Suggested Topics within your search.
Suggested Topics within your search.
- History 14
- Politics and government 8
- Social conditions 8
- Biochemistry 6
- Law 6
- methods 6
- Electric wiring, Interior 5
- Health 5
- Juvenile literature 5
- Physical fitness 5
- Sociology 5
- Digital techniques 4
- Economic conditions 4
- Economic policy 4
- Management 4
- Nursing 4
- Photography 4
- Race relations 4
- Social policy 4
- Social problems 4
- Cultural pluralism 3
- Discrimination 3
- Domestic relations 3
- Education 3
- Electric wiring 3
- Ethnic relations 3
- Ethnology 3
- Gays 3
- Health and Fitness 3
- History and criticism 3
-
13301
Revize vzdělávacího obsahu bezpečnostní problematiky pohledem klíčových aktérů kurikulární reformy
Published 2025-01-01“…Je tedy zřejmé, že jsou učiteli považována za témata patřící do vzdělávání. …”
Get full text
Article -
13302
Wav-audio steganography algorithm based on amplitude modifying
Published 2014-10-01“…Algorithms in different effective domains are analysed,and a wav-audio steganography algorithm based on amplitude modifying is proposed.The secret audio is scrambled through a random number generator.Amplitude values of each sampling point group are compared in original audio.While amplitude values are modified,the secret information bits are embedded.Embedding strength can be adjusted according to the key.Simulation results demonstrate that hiding capacity of this algorithm is large and good invisibility can be achieved.The anti-steganalysis ability of this algorithm is good and blind extraction can be realized.…”
Get full text
Article -
13303
Study of FEC at edge node of optical code label switching network
Published 2012-05-01“…The structure block of the optical code label switching network was built,and the design scheme for the forwarding equivalent classes (FEC)was proposed employing OCDM technology which was appropriate for variable packets transmission and allow the label processed in parallel in core node.The overhead between the duration of control bits and the duration of payload was investigated based on the above design scheme.The fixed slot algorithm (FSA) was employed to assemble the incoming packets in the assemble queue,simulation results and analysis were given between the relation of arrival ratio/assemble slot and packets loss ratio.…”
Get full text
Article -
13304
La Sante Nan Lavi Granmoun: Gid Pou Manje Storaj
Published 2005-02-01“… Si ou pa achte manje souvan, ou achte manje ki pral sevi-w pou anpil tan. …”
Get full text
Article -
13305
La Sante Nan Lavi Granmoun: Gid Pou Manje Storaj
Published 2005-02-01“… Si ou pa achte manje souvan, ou achte manje ki pral sevi-w pou anpil tan. …”
Get full text
Article -
13306
A VHDL Code for Offset Pulse Position Modulation Working with Reed Solomon System by Using ModelSim
Published 2022-12-01“…These bits can then be utilized by the receiver to identify and correct specific types of errors. …”
Get full text
Article -
13307
Screen Guided Training Does Not Capture Goal-Oriented Behaviors: Learning Myoelectric Control Mappings From Scratch Using Context Informed Incremental Learning
Published 2025-01-01“…Despite lower offline accuracy, the ZS-A model achieved the highest online throughput (<inline-formula> <tex-math notation="LaTeX">$1.47~\pm ~0.46$ </tex-math></inline-formula> bits/s), significantly outperforming the SGT baseline (<inline-formula> <tex-math notation="LaTeX">$1.15~\pm ~0.37$ </tex-math></inline-formula> bits/s) and reached competitive performance within 200 seconds. …”
Get full text
Article -
13308
Determining the Natural Disaster Diversity of Van Province by Fine Kinney Risk Assessment Method (FK-RAM)
Published 2023-07-01“…RAM, which was previously applied by researchers for Bitlis, was applied for the first time for Van province. …”
Get full text
Article -
13309
Effect of a Selective Progesterone Receptor Modulator on Induction of Apoptosis in Uterine Fibroids In Vivo
Published 2012-01-01“…No statistical difference in the AI was observed between the two groups of patients treated with ulipristal acetate (5 mg or 10 mg). Conclusion. Treatment with ulipristal acetate induces apoptosis in uterine fibroid cells. …”
Get full text
Article -
13310
Active Cycle Of Breathing Technique Terhadap Fungsi Paru pada Pasien Paska Operasi Bedah Jantung
Published 2021-03-01“…This study used pra experiment method involving 30 respondents with purposive sampling technique in adult surgery intensive care unit and Surgical ward. This group applies ACBT for 4 days: 2x/day, duration 15 minutes/session on 1st and 2nd day after surgery; 1x/day, duration 15 minutes/session on 3rd and 4th day after surgery. …”
Get full text
Article -
13311
Security of the cryptosystems based on ergodic matrices
Published 2015-08-01“…The security of the public-key cryptosystems based on ergodicmatrices over finite field was analysed.According to the public key,a system of linear equations for the forged secret key bits is obtained by inverse matrix elimination method.It is proved that the computational TEME problem is solvablein polynomial time and the ciphertext of the PZZ1 cryptosystem can be decrypted by the forged secret key.In some case the SEME problem can be reduced to discrete logarithm problem in polynomial time.If the key parameters are chosen improperly,then PZZ2 cryptosystem is based on discrete logarithm problem instead of NP hard problem.…”
Get full text
Article -
13312
Research and simulation of timing attacks on ECC
Published 2016-04-01“…Based on the hidden Markov model (HMM) idea,a timing attack on the elliptic curve digital signature system,which adopted the “double-and-add” scalar multiplication,was proposed.Simulation experiments on the secure Koblitz curve which released by the National Institute of Standards Technology (NIST) were implemented and four secure Koblitz curves except the K-571 were attacked successfully.The experiment results show that the attack can recover almost all the key bits in a few minutes by collecting only once time data,and is easy to imple-ment at a high success rate.…”
Get full text
Article -
13313
Resource Allocation Algorithm for the Downlink of Multi-User OFDM System with Optimized Fairness
Published 2015-12-01“…Firstly, assign the subcarriers to users with the constraint on proportional fairness and the water-filling algorithm was used in this process for the power allocation of each subcarrier. Then update the bits and power for each subcarrier of all the users using greedy power allocation to achieve higher data rates and power efficiency. …”
Get full text
Article -
13314
Influence of different formulations and process parameters during the preparation of drug-loaded PLGA microspheres evaluated by multivariate data analysis
Published 2014-12-01“…In addition, ethyl acetate had an adverse effect on the burst effect, while increased stirring speed had the opposite effect. …”
Get full text
Article -
13315
Energy efficiency joint optimization algorithm for low-precision ADC massive MIMO systems
Published 2020-06-01“…An uplink energy efficiency optimization algorithm based on alternating optimization algorithm was proposed for large-scale multiple-input multiple-output (MIMO) systems with low-precision analog to digital converters (ADC).That is,based on the maximum ratio combining (MRC) reception,an optimization model aiming at maximizing energy efficiency was established,and then the original fractional form optimization problem was converted into an equivalent subtractive form according to the nature of the fractional programming.In the case where the number of quantization bits was constant,the iterative optimization of the transmission power and the pilot length were performed.Simulation results show that the proposed algorithm has better spectral efficiency and energy efficiency.…”
Get full text
Article -
13316
VLSI design of an irregular LDPC decoder in DTMB
Published 2007-01-01“…An irregular LDPC decoder with a code length of 7 493 bits for DTMB system was implemented based on SMIC 0.13μm CMOS process.A new method to control memories was proposed,which can reuse memories for three different code rates only by increasing 5% memory usage.The throughput of the LDPC decoder is up to 150Mbit/s with the max iterative number of 15.While keeping the throughout of 50Mbit/s,its max iterative number can reach 45.The FPGA synthesis reports and the decoder layout in SMIC 0.13μm CMOS technology are given.…”
Get full text
Article -
13317
Novel robust content-based watermarking for image
Published 2005-01-01“…The chaotic mapping enables the logo pixels rearrange randomly in the specified spatial domain, and the mixed bits of the logo were embedded in the image DCT coefficients. …”
Get full text
Article -
13318
Active Cycle Of Breathing Technique Terhadap Fungsi Paru pada Pasien Paska Operasi Bedah Jantung
Published 2021-05-01“…This study used pra experiment method involving 30 respondents with purposive sampling technique in adult surgery intensive care unit and Surgical ward. This group applies ACBT for 4 days: 2x/day, duration 15 minutes/session on 1st and 2nd day after surgery; 1x/day, duration 15 minutes/session on 3rd and 4th day after surgery. …”
Get full text
Article -
13319
Bacterias productoras de hidrolasas aisladas de suelos de cultivos de arroz: Caracterización fenotípica y molecular
Published 2024-04-01“…Las bacterias, según su actividad hidrolítica, formaron cinco grupos: tres degradaron gelatina, leche descremada, caseína, aceite de oliva, almidón, celulosa, pectina, y tributirina; una, aceite de oliva y tributirina; otra, gelatina, leche descremada, aceite de oliva y tributirina; una, gelatina, aceite de oliva, almidón, tributirina; y una, gelatina, leche descremada, caseína, aceite de oliva y tributirina. …”
Get full text
Article -
13320
Crystal structure of poly[μ3-acetato-diaqua-μ3-sulfato-cerium(III)]: serendipitous synthesis of a layered coordination polymer exhibiting interlayer O—H...O hydrogen bonding
Published 2025-02-01“…Single crystals of the title compound, [Ce(CH3COO)(SO4)(H2O)2]n, were obtained serendipitously by the reaction of Ce(NO3)3·6H2O with 2,5-thiophenedicarboxylic acid (H2TDC) and acetic acid in a mixture of ethanol and water, where it is assumed that the sulfate ions leached from the Teflon reactor, which was treated with peroxymonosulfuric acid prior to its use. …”
Get full text
Article