretical analysis proves that CBFM utilizes memory more effi-ciently than BFM,the current state of art.Experiments also show that,on the scenario of memory size fixed,the false positive rate of CBFM is lower than that of all other indexin ethods.Especially on the scenario of memory constrained,the false positive rate of CBFM can be 3 orders of magnitude lower than that of BFM(Bloom filter matrix) indexing me-thod.CBFM is an accurate data structure for multi-dimensional membership query.…”
Get full text
Article