Showing 8,061 - 8,080 results of 20,519 for search '"standardization"', query time: 0.08s Refine Results
  1. 8061

    THE CENTRALIZED STRUCTURE OF FUND OF ASSESSMENT TOOLS OF EDUCATIONAL PROGRAM by Elena Yu. Shakhova, Elena V. Nester, Il’ya S. Sitov

    Published 2017-02-01
    “…The centralized structure of assessment tools of the main educational program of higher education consists of the following documents:- fund of assessment tools of the educational program — the central document uniting information on competences (formulations, codes of competences, a matrix of competences, stages of formation of competences), the description of types and forms of control on all elements of the educational program, criteria and scales of estimation (basic, standard, specialized), the methodical materials defining procedures of assessment tools development and the procedure of assessment, the main assessment tools of elements of the educational program;- funds of assessment tools of the current control of progress and intermediate certification as a part of working programs for separate elements of the educational program, which are developed on the basis of a central document.The offered structure of the fund of assessment tools is brought closer to the classical scheme of normalization of data – «one fact – in one place». …”
    Get full text
    Article
  2. 8062

    Tree pruning in the structural approach to vowel reduction and lenition by Karolina Drabikowska

    Published 2021-12-01
    “…Government Phonology 2.0. In contrast to the standard GP model, whereby lenition and vowel reduction can be viewed as shortening, element suppression or status switching, the structural approach employs the procedure of tree pruning with a heavily limited role of melodic annotation. …”
    Get full text
    Article
  3. 8063

    OpenFlow table lookup scheme integrating multiple-cell Hash table with TCAM by Chun-qiang LI, Yong-qiang DONG, Guo-xin WU

    Published 2016-10-01
    “…In OpenFlow networks,switches accept flow rules through standardized interfaces,and perform flow-based packet processing.To facilitate the lookup of flow tables,TCAM has been widely used in OpenFlow switches.However,TCAM is expensive and consumes a large amount of power.A hybrid lookup scheme integrating multiple-cell Hash table with TCAM was proposed for flow table matching to simultaneously reduce the cost and power consumption of lookup structure without sacrificing the lookup performance.By theoretical analysis and extensive experiments,optimal capacity configuration of Hash table and TCAM was achieved with the optimized cost of flow table lookup.The experiment results also show that the proposed lookup scheme can save over 90% cost and the power consumption of flow table matching can be reduced significantly compared with the pure TCAM scheme while keeping the similar lookup performance.…”
    Get full text
    Article
  4. 8064

    Primary neurolymphomatosis presenting as foot drop: A rare case report by Neha Bakshi, Vineeta Chand, Rajiv Anand, Rajan Duggal

    Published 2024-12-01
    “…Nerve biopsy remains the diagnostic gold standard, use of magnetic resonance imaging (MRI) and fluorodeoxyglucose–positron emission tomography (FDG-PET) may help in diagnosis and selecting targets for biopsy. …”
    Get full text
    Article
  5. 8065

    A Wideband Hybrid Fractal Ring Antenna for WLAN Applications by Atif Jamil, Muhammad Rauf, Abdul Sami, Arsalan Ansari, Muhammad Dawood Idrees

    Published 2022-01-01
    “…The geometrical construction of the proposed antenna is compared to the standard Koch curve geometry. It is shown that combining the meander and Koch curve shapes increases the effective electrical length. …”
    Get full text
    Article
  6. 8066

    Design and implementation for partition dynamically vector quantization chip by YU Ning-mei, WANG Dong-fang, LIAO Yu-min, FU Yun-qiang

    Published 2009-01-01
    “…Partition dynamically vector quantization(PDVQ) chip was researched and produced to encode images.Before encoding,it first judged the correlation of the encoding image block,and then decided to choose the size of the image blocks.Test result shows that PDVQ chip can improve the compression rate to 27% in average by contrasting with the normal VQ,even to 64%.The size of the codebook in PDVQ chip was 256×16 byte,and all codevectors in the codebook were categorized by direction,in each category codebook codewords were sorted in the ascending order of their sum,this kind codebook architecture could reduce search range largely.The VLSI architecture of PDVQ chip was implemented based on Charter 0.35μm CMOS standard cell technology,its chip area was 2.08mm×2.08mm.Test result shows that,at 3.0V power supply,PDVQ chip can operate up to 100MHz.At this operation,its power dissipation is 295mW,and it can support real-time encoding application for 512×512 gray images at 30fame/s.…”
    Get full text
    Article
  7. 8067

    Daratumumab, Lenalidomide, and Dexamethasone (DRD), an Active Regimen in the Treatment of Immunosuppression-Associated Plasmablastic Lymphoma (PBL) in the Setting of Gorham’s Lymph... by Matthew Lee, Beth A. Martin, Haifaa Abdulhaq

    Published 2022-01-01
    “…Neither disease has a standard of care. We present a 23-year-old HIV-negative woman with GSD, managed medically with octreotide and sirolimus, who developed PBL. …”
    Get full text
    Article
  8. 8068

    Appropriateness of learning environments in preprimary educational institutions: the case of preschools in Bahir Dar city, Ethiopia by Mulugeta Yayeh Worku

    Published 2025-01-01
    “…Data were collected using questionnaires and observations, and analyzed both quantitatively (using means, standard deviations, one-sample t-tests, and independent samples t-tests) and qualitatively through a thematic analysis approach. …”
    Get full text
    Article
  9. 8069

    Complements to the Theoretical Treatments of the Electron Collision with : An R-Matrix Approach by V. Stancalie

    Published 2013-01-01
    “…The calculated values for fine-structure levels are compared with the available experimental data in Atomic Structure Database of the National Institute for Standards and Technology. The agreement between the calculated and the experimental data is reasonably good, the energy difference average percentage of the low-lying levels usually agreeing to within 3.6% of each other. …”
    Get full text
    Article
  10. 8070

    Combined encryption method for CAN bus data based on periodic coupled processing by Wutao QIN, Peng WANG, Yufeng LI

    Published 2023-01-01
    “…In the intelligent connected age, CAN bus transmission faces the urgent demand of light weighted security encryption.Based on this, a fast response and high security CAN bus data encryption method was proposed.Since the 64 bit CAN packets were sent periodically, an online-offline block encryption algorithm coupled with message transmission cycle was proposed.In offline phase, the dynamic session key was generated by using advanced encryption standard.In online phase, the dynamic session key was used to quickly respond to encryption and decryption requests.The online computation delay was greatly reduced by the pre-encryption computation in offline phase, which helped achieving low latency and lightweight computation.At the same time, the ciphertext policy attribute based encryption was used to encrypt the block cipher.The access control policy made by the data sending OBU ensures that only the target OBU can decrypt the block cipher, so as to achieve targeted encryption.…”
    Get full text
    Article
  11. 8071

    «LEDA AND THE SWAN» BY S.D. ERZIA (1922, 1929) IN THE CONTEXT OF ARTISTIC TRADITION by Irina V. Klyueva

    Published 2023-09-01
    “…It is shown that, being in the field of attraction of the Art Nouveau style and symbolism, which had a special attraction to the theme of “Leda and the Swan”, in its interpretation the artist gravitated towards individual solutions and iconographic non-standardism.…”
    Get full text
    Article
  12. 8072

    Efficient and scalable architecture for searchable symmetric encryption by Zhi-qiang WU, Ken-li LI, Hui ZHENG

    Published 2017-08-01
    “…The existing encryption schemes were usua11y poor of index construction and maintenance,which was difficu1t to meet the retrieva1 requirements for distributed ciphertext.Aiming at the above shortage of existing schemes,a structure of separab1e ciphertext inverted index was proposed for improving the performance of para11e1 constructing cryptograph index,simp1ifying the data maintenance process,and increasing the compatibi1ity with the traditiona1 NoSQL system.The method of centra1ized inverted index was adopted to improve the retrieva1 efficiency of distributed retrieva1 system.Then,the proposed scheme was proved to meet the wide1y adopted IND-CKA security standard.Fina11y,Cassandra was combined to eva1uate the severa1 performance parameters,and the experimenta1 resu1ts show proposed architecture has good app1icabi1ity to the distributed and massive encrypted data environment.…”
    Get full text
    Article
  13. 8073

    DA draws a circle: on document architecture and its relation to library and information science education and research by Mats Dahlstrom, Mikael Gunnarsson

    Published 2000-01-01
    “…The mismatch of traditional library institutions and systems (where the printed codex book and its derivatives have been the standard of measurement) and digital carriers for bodies of text and the different architectures of these, suggests our great need for new fields of LIS research, where DA might prove a valuable tool. …”
    Get full text
    Article
  14. 8074

    Promoting music intervention training in oncology in China: Challenges, opportunities, and pathways forward by Nie Juan, He Ying-Lan

    Published 2024-01-01
    “…It also advocates for increased investment in music therapists, standardized clinical procedures, and sustainable financial resources to accelerate the integration of music-based interventions into healthcare practices.…”
    Get full text
    Article
  15. 8075

    Modification and Control Technology of Contact Zone of the Straight Bevel Gear by Li Yufan, Nan Boru, Gao Bin

    Published 2020-07-01
    “…During developing a high lift straight bevel gear pair for a large passenger aircraft,the straight bevel gear pair designed according to ANSI/AGMA 2009-B01 standard,the figure of the tooth contact pattern is clearly marked in the drawing,the length,position,shape and other information,in the manufacturing process control of bevel gears also have certain requirements,a good contact state of the gearbox under any working load is finally realized,and the interchangeability of the gear pair is realized,and the concept of master gear and control gear is proposed. …”
    Get full text
    Article
  16. 8076

    Attacks on One Designated Verifier Proxy Signature Scheme by Baoyuan Kang

    Published 2012-01-01
    “…However, most of them were proven secure in the random oracle model, which has received a lot of criticism since the security proofs in the random oracle model are not sound with respect to the standard model. Recently, by employing Water's hashing technique, Yu et al. proposed a new construction of designated verifier proxy signature. …”
    Get full text
    Article
  17. 8077

    Confining the margins, marginalizing the confined: The Distress of Neglected Lockdown Victims in Indian Cities by Rémi de Bercegol, Anthony Goreau-Ponceaud, Shankare Gowda, Antony Raj

    Published 2020-05-01
    “…In addition to the fact that the protective measures against the virus are impossible to respect there, due to promiscuity and insufficient access to water, the brutal disappearance of everyday livelihood strongly aggravates the low standard of living of the inhabitants. By revealing the paradoxical effects of a confinement that is not adapted to poor neighbourhoods, this article argues for a better consideration of the latter, during and after the pandemic crisis.…”
    Get full text
    Article
  18. 8078

    A’joot  : Ethics, Rights and Values Spoken from the Stomach and Heart by Araceli Rojas

    Published 2025-01-01
    “…Second, this text discusses double standards practices from the West that have unfairly divided the world into people with rights and those without merit. …”
    Get full text
    Article
  19. 8079

    Encoding Disappearing Characters: The Case of Twentieth-Century Japanese-Canadian Names by Stewart Arneil

    Published 2019-08-01
    “…This report documents our efforts with two technologies designed to address this situation. The first is the Standardized Variation Sequence (SVS) feature of Unicode. …”
    Get full text
    Article
  20. 8080

    Lytton Strachey : l’historien intime de deux reines by Jeannine Hayat

    Published 2015-03-01
    “…Indeed the Stracheyan way of life, free from Victorian moral standards and guided by the rules of the Bloomsbury group, inspired his story of Victoria and Elizabeth. …”
    Get full text
    Article