Showing 1,581 - 1,600 results of 1,881 for search 'BYUtv~', query time: 2.03s Refine Results
  1. 1581

    Adana Sosyalizmi’nden Los Adanas’a Madunluğun Popüler Görünümleri: Sıfır Bir Dizisi by Yusuf Ziya Gökçek

    Published 2023-06-01
    “…Türkiye’de ilk olarak Youtube’da sonra BluTV’de yayınlanan, 6 sezon süren Sıfır Bir dizisi, kendinden önceki film geleneği, karakterleri ile dinamik ilişki kurmaktadır. …”
    Get full text
    Article
  2. 1582

    A "Bloody" (Irritating) Four Star Masterpiece and the "Construction of an Empire" The Proposition and Other Australian Stories by Chantal Kwast-Greff

    Published 2007-05-01
    “…La problématique centrale du procédé cinématographique mis en œuvre est posée par l’utilisation à outrance de l’image-stéréotype et de l’icône visuelle aussi bien que sonore qui permettent de jouer avec l’émotion du spectateur : l’histoire—vraie, montée ou démontée—est vue par le petit bout de la lorgnette et se propose comme la Vérité de l’histoire de la construction de l’Empire en Australie…”
    Get full text
    Article
  3. 1583

    La langue, matière à machines by Pierre Thévenin, Emmanuel Ducourneau, Anthony Stavrianakis

    Published 2024-12-01
    “…A figure in the domain of art brut invents alphabets to grasp the being of words. …”
    Get full text
    Article
  4. 1584

    KINEMATICS AND WATER TIGHTNESS ANALYSIS OF DOUBLE SPHERICAL SHELL ROTARY DOCKING SKIRT by GONG HaiXia, LIU Zhe, WANG LiQuan, WANG ChenYe

    Published 2018-01-01
    “…According to the working principle of the docking device,the posture equation and kinematics model of the butt skirt are derived,and according to its kinematic model to obtain the accident submarine at different angles that the direction skirt and angle skirt angle of rotation required. …”
    Get full text
    Article
  5. 1585

    Cache timing attack on SMS4 by ZHAO Xin-jie, WANG Tao, ZHENG Yuan-yuan

    Published 2010-01-01
    “…Two access driven Cache timing analysis methods on both first four rounds and last four rounds of SMS4 encryption were proposed and discussed.On the precondition of not interfering SMS4 encryption,a spy process was designed to gather the un-accessed lookup table related Cache sets during first four rounds and last four rounds of SMS4 encryption,then transferred them into impossible lookup table indices,combing plaintext or cipher text to analyze the impossible key byte candidates,finally the initial SMS4 key was recovered.Experiment results demonstrate that multi-process sharing Cache space feature and SMS4 lookup table structure decide that SMS4 is vulnerable to Cache timing attack,for about 80 samples are enough to recover full 128bit SMS4 key during both first four rounds attack and last four rounds attack,so it’s necessary to take certain countermeasures to prevent this kind of attack.…”
    Get full text
    Article
  6. 1586

    DIŞ BORÇ, İÇ BORÇ VE EKONOMİK BÜYÜME ARASINDAKİ İLİŞKİ: BRICS-TM ÜLKELERİ ÜZERİNE AMPİRİK BİR ANALİZ - THE RELATIONSHIP BETWEEN EXTERNAL DEBT, INTERNAL DEBT AND ECONOMIC GROWTH: AN... by Mehmet Vahit Eren

    Published 2020-07-01
    “…Özel kesim açığı, bütçe açığı ve cari açık, iç ve dış borçlanmanın temel nedenleri arasında yer almaktadır. …”
    Get full text
    Article
  7. 1587

    BURNOS PRIEŽIŪROS SPECIALISTŲ KOMANDINIS DARBAS by Evelina Daugėlienė, Domantė Beinorytė

    Published 2023-07-01
    “…Apie komandinį darbą sveikatos priežiūros srityje šiomis dienomis yra kalbama nemažai, siekiama, kad komandiniu darbu būtų paremtas visas burnos priežiūros specialistų darbas. …”
    Get full text
    Article
  8. 1588

    Elliptic-Curve Cryptography Implementation on RISC-V Processors for Internet of Things Applications by Preethi Preethi, Mohammed Mujeer Ulla, G. Praveen Kumar Yadav, Kumar Sekhar Roy, Ruhul Amin Hazarika, Kuldeep Saxena K.

    Published 2024-01-01
    “…The implementation takes 483 clock cycles and utilizes approximately 4096 bytes of memory. These results demonstrate that ECDSA can be efficiently implemented on RISC-V processors, making it a promising option for secure communication in IoT applications. …”
    Get full text
    Article
  9. 1589

    Proxy caching algorithm based on segment popularity for mobile streaming media by YANG Ge1, LIAO Jian-xin1, ZHU Xiao-min1, YANG Bo1, HUANG Hai1

    Published 2007-01-01
    “…A novel dynamic scheduling algorithm P2CAS2M2(proxy caching algorithm based on segment popularity for mobile streaming media)based on segment popularity for mobile streaming media was proposed.Proxy caching admis-sion and replacement algorithm based on the object segment popularity for mobile streaming media was implemented.The principle was obeyed that the data cached for each mobile streaming media object were in proportion to their popu-larity at the proxy server.The cache window size was updated periodically according to the average access time of the clients.Simulation results show that this algorithm is more adaptive than A2LS(adaptive and lazy segmentation algorithm) for the variety of the proxy server cache.It can gain more average number of cached mobile streaming media objects and less delayed requested ratio while byte-hit ratio of P2CAS2M2 is close to or exceeds A2LS under the circumstance of the same proxy cache space.…”
    Get full text
    Article
  10. 1590

    „Gesamtkunstwerk” w dobie postmodernizmu. Peter Greenaway i walizki Tulse’a Lupera by Antoni Michnik

    Published 2010-06-01
    “…Podążając za myślą Odo Marquarda, analizuje różne sposoby rozumienia tego pojęcia, zastanawiając się nad tym, czy w dobie estetyki fragmentu dzieło totalne ma rację bytu. W drugiej części tekstu autor dekoduje zawarte w projekcie znaczenia, odsłaniając systemy, jakimi Greenaway posługuje się przy jego organizacji, a także tworzywa, jakich używa przy jego konstrukcji. …”
    Get full text
    Article
  11. 1591

    An Effective Privacy-Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation by Wenbin Yao, Pengdi Ye, Xiaoyong Li

    Published 2014-01-01
    “…At the second phase, all cubes are unfolded and combined together as a cross-shaped cube, which will be partitioned into a few data fragments to guarantee that every fragment does not contain continuous bytes. These fragments are stored on randomly chosen servers within cloud environment. …”
    Get full text
    Article
  12. 1592

    Improved integral attack——random linear distinguish and key recovery attack by Shaoyu DU

    Published 2023-04-01
    “…Based on the integral attack and collision attack of four rounds of AES, a random linear distinguish attack against four rounds of SP block ciphers was proposed, which took advantage of the non-uniformity of linear biases’ distribution between some blocks of plaintext and inner state.Combined with precomputation, a key recovery attack against four rounds of AES-like block ciphers was proposed.For LED-64, the results of distinguish attack and key recovery attack were given.Therein for LED-64 of 1-Step, the probability of successful distinguish attack is 85% under the condition that the data complexity is 2<sup>8</sup> and the computational complexity is 2<sup>16</sup> basic operation.For LED-64 of 2-Step, the calculation complexity of the key recovery attack under the condition of related key is 2<sup>14</sup> basic operation, the data complexity is 2<sup>8</sup>, and the precomputation storage complexity is 2<sup>38</sup> half bytes.…”
    Get full text
    Article
  13. 1593

    Analiza kakovostne strukture okroglega lesa listavcev by Luka Krajnc, Domen Arnič, Peter Prislan

    Published 2023-07-01
    “… Prispevek predstavlja rezultate analize kakovostne strukture okroglega lesa treh najpomembnejših drevesnih vrst listavcev v Sloveniji, navadne bukve (Fagus sylvatica L.), gorskega javorja (Acer pseudoplatanus L.) ter hrasta doba (Quercus robur L.). …”
    Get full text
    Article
  14. 1594

    L’enseignement de l’architecture à l’Académie royale de peinture, sculpture et architecture de Toulouse by Marjorie Guillin

    Published 2010-05-01
    “…The letters patent obtained by the Toulouse institution gave it a privileged status: it was the only  provincial academy of art to be given the title of “Royal” academy, and, unlike other provincial establishments, it was free from all control bythe Paris academy.  Taking this autonomy into account, one can examine the educational choices made by the Toulouse Academy, their nature and whether they were innovatory. …”
    Get full text
    Article
  15. 1595

    PARACETAMOLIO ATPALAIDAVIMO KINETIKA IŠ EKSTEMPORALIAI PAGAMINTŲ REKTALINIŲ SUPOZITORIJŲ by Asta Marija Inkėnienė, Kristina Ramanauskienė, Aurimas Galkontas

    Published 2019-12-01
    “…Rektalinė vaistų forma yra puiki alternatyva geriatrijoje ir pediatrijoje, veikia sistemiškai arba vietiškai. Supozitorijos gali būti gaminamos ekstemporaliai pagal paskirtą individualią dozę ar sudėtį. …”
    Get full text
    Article
  16. 1596

    SOCIALINIO DARBUOTOJO NUOSTATOS Į ASMENŲ SU PROTO NEGALIA SEKSUALUMĄ by Tomas Virbalis, Asta Venckienė

    Published 2022-09-01
    “…Pastebėta, kad seksualumo ugdymas turėtų būti pradedamas dar švietimo įstaigose, kaip vienas iš lytiškumo ugdymo aspektų. …”
    Get full text
    Article
  17. 1597

    Cross Reaction of Haemonchus Contortus ANTIGEN WITH ANTI-Fasciola Gigantica Serum by Using Western Blot Technique by Firman Hadi Fanani, Kusnoto Kusnoto, Poedji Hastutiek, Setiawan Koesdarto, Endang Suprihati

    Published 2020-06-01
    “…Cross reaction of Haemonchus contortus protein with anti-Fasciola gigantica serum byusing Western blot technique and obtained 3 protein bands are 94.9, 52.7, 46.7 kDa.…”
    Get full text
    Article
  18. 1598

    Ó di gbéré, ó di kése, Adébayọ̀ Fálétí by Lere Adeyemi

    Published 2021-12-01
    “…Sé bíkú bá je ̣ ja láyé ijó ̣ sí, ̣ Owọ́ ̣ ikú a máa gbòn iróró iróró, ̣ Bíkú bá jeku nígbà ìwásẹ̀ ,̣ Esẹ̀ ̣ rè ̣ a máa gbòn irìrì irìrì, ̣ Bíkú bá jeyin e ̣ lẹ́ bute ̣ , ara ikú a máa já ibùtè ̣ ̣ ibùtè,̣ Ikú àsìkò yìí bàjé ̣ kò gbebọ ̣ kò gbètùtù, Ìkà nikú, ikú kò màgbà béẹ̀ ̣ ni kò momo ̣ dé, ̣ Bílé oyin bá kan gbínrín gbínrín, Béẹ ̣ wádìí rè ̣ wò, isẹ́ ̣ ikú ni, Bódẹ̀ dẹ̀ ̣ `adò bá sì dibi ikorò, Ikú ló fa sábàbí è. …”
    Get full text
    Article
  19. 1599

    Adversarial method for malicious ELF file detection based on deep reinforcement learning by SUN He, ZHANG Bocheng, GENG Jiaxuan, WU Di, WANG Junfeng, FANG Zhiyang

    Published 2024-10-01
    “…This method generated adversarial examples by constructing optimal perturbation bytes for the target detection model while preserving the original functionality of the ELF files, without relying on the internal details of the target model. …”
    Get full text
    Article
  20. 1600

    Targeting Anabolic Impairment in Response to Resistance Exercise in Older Adults with Mobility Impairments: Potential Mechanisms and Rehabilitation Approaches by Micah J. Drummond, Robin L. Marcus, Paul C. LaStayo

    Published 2012-01-01
    “…., sarcopenia) and may be compounded by comorbidities, injury, surgery, illness, and physical inactivity. While a bout of resistance exercise increases protein synthesis rates in healthy young skeletal muscle, the effectiveness of resistance exercise to mount a protein synthetic response is less pronounced in older adults. …”
    Get full text
    Article