Showing 6,941 - 6,960 results of 21,030 for search '"multiplication"', query time: 0.11s Refine Results
  1. 6941

    Analysis for a Delayed Three-Species Predator-Prey Model with Feedback Controls and Prey Diffusion by Lili Jia

    Published 2020-01-01
    “…Finally, the corresponding stochastic time-delay predator-prey model with multiplicative noise sources is solved numerically, and some interesting new dynamics behavior is obtained.…”
    Get full text
    Article
  2. 6942

    Sublime Gaps by Antoine Dechêne

    Published 2018-07-01
    “…Including close readings of Henry James’s “The Figure in the Carpet” (1896) and Samuel Beckett’s Molloy (1951), this essay proceeds to show that the “metaphysical” character of these texts lies predominantly in their lack of faith in language as a reliable tool to convey the multiple and shifting identities of the unsuccessful sleuth confronted with the meaninglessness of his investigation.…”
    Get full text
    Article
  3. 6943
  4. 6944

    An energy-efficient multi-channel MAC protocol for linear sensor network by Fei TONG, Rucong SUI, Yu CHEN, Heng SU, Hengrui LIU, Shangfeng SU, Yuke YAN

    Published 2022-12-01
    “…Sensor nodes in linear sensor network (LSN) are deployed linearly due to the linear topology of the monitoring area.Most of the state-of-the-art medium access control (MAC) protocols designed for LSN adopted the duty-cycling and pipelined-forwarding (DCPF) schemes.They can reduce data propagation delay and network energy consumption but may still cause issues such as transmission competition, interference, and energy hole.To address these issues, an improved DCPF MAC protocol was proposed based on multiple channels and redundant-node deployment for LSN.The extensive simulations based on OPNET demonstrate that, compared with existing protocols, the proposed protocol shows a better performance in terms of energy efficiency, packet delivery ratio, throughput, and packet transmission latency.…”
    Get full text
    Article
  5. 6945

    Landscape Integrated Pest Management by Eileen A. Buss, Adam G. Dale

    Published 2016-05-01
    “…People can be quick to use pesticides, but an integrated approach using multiple tools can be much safer, have longer lasting beneficial effects, and in some cases cut costs. …”
    Get full text
    Article
  6. 6946

    Fugitive Plots: Adaptation, Storytelling, and Choreography in Cabin in the Sky and Stormy Weather by Elena Igartuburu

    Published 2023-07-01
    “…Using the concept of maroonage and the theories of image circulation proposed by Christina Sharpe (2016) and Sylvia Wynter (2016), I analyze the production history of the films, their origin in multiple adaptations, and their use of music and dance to illuminate the existence of micro agency within the film. …”
    Get full text
    Article
  7. 6947

    Regards croisés sur les feuilles de route hydrogène de trois pays : le Canada, le Japon et la France. Quels enseignements ? by Laurent Jammes

    Published 2021-04-01
    “…The multiple uses of hydrogen – as a mean to store energy, for mobility or cogeneration of electricity and heat, as a vector to bridge between energy networks – make it a key vector of the energy transition. …”
    Get full text
    Article
  8. 6948

    Bradamante et Fleurdépine. L’amour impossible du Roland furieux (1532) by Valentina Irena Denzel

    Published 2009-12-01
    “…At the same time, the multiple facets of Bradamante’s, Ricciardetto’s, and Fleurdépine’s sex and gender give way to a second interpretation of this episode.…”
    Get full text
    Article
  9. 6949

    An insight into the stochastic solitonic features of the Maccari model using the solver technique. by Hesham G Abdelwahed, Reem Alotaibi, Emad K El-Shewy, Mahmoud A E Abdelrahman

    Published 2024-01-01
    “…In this paper, the unified approach is used in acquiring some new results to the coupled Maccari system (MS) in Itô sense with multiplicative noise. The MS is a nonlinear model used in hydrodynamics, plasma physics, and nonlinear optics to represent isolated waves in a restricted region. …”
    Get full text
    Article
  10. 6950

    Les étudiants francophones et l’anglais à l’université française : mission impossible? by Nicole Décuré, Elisabeth Crosnier

    Published 2023-12-01
    “…Students from countries with multiple mother tongues and French as an official language, who are studying or completing their studies in France, often face serious difficulties in English. …”
    Get full text
    Article
  11. 6951

    Crop Growth Monitoring System Based on Agricultural Internet of Things Technology by Jienan Wu

    Published 2022-01-01
    “…After improving the fuzzy algorithm, this paper builds an intelligent model, builds the system structure framework according to the actual needs of crop growth monitoring, sets up and analyzes the environmental parameters, and builds the crop growth monitoring system from multiple perspectives. Finally, after constructing the system structure of this paper, the performance of the system proposed in this paper is verified. …”
    Get full text
    Article
  12. 6952

    Overview of quantum key distribution metropolitan optical networking technology by Hua WANG, Yongli ZHAO

    Published 2019-09-01
    “…Quantum key distribution is a basic implementation technology of quantum communication,which provides a secure key distribution method.With the maturity and development of point-to-point quantum key distribution technology,multi-point to multi-point quantum key distribution networking has become a trend of development in the future.How to construct a multi-point to multi-point quantum key distribution network is currently urgent problem.The architecture of QKD-MON was proposed,the key problems and corresponding strategies in QKD-MON were discussed,the applications of QKD-MON in various scenes were studied,and finally the future development direction and challenges were discussed.The QKD network architecture proposed can efficiently implement QKD between multiple points and provide key resources for the customer flexibly.…”
    Get full text
    Article
  13. 6953

    Entrepreneurial alertness: Study of the Influence of Individual Characteristics and Entrepreneurship by Hilka Pelizza Vier Machado, Valter da Silva Faia, Juliano Domingues da Silva

    Published 2016-01-01
    “…In order to identify the factors that influenced the alertness we developed multiple linear regression and the ANOVA test to determine possible differences among groups (gender, education). …”
    Get full text
    Article
  14. 6954

    L’incontournable usage du cas et de l’exemple dans l’enseignement universitaire by Alice Delserieys, Perrine Martin

    Published 2016-10-01
    “…This interest in university lecturers’ practices and their multiple uses of examples in class then raises the question of the effectiveness in relation to student engagement and learning.…”
    Get full text
    Article
  15. 6955

    Sticky Costs Behavior and Earnings Management by Alini da Silva, Vinícius Costa da Silva Zonatto, Cristian Baú Dal Magro, Roberto Klann

    Published 2019-01-01
    “…The sample comprised 160 Brazilian companies listed on BM&FBovespa between 2008 and 2017. Multiple linear regression models were used to analyze the data. …”
    Get full text
    Article
  16. 6956

    CHALLENGES IN THE MARKETING AND BRANDING OF CLUSTERS by Marita Koszarek

    Published 2013-12-01
    “…Specifics of clusters, such as multiple stakeholders, make it difficult to forge a strong brand identity. …”
    Get full text
    Article
  17. 6957

    Risk Management in Born Globals: the Case of Brazilian Craft Breweries by Fabricio Stocker, Gustavo Abib

    Published 2019-01-01
    “…Accordingly, we adopted the qualitative research approach, used a multiple case study strategy, and selected seven relevant craft breweries with national prominence. …”
    Get full text
    Article
  18. 6958

    Delay and energy minimization for MEC-based secure communication by Pinyi REN, Qian XU

    Published 2020-11-01
    “…Considering a physical-layer-security-aided confidential document transmission problem,a secure transmission strategy was proposed where the base station equipped with a mobile edge computing (MEC) server served as a relay to help compress,forward,and decompress.First,the Poisson point process was used to calculate the secure transmission probability for the scenario with multiple potential eavesdroppers.Then,a delay and energy minimization problem was formulated under a constraint on the two-hop secure transmission probability.The optimal compression and decompression scheme was obtained using the one-dimensional search combined with linear programming.Simulation results show that the document compression is necessary for the link with small achievable secrecy rate under a given secure transmission probability; otherwise,the document should be directly transmitted without compression.…”
    Get full text
    Article
  19. 6959

    Les mégaprojets hydriques de l’ouest étasunien : histoire d’État(s) et gestion des ressources naturelles by Joan Cortinas, Murielle Coeurdray, Brian O’Neill, Franck Poupeau

    Published 2016-12-01
    “…The reconstruction of that history has been possible by using multiple sources (literature review, grey literature, main actors’ personal records, etc.). …”
    Get full text
    Article
  20. 6960

    What is TEI Conformance, and Why Should You Care? by Lou Burnard

    Published 2018-12-01
    “…One of the more noticeable features of the Guidelines is their desire to have (as the French say) both the butter and the money for the butter; I will suggest that this polymorphous multiplicity is an essential component of the system, and has been a key factor in determining the TEI’s continued relevance.…”
    Get full text
    Article