Suggested Topics within your search.
Suggested Topics within your search.
- Law reports, digests, etc 5
- Mass media 2
- Methodology 2
- Objectivity 2
- Psychological aspects 2
- Psychology 2
- Research 2
- Agriculture 1
- Anesthesiology 1
- Communication in rehabilitation 1
- Corporate culture 1
- Descriptive cataloging 1
- Economic aspects 1
- Electronic circuits 1
- Examinations, questions, etc 1
- Medical rehabilitation 1
- Nursing 1
- Nursing Assessment 1
- Nursing Care 1
- Organizational behavior 1
- Organizational sociology 1
- Perioperative Nursing 1
- Regression analysis 1
- Rehabilitation 1
- Social sciences 1
- Standards 1
- Statistical methods 1
- Surgical nursing 1
- Telecommunication in medicine 1
- Telemedicine 1
-
6921
Supporting Preemptive Multitasking in Wireless Sensor Networks
Published 2014-02-01“…Supporting the concurrent execution of multiple tasks on lightweight sensor nodes could enable the deployment of independent applications on a shared wireless sensor network, thus saving cost and time by exploiting infrastructures which are typically underutilized if dedicated to a single task. …”
Get full text
Article -
6922
A novel fuzzy vault scheme based on the feature level fusion of fingerprint and face features
Published 2018-10-01“…Aiming at the problem that the biometric feature-based fuzzy vault is vulnerable to correlation attack and the loss of key and biometric template,and the authentication performance of fuzzy vault based on single biometric feature is unreliable,a novel fuzzy vault scheme based on the feature level fusion of fingerprint and face features was proposed.This scheme carried out irreversible transformation of fingerprint features and face features,and based on the Diffie-Hellman algorithm,the transformed fingerprints and face features were fused into a template at the feature level.Finally,the fusion template was used to construct the fuzzy vault.By updating the random matrix,the vault could be revoked,which could effectively resist the correlation attacks and achieve reliable authentication.Experimental results show that the proposed scheme improves the reliability of the system and the security of multiple biometric templates.…”
Get full text
Article -
6923
Pratiquer une réflexion épistémologique sur les sciences dans une école communautaire du Québec : exemple de tension entre savoirs diffusés et savoirs locaux.
Published 2015-09-01“…We think generally, in most of the western countries, that the pupils and the teachers know difficulties during the teaching of the experimental sciences. Multiple causes, often vague, are advanced to explain them. …”
Get full text
Article -
6924
A estética contemporânea: nova poética, novo olhar
Published 2012-01-01“…The so-called Post-Modernism in Brazil, as in most western countries, is a multiple phenomenon, full of indetermination. One aspect of this panorama is the distrust of speech structures once considered stables that seemed to characterize the modernist language, and also the consciense of the precarious status of the groundworks and determinations, which is disseminated in the idea of scattering, of insuficiency of the dialectics supported by enlightenment and rationalism. …”
Get full text
Article -
6925
Situational Fluidity and the Use of Identity Labels in Interactions
Published 2025-01-01“…On the basis of 52 interviews, the authors show that LGBTQ+ people adopt multiple terms and adjust their usage relative to the interactional demands at hand. …”
Get full text
Article -
6926
An Improved Retransmission Approacb Based on Opportunistic Network Coding in Multicast Networks
Published 2015-04-01“…A novel opportunistic-network-coding-based retransmission approach was proposed.According to the feedback on packet loss from the receiving nodes,this novel approach can not only efficiently select a combination of lost packets through Hash lookup for packet retransmission,but also can ensure priority retransmission making up to a single combination retransmission packet which can maximize the number of receiving nodes for recovering their lost packets.Furthermore,the proposed approach fully exploits the coding opportunity based on neighborhood association,and allows the receiving nodes to recover their lost packets from multiple retransmission packets.The simulation results show that this novel approach can effectively reduce the number of retransmissions to improve the transmission efficiency with respect to the existing algorithms.…”
Get full text
Article -
6927
AONT-and-NTRU-based rekeying scheme for encrypted deduplication
Published 2021-10-01“…Rekeying is a good way to protect against key exposure.Most of the existing encrypted deduplication systems are implemented based on message-locked-encryption, in which multiple users with the identical data share the same encryption key.When a user updates keys, that update must be followed by all other data owners, which will incur large computational and communicational overheads.To solve this problem, an AONT-and-NTRU-based rekeying scheme was proposed, a variant of AONT was designed to solve the synchronization problem of multi-user rekeying, and a proxy re-encryption algorithm based on NTRU was introduced to reduce the communicational overhead for the system and computational overhead for clients during rekeying.The efficiency analysis and experimental results show that the proposed scheme has better encryption and decryption efficiency than existing schemes and the time cost of rekeying is significantly reduced.…”
Get full text
Article -
6928
A density clustering-based network performance failure big data analysis algorithm
Published 2020-09-01“…Facing frequent network security incidents,how to quickly find abnormal data in massive monitoring database and carry out network failure analysis becomes a research difficulty.A density-based network performance failure big data analysis algorithm was proposed,which extracted key performance characteristic indicators through entropy weight analysis,implemented data shaping through data cleaning and standardization,and extracted abnormal performance data on the basis of DBSCAN clustering algorithm.Relying on the real-time massive backbone network link performance data of multiple domestic operators to validated this algorithm,the results shows that compared with the manually manner,the recognition accuracy of the algorithm proposed to the network performance abnormal data is more than 90%,which can well fit for the analysis of real-time Internet network operation failure.…”
Get full text
Article -
6929
Jesus talks to the Samaritan woman
Published 2024-12-01“… The contemporary world is characterised by the dehumanisation of “the other” on multiple grounds. Jesus’ encounter with the Samaritan woman (John 4:1-42) sheds light on his attitude towards, and his engagement with her as a conventional “other” for Jews. …”
Get full text
Article -
6930
Dynamic P2P trust model based on context factors
Published 2016-08-01“…A multi-dimensional trust model was constructed based on the context factors.The direct trust of the interac-tive entities was estimated by integrating the time-decay factor,the transaction impact factor and the participation fre-quency.The trust similarity algorithm was designed based on the Dice similarity and the feedback credibility was aggre-gated from multiple trust chains.The direct interaction,the evaluation similarity and the trust chain was integrated for calculating the recommendation trust.The peer's trust was evaluated by combing the direct trust and the recommendation trust.A new mechanisam was proposed for the trust's update,incentive or punishment according to the peer's behavior on the interaction.The practical example analysis shows that the proposed model can effectively explain the effect of the transaction contextual factors on the entity trust,and can improve the trust sensitivity to the context transaction factors.…”
Get full text
Article -
6931
Variation in mitochondrial genome primary sequence among whole-genome-sequenced strains of Neurospora crassa
Published 2012-06-01“…Despite the fact that the mitochondrial genome is present in multiple copies per cell, many of the polymorphisms were homozygous within each strain. …”
Get full text
Article -
6932
In the Clouds: On the Vagueness of Atmospheres
Published 2017-02-01“…In the course of listing the multiple characteristics of atmosphere, problems that have to do with language emerge. …”
Get full text
Article -
6933
Mémoire et minorité : l’identité collective dans la littérature germanophone de Belgique
Published 2016-12-01“…Through a close reading of selected literary texts from German-speaking minority authors in East Belgium, this contribution will discuss the status of the literary representation of minority culture and its expression of multiple identities and allegiances as a space (be it geographic, cultural, linguistic, or aesthetic) in which global and local forces interact. …”
Get full text
Article -
6934
Les miroirs médiévaux : réflexions génériques et genrées
Published 2024-12-01“…While these texts aim to « engender » subjects through their prescriptive writing, the medieval educational treatises, both in the body of the text and in their materiality, present multiple facets that go beyond the gendered distribution of the initial address. …”
Get full text
Article -
6935
Research of smart power station framework and practice of informatization construction
Published 2016-04-01“…Following this blueprint,program management approach was innovated,the problem that the implementation workis multiple,complex and strongly relevant was solved,initial results in six areas was achieved,the overall operation level of power plant was improved,and experience for the development of smart power industry in China was accumulated.…”
Get full text
Article -
6936
Les mosquées ibadites du Maghreb
Published 2009-07-01“…The Ibadite mosques of Mzab, Jebel Nafûsa and Djerba share a number of characteristics, the most important being the multiplicity of mihrabs and prayer niches outside of the sanctuary. …”
Get full text
Article -
6937
Ossifying Fibroma of Mandible - A Case Report
Published 2023-10-01“…Findings: Clinical manifestations include asymptomatic expansion of the mandible with infrequent maxillary lesions, pain, malocclusion, and compromised quality of life including aesthetic perception. Owing to multiplicity of features, tendency of recurrence, and possibility of malignant transformation, the diagnosis, treatment, and post-operative management of ossifying fibroma are always a challenge. …”
Get full text
Article -
6938
Parry–Romberg Syndrome with Uhthoff’s Phenomena: A Spectrum of Autoimmune Disease?
Published 2019-01-01“…The present case suggests that PRS may possibly have an autoimmune etiology resembling that of multiple sclerosis.…”
Get full text
Article -
6939
Acer palmatum 'Bloodgood'
Published 2004-10-01“…Leaves turn greenish red during hot weather in the southern part of its range. The multiple trunks are muscular-looking, picturesque, grey and show nicely when lighted at night. …”
Get full text
Article -
6940
State recovery attack on ACORN v3 in nonce-reuse setting
Published 2020-08-01“…Based on differential-algebraic method and guess-and-determine technique,the state recovery attack of ACORN v3 was presented when one pair of key and Nonce was used to encrypt two messages.The time complexity of the attack was 2<sup>122.5</sup>c,where c was the time complexity of solving linear equations.The data complexity and the storage complexity were negligible.Furthermore,according to the analysis on the sense of multiple nonce reuse,it is found that relatively complicated filter function of ACORN v3 makes it infeasible to extract the linear equations about the internal state directly from key streams.Thus,the risk of significantly reducing the attack complexity by increasing the times of nonce reuse can be effectively avoided.…”
Get full text
Article