Suggested Topics within your search.
Suggested Topics within your search.
- Study and teaching 2
- Computer animation 1
- Corporate culture 1
- English 1
- Islam 1
- Islamic religious education 1
- Mathematics 1
- Mathematics teachers 1
- Medicine 1
- Organizational behavior 1
- Organizational sociology 1
- Political aspects 1
- Semiotics 1
- Semiotics and art 1
- Semiotics and literature 1
- Social movements 1
- Social networks 1
- Study skills 1
- Subject headings 1
- Technological innovations 1
- Training of 1
-
1161
The Improved Riccati Equation Method and Exact Solutions to mZK Equation
Published 2012-01-01“…The method appears to be easier and more convenient by means of a symbolic computation system. Of course, it is also effective to solve other nonlinear evolution equations in mathematical physics.…”
Get full text
Article -
1162
Luxúria e iconografia na escultura românica portuguesa
Published 2015-06-01“…The present article contributes to this debate by analyzing different symbolic and thematic areas that can be found on the Medieval Bestiary, on the Bible, on the human being and on the animal world representations. …”
Get full text
Article -
1163
La coopération décentralisée : un élan pour le développement culturel durable dans l’espace euro-méditerranéen
Published 2010-05-01“…Cultural activities produce symbolic goods and services, which play a crucial role in contemporary societies. …”
Get full text
Article -
1164
Pseudo-Duals of Frames and Modular Riesz Bases in Hilbert $C^\ast$-Modules
Published 2024-10-01“…Finally, we get some results on pseudo-duals of modular Riesz bases, mainly their preservation under the action of morphisms and their behavior in the presence of semi-normalized symbols are studied.…”
Get full text
Article -
1165
‘Dove si è di casa’. Pratiche di appaesamento dell'orzo in Val di Fiemme
Published 2021-12-01“…From its origin in the vegetable gardens of Capriana to its valorization by the Terre Altre agricultural cooperative, up to its use as an ingredient in the Fiemme Brewing: each of these steps marks different symbolic assimilation of the cereal within the community memory.…”
Get full text
Article -
1166
Kim jest Bóg i gdzie mieszka? Analiza semiotyczna postaci Boga w percepcji dziecięcej w rodzinach praktykujących katolików
Published 2016-03-01“…Making use of the theories as well as the interviews concerning the perception of the character of God I demonstrate that the child interprets the world through contact with symbolic reality and through giving reality some meaning. …”
Get full text
Article -
1167
Algorithm for blind separation of PCMA based on CHASE decoding
Published 2015-03-01“…The results of soft output of SOVA-PSP were sorted based on reliability in the algorithm, the mixed symbols that had low reliability in the sorted results were reconstructed. …”
Get full text
Article -
1168
Les genres récrits n° 5
Published 2019-07-01“…., at the Université du Québec à Montréal), it often remains a symbolically important act, but without strong legal consequences. …”
Get full text
Article -
1169
The Many Meanings of D-Day
Published 2012-03-01“…This essay investigates what D-Day has symbolized for Americans and how and why its meaning has changed over the past six decades. …”
Get full text
Article -
1170
'A journey around his room': Genre uniqueness of I.A. Goncharov's novel 'Oblomov'
Published 2018-02-01“…Goncharov, which is connected, as it would seem, only with the book of essays “Frigate Pallas”, is actually present in all three novels of the writer, showing itself as a theme or a motive and as a symbolic image or an ideal form of human activity. …”
Get full text
Article -
1171
Ordos Mausoleum of Genghis Khan: History and Modernity
Published 2024-11-01“…It is believed that this memorial contains personal belongings and symbols of the power of the great Mongol conqueror. …”
Get full text
Article -
1172
Blood Pressure and Heart Rate Variability to Detect Vascular Dysregulation in Glaucoma
Published 2015-01-01“…Data were analyzed calculating univariate linear (time domain and frequency domain), nonlinear (Symbolic Dynamics, SD) and bivariate (Joint Symbolic Dynamics, JSD) indices. …”
Get full text
Article -
1173
Josquin’s Motet “In amara crucis ara” in the Green Codex of Viadrina
Published 2016-06-01“…Analysis shows that the motet’s text (its symbolic meaning) was probably the main reason why it – and not another part of the cycle Qui velatus facie fuisti – was selected and copied into the codex I F 428. …”
Get full text
Article -
1174
Human-Gorilla and Gorilla-Human: Dynamics of Human-animal boundaries and interethnic relationships in the central African rainforest
Published 2014-02-01“…Here human and gorilla interactions are bidirectional. Much beyond food or symbols for humans, gorillas are human’s ontological counterparts. …”
Get full text
Article -
1175
Optimal Index Code With Rate 4 Over F₂
Published 2025-01-01“…High throughput broadcasting systems requires efficient broadcasting that can broadcast the information source symbols with optimal rate (i.e., maximizing the usage of broadcast channel which exploits the broadcast nature of the wireless medium through index coding). …”
Get full text
Article -
1176
A Comparative Study on: the Aspects of Imagination in the Text and Paintings of Nezami’s Khosrow and Shirin (Based on Gilbert Durand Hypothesis)
Published 2019-06-01“…Analyzing the text shows, the usage of different diurnal and nocturnal symbols such as: death, ascension, dagger, killing, water, dripping, bloodthirsty, trembling, anger, and so on. …”
Get full text
Article -
1177
US Medical Schools’ 2024 Commencements and Antisemitism: Addressing Unprofessional Behavior
Published 2025-01-01“…Conclusions: We identified unprofessional behavior at commencements of top-ranked medical schools consisting of antisemitism and displaying offensive and insensitive symbols and messaging. There is an urgent need for medical schools in the US to educate medical trainees about the dangers of antisemitism and all forms of hate and insensitivity.…”
Get full text
Article -
1178
Hardcoded vulnerability detection approach for IoT device firmware
Published 2022-10-01“…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
Get full text
Article -
1179
Valorização turística da oliveira em Saint-Rémy de Provence: entre a requalificação simbólica e a deturpação dos valores patrimoniais
Published 2024-07-01“…By studying the iconic discourse based on the use of images linked to the olive-growing heritage, the aim is to examine the hypothesis that the olive, olive oil and the olive tree have above all an emblematic value as symbols of Provence. Our aim is to show that they are used primarily for commercial and tourist purposes, as well as being witnesses to a claimed cultural identity.…”
Get full text
Article -
1180
Ne jamais dire « Fontaine, je ne boirai pas de ton eau »
Published 2009-12-01“…The gardens, parks and mostly the water points described have an obvious symbolic meaning in the novels: water jets, waterfalls and fountains appear at key moments and mirror the voluptuousness and the sensuality displayed by the protagonists. …”
Get full text
Article