Showing 8,441 - 8,460 results of 10,771 for search 'Big3~', query time: 1.27s Refine Results
  1. 8441

    Energy policy of the Republic of Turkey: expansion in the Eastern Mediterranean by B. D. Nuriev, S. V. Pospelov

    Published 2023-05-01
    “…Another important reason is the desire of official Ankara and the Turkish big business that has taken shape over the past two decades to strengthen its influence in neighboring countries and territories. …”
    Get full text
    Article
  2. 8442

    Yalta 1945: the Black Sea Straits and the War in the Far East by M. S. Monakov

    Published 2015-06-01
    “…Behind this processes were certain political goals, and when the war began Stalin stopped work on the first "big shipbuilding program" though it did not mean that he refused them. …”
    Get full text
    Article
  3. 8443
  4. 8444

    Compression Algorithm of Road Traffic Spatial Data Based on LZW Encoding by Dong-wei Xu, Yong-dong Wang, Li-min Jia, Gui-jun Zhang, Hai-feng Guo

    Published 2017-01-01
    “…Wide-ranging applications of road traffic detection technology in road traffic state data acquisition have introduced new challenges for transportation and storage of road traffic big data. In this paper, a compression method for road traffic spatial data based on LZW encoding is proposed. …”
    Get full text
    Article
  5. 8445

    Howard S. Becker - Kanıt by Engin Durukan Abdulhakimoğulları

    Published 2022-04-01
    “…Günümüzde anket, mülakat, doküman incelemesi, kurumların tuttuğu istatistiki veriler gibi geleneksel veri toplama yöntemleri ve kaynaklarının yanı sıra büyük veri (big data) olarak adlandırılan internet temelli yeni veri kaynakları da bulunmaktadır. …”
    Get full text
    Article
  6. 8446

    Graph clustering method based on structure entropy constraints by Zhiying ZHANG, Youliang TIAN

    Published 2021-12-01
    “…Aiming at the problem of how to decode the true structure of the network from the network embedded in the large-scale noise structure at the open information sharing platform centered on big data, and furthermore accurate mining results can be obtained in the mining related information process, the method of clustering based on structure entropy was proposed to realize divide the correlation degree of nodes in the graph.A solution algorithm for calculating two-dimensional structural information and a module division algorithm based on the principle of entropy reduction were proposed to divide the nodes in the graph structure to obtain corresponding modules.The K-dimensional structural information algorithm was used to further divide the divided modules to realize the clustering of nodes in the graph structure.An example analysis shows that the proposed graph clustering method can not only reflect the true structure of the graph structure, but also effectively mine the degree of association between nodes in the graph structure.At the same time, the other three clustering schemes are compared, and the experiment shows that this scheme has higher efficiency in execution time and guarantees the reliability of the clustering results.…”
    Get full text
    Article
  7. 8447

    Animal Objects: Memory, Desire and Mourning by Julia Courtney

    Published 2018-12-01
    “…Hunting trophies, taxidermic mounts and domestic objects made from preserved dismembered parts, allowed retired colonial ‘Nimrods’ and intrepid ‘Dianas’ to relive the vivid experiences of big game hunting. At the same time disembodied claws, teeth and horns carried an erotic charge when transformed into lovers’ gifts, while the sensuous reaction to animal skins can be seen in contemporary art and fiction. …”
    Get full text
    Article
  8. 8448
  9. 8449

    Chandipura virus: The 2024 resurgence and Gujarat outbreak by Rabin Debnath, Pooja A Chawla

    Published 2024-12-01
    “…Acute encephalitis syndrome, which mostly affects children and has a high death rate, has been associated with Chandipura virus, an arbovirus largely spread by sandflies (Phlebotomus spp.). …”
    Get full text
    Article
  10. 8450

    New Analyses of Duopoly Game with Output Lower Limiters by Zhaohan Sheng, Jianguo Du, Qiang Mei, Tingwen Huang

    Published 2013-01-01
    “…Numerical experiments show that the output evolution system having lower limiters becomes more robust than without them, and chaos disappears if the lower limiters are big enough. The local or global stability of the conditional equilibrium points provides a theoretical basis for the limiter control method of chaos in economic systems.…”
    Get full text
    Article
  11. 8451

    Incremental Fuzzy Clustering Based on Feature Reduction by Yongli Liu, Yajun Zhang, Hao Chao

    Published 2022-01-01
    “…In the era of big data, more and more datasets are gradually beyond the application scope of traditional clustering algorithms because of their large scale and high dimensions. …”
    Get full text
    Article
  12. 8452

    A Critique on the Translation of the Book “A Fiscal History of Iran in the Safavid and Qajar Periods” By Willem Floor by Amin mohammadi

    Published 2020-03-01
    “…We find out that being unfamiliar with some aspects of the text such as political history, historical geography, financial idioms and terminology, and documentation causes some big mistakes in translation, and all the readers, writers, and translators get mixed up.…”
    Get full text
    Article
  13. 8453

    Impact of digital transformation on the competitive advantage of companies by Zimonjić Marijana

    Published 2024-01-01
    “…Key factors of digital transformation, as well as ways in which technologies such as artificial intelligence, big data, automation, and cloud computing enable companies to improve their operations, innovate products and services, and achieve sustainable competitive advantage in the market. …”
    Get full text
    Article
  14. 8454

    An Artificial Intelligence Approach for Verifying Persons by Employing the Deoxyribonucleic Acid (DNA) Nucleotides by Raid Rafi Omar Al-Nima, Marwa Mawfaq Mohamedsheet Al-Hatab, Maysaloon Abed Qasim

    Published 2023-01-01
    “…However, it seems that there is still a need to propose a new approach for verifying humans, especially after the recent big wars, where too many people lost and die. This approach should have the capability to provide high personal verification performance. …”
    Get full text
    Article
  15. 8455

    Machine Learning–Based Predictive Farmland Optimization and Crop Monitoring System by Marion Olubunmi Adebiyi, Roseline Oluwaseun Ogundokun, Aneoghena Amarachi Abokhai

    Published 2020-01-01
    “…Random forest algorithm and BigML were employed to analyze and classify datasets containing crop features that generated subclasses based on random crop feature parameters. …”
    Get full text
    Article
  16. 8456

    Research on the security of national secret algorithm based compute first networking by Jie PAN, Lan YE, Pengfei ZHANG, Zhonggui BU

    Published 2023-08-01
    “…With the promotion of national secret algorithm, in-depth research on the arithmetic network was carried out, a more efficient and reasonable security scheme for the arithmetic network was proposed, ensuring the data security and privacy of the arithmetic network with the help of the state secret algorithm.The main elements of the design program included: Supporting arithmetic demand and cryptographic invocation through the underlying resources, the arithmetic orchestration layer provided the ability to orchestrate data arithmetic, meanwhile, the arithmetic scheduling layer intelligently discerned the optimal nodes for arithmetic resource scheduling and allocation; the cryptographic reinforcement layer used the national secret algorithm based on hardware support with the help of public key cryptosystem, hash function, digital envelope, homomorphic encryption, blockchain and other technologies.Focusing on arithmetic network access security, transmission security, data security and privacy protection aspects of security implementation.An architecture and application form was innovatively proposed to guarantee the data security of the arithmetic network, which could meet the needs of the application layer arithmetic in the scenarios of big data, intelligent technology, etc..The security of the arithmetic network is enhanced by empowering the arithmetic network through the state-secret algorithm.…”
    Get full text
    Article
  17. 8457

    Construction of diffusion layers based on cipher structures by Peng-fei LI

    Published 2017-06-01
    “…Taked diffusion layers of block cipher algorithms as the research object,lightweight diffusion layers were constructed by two cipher structures based on the characteristics of diffusion layers of lightweight block cipher algorithms,which were the construction of software-oriented diffusion layers based on Feistel structure and the construction of hardware-oriented diffusion layers based on LFSR.Lightweight involution diffusion layers with branch numbers 7 over eight 4-bit and 8-bit S-boxes were constructed by 3-round Feistel structure and the round functions adopt linear transformations with rotation and XORs.Some suboptimal diffusion layers over four 4 bit and 8 bit S-boxes and diffusion layers with branch numbers 7 over eight 4 bit and 8 bit S boxes based on LFSR were constructed.In addition,6,7,8 dimension MDBL matrices and many 16,18,32 dimension binary matrices with big dimension and branch numbers 7,7,12 based on LFSR were constructed.The experimental results have high practical significance in realm of the design of block cipher algorithms.…”
    Get full text
    Article
  18. 8458

    ROLE OF RADIOGRAPHER IN HANDLING COVID-19 AT CT SCAN ROOM DURING PANDEMIC by Aisyatun Mardliyyah, Anggraini Dwi Sensusiati, Amilia Kartika Sari

    Published 2020-11-01
    “…Background: Radiographers have a big role in handling COVID-19 during the pandemic. …”
    Get full text
    Article
  19. 8459

    The Multivariate Fusion Distribution Characteristics in Physician Demand Prediction by Jiazhen Zhang, Wei Chen, Xiulai Wang

    Published 2025-01-01
    “…Aiming at the optimization of the big data infrastructure in China’s healthcare system, this study proposes a lightweight time series physician demand prediction model, which is especially suitable for the field of telemedicine. …”
    Get full text
    Article
  20. 8460

    Mathematical Modeling and Simulation of Online Teaching Effect Evaluation Based on Decision Tree Algorithm by Pingli Sun

    Published 2022-01-01
    “…With the support of big data technology, the field of education is also facing new problems and opportunities. …”
    Get full text
    Article