Suggested Topics within your search.
Suggested Topics within your search.
- Law reports, digests, etc 5
- Mass media 2
- Methodology 2
- Objectivity 2
- Psychological aspects 2
- Psychology 2
- Research 2
- Agriculture 1
- Anesthesiology 1
- Communication in rehabilitation 1
- Corporate culture 1
- Descriptive cataloging 1
- Economic aspects 1
- Electronic circuits 1
- Examinations, questions, etc 1
- Medical rehabilitation 1
- Nursing 1
- Nursing Assessment 1
- Nursing Care 1
- Organizational behavior 1
- Organizational sociology 1
- Perioperative Nursing 1
- Regression analysis 1
- Rehabilitation 1
- Social sciences 1
- Standards 1
- Statistical methods 1
- Surgical nursing 1
- Telecommunication in medicine 1
- Telemedicine 1
-
3481
Mathematics Student Teachers’ Reflections on Their Preparation Of Ethnomathematics Approach: A Community Cultural Wealth Perspective
Published 2024-05-01“…The results of student teachers’ reflections are presented in three themes which emerged from this research: (1) ethnomathematics ushers pedagogical shift from traditional to innovative teaching approaches; (2) ethnomathematics approaches develop student teachers’ awareness of mathematics embedded in Morabaraba game; and (3) Integration of cultural techniques provide multiple strategies for teaching and learning multiplication concept. …”
Get full text
Article -
3482
Récits et expériences du paysage urbain historique de Porto, ville inscrite au patrimoine mondial de l’humanité
Published 2024-11-01“…It also highlights the fact that the multiplication of categories does not systematically lead to a greater inclusion of heritage. …”
Get full text
Article -
3483
Interference in English managerial discourse exemplified by business cases
Published 2025-01-01“…Discourse interference is analyzed through the prism of the linguosynergetic approach, which is based on the principle of non-linearity, and sense multiplication effects as a result of interaction of discourses and which describes the appearance of new senses and new opportunities for development of the discourses based on their coexistence and interaction. …”
Get full text
Article -
3484
Fast and low‐power leading‐one detectors for energy‐efficient logarithmic computing
Published 2021-07-01“…Abstract The logarithmic number system (LNS) can be used to simplify the computation of arithmetic functions, such as multiplication. This article proposes three leading‐one detectors (LODs) to speed up the binary logarithm calculation in the LNS. …”
Get full text
Article -
3485
Small pilot study of ultra-high pressure reverse osmosis technology for treating landfill leachate in Northwest China
Published 2024-12-01“…This paper took influent pH, operating pressure and temperature as influencing factors, and COD, ammonia nitrogen and conductivity of concentrate and produced water as evaluation parameters, to derive the optimal working conditions by analyzing the changes of concentration multiplication rate, membrane flux and water production rate to treat leachate from a landfill plant in Lanzhou. …”
Get full text
Article -
3486
Novel direct sequence spread spectrum communication method
Published 2023-12-01“…In response to the problem of limited performance and low spectral efficiency in complex multipath environments of traditional direct sequence spread spectrum communication, a cyclic prefix (CP) block transmission structure spread spectrum system with a time-frequency hybrid direct sequence spread spectrum receiver structure was proposed.The system adopted maximum ratio combination (MRC) in the frequency domain to achieve equalization and de-spreading processes simultaneously, while achieving optimal reception performance and omitting the IFFT process to reduce computational complexity significantly.On this basis, it was proposed to replace the m-sequence with the constant amplitude zero auto correlation (CAZAC) sequence as the spread spectrum sequence, which significantly improved the system performance without increasing computational complexity.Finally, a high-speed spread spectrum communication method based on cyclic code shift keying (CCSK) was proposed to solve the problems of low spectrum utilization efficiency and limited transmission rate in traditional direct sequence spread spectrum.By utilizing the property of Fourier transform time-domain cyclic shift, a low implementation complexity CCSK decoding method was designed, which reduced the multiplication number required for CCSK de-spreading by O(N<sup>2</sup>) reduced to O (Nlog N), greatly reducing resource consume.The simulation results show that compared to existing direct sequence spread spectrum methods, the proposed method achieves approximately 3 dB gain in both Gaussian and complex multipath channel environments.…”
Get full text
Article -
3487
A Low-Power Streaming Speech Enhancement Accelerator for Edge Devices
Published 2024-01-01“…The tailored hardware accommodates these diverse computing patterns by breaking them down into element-wise multiplication and accumulation (MAC). This is achieved through a 1-D processing array, utilizing configurable SRAM addressing, thereby minimizing hardware complexities and simplifying zero skipping. …”
Get full text
Article -
3488
Principled neuromorphic reservoir computing
Published 2025-01-01“…., neurons that enable both summation as well as multiplication of inputs. Finally, we provide an implementation of the memory buffer and Sigma-Pi networks on Loihi 2, an existing neuromorphic hardware platform.…”
Get full text
Article -
3489
Constructing method of opaque predicate based on type conversion and operation of floating point numbers
Published 2023-10-01“…With the increasing complexity of software functions and the evolving technologies of network attacks, malicious behaviors such as software piracy, software cracking, data leakage, and malicious software modification are on the rise.As a result, software security has become a focal point in industry research.Code obfuscation is a common software protection technique used to hinder reverse engineering.It aims to make program analyzing and understanding more difficult for attackers while preserving the original program functionality.However, many existing code obfuscation techniques suffer from performance loss and poor concealment in pursuit of obfuscation effectiveness.Control flow obfuscation, particularly opaque predicate obfuscation, is widely used to increase the difficulty of code reverse engineering by disrupting the program’s control flow.A method was proposed to address the limitations of existing code obfuscation techniques.It utilized the phenomenon of precision loss that occurred during type conversion and floating-point number operations in computers.Under certain conditions, this method produced operation results that contradict common sense.By performing forced type conversion, addition, and multiplication with selected decimal numbers, a series of opaque predicates can be constructed based on the statistical analysis of their operation results.This approach achieved code obfuscation with high concealment, good generality, reversibility, and low overhead compared to traditional opaque predicates.Experimental verification demonstrates that this method significantly slows down attackers’ reverse engineering efforts and exhibits good resistance to dynamic analysis techniques such as symbolic execution.…”
Get full text
Article -
3490
New operations on cubic intuitionistic fuzzy sets under P–order
Published 2024-12-01“…In this piece of work, few operators on the cubic intuitionistic fuzzy sets under P – order, such as arithmetic mean (@), geometric mean ($), multiplication operator (*), ‘#’ and necessity (□) and possibility (◇) operations on the cubic intuitionistic fuzzy sets under P – order, are defined. …”
Get full text
Article -
3491
-
3492
Euro-Med Abandoned Small(er) Towns. A landscape/ecological urbanism perspective for sustainable regeneration in Basilicata inlands
Published 2022-11-01“…Performative bio-cultural green infrastructure, through the multiplication of public space, could support sustainable processes, in an ecological, economic and social sense. …”
Get full text
Article -
3493
Tritium Breeding Performance Analysis of HCLL Blanket Fusion Reactor Employing Vanadium Alloy (V-5Cr-5Ti) as First Wall Material
Published 2022-01-01“…This alloy has the highest number of neutronic performing for 1.27 TBR and 1.26 in multiplication energy factor in all investigations. Meanwhile, the amount of atomic displacement, hydrogen, and helium production are around 22.31 appm, 765.55 appm, and 281.57 appm, respectively. …”
Get full text
Article -
3494
Ethnomathematical perspectives on Galah Asin: Investigating the mathematical and cultural significance of a traditional game
Published 2024-09-01“…Galah Asin also has addition, subtraction, multiplication, and division in gameplay. The implication of exploring ethnomathematics study is that understanding cultural activities can be integrated into school mathematics instruction. …”
Get full text
Article -
3495
Closed Fuel Cycle and Minor Actinide Multirecycling in a Gas-Cooled Fast Reactor
Published 2009-01-01“…By a careful choice of the MA-fraction in the fuel, the reactivity of the fuel can be tuned to obtain a preset multiplication factor at end of cycle. Preliminary decay heat calculations show that the presence of MA in the fuel significantly increases the decay heat for time periods relevant to accidents (104–105 s after shutdown). …”
Get full text
Article -
3496
Monolithic 3-D-Based Nonvolatile Associative Processor for High-Performance Energy-Efficient Computations
Published 2024-01-01“…We build a custom cycle-accurate simulator to implement and evaluate the 3-D associative matrix multiplication algorithm, highlighting the potential of the M3D AP for accelerating artificial intelligence applications. …”
Get full text
Article -
3497
Compilation of components of urban architectural spaces durability emphasizing the of everyday life rhythms (Case study: Tabriz Bazaar)
Published 2021-03-01“…Considering the importance of sustainability, the purpose of this study is to identify the factors affecting the survival of urban spaces, with emphasis on the multiplication of effective daily life in three areas of the Tabriz market (Grand mosque, Rasteh bazar, and Saheb-ol-amr square). …”
Get full text
Article -
3498
Key Success Factors for Export Structure Optimization in East Asian Countries Through Global Value Chain (GVC) Reorganization
Published 2025-01-01“…Through a literature review and expert interviews, 14 pivotal factors were analyzed using DEMATEL (Decision Making Trial and Evaluation Laboratory), ISM (Interpretive Structural Modeling), and MICMAC (Cross-Impact Matrix Multiplication Applied to Classification) methods. Findings show that strengthening innovation capabilities, facilitating technology spillovers, investing in cross-border e-commerce, and improving market access policies are crucial drivers of export optimization. …”
Get full text
Article -
3499
J. M. KEYNES AND HIS ECONOMIC THEORY: AN ETHICAL PERSPECTIVE
Published 2016-06-01“…The final part of the article analyzes one of the most important, from the point of view of Keynes, vices of capitalism - reckless proclivity of people to the multiplication of "abstract monetary wealth". It is shown that it doesn't only disfigure the psyche and consciousness of people, but also changes the direction of development of the market economy towards "speculative capitalism", which creates a threat to civilization, creativity, well-being and full development of the individual.…”
Get full text
Article -
3500
Human, too human? Experience, Learning, Interaction with AI
Published 2025-01-01“…The importance of the contribution lies in emphasising the need to keep the two components, the artificial and the human, separate to foster an interactional and communicational exchange destined to become increasingly frequent in the future, as is already the case in most social contexts. The multiplication of the spheres of interaction between humans and AI embodied in social robots makes it possible to consolidate a partnership with interesting developments from an epistemological point of view and with possible applications in which two intelligences of different natures, organic and inorganic, can for the first time work together to produce knowledge. …”
Get full text
Article