-
1541
I Would Say I Am Austrian but …' - Multiple Spatial Belongings and Hybrid Identities among Young People in Vienna, Austria
Published 2021-11-01“…In public debates, migrants and their descendants are repeatedly called on to “integrate”, while their feelings of belonging to Austria are questioned. …”
Get full text
Article -
1542
Historic Preservation, Complexity, and the Shadow of Monumentality: The Case of Lutyens’ Delhi
Published 2025-01-01“… Over the years, the central administrative district of New Delhi, known colloquially as Lutyens’ Delhi, dominantly shaped under the authorship of Sir Edwin Lutyens and Sir Herbert Baker, has been repeatedly called upon to support a wider range of uses and a higher range of densities than it currently houses. …”
Get full text
Article -
1543
Ethnic identity features in convicted migrants with recidivist behavior: development of tolerance among convicted migrants to other ethnic groups
Published 2023-07-01“…The increase in the number of convicted migrants who commit crimes repeatedly is characterized by criminalization degree presence, as well as personal and behavioral traits. …”
Get full text
Article -
1544
Unilateral Hemiparesis with Thoracic Epidural in an Adolescent
Published 2012-01-01“…We describe a case of a 16-year-old adolescent who developed repeated complete unilateral extensive epidural sensory and motor blockade with Horner’s syndrome after thoracic epidural catheter placement. …”
Get full text
Article -
1545
Research on trust measure and management for open distributed systems based on dynamic grouping
Published 2015-01-01“…A stability enhanced group-based trust model(denoted by SEGTM) for open distributed systems was presented to solve the problems of not sufficiently maintaining trust relation between peers due to the dynamic changes in trust network topology.First,the formation and dynamic management of peers' group were depicted in detail,including nodes gathered into the same group with similar interests,competition for group head and nodes within the group leave in active or passive ways.Then,the trust relation in proposed model was categorized into three kinds and subsequently each solution for these kinds was also put forward.So,the problems of decline in accuracy of computational trust degree between peers due to the difference of peers' interests and low probability of repeated transactions between them were addressed.Simulation results show that the model not only enhances the fairness and stability in response to dynamic changes in network topology,but also can effectively resist the attacks of malicious nodes.…”
Get full text
Article -
1546
A baboon walking on a treadmill: the use of positive reinforcement techniques to study bipedal walking in non-human primates
Published 2022-03-01“…However, using cooperative animals that can freely move in experimental setup allows us to collect valuable and relevant data and makes these repeatable and comparable between species. Based on the current knowledge and our experience, we present an experimental approach that aims at reaching the standards of the study of human movement in a non-human primate, the olive baboon, Papio anubis, thanks to the use of positive reinforcement techniques. …”
Get full text
Article -
1547
A dual speech encryption algorithm based on improved Henon mapping and hyperchaotic
Published 2021-12-01“…Aiming at the problems of small key space, poor security, low encryption efficiency, and the inability to realize the trade-off between key complexity and encryption efficiency of existing speech chaotic encryption algorithms, a dual speech encryption algorithm based on improved Henon mapping and hyperchaotic was proposed.Firstly, the traditional Henon mapping was improved by extending the control parameter range and taking the nonlinear trigonometric function as the input parameter variable, which made the Henon mapping have larger chaotic space and higher chaotic complexity.Secondly, the improved Henon mapping was used to generate pseudorandom sequence, and the speech data was encrypted single time without repeated scrambling to obtain the first time encryption results of the speech data.Finally, Lorenz hyperchaotic system was adopted to encrypt the speech data after the first time encryption by Arnold secondary scrambling encryption and XOR diffusion encryption to obtaining the final ciphertext speech data.The experimental results show that, compared with the existing methods, the proposed algorithm have larger key space, higher encryption efficiency, and stronger robustness against various cryptographic attacks.…”
Get full text
Article -
1548
Politique d’évaluation des apprentissages et médiatisation d’une controverse professionnelle : ou comment la pédagogie et le « bon sens » s’affrontent
Published 2011-03-01“…In this aspect, the debate exceeds the specific and restricted content of student evaluation and challenges a set of ideas – otherwise reduced to a caricature – which are seen as having dominated the second half of the 20th century and as being responsible for the repeated failure of systemic reforms and local attempts to improve schools.…”
Get full text
Article -
1549
Les péripéties cynégétiques des Noirs d’Équateur. De l’art de rester humain et chrétien tout en chassant
Published 2008-07-01“…Sometimes they have repeatedly bad luck or, as they express it themselves, « a damaged arm ». …”
Get full text
Article -
1550
Motyw nadziei w twórczości Igora Talkowa
Published 2023-12-01“…Moreover, the conducted research shows that the poet, recalling the literary image of hope in his work, repeatedly referred to biblical texts and the works of the authors of the Golden Age, which, as works by Igor Talkov, allows to distinguish another characteristic feature of the presented speech master. …”
Get full text
Article -
1551
Marinesque (Loupian, Hérault) : un relais routier sur la voie Domitienne
Published 2016-12-01“…The construction of the site, in the second quarter of the 1st century BC, could be considered a local initiative on the outskirts of lands that had been cultivated since the Iron Age in order to take advantage of its proximity to a public road. The repeated flooding of the river and the development of new forms of land ownership – legal evidence of which was discovered in the form of a boundary marker – most likely led to the site being abandoned at the beginning of the Early Empire.…”
Get full text
Article -
1552
The mediating role of memorable tourism experience on tourist behavior: A perspective on organized tours
Published 2023-04-01“…In this context, it can be said that phenomena such as image, satisfaction and experience affect tourists' perceptions of destination image, and this situation increases the probability of destinations being preferred repeatedly. As a result, it can be concluded that factors with high emotional intensity such as memorable tourism experience and tourist satisfaction affect the intention to recommend.…”
Get full text
Article -
1553
Optimizing of Iterative Turbo Equalizer for Underwater Sensor Communication
Published 2013-12-01“…Equalizer and decoder are connected through the interleaving and deinterleaving that update each other's information repeatedly. At the receiver side, we resort to powerful turbo equalization algorithms that iteratively exchange probabilistic information between inner decoder and outer decoder, thereby reducing the error rates significantly. …”
Get full text
Article -
1554
“First Woman to…” Exceptionalism Discourse
Published 2024-01-01“…Many feminist theologians have repeatedly named “the cultural-political power at work in our world as patriarchy”. …”
Get full text
Article -
1555
Successful Renal Transplantation between Identical Twins with Very Brief Immunosuppression
Published 2018-01-01“…Monozygosity was determined using short tandem repeat (STR) analysis. All immunosuppression was successfully discontinued at 2 days and 3 weeks, respectively, after transplantation. …”
Get full text
Article -
1556
Research and applications on intelligent operations of cross-professional carrying network
Published 2022-11-01“…With the increasingly close integration of artificial intelligence technology and networks, the operation and production of networks in the future should be fully digitalized, automated and intelligent.At present, fault locating of cross-professional network mainly relies on operation and maintenance staff of each professional network to analyze and dispatch orders, resulting in long trouble clearing time and repeated orders.In order to save manual work, with the help of automation and artificial intelligent technologies, a cross-professional network intelligent operation and maintenance system was developed and applied in real network.The associated topology information of IPRAN and OTN, along with the real-time IPRAN and OTN alarm data were analyzed, the root cause alarm was located accurately, the fault location was determined, and dispatch order was achieved automatically.A automatic cross-professional fault diagnosis capability was built by the system, which reduced the fault locating time from traditional two minutes to tens of milliseconds, therefore, the manual work was reduced by more than 90%, and 95% fault types of the existing network could be covered.…”
Get full text
Article -
1557
Research on optimal parallel routing and wide diameter of unidirectional double-loop networks
Published 2014-08-01“…Based on the PDD, a method to find two shortest parallel pathes quickly without any repeating node was proposed. At last, the simulation of the distribution of wide diameter of DLN is given. …”
Get full text
Article -
1558
Recirculation of digestive enzymes
Published 2011-06-01“…The principle of enterohepatic circulation of bile acids in general view is repeated at interorgan recirculation of hydrolases of the digestive glands providing process of digestion, and by enzyme signaling – integration and adaptation of functions of the gut organs by modulating effects.…”
Get full text
Article -
1559
Research on the method of discovering specific organization structure in bank account transaction network
Published 2020-02-01“…In recent years,stakeholder economic crime behaviors such as illegal pyramid schemes,illegal fund raising and money laundering despite repeated prohibitions,makes the research of anomaly detection in financial transaction network has gradually attracted the attention of researchers.The way how to fund flow between bank accounts in an illegal organization implies the relationship structure of their members.Firstly,a directed weighted transaction network model was built on the basis of the transaction characteristics.Then,combining with the localtopology structure of the built transaction network of the accounts,two kinds of core nodes of the organization,including black hole nodes and star nodes,were defined.By analyzing the relationship between those two kinds nodes,an organization discovery algorithm of combining “black hole and star nodes” based on spanning subgraph was proposed.Experiments on real bank accounts transaction network containing illegal pyramid scheme organizations show the effectiveness of the algorithm in discovering the specific tree organization structure.…”
Get full text
Article -
1560
Contrôle de l’intimité et normes de genre : la qualification d’un comportement suspect et sa contestation dans le cadre de perquisitions et d’assignations à résidence pendant l’éta...
Published 2021-12-01“…The article relies on the analysis of repeated interviews and files of individuals who were suspected of Islamic radicalization and who experienced a search and/or a house arrest. …”
Get full text
Article