Suggested Topics within your search.
Suggested Topics within your search.
- Law reports, digests, etc 5
- Mass media 2
- Methodology 2
- Objectivity 2
- Psychological aspects 2
- Psychology 2
- Research 2
- Agriculture 1
- Anesthesiology 1
- Communication in rehabilitation 1
- Corporate culture 1
- Descriptive cataloging 1
- Economic aspects 1
- Electronic circuits 1
- Examinations, questions, etc 1
- Medical rehabilitation 1
- Nursing 1
- Nursing Assessment 1
- Nursing Care 1
- Organizational behavior 1
- Organizational sociology 1
- Perioperative Nursing 1
- Regression analysis 1
- Rehabilitation 1
- Social sciences 1
- Standards 1
- Statistical methods 1
- Surgical nursing 1
- Telecommunication in medicine 1
- Telemedicine 1
-
3381
“If only you could see me now”: Autoportrait et théâtralité dans les lettres de Sylvia Plath à sa mère
Published 2023-06-01“…Sylvia Plath's work is haunted by the question of self-representation; her poems, her autobiographical novel The Bell Jar, her short stories, her diary, and her correspondence can be read as facets of a self-portrait diffracted through the different mirrors of these literary genres. This multiplication of the autobiographical mode and of the figures of the self seems to result from an ambivalent attitude to self-representation: while the latter is perceived as synonymous with psychic integrity, it is also deeply feared because, freezing the subject, it could prove fatal. …”
Get full text
Article -
3382
De la « Fortress Conservation » aux nouveaux modèles de gestion participative de la biodiversité en Tanzanie
Published 2020-05-01“…Conservation models with a "participatory and inclusive" label are more related to the criminalization of practices and uses prior to the devices and promote the multiplication of guards and police, rather than proposing a particular awareness within a broader vision of political ecology. …”
Get full text
Article -
3383
Bit-Table Based Biclustering and Frequent Closed Itemset Mining in High-Dimensional Binary Data
Published 2014-01-01“…The method is based on simple but very powerful matrix and vector multiplication approaches that ensure that all patterns can be discovered in a fast manner. …”
Get full text
Article -
3384
Crise rural multidimensional e políticas integradas: o caso do Recôncavo da Bahia
Published 2019-12-01“…Historic birthplace of brazilian agrarian society, the region of Recôncavo of Bahia currently faces a rural development crisis, also taking place in other regions of Bahia and the Northeast of Brazil. The multiplication of very small farms, the adverse markets trends and the recession of the national economy are combined and result in high levels of social fragility, the emptying of the field and the ageing of the rural population. …”
Get full text
Article -
3385
Síntesis y crítica de las evaluaciones de la efectividad de los motores de búsqueda en la Web. (Synthesis and critical review of evaluations of the effectiveness of Web search engi...
Published 2003-01-01“…The consolidation of the World Wide Web as the paradigmatic method for developing the Information Society, and the continuous multiplication of the number of documents published in this environment, has led to the implementation of the most advanced, and extensive information retrieval systems, in the shape of web search engines. …”
Get full text
Article -
3386
Les conflits fonciers comme analyseurs des guerres civiles : chefs de guerre, militaires américains et juges Taliban dans la Kunar
Published 2013-06-01“…Consideration of conflicts over inheritance and plot demarcations constitute a particularly powerful means of analyzing the social tensions that fuel the civil war in this rural province of Afghanistan. The multiplication and politicization of land disputes throughout the last three decades highlight the dislocation of the political structures and the normative framework which regulated these conflicts before the Soviet invasion. …”
Get full text
Article -
3387
Nonrecursive Equivalent of the Conjugate Gradient Method without the Need to Restart
Published 2019-01-01“…As in CG, only one matrix-vector multiplication is required per step with appropriate transformations. …”
Get full text
Article -
3388
Réponse de quatre variétés de Anacardium occidentale L. aux techniques de greffage horticole en pépinière
Published 2017-12-01“…The objective of the study was to help improve the effective multiplication of A. occidental L. best varieties. To do so, a grafting test of juvenile and adult material using four (4) rootstocks corresponding to the "varieties" of western A. occidentale L. …”
Get full text
Article -
3389
Identification of three novel species and one new record of Kirschsteiniothelia (Kirschsteiniotheliaceae, Kirschsteiniotheliales) from Jiangxi, China
Published 2025-01-01“…While plant debris is a habitat favoring the survival and multiplication of various microbial species. In this study, several kirschsteiniothelia-like isolates were collected from dead branches of unidentified perennial dicotyledonous plants. …”
Get full text
Article -
3390
Focusing of Spotlight Tandem-Configuration Bistatic Data with Frequency Scaling Algorithm
Published 2016-01-01“…Range cell migration correction (RCMC) is realized through phase multiplication. The proposed algorithm is insensitive to the length of the baseline due to the high precision of the point target (PT) spectrum that we are based on. …”
Get full text
Article -
3391
Improved Generalized Single-Source Tangential Equivalence Principle Algorithm with Contact-Region Modeling Method for Array Structures
Published 2018-01-01“…Furthermore, the multilevel fast multipole algorithm (MLFMA) is used to accelerate the matrix-vector multiplication in the GSST-EPA. Numerical results are shown to demonstrate the accuracy and efficiency of the proposed method.…”
Get full text
Article -
3392
Certain Spaces of Functions over the Field of Non-Newtonian Complex Numbers
Published 2014-01-01“…Later, we define the space C*(Ω) of *-continuous functions and state that it forms a vector space with respect to the non-Newtonian addition and scalar multiplication and we prove that C*(Ω) is a Banach space. …”
Get full text
Article -
3393
Secure and efficient two-party ECDSA signature scheme
Published 2021-02-01“…To solve the easy disclosure of signature private key and excessive concentration of signature rights, a secure and efficient two-party ECDSA signature scheme was proposed for the blockchain based network trading systems.By pre-computing one-time pad Beaver’s triple, and utilizing the Beaver’s triple based secure two-party multiplication technology, some computationally intensive homomorphic encryption operations and oblivious transfer operations with high communication overhead were effectively avoided, and thereby an efficient two-party ECDSA signing was realized, which could ensure that the two signing parties output valid ECDSA signature without reconstructing the complete private key.The proposed scheme was proved to be provably secure under the hybrid model of the universally composable framework.Theoretical analysis and simulation results demonstrate that the proposed scheme has significant advantages in terms of signing efficiency and bandwidth requirements when compared with the existing two two-party ECDSA signature schemes.…”
Get full text
Article -
3394
Verifiable access control scheme based on unpaired CP-ABE in fog computing
Published 2021-08-01“…Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality and fine-grained access control.The excessive computational overhead of bilinear pairing restricts its application and development.In response to this, a verifiable access control scheme was proposed based on unpaired CP-ABE in fog computing.In order to make CP-ABE more efficient, simple scalar multiplication in elliptic curve encryption was used to replace bilinear pairing, thereby reducing the overall computational overhead.Decryption operations were outsourced to fog nodes to reduce user computational complexity, and based on the tamper-proof and traceable characteristics of the blockchain, the correctness of the access transaction was verified and the access authorization process was recorded.Security and performance analysis shows that the scheme is safe under the elliptic curve decision-making DBDH (Diffie-Hellman) assumption, and the calculation efficiency is higher.…”
Get full text
Article -
3395
Generalized roughness of three dimensional ( $$\in ,\in \vee q$$ ∈ , ∈ ∨ q )-fuzzy ideals in terms of set-valued homomorphism
Published 2024-05-01“…Abstract The objective of this study is to generalize the roughness of a fuzzy set-in three-dimensional structure by introducing ternary multiplication. Many results and theorems of rough fuzzy ideals have been extended from semigroup and semiring, to ternary semiring by introducing the definition of a rough fuzzy subset of ternary semiring. …”
Get full text
Article -
3396
« Qu’est-ce qu’il y a de pire que cette injustice et cette oppression, oh homme ? » Mouvement féminin, presse et stratégies d’émancipation, Soudan 1950-1956
Published 2020-03-01“…They were mostly written by women journalists, but also by some men. The multiplication of women’s voices was unprecedented in modern Sudanese history. …”
Get full text
Article -
3397
Exploring Drug Targets in Isoprenoid Biosynthetic Pathway for Plasmodium falciparum
Published 2014-01-01“…Among several pathways in apicoplast, isoprenoid biosynthesis is one of the important pathways for parasite as its multiplication in human erythrocytes requires isoprenoids. …”
Get full text
Article -
3398
An Anonymous Authentication Scheme in VANETs of Smart City Based on Certificateless Group Signature
Published 2020-01-01“…In this scheme, it can implement the process of adding, signing, verifying, and revoking group members only by simple multiplication of the elliptic curve and synchronization factor technology, which shortens the length of the signature and improves the efficiency of the signature. …”
Get full text
Article -
3399
STUDY ON NONLINEAR DYNAMIC CHARACTERISTICS OF DRIVING SYSTEM OF SHEARER CUTTING MACHINE WITH CLEARANCE
Published 2019-01-01“…The results show that the gears are increased by the gears The change of the meshing force and the amplitude of the frequency multiplication of the meshing frequency. Increasing the amplitude of the tooth side increases the fluctuation range of the engaging force,causing a large impact force in the transmission process,accelerating the wear of the tooth surface,The gears are broken in gear due to overload. …”
Get full text
Article -
3400
Géolocalisation des sources fiscales pré-révolutionnaires : la quadrature du cercle
Published 2016-08-01“…The multiplication of tax sources from the late Middle Ages makes possible the spatialization of data which, for previous periods were difficult to cross with the archaeological sources without adequate tools. …”
Get full text
Article