Suggested Topics within your search.
Suggested Topics within your search.
- Philosophy 11
- History 9
- Moral and ethical aspects 8
- Economic development 7
- Social service 7
- Research 6
- Economic policy 5
- History and criticism 5
- Management 5
- Mass media 5
- Social aspects 5
- Study and teaching 5
- Economic conditions 4
- Education 4
- Quantum theory 4
- methods 4
- Chemistry, Physical and theoretical 3
- Communication 3
- Criticism 3
- Culture 3
- Economic aspects 3
- Economics 3
- Educational leadership 3
- Globalization 3
- Information theory 3
- Jurisprudence 3
- Law 3
- Literature 3
- MATHEMATICS / Mathematical Analysis 3
- Number theory 3
-
23561
Difficultés des enseignants lors de l’enseignement de questions socialement vives : quelle conceptualisation pour mieux les comprendre ?
Published 2019-11-01“…In this article, we articulate the theoretical frameworks of the didactics of SAQ and of the clinic of activity in order to better understand the conflicts at work in teachers’ activity. …”
Get full text
Article -
23562
Le cadrage religieux de la mobilisation « anti-genre » : une étude micro-événementielle du Family Day
Published 2017-12-01“…Based on a micro-analytic observation of the Family Day demonstration in Rome (June 2015), the article examines, on the one hand, the theoretical-political framework of the "anti-gender" cause; and, on the other hand, the strategic use of a Catholic religious framework to strengthen the adhesion to the cause. …”
Get full text
Article -
23563
On the compatible weakly nonlocal Poisson brackets of hydrodynamic type
Published 2002-01-01Get full text
Article -
23564
Distributed energy efficient unequal clustering algorithm for wireless sensor networks
Published 2009-01-01“…Finally, an unequal clustering algorithm was proposed for single-hop homogeneous networks. Through both theoretical analysis and numerical results, it is shown that DEEUC prolongs the network lifetime significantly against the other clustering protocols such as LEACH-C and EECS. …”
Get full text
Article -
23565
Study on I/O response time bounds of network storage systems
Published 2006-01-01“…In order to predict and improve the performance of networked storage systems,the relationship was explored between the system I/O response time and its performance factors by quantitative analytical method.Through analyzing data flow in networked RAID storage system,we established its analytical model utilizing closed queuing networks and studied on performance bounds of the system I/O response time.Experimental results show that the theoretical bounds are found to be in agreement with the actual performance bounds of the networked RAID storage system and reflect the dynamic trend of its actual performance.Furthermore,we conclude that the CPU processing power and cache hit rate of the server at the storage center are the key factors affecting the I/O response time,as the concurrent jobs are lower.…”
Get full text
Article -
23566
Steel Wire Mechanical Property Degradation Study Based on Numerical Simulation
Published 2022-01-01“…It is necessary to conduct in-depth research on the stress status and damage evolution of the hanger rods, to establish a theoretical basis for the design principles and criteria of key components. …”
Get full text
Article -
23567
Dynamic of Innovation in Services for Consumers at the Bottom of the Pyramid
Published 2017-01-01“…The results showed adherence of the proposed framework to the dynamics of innovation conducted by the studied firm. Considering the theoretical- academic perspective, the framework helps explain the interaction between dimensions, capabilities, and elements of the market infrastructure. …”
Get full text
Article -
23568
Privacy protection scheme of DBSCAN clustering based on homomorphic encryption
Published 2021-02-01“…In order to reduce the risk of data privacy leakage in the process of outsourced clustering, a privacy protection scheme of DBSCAN clustering based on homomorphic encryption was proposed.In order to encrypt the float data in the actual scene, three data preprocessing methods for different data accuracy were given, and a policy for choosing a proper data preprocessing method based on data characteristics, accuracy and computational cost was also proposed.For the ciphertext comparison operation that was not supported by homomorphic encryption, a protocol between the client and the cloud server was designed to realize the function of ciphertext comparison.Theoretical analysis and experimental results show that the proposed scheme can ensure the security of data privacy, and has a higher clustering accuracy rate and lower time overhead.…”
Get full text
Article -
23569
Multicast resource allocation scheme considering source-coding characteristic in OFDM systems
Published 2010-01-01“…Aiming to solve the problem that unicast or conventional multicast was incapable of make full use of the opening for wireless propagation in orthogonal frequency division multiplexing(OFDM) systems,a resource allocation scheme involving several multicast groups was proposed to maintain proportional fairness among groups.The proposed scheme consisted of subcarrier assignment algorithm and power allocation algorithm.The former was achieved by modi-fying the existing unicast subcarrier assignment algorithm,whilst optimal power allocation on condition that subcarrier assignment was determined was reached by the latter based on theoretically derived non-linear equations.Simulation re-sults show that the proposed scheme can ensure perfect fairness among different multicast groups,and remarkably out-performs conventional multicast in terms of rate-sum capacity.Combined with the low complexity,it is suitable for the application to voice/video multicast in actual wireless systems.…”
Get full text
Article -
23570
Regularized manifold information extreme learning machine
Published 2016-11-01“…By exploiting the thought of manifold learning and its theoretical method, a regularized manifold information ex-treme learning machine algorithm aimed to depict and fully utilize manifold information was proposed. …”
Get full text
Article -
23571
The Spell of Homo Informaticus: Two Superstitions and Three Dreams
Published 2000-01-01“…The article puts under the close scrutiny the key pro et contra arguments involved in the theoretical articulation of these basic attitudes and examines the topical question: why can neither the dreadful fears nor the gay hopes of<i> Homo Irretitus</i> be reasonably sustained in the face of critical inquiry?…”
Get full text
Article -
23572
The Active Outward Orientation of the Organisation
Published 2022-11-01“…This study examines and Identifies an appropriate theoretical framework within which to proceed with an Investigation into organisational effectiveness. …”
Get full text
Article -
23573
Negotiating Meanings of Borderlands in relation to Arabness, Americanness and Muslimness: Mohja Kahf’s The Girl in the Tangerine Scarf (2006)
Published 2019-05-01“…This literature has carved out a niche for itself as a literature of minority, of womanhood and of borderlands. Recent theorizations on borderland zone(s) have endeavored to understand journeys of displacement and dislocation that immigrants may experience. …”
Get full text
Article -
23574
Performance comparison of systematic polar code and non-systematic polar code
Published 2019-06-01“…Polar code in channel coding schemes is a research hotspot in 5G communication field.Polar code is susceptible to error propagation under successive cancellation decoding,and the performance of the code at short and medium block lengths is not ideal.For the problems,the performance difference between systematic polar code and non-systematic polar code was studied under various simulation conditions.Simulation results demonstrate that systematic polar code has advantage over non-systematic polar code in bit error rate performance,and the former are more robust against error propagation than the latter under successive cancellation decoding.The above results are considerable importance from the theoretical values in 5G communication and performance optimization of polar code.…”
Get full text
Article -
23575
Efficient anonymous roaming authentication scheme using certificateless aggregate signature in wireless network
Published 2016-07-01“…Furthermore, based on the proposed signature scheme, a novel roaming authentication scheme with anonymity was presented, in which it simplified the traditional three-party au-thentication model. The theoretical analysis shows that this scheme is secure and effective, and thus it is especially suit-able for large-scale wireless mobile networks.…”
Get full text
Article -
23576
Analysis of Static and Dynamic Characteristic of a Transfer Gearbox based on Finite Element
Published 2018-01-01“…The purpose of this is to provide theoretical basis and guidance for the following structural optimization design. …”
Get full text
Article -
23577
Optimal configuration algorithm for static segment of FlexRay
Published 2012-11-01“…FlexRay,which could provide high data bandwidth,time determinism and reliability,was recognized as the standard of the next generation automotive buses,but the complexity of the configuration hindered its wide application in automotive electronics systems.Slot ID assignment of static segment was the key part of its configuration.Started from the system-level point of view,a new system-level scheduling unit model was defined.Based on confining the iable slot IDs and analyzing delay for each scheduling unit,a branch and bound-based searching was carried on to search the optimal slot ID assignment plan that realized the minimization of system’s end-to-end delay.Both theoretical proving and experimental results show that the slot ID assignment method is optimal in optimizing system’s end-to-end delay.…”
Get full text
Article -
23578
Analyser les pratiques d’enseignement-apprentissage de la lecture des textes littéraires : quelle modélisation pour quels enjeux ?
Published 2017-06-01“…Conceived as an essay of theoretical discussion, the article starts from the observation that the analysis of teaching-learning practices in the reading of literary texts is torn between two types of competing modeling: one centered on the expected activity of the teacher and / or students, the other centered on observing actual practices. …”
Get full text
Article -
23579
Verdade, ficção e memórias da violência na narrativa de Valêncio Xavier
Published 2013-01-01“…We also part from the attempt to recover and discuss some aspects of the complex theoretical discussion that takes place between literature, history and writing. …”
Get full text
Article -
23580
ASSESSMENT OF THE BRICS MONETARY POLICY
Published 2020-02-01“…A set of theoretical, practical and methodological issues of determining the economic status of the state, based on the use of indicators of stability, dynamic and qualitative indicators of state development has been examined for obtaining a generalized assessment of monetary policy on the example of the BRICS countries. …”
Get full text
Article