Suggested Topics within your search.
Suggested Topics within your search.
- Democracy 2
- Education 2
- Effective teaching 2
- Elementary school teaching 2
- Moral and ethical aspects 2
- Quality of life 2
- Social conditions 2
- Social problems 2
- Teaching 2
- Administration 1
- Aims and objectives 1
- Anesthetics 1
- Appreciation 1
- Automobiles 1
- Business communication 1
- Business ethics 1
- Classroom management 1
- College administrators 1
- Comparative method 1
- Cross-cultural studies 1
- Curricula 1
- Economic development 1
- Economic policy 1
- Education, Humanistic 1
- Educational change 1
- Educational leadership 1
- Environmental economics 1
- Environmental policy 1
- Ethnology 1
- Exercise 1
-
981
Blind recognition of RSC based on logarithmic conformity
Published 2018-10-01“…A new algorithm based on logarithmic conformity was proposed.Firstly,based on the probability of total RSC coding equation,the concept of logarithmic coincidence degree,which could measure the establishment of coding equation,was introduced.Then because of constraint length of RSC,the polynomial database could be generated,and then logarithmic conformity of every polynomial could be calculated when traversing the database.As the results,the RSC could be recognized,because the correct polynomial could make the conformity maximum.The algorithm has small amount of calculation because of finite traversal,which was only related to amount of intercepted data,besides,this algorithm has good error tolerance by soft decisions.The simulation results show that the correct ratio of recognition can reach 90% at SNR of 0 dB and its performances are obviously superior to those of existing algorithms.…”
Get full text
Article -
982
Fault tolerance of balanced hypercubes
Published 2017-09-01“…Fault tolerance is one of the important ways to measure the reliability of multiprocessor interconnection networks.g-restricted edge connectivity and g-restricted connectivity can ensure every remaining component is disconnected ,the number of neighbors of vertex is no less than g,which can measure the fault tolerance and reliability of multiprocessor and multichannel system more accurately.Balanced hypercubes is a variant of the hypercube,which has some specific topological properties,it can better meet the needs of the multiprocessor system and many new networks.The {1,2}-restricted edge connectivity and the {1,2}-restricted connectivity of balanced hypercubes were proposed,which could enrich the evaluation system of network fault tolerance and reliability in balanced hypercubes topology and it laid a good foundation for the fault diagnosis algorithm of balances hypercube.…”
Get full text
Article -
983
Capture réglementaire en temps de pandémie
Published 2021-02-01“…In the midst of the covid-19 pandemic, the Food and Drug Administration (FDA) published in March the orphan drug status granted to remdesivir, a molecule patented by Gilead as a treatment for the new coronavirus. This gave the company seven years of market exclusivity for its drug in the US market. …”
Get full text
Article -
984
Approach to detecting SQL injection behaviors in network environment
Published 2016-02-01“…Based on the request length, request frequency and feature string, a new method, LFF (length-frequency-feature), was proposed to detect SQL injection behaviors from network traffic. …”
Get full text
Article -
985
The Poetics of Second Liberation
Published 2024-09-01“…The essay rereads the play, focusing on the concepts of ‘bad decolonization’, ‘good decolonization’, and the necessity for a ‘second liberation’ – a form of decolonization that transcends mere emancipation from physical subjugation. …”
Get full text
Article -
986
Efficient signcryption scheme based on Cocks’ identity cryptosystem
Published 2020-12-01“…Most of the existing identity-based signcryption schemes are based on bilinear or multilinear pairing operations construction.To solve the problem of low efficiency caused by complex pair operation, a new efficient signcryption scheme based on the identity cryptosystem of Cocks was proposed.Firstly, the security model of the proposed scheme was formalized, and the definition of confidentiality and unforgeability was given.Secondly, the quadratic residue problem was used to realize the concrete construction of the proposed scheme, and the signature algorithm was designed in a logical step by combining Jacobi symbol operation.Finally, the security proofed that the scheme satisfied the confidentiality and unforgeability was given under the random prediction model.The efficiency analysis shows that compared with the existing identity-based signcryption scheme, the proposed scheme greatly improves the computing efficiency and has good characteristics of identity-based cryptosystem.…”
Get full text
Article -
987
THE ETHICS OF PLATO’S IDEAS AND IDEALS
Published 1998-01-01“…A new aspect of Plato’s world view is his retributionalistic conception, according to which every person’s life is assessed after death. …”
Get full text
Article -
988
Citrus Nursery Production Guide, Chapter 8: Stock Plant and Tree Production: c) Weed Management in Citrus Nurseries
Published 2019-10-01“…It is not uncommon for weeds to grow in containers, where they compete with citrus seedlings, and on greenhouse floors, where they can harbor pests and diseases. This new 7-page publication of the UF/IFAS Horticultural Sciences Department provides descriptions of a few commonly found weeds in citrus nurseries and good weed management practices. …”
Get full text
Article -
989
Topological Modification of a Helical Gear with Circular Tooth Profile in Gear Cutter and Tooth Drum-shaped
Published 2018-01-01“…The gear modification is an important technique to improve gear transmission performance. A new topological modification method with circular tooth profilein gear cutter and tooth drum-shaped is put forward. …”
Get full text
Article -
990
„Ma santé commence à être un peu meilleure...“ Osvícenec a jeho zdraví.
Published 2021-12-01“…Attention is paid to which methods and medicaments Kaunitz considered healthy, whether he followed any preventive treatment to maintain good health, and what he advised his relatives and friends. …”
Get full text
Article -
991
The Multiple Modernities of Sweden
Published 2011-06-01“…In this volume, Mattsson and Wallenstein answer many questions, but raise an equal amount of new questions and thus leave the reader wanting more, as any good book should.…”
Get full text
Article -
992
Medicinal Effect of Nutraceutical Fruits for the Cognition and Brain Health
Published 2016-01-01Get full text
Article -
993
Models for Type VI Adsorption Isotherms from a Statistical Mechanical Formulation
Published 2013-04-01“…The formulation of these new expressions is based on a rigorous statistical mechanical description. …”
Get full text
Article -
994
Research on link prediction model based on hierarchical attention mechanism
Published 2021-03-01“…In order to solve the problem that the existing graph attention mechanism tends to cause attention distribution to certain relations with high frequency when performing link prediction related tasks, a new link prediction model based on hierarchical attention mechanism was proposed.In the link prediction task, a hierarchical attention mechanism was designed to give different attention to the relationships of different relationship types connected to a given entity in the knowledge graph according to the relationship in the prediction task.While the characteristics of multi-hop neighbor entities were pay attention to, the relationship characteristics was pay more attention to find the relationship type that matches the target relationship.Through comparison experiments with the mainstream models on multiple benchmark data sets, the results show that the performance of the model is better than the mainstream models and has good robustness.…”
Get full text
Article -
995
Budgets participatifs : S’approprier la dialectique de la gouvernance participative locale
Published 2017-06-01“…A multiplicity of stakeholders take part in the promotion of citizen participation, the “new paradigm” for good governance: development organisations, the State, local authorities and the population. …”
Get full text
Article -
996
Study of a Fractional-Order Chaotic System Represented by the Caputo Operator
Published 2021-01-01“…This paper is presented on the theory and applications of the fractional-order chaotic system described by the Caputo fractional derivative. Considering the new fractional model, it is important to establish the presence or absence of chaotic behaviors. …”
Get full text
Article -
997
Improved method of Tor network flow watermarks based on IPD interval
Published 2019-08-01“…Tor is an anonymous network mechanism that provides services for hiding traffic sources,but it has the problem that the entry traffic flows of Tor are clearly identifiable.Bridge protocols such as obfs4 come into being to solve this problem,which brings new challenges that have not yet been overcome.An IPD interval scheme is proposed,which uses the clustering characteristics of k-means to improve the original scheme,so that the added flow watermark can be detected efficiently in the three modes of obfs4 bridges.The results of experiments show that the improved algorithm has higher detection rate and recognition rate,and has good adaptability to variable netflow traffic,which is conducive to the construction of a nice secure network environment.…”
Get full text
Article -
998
Mechanism Design and Simulation of Self-centering Center Rest Used in Grinding Machine
Published 2016-01-01“…The simulation data and the theoretical calculation value are good consistency. Thus,a new method of structure design and topology optimization of self-centering center rest is provided.…”
Get full text
Article -
999
Improvement of College English Teaching Model under the Background of Information Technology
Published 2022-01-01“…The experimental research results show that the college English teaching system based on information technology proposed in this paper has a good teaching effect.…”
Get full text
Article -
1000
A Universal Calculation Method for Jacobian Matrix of Parallel Mechanism
Published 2015-01-01“…The Jacobian matrix is a key concept in mechanisms and profoundly reflect the nature of the mechanism,which provides us not only a kinematics mapping relations,it also sets a basis for mechanism analysis and synthesis in the future.A universal calculation method for Jacobian matrix of parallel mechanism is presented based on screw theory.Due to its style of construction,tedious steps in normal calculation method,including observation and derivation are nicely avoided,which makes this new method much more simplified.Meanwhile,since its modularization in style,this method also provides its advantages in computer aided programming.A limited-DOF parallel manipulator 3-RPS is used as an example to testify the superiority of this method,which also set a good foundation for further performance analysis and design.…”
Get full text
Article