Showing 6,981 - 7,000 results of 21,030 for search '"multiplication"', query time: 0.09s Refine Results
  1. 6981

    Un General Data Protection Regulation (GDPR) non molto general by Elena Bougleux

    Published 2021-06-01
    “…Recalling various traditions of studies – in philosophy, history, cultural criticism and linguistic – which have deeply discussed the genesis of knowledge, the essay highlights the limitations and risks of an approach that proposes a single management for a multiplicity of variable and non-reducible research circumstances.…”
    Get full text
    Article
  2. 6982

    2019–2020 Florida Citrus Production Guide: Postbloom Fruit Drop by Natalia A. Peres, Megan M. Dewdney

    Published 2019-08-01
    “…Navel and Valencia oranges have experienced the most severe damage in Florida since they tend to have extended or multiple blooms. This 3-page fact sheet is part of the 2019–2020 Florida Citrus Production Guide. …”
    Get full text
    Article
  3. 6983

    Le vol sous l’œil des médecins légistes. Étude du concept de kleptomanie au cours du XIXe siècle by Lisa Bogani

    Published 2016-05-01
    “…Matthey, the concept of kleptomania has developed multiple evolutions during the 19th Century. Whereas this concept has been hardly recognized by magistrates and alienists of the first 19th century, it still manages to maintain itself and it's been strengthened in the courts under the Third Republic. …”
    Get full text
    Article
  4. 6984

    Network fault location based on bipartite graphs for communication and information networks by Limin CUI, Qingsu HE, Junsheng WANG, Xin SHI

    Published 2017-03-01
    “…Grasping the transmission correlation of network nodes, a joint network fault location mechanism based on bipartite graph model was proposed.Firstly,network nodes were clustered into multiple sub-domains based on their fault correlation.Then,the bipartite graph fault correlation model was established for each sub-domain.Finally,the target sorting method was applied to locate network faults in every sub-domain simultaneously.Simulation experiments show that this method can locate network faults with high accuracy.…”
    Get full text
    Article
  5. 6985

    Partial computation offloading method based on joint resource allocation for mobile edge computing by Yao LIU, Yueyuan HE, Hongjing ZHOU, Chaoliang LI, Chuang LI

    Published 2023-03-01
    “…In order to meet the requirements of users for computing-intensive tasks and solve the problems of limited computing resources and energy of mobile terminals, a partial offloading method was proposed for multi-user mobile edge computing system with orthogonal frequency division multiple access by setting constraints such as task delay, device energy and communication resources, aiming at optimizing task delay.The initial offloading ratio was set and the communication resource was allocated under the condition of satisfying the user’s minimum delay.And then the remaining computing resource was allocated according to the server’s computing capability.Finally, the offload ratio was optimized according to the resource allocation.Simulation results show that this method can reduce the delay of task computing and the energy consumption of mobile terminals.…”
    Get full text
    Article
  6. 6986

    Measurement of strange baryon production in charged-particle jets in pp and p-Pb collisions with ALICE by van Weelden Gijs

    Published 2025-01-01
    “…The enhancement of the ratio of strange to non-strange hadrons with increasing charged-particle multiplicity density is often interpreted as a signature of the medium formed in heavy-ion collisions. …”
    Get full text
    Article
  7. 6987

    Incremental dynamic community discovery algorithm based on multi-core nodes by Jing CHEN, Zhijun LIU, Xinyu YANG, Mingxin LIU, Miaomiao LIU

    Published 2024-03-01
    “…A new incremental dynamic community discovery algorithm MCNIDCD based on multiple core nodes was proposed to address challenges in dynamic community discovery.It adapted to sudden events like the emergence or disappearance of communities during evolution.MCNIDCD categorized core nodes into diffusion and cohesion types, and devised four incremental updating strategies.It adjusted node community membership locally and optimized community structure using an incremental modularity method to facilitate community merging.Evaluation on artificial and real networks shows MCNIDCD’s high conformity to community evolution patterns.In real network experiments, MCNIDCD exhibits a 28% average improvement in modularity performance and significant stability advantages.Its superiority is important for studying dynamic community evolution.…”
    Get full text
    Article
  8. 6988

    Internet como instrumento para la Yihad by Alfonso Merlos García

    Published 2006-01-01
    “…Los medios de comunicación, la clase política y las agencias de seguridad e información han tendido a concentrar sus esfuerzos en la neutralización del ciberterrorismo sin prestar suficiente atención a los múltiples usos de Internet que están haciendo los neosalafistas: para la propaganda y para la guerra psicológica, para el reclutamiento y para la financiación, para la documentación y para la planificación de atentados. …”
    Get full text
    Article
  9. 6989

    Improvement of lightweight threshold group signature scheme by Zhirong ZHU, Jiayu LYU, Guohua YE, Zhiqiang YAO

    Published 2020-08-01
    “…In order to improve the security and efficiency of threshold group signature in 5G environment,a new scheme was proposed.The core idea was to introduce message token and dynamic identity to improve the freshness of authentication information and increase the difficulty of enemy attacks.At the same time,the number of interactions between the participating parties was simplified,and some computing tasks were migrated to the server to reduce the computing overhead of the member part.After security analysis,the proposed scheme can resist multiple attacks including replay attack.After performance analysis,the proposed scheme can reduce the interaction with the trusted center twice compared with similar schemes,reduce the signature space by 30%,and have shorter execution time,which is suitable for resource-constrained devices under 5G network.…”
    Get full text
    Article
  10. 6990

    Parameter Sensitivity Analysis of Permanent Magnetic Eddy-current Flexible Transmission by Tongyu Shi

    Published 2020-01-01
    “…To study the effect of the parameters of permanent magnet eddy-current flexible transmission on multiple performance objectives of output performance, the accurate analytical model is built. …”
    Get full text
    Article
  11. 6991

    The Problem of Confounding in Studies of the Effect of Maternal Drug Use on Pregnancy Outcome by Bengt Källén

    Published 2012-01-01
    “…In rare instances, infant sex and multiple birth can appear as confounders. The most difficult problem to solve is often confounding by indication. …”
    Get full text
    Article
  12. 6992

    An Application of Subgroup Discovery Algorithm on the Case of Decentralization and Quality of Governance in EU by Lan Umek

    Published 2014-12-01
    “…The degree of decentralization is measured from a fiscal and political point of view, and the quality of governance by multiple indicators and citizen opinions. The paper presents a subgroup discovery algorithm which is capable of analysing two sets of several variables, and uses it for the analysis of EU countries. …”
    Get full text
    Article
  13. 6993

    La vehemencia de sí. Elementos para una filosofía del consentimiento by Patricio Andrés Mena Malet

    Published 2014-01-01
    “…Se busca aportar elementos conceptuales para una filosofía del consentimiento, al interrogar el privilegio que otorga Paul Ricœur a la afirmación con respecto a las múltiples formas de negatividad inscritas en el ser humano y en sus acciones. …”
    Get full text
    Article
  14. 6994

    Exposer la sculpture au Louvre au temps de Rodin, 1860-1914 by Geneviève Bresc-Bautier

    Published 2016-05-01
    “…In the rooms of the Musée du Louvre, curators were faced with many constraints: space limited in surface, height and the repartition into rooms by the architecture of an existing palace; lateral light from windows on a single side; existing original collection; multiple improvements, influenced by the curiosity and appetite of the curators, the taste of the donors and the assignments from the Musée du Luxembourg. …”
    Get full text
    Article
  15. 6995

    Video Fingerprint Management System:Exploration and Practice on Video Content Security Protection by Yufeng Li, Shoulian Qian, Julong Lan, Xiaoqiang Guo, Bo Chen

    Published 2015-06-01
    “…Moreover,the system can locate on carrying network line and provide solutions for supervision of video fragmentation under multiple-screen fusion situation and copyright protection on transmit line in real time.…”
    Get full text
    Article
  16. 6996

    Eterotopie. Lo spazio tra potere e sapere nell’impresa genealogica di Michel Foucault by Sebastianelli, Pietro

    Published 2024-12-01
    “…The aim of this essay is to attempt to frame the theme of space in Michel Foucault's research, through a recognition of some of the multiple theoretical places in which the problematic of space comes into question in the French philosopher's thought.…”
    Get full text
    Article
  17. 6997

    Efficient broadcast transmission algorithms based on opportunistic network coding by Ji LU, Cheng-ke WU, Song XIAO, Ran ZHANG

    Published 2012-01-01
    “…Opportunistic network coding (ONC) based broadcast transmission algorithms were proposed to improve the transmission efficiency for wireless single-hop networks.Based on the traditional wireless broadcast transmission model,ONC based solo combination packet broadcast transmission (ONCSB) algorithm and ONC based multiple combination packets broadcast transmission (ONCMB) algorithm were osed respectively.By employing the method of combination different lost packets with different strategies,the ONCSB and ONCMB can improve the throughput with recovering lost packets via a combination packet efficiently.The simulation results show that either ONCSB or ONCMB can lead to better transmission bandwidth performance compared with other algorithms under different wireless channel conditions.…”
    Get full text
    Article
  18. 6998

    THE GENUS AS, A POTENTIAL SOURCE OF ANTICANCER AGENT: AN UPDATED REVIEW

    Published 2024-02-01
    “…The ability of pistachios to inhibit tumor growth  is supported by data indicating that they do so by modulating multiple apoptotic pathways in tumor cells.  This article introduces pistachios and discusses their potential anticancer effects, mainly targeting apoptosis related pathways …”
    Get full text
    Article
  19. 6999

    Systemic sclerosis and the gastrointestinal tract by Irena Walecka

    Published 2017-09-01
    “…Systemic sclerosis (SSc) is an autoimmunological disease of unknown origin with complex pathogenesis and multiple organ involvement. It is characterised by vascular and immunological abnormalities leading to fibrosis of the skin and internal organs. …”
    Get full text
    Article
  20. 7000

    Expectations of refugees in the tragedy of frontiers, the perception of the trajectory and the deafness of rights by Aloisio Ruscheinsky, Corina Nicoleta Tulbure

    Published 2017-01-01
    “…The authors argue that a refugee camp is an exceptional space to put order in the tension, in the spatial and temporal dimensions. There are always multiple borders in refugee camps, whether between countries, cultures and languages, it is the crossing of goods and people. …”
    Get full text
    Article