Showing 981 - 1,000 results of 2,973 for search 'Good Newwz~', query time: 1.49s Refine Results
  1. 981

    Blind recognition of RSC based on logarithmic conformity by Zhaogen ZHONG, Zhaojun WU, Limin ZHANG, Zhiqing WANG

    Published 2018-10-01
    “…A new algorithm based on logarithmic conformity was proposed.Firstly,based on the probability of total RSC coding equation,the concept of logarithmic coincidence degree,which could measure the establishment of coding equation,was introduced.Then because of constraint length of RSC,the polynomial database could be generated,and then logarithmic conformity of every polynomial could be calculated when traversing the database.As the results,the RSC could be recognized,because the correct polynomial could make the conformity maximum.The algorithm has small amount of calculation because of finite traversal,which was only related to amount of intercepted data,besides,this algorithm has good error tolerance by soft decisions.The simulation results show that the correct ratio of recognition can reach 90% at SNR of 0 dB and its performances are obviously superior to those of existing algorithms.…”
    Get full text
    Article
  2. 982

    Fault tolerance of balanced hypercubes by Xin-xin ZHANG, Li XU, Li-mei LIN

    Published 2017-09-01
    “…Fault tolerance is one of the important ways to measure the reliability of multiprocessor interconnection networks.g-restricted edge connectivity and g-restricted connectivity can ensure every remaining component is disconnected ,the number of neighbors of vertex is no less than g,which can measure the fault tolerance and reliability of multiprocessor and multichannel system more accurately.Balanced hypercubes is a variant of the hypercube,which has some specific topological properties,it can better meet the needs of the multiprocessor system and many new networks.The {1,2}-restricted edge connectivity and the {1,2}-restricted connectivity of balanced hypercubes were proposed,which could enrich the evaluation system of network fault tolerance and reliability in balanced hypercubes topology and it laid a good foundation for the fault diagnosis algorithm of balances hypercube.…”
    Get full text
    Article
  3. 983

    Capture réglementaire en temps de pandémie by Samira Guennif

    Published 2021-02-01
    “…In the midst of the covid-19 pandemic, the Food and Drug Administration (FDA) published in March the orphan drug status granted to remdesivir, a molecule patented by Gilead as a treatment for the new coronavirus. This gave the company seven years of market exclusivity for its drug in the US market. …”
    Get full text
    Article
  4. 984

    Approach to detecting SQL injection behaviors in network environment by Yu-fei ZHAO, Gang XIONG, Long-tao HE, Zhou-jun LI

    Published 2016-02-01
    “…Based on the request length, request frequency and feature string, a new method, LFF (length-frequency-feature), was proposed to detect SQL injection behaviors from network traffic. …”
    Get full text
    Article
  5. 985

    The Poetics of Second Liberation by Vincent R. Ogoti

    Published 2024-09-01
    “…The essay rereads the play, focusing on the concepts of ‘bad decolonization’, ‘good decolonization’, and the necessity for a ‘second liberation’ – a form of decolonization that transcends mere emancipation from physical subjugation. …”
    Get full text
    Article
  6. 986

    Efficient signcryption scheme based on Cocks’ identity cryptosystem by Changgen PENG, Xiaoyu ZHANG, Hongfa DING, Shanhui YANG

    Published 2020-12-01
    “…Most of the existing identity-based signcryption schemes are based on bilinear or multilinear pairing operations construction.To solve the problem of low efficiency caused by complex pair operation, a new efficient signcryption scheme based on the identity cryptosystem of Cocks was proposed.Firstly, the security model of the proposed scheme was formalized, and the definition of confidentiality and unforgeability was given.Secondly, the quadratic residue problem was used to realize the concrete construction of the proposed scheme, and the signature algorithm was designed in a logical step by combining Jacobi symbol operation.Finally, the security proofed that the scheme satisfied the confidentiality and unforgeability was given under the random prediction model.The efficiency analysis shows that compared with the existing identity-based signcryption scheme, the proposed scheme greatly improves the computing efficiency and has good characteristics of identity-based cryptosystem.…”
    Get full text
    Article
  7. 987

    THE ETHICS OF PLATO’S IDEAS AND IDEALS by Jonas Balčius

    Published 1998-01-01
    “…A new aspect of Plato’s world view is his retributionalistic conception, according to which every person’s life is assessed after death. …”
    Get full text
    Article
  8. 988

    Citrus Nursery Production Guide, Chapter 8: Stock Plant and Tree Production: c) Weed Management in Citrus Nurseries by Biwek Gairhe, Ramdas Kanissery, Brent Sellers

    Published 2019-10-01
    “…It is not uncommon for weeds to grow in containers, where they compete with citrus seedlings, and on greenhouse floors, where they can harbor pests and diseases. This new 7-page publication of the UF/IFAS Horticultural Sciences Department provides descriptions of a few commonly found weeds in citrus nurseries and good weed management practices. …”
    Get full text
    Article
  9. 989

    Topological Modification of a Helical Gear with Circular Tooth Profile in Gear Cutter and Tooth Drum-shaped by Zhang Xijin, Jiang Jinke, Jia Chao, Hou Xiangying, Yang Qian

    Published 2018-01-01
    “…The gear modification is an important technique to improve gear transmission performance. A new topological modification method with circular tooth profilein gear cutter and tooth drum-shaped is put forward. …”
    Get full text
    Article
  10. 990

    „Ma santé commence à être un peu meilleure...“ Osvícenec a jeho zdraví. by Lenka Švandová Maršálková

    Published 2021-12-01
    “…Attention is paid to which methods and medicaments Kaunitz considered healthy, whether he followed any preventive treatment to maintain good health, and what he advised his relatives and friends. …”
    Get full text
    Article
  11. 991

    The Multiple Modernities of Sweden by Janina Gosseye

    Published 2011-06-01
    “…In this volume, Mattsson and Wallenstein answer many questions, but raise an equal amount of new questions and thus leave the reader wanting more, as any good book should.…”
    Get full text
    Article
  12. 992
  13. 993

    Models for Type VI Adsorption Isotherms from a Statistical Mechanical Formulation by M. Ben Yahia, Y. Ben Torkia, S. Knani, M. A. Hachicha, M. Khalfaoui, A. Ben Lamine

    Published 2013-04-01
    “…The formulation of these new expressions is based on a rigorous statistical mechanical description. …”
    Get full text
    Article
  14. 994

    Research on link prediction model based on hierarchical attention mechanism by Xiaojuan ZHAO, Yan JIA, Aiping LI, Kai CHEN

    Published 2021-03-01
    “…In order to solve the problem that the existing graph attention mechanism tends to cause attention distribution to certain relations with high frequency when performing link prediction related tasks, a new link prediction model based on hierarchical attention mechanism was proposed.In the link prediction task, a hierarchical attention mechanism was designed to give different attention to the relationships of different relationship types connected to a given entity in the knowledge graph according to the relationship in the prediction task.While the characteristics of multi-hop neighbor entities were pay attention to, the relationship characteristics was pay more attention to find the relationship type that matches the target relationship.Through comparison experiments with the mainstream models on multiple benchmark data sets, the results show that the performance of the model is better than the mainstream models and has good robustness.…”
    Get full text
    Article
  15. 995

    Budgets participatifs : S’approprier la dialectique de la gouvernance participative locale by Manuel Goehrs

    Published 2017-06-01
    “…A multiplicity of stakeholders take part in the promotion of citizen participation, the “new paradigm” for good governance: development organisations, the State, local authorities and the population. …”
    Get full text
    Article
  16. 996

    Study of a Fractional-Order Chaotic System Represented by the Caputo Operator by Ndolane Sene

    Published 2021-01-01
    “…This paper is presented on the theory and applications of the fractional-order chaotic system described by the Caputo fractional derivative. Considering the new fractional model, it is important to establish the presence or absence of chaotic behaviors. …”
    Get full text
    Article
  17. 997

    Improved method of Tor network flow watermarks based on IPD interval by Jie DU, Yongzhong HE, Ye DU

    Published 2019-08-01
    “…Tor is an anonymous network mechanism that provides services for hiding traffic sources,but it has the problem that the entry traffic flows of Tor are clearly identifiable.Bridge protocols such as obfs4 come into being to solve this problem,which brings new challenges that have not yet been overcome.An IPD interval scheme is proposed,which uses the clustering characteristics of k-means to improve the original scheme,so that the added flow watermark can be detected efficiently in the three modes of obfs4 bridges.The results of experiments show that the improved algorithm has higher detection rate and recognition rate,and has good adaptability to variable netflow traffic,which is conducive to the construction of a nice secure network environment.…”
    Get full text
    Article
  18. 998

    Mechanism Design and Simulation of Self-centering Center Rest Used in Grinding Machine by Zhao Yongqiang, Chai Xinning, Hou Hongling, Wang Yaofeng

    Published 2016-01-01
    “…The simulation data and the theoretical calculation value are good consistency. Thus,a new method of structure design and topology optimization of self-centering center rest is provided.…”
    Get full text
    Article
  19. 999

    Improvement of College English Teaching Model under the Background of Information Technology by Fang Du, Yi-xin Xiong, Xian-cheng Ming

    Published 2022-01-01
    “…The experimental research results show that the college English teaching system based on information technology proposed in this paper has a good teaching effect.…”
    Get full text
    Article
  20. 1000

    A Universal Calculation Method for Jacobian Matrix of Parallel Mechanism by Zhang Shuangshuang, Yang Hongtao

    Published 2015-01-01
    “…The Jacobian matrix is a key concept in mechanisms and profoundly reflect the nature of the mechanism,which provides us not only a kinematics mapping relations,it also sets a basis for mechanism analysis and synthesis in the future.A universal calculation method for Jacobian matrix of parallel mechanism is presented based on screw theory.Due to its style of construction,tedious steps in normal calculation method,including observation and derivation are nicely avoided,which makes this new method much more simplified.Meanwhile,since its modularization in style,this method also provides its advantages in computer aided programming.A limited-DOF parallel manipulator 3-RPS is used as an example to testify the superiority of this method,which also set a good foundation for further performance analysis and design.…”
    Get full text
    Article