Showing 3,381 - 3,400 results of 21,030 for search '"multiplication"', query time: 0.11s Refine Results
  1. 3381

    “If only you could see me now”: Autoportrait et théâtralité dans les lettres de Sylvia Plath à sa mère by Laure DE NERVAUX-GAVOTY

    Published 2023-06-01
    “…Sylvia Plath's work is haunted by the question of self-representation; her poems, her autobiographical novel The Bell Jar, her short stories, her diary, and her correspondence can be read as facets of a self-portrait diffracted through the different mirrors of these literary genres. This multiplication of the autobiographical mode and of the figures of the self seems to result from an ambivalent attitude to self-representation: while the latter is perceived as synonymous with psychic integrity, it is also deeply feared because, freezing the subject, it could prove fatal. …”
    Get full text
    Article
  2. 3382

    De la « Fortress Conservation » aux nouveaux modèles de gestion participative de la biodiversité en Tanzanie by Adriana Blache 

    Published 2020-05-01
    “…Conservation models with a "participatory and inclusive" label are more related to the criminalization of practices and uses prior to the devices and promote the multiplication of guards and police, rather than proposing a particular awareness within a broader vision of political ecology. …”
    Get full text
    Article
  3. 3383

    Bit-Table Based Biclustering and Frequent Closed Itemset Mining in High-Dimensional Binary Data by András Király, Attila Gyenesei, János Abonyi

    Published 2014-01-01
    “…The method is based on simple but very powerful matrix and vector multiplication approaches that ensure that all patterns can be discovered in a fast manner. …”
    Get full text
    Article
  4. 3384

    Crise rural multidimensional e políticas integradas: o caso do Recôncavo da Bahia by Philippe Jean Louis Sablayrolles, Fábio Luís Seixas Costa, Mayara Santiago Do Carmo, Jánderson Santana Dos Santos

    Published 2019-12-01
    “…Historic birthplace of brazilian agrarian society, the region of Recôncavo of Bahia currently faces a rural development crisis, also taking place in other regions of Bahia and the Northeast of Brazil. The multiplication of very small farms, the adverse markets trends and the recession of the national economy are combined and result in high levels of social fragility, the emptying of the field and the ageing of the rural population. …”
    Get full text
    Article
  5. 3385

    Síntesis y crítica de las evaluaciones de la efectividad de los motores de búsqueda en la Web. (Synthesis and critical review of evaluations of the effectiveness of Web search engi... by Francisco Javier Martínez Méndez, José Vicente Rodríguez Muñoz

    Published 2003-01-01
    “…The consolidation of the World Wide Web as the paradigmatic method for developing the Information Society, and the continuous multiplication of the number of documents published in this environment, has led to the implementation of the most advanced, and extensive information retrieval systems, in the shape of web search engines. …”
    Get full text
    Article
  6. 3386

    Les conflits fonciers comme analyseurs des guerres civiles : chefs de guerre, militaires américains et juges Taliban dans la Kunar by Adam Baczko

    Published 2013-06-01
    “…Consideration of conflicts over inheritance and plot demarcations constitute a particularly powerful means of analyzing the social tensions that fuel the civil war in this rural province of Afghanistan. The multiplication and politicization of land disputes throughout the last three decades highlight the dislocation of the political structures and the normative framework which regulated these conflicts before the Soviet invasion. …”
    Get full text
    Article
  7. 3387

    Nonrecursive Equivalent of the Conjugate Gradient Method without the Need to Restart by Josip Dvornik, Damir Lazarevic, Antonia Jaguljnjak Lazarevic, Marija Demsic

    Published 2019-01-01
    “…As in CG, only one matrix-vector multiplication is required per step with appropriate transformations. …”
    Get full text
    Article
  8. 3388

    Réponse de quatre variétés de Anacardium occidentale L. aux techniques de greffage horticole en pépinière by Touré Mamoudou Abdoul, Faye Elhadji, Goudiaby Ramatoulaye

    Published 2017-12-01
    “…The objective of the study was to help improve the effective multiplication of A. occidental L. best varieties. To do so, a grafting test of juvenile and adult material using four (4) rootstocks corresponding to the "varieties" of western A. occidentale L. …”
    Get full text
    Article
  9. 3389

    Identification of three novel species and one new record of Kirschsteiniothelia (Kirschsteiniotheliaceae, Kirschsteiniotheliales) from Jiangxi, China by Xing-Xing Luo, Ming-Gen Liao, Ya-Fen Hu, Xiu-Guo Zhang, Zhao-Huan Xu, Jian Ma

    Published 2025-01-01
    “…While plant debris is a habitat favoring the survival and multiplication of various microbial species. In this study, several kirschsteiniothelia-like isolates were collected from dead branches of unidentified perennial dicotyledonous plants. …”
    Get full text
    Article
  10. 3390

    Focusing of Spotlight Tandem-Configuration Bistatic Data with Frequency Scaling Algorithm by Shichao Chen, Ming Liu, Jun Wang, Fugang Lu, Mengdao Xing

    Published 2016-01-01
    “…Range cell migration correction (RCMC) is realized through phase multiplication. The proposed algorithm is insensitive to the length of the baseline due to the high precision of the point target (PT) spectrum that we are based on. …”
    Get full text
    Article
  11. 3391

    Improved Generalized Single-Source Tangential Equivalence Principle Algorithm with Contact-Region Modeling Method for Array Structures by Yao Han, Hanru Shao, Jianfeng Dong

    Published 2018-01-01
    “…Furthermore, the multilevel fast multipole algorithm (MLFMA) is used to accelerate the matrix-vector multiplication in the GSST-EPA. Numerical results are shown to demonstrate the accuracy and efficiency of the proposed method.…”
    Get full text
    Article
  12. 3392

    Certain Spaces of Functions over the Field of Non-Newtonian Complex Numbers by Ahmet Faruk Çakmak, Feyzi Başar

    Published 2014-01-01
    “…Later, we define the space C*(Ω) of *-continuous functions and state that it forms a vector space with respect to the non-Newtonian addition and scalar multiplication and we prove that C*(Ω) is a Banach space. …”
    Get full text
    Article
  13. 3393

    Secure and efficient two-party ECDSA signature scheme by Jing WANG, Libing WU, Min LUO, Debiao HE

    Published 2021-02-01
    “…To solve the easy disclosure of signature private key and excessive concentration of signature rights, a secure and efficient two-party ECDSA signature scheme was proposed for the blockchain based network trading systems.By pre-computing one-time pad Beaver’s triple, and utilizing the Beaver’s triple based secure two-party multiplication technology, some computationally intensive homomorphic encryption operations and oblivious transfer operations with high communication overhead were effectively avoided, and thereby an efficient two-party ECDSA signing was realized, which could ensure that the two signing parties output valid ECDSA signature without reconstructing the complete private key.The proposed scheme was proved to be provably secure under the hybrid model of the universally composable framework.Theoretical analysis and simulation results demonstrate that the proposed scheme has significant advantages in terms of signing efficiency and bandwidth requirements when compared with the existing two two-party ECDSA signature schemes.…”
    Get full text
    Article
  14. 3394

    Verifiable access control scheme based on unpaired CP-ABE in fog computing by Jiangtao DONG, Peiwen YAN, Ruizhong DU

    Published 2021-08-01
    “…Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality and fine-grained access control.The excessive computational overhead of bilinear pairing restricts its application and development.In response to this, a verifiable access control scheme was proposed based on unpaired CP-ABE in fog computing.In order to make CP-ABE more efficient, simple scalar multiplication in elliptic curve encryption was used to replace bilinear pairing, thereby reducing the overall computational overhead.Decryption operations were outsourced to fog nodes to reduce user computational complexity, and based on the tamper-proof and traceable characteristics of the blockchain, the correctness of the access transaction was verified and the access authorization process was recorded.Security and performance analysis shows that the scheme is safe under the elliptic curve decision-making DBDH (Diffie-Hellman) assumption, and the calculation efficiency is higher.…”
    Get full text
    Article
  15. 3395

    Generalized roughness of three dimensional ( $$\in ,\in \vee q$$ ∈ , ∈ ∨ q )-fuzzy ideals in terms of set-valued homomorphism by Shahida Bashir, Rabia Mazhar, Nasreen Kausar, Saziye Yaman, Syed Suleman Ali, Muneeb Ul Hassan Afzal

    Published 2024-05-01
    “…Abstract The objective of this study is to generalize the roughness of a fuzzy set-in three-dimensional structure by introducing ternary multiplication. Many results and theorems of rough fuzzy ideals have been extended from semigroup and semiring, to ternary semiring by introducing the definition of a rough fuzzy subset of ternary semiring. …”
    Get full text
    Article
  16. 3396

    « Qu’est-ce qu’il y a de pire que cette injustice et cette oppression, oh homme ? » Mouvement féminin, presse et stratégies d’émancipation, Soudan 1950-1956 by Elena Vezzadini

    Published 2020-03-01
    “…They were mostly written by women journalists, but also by some men. The multiplication of women’s voices was unprecedented in modern Sudanese history. …”
    Get full text
    Article
  17. 3397

    Exploring Drug Targets in Isoprenoid Biosynthetic Pathway for Plasmodium falciparum by Tabish Qidwai, Farrukh Jamal, Mohd Y. Khan, Bechan Sharma

    Published 2014-01-01
    “…Among several pathways in apicoplast, isoprenoid biosynthesis is one of the important pathways for parasite as its multiplication in human erythrocytes requires isoprenoids. …”
    Get full text
    Article
  18. 3398

    An Anonymous Authentication Scheme in VANETs of Smart City Based on Certificateless Group Signature by Yuanpan Zheng, Guangyu Chen, Liguan Guo

    Published 2020-01-01
    “…In this scheme, it can implement the process of adding, signing, verifying, and revoking group members only by simple multiplication of the elliptic curve and synchronization factor technology, which shortens the length of the signature and improves the efficiency of the signature. …”
    Get full text
    Article
  19. 3399

    STUDY ON NONLINEAR DYNAMIC CHARACTERISTICS OF DRIVING SYSTEM OF SHEARER CUTTING MACHINE WITH CLEARANCE by XIE Mao, LIU XiFu, Fu ChunTian, YU HaiYang

    Published 2019-01-01
    “…The results show that the gears are increased by the gears The change of the meshing force and the amplitude of the frequency multiplication of the meshing frequency. Increasing the amplitude of the tooth side increases the fluctuation range of the engaging force,causing a large impact force in the transmission process,accelerating the wear of the tooth surface,The gears are broken in gear due to overload. …”
    Get full text
    Article
  20. 3400

    Géolocalisation des sources fiscales pré-révolutionnaires : la quadrature du cercle by Florent Hautefeuille

    Published 2016-08-01
    “…The multiplication of tax sources from the late Middle Ages makes possible the spatialization of data which, for previous periods were difficult to cross with the archaeological sources without adequate tools. …”
    Get full text
    Article