Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
3641
Evapotranspiration-Based Irrigation Scheduling for Agriculture
Published 2019-05-01“…Crane, and Bruce Schaffer, focuses on the main concepts related to ET-based irrigation scheduling and reviews the use of "smart" irrigation scheduling controllers for agricultural applications. …”
Get full text
Article -
3642
Aristotle, Rhetoric and Poetry based on the Pseudology
Published 2020-05-01“…The relationship between rhetoric and poetry has been the subject of experts’ controversy since the beginning of the controversy, and this controversy has continued to this day without reaching a definite conclusion. …”
Get full text
Article -
3643
Vision-Based Tracking of Uncooperative Targets
Published 2011-01-01“…This paper presents a summary of a subset of the extensive vision-based tracking methods developed at Georgia Tech. …”
Get full text
Article -
3644
Synthesis of Magnetic Composite Based on Vermiculite
Published 2024-12-01“… The aim of the study was to synthesize a magnetic composite based on vermiculite and to evaluate its physicochemical properties and adsorption capacity. …”
Get full text
Article -
3645
Are asymmetries in imperative negation based in usage?
Published 2025-01-01“…It proposes negation’s discourse presuppositionality, which has been argued to account for neutralization in standard negation, as an explanation for most but not all of these typological and usage-based results in imperative negation too. …”
Get full text
Article -
3646
-
3647
Steganalysis for stegotext based on text redundancy
Published 2009-01-01“…Targeted at the text steganography with mimic model,a steganalysis method based on source redundancy for stegotexts was proposed.This method processed the text and the words in it as the m-order Markov source and the source symbols respectively,then computed the redundancy of the source.Through analyzing the relationship between the re-dundancy and the size of the text,the existence of hidden information could be determined.With testing of 8 000 ste-gotexts produced by the four main softwares NiceText,Texto,Stego and Sams Big Play Maker,and 2 400 normal texts randomly sampled from innocuous texts downloaded from the Internet,the results show that the false positive rate of our steganalysis method is 0.5% and the false negative rate is 3.9%.Experiments and analyzing results indicate that the steganalysis method can effectively detect stegotexts based on natural language processing with mimic model.…”
Get full text
Article -
3648
Detecting LDoS attack based on ASPQ
Published 2012-05-01“…Based on the analysis of the effects on average size of packet in the queue which LDoS attack makes,the change of this value was got by simulation on NS2.So detection algorithm was proposed,and was applied on Droptail and RED,which were typical queue management algorithm.The result of simulation shows that the algorithm can effectively detect the LDoS attack.…”
Get full text
Article -
3649
-
3650
Virtualized deployment of DPI based on Docker
Published 2019-12-01“…DPI is a kind of dedicated device for traffic identification and processing in the network of telecom operators,and a large number of DPI devices have been deployed in the network currently.However,the traditional DPI deployment brings the coexistence of multiple DPI systems,duplication of functions,and complicated maintenance and management,and it isn’t conducive to the rapid deployment of a large number of standardized DPI applications.With the development of NFV technology,virtualizing DPI deployment is a trend to solve this problem,and Docker is a container-level virtualization technology,DPI can be deployed based on it.Docker and the underlying data packet processing technology DPDK which was related to DPI deployment was described,and the Docker-based DPI virtualization deployment proposals was given.…”
Get full text
Article -
3651
On privacy of property-based remote attestation
Published 2009-01-01Subjects: Get full text
Article -
3652
Trustworthy network based on blockchain technology
Published 2019-10-01“…With the frequent occurrence of network security issues,the industry had not satisfied the patch-based external security solution,and it was hoped that the endogenous security could be realized from the network architecture layer.The decentralized trustworthy network architecture was proposed.Based on the research of the security of existing network underlying protocol,a trustworthy network architecture based on decentralization technology was proposed,such as blockchain technology,which could effectively solve the problem of lack of endogenous security in existing networks.Layers implement network security to avoid malicious network attacks or network failures caused by configuration errors.…”
Get full text
Article -
3653
-
3654
Evidence-Based Cerebral Vasospasm Surveillance
Published 2013-01-01“…Invasive strategies including brain tissue oxygen monitoring, microdialysis, thermal diffusion, and jugular bulb oximetry are examined. Lastly, near-infrared spectroscopy, a recent addition to the field, is briefly reviewed. …”
Get full text
Article -
3655
Evapotranspiration-Based Irrigation Scheduling for Agriculture
Published 2019-05-01“…Crane, and Bruce Schaffer, focuses on the main concepts related to ET-based irrigation scheduling and reviews the use of "smart" irrigation scheduling controllers for agricultural applications. …”
Get full text
Article -
3656
Blind SNR estimation based on cyclostationarity
Published 2006-01-01“…Upsampling and shaping filtering introduce the cyclostationarity of transmit signals. Based on the cyclosta-tionary statistics of signals, a blind SNR estimator in AWGN channel was proposed. …”
Get full text
Article -
3657
Implementing Inquiry-Based Teaching Methods
Published 2009-01-01“…AEC395/WC076: Implementing Inquiry-Based Teaching Methods (ufl.edu) …”
Get full text
Article -
3658
Cloud Data Center Based on SDN
Published 2014-08-01“…Along with rapid growth of mobile internet, cloud computing and other new services, on the one hand, the traditional IDC is being transformed to cloud computing data center, on the other hand, more and more applications and data are coming to be carried on the cloud, which makes the scale of cloud data centers substantially increase, while the traditional network architecture and the technologies has been difficult to adapt to the development of the cloud data center. …”
Get full text
Article -
3659
Conscientious Objection Based on Patient Identity
Published 2022-11-01“…The AMA’s code supports conscientious objection if it is based on a moral objection to a treatment rather than discrimination against patients.[4] From the Church Amendments to the Affordable Care Act, federal law has protected practitioners’ rights to object to participating in treatments contrary to their religious or moral beliefs, such as abortions, sterilization, euthanasia, or physician-assisted suicide.[5] However, the language of these laws emphasizes treatment-based objection; the laws protect healthcare workers who are unwilling to participate in medical practices based on a moral objection to a treatment. …”
Get full text
Article -
3660
An Office-Based Procedure for Hyphema Treatment
Published 2015-01-01“…Case Reports in Ophthalmological Medicine…”
Get full text
Article