Showing 23,561 - 23,580 results of 33,243 for search 'Theorbo~', query time: 2.81s Refine Results
  1. 23561

    Difficultés des enseignants lors de l’enseignement de questions socialement vives : quelle conceptualisation pour mieux les comprendre ? by Amélie Lipp

    Published 2019-11-01
    “…In this article, we articulate the theoretical frameworks of the didactics of SAQ and of the clinic of activity in order to better understand the conflicts at work in teachers’ activity. …”
    Get full text
    Article
  2. 23562

    Le cadrage religieux de la mobilisation « anti-genre » : une étude micro-événementielle du Family Day by Massimo Prearo

    Published 2017-12-01
    “…Based on a micro-analytic observation of the Family Day demonstration in Rome (June 2015), the article examines, on the one hand, the theoretical-political framework of the "anti-gender" cause; and, on the other hand, the strategic use of a Catholic religious framework to strengthen the adhesion to the cause. …”
    Get full text
    Article
  3. 23563
  4. 23564

    Distributed energy efficient unequal clustering algorithm for wireless sensor networks by SHANG Feng-jun1, Mehran Abolhasan2, Tadeusz Wysocki3

    Published 2009-01-01
    “…Finally, an unequal clustering algorithm was proposed for single-hop homogeneous networks. Through both theoretical analysis and numerical results, it is shown that DEEUC prolongs the network lifetime significantly against the other clustering protocols such as LEACH-C and EECS. …”
    Get full text
    Article
  5. 23565

    Study on I/O response time bounds of network storage systems by CUI Bao-jiang1, LIU Jun2, WANG Gang2, LIU Jing2

    Published 2006-01-01
    “…In order to predict and improve the performance of networked storage systems,the relationship was explored between the system I/O response time and its performance factors by quantitative analytical method.Through analyzing data flow in networked RAID storage system,we established its analytical model utilizing closed queuing networks and studied on performance bounds of the system I/O response time.Experimental results show that the theoretical bounds are found to be in agreement with the actual performance bounds of the networked RAID storage system and reflect the dynamic trend of its actual performance.Furthermore,we conclude that the CPU processing power and cache hit rate of the server at the storage center are the key factors affecting the I/O response time,as the concurrent jobs are lower.…”
    Get full text
    Article
  6. 23566

    Steel Wire Mechanical Property Degradation Study Based on Numerical Simulation by Jiangjiang Li, Xuanyu Zhang

    Published 2022-01-01
    “…It is necessary to conduct in-depth research on the stress status and damage evolution of the hanger rods, to establish a theoretical basis for the design principles and criteria of key components. …”
    Get full text
    Article
  7. 23567

    Dynamic of Innovation in Services for Consumers at the Bottom of the Pyramid by Gibson Meira Oliveira, André Gustavo Carvalho Machado

    Published 2017-01-01
    “…The results showed adherence of the proposed framework to the dynamics of innovation conducted by the studied firm. Considering the theoretical- academic perspective, the framework helps explain the interaction between dimensions, capabilities, and elements of the market infrastructure. …”
    Get full text
    Article
  8. 23568

    Privacy protection scheme of DBSCAN clustering based on homomorphic encryption by Chunfu JIA, Ruiqi LI, Yafei WANG

    Published 2021-02-01
    “…In order to reduce the risk of data privacy leakage in the process of outsourced clustering, a privacy protection scheme of DBSCAN clustering based on homomorphic encryption was proposed.In order to encrypt the float data in the actual scene, three data preprocessing methods for different data accuracy were given, and a policy for choosing a proper data preprocessing method based on data characteristics, accuracy and computational cost was also proposed.For the ciphertext comparison operation that was not supported by homomorphic encryption, a protocol between the client and the cloud server was designed to realize the function of ciphertext comparison.Theoretical analysis and experimental results show that the proposed scheme can ensure the security of data privacy, and has a higher clustering accuracy rate and lower time overhead.…”
    Get full text
    Article
  9. 23569

    Multicast resource allocation scheme considering source-coding characteristic in OFDM systems by XU Wen-jun, HE Zhi-qiang, NIU Kai, LIN Jia-ru, WU Wei-ling

    Published 2010-01-01
    “…Aiming to solve the problem that unicast or conventional multicast was incapable of make full use of the opening for wireless propagation in orthogonal frequency division multiplexing(OFDM) systems,a resource allocation scheme involving several multicast groups was proposed to maintain proportional fairness among groups.The proposed scheme consisted of subcarrier assignment algorithm and power allocation algorithm.The former was achieved by modi-fying the existing unicast subcarrier assignment algorithm,whilst optimal power allocation on condition that subcarrier assignment was determined was reached by the latter based on theoretically derived non-linear equations.Simulation re-sults show that the proposed scheme can ensure perfect fairness among different multicast groups,and remarkably out-performs conventional multicast in terms of rate-sum capacity.Combined with the low complexity,it is suitable for the application to voice/video multicast in actual wireless systems.…”
    Get full text
    Article
  10. 23570

    Regularized manifold information extreme learning machine by De-shan LIU, Yong-he CHU, De-qin YAN

    Published 2016-11-01
    “…By exploiting the thought of manifold learning and its theoretical method, a regularized manifold information ex-treme learning machine algorithm aimed to depict and fully utilize manifold information was proposed. …”
    Get full text
    Article
  11. 23571

    The Spell of Homo Informaticus: Two Superstitions and Three Dreams by Marius Povilas Saulauskas

    Published 2000-01-01
    “…The article puts under the close scrutiny the key pro et contra arguments involved in the theoretical articulation of these basic attitudes and examines the topical question: why can neither the dreadful fears nor the gay hopes of<i> Homo Irretitus</i> be reasonably sustained in the face of critical inquiry?…”
    Get full text
    Article
  12. 23572

    The Active Outward Orientation of the Organisation by George Angelopulo

    Published 2022-11-01
    “…This study examines and Identifies an appropriate theoretical framework within which to proceed with an Investigation into organisational effectiveness. …”
    Get full text
    Article
  13. 23573

    Negotiating Meanings of Borderlands in relation to Arabness, Americanness and Muslimness: Mohja Kahf’s The Girl in the Tangerine Scarf (2006) by Dalal Sarnou

    Published 2019-05-01
    “…This literature has carved out a niche for itself as a literature of minority, of womanhood and of borderlands. Recent theorizations on borderland zone(s) have endeavored to understand journeys of displacement and dislocation that immigrants may experience. …”
    Get full text
    Article
  14. 23574

    Performance comparison of systematic polar code and non-systematic polar code by Hui LI, Ming YE, Qiang TONG, Jie CHENG, Lijie WANG

    Published 2019-06-01
    “…Polar code in channel coding schemes is a research hotspot in 5G communication field.Polar code is susceptible to error propagation under successive cancellation decoding,and the performance of the code at short and medium block lengths is not ideal.For the problems,the performance difference between systematic polar code and non-systematic polar code was studied under various simulation conditions.Simulation results demonstrate that systematic polar code has advantage over non-systematic polar code in bit error rate performance,and the former are more robust against error propagation than the latter under successive cancellation decoding.The above results are considerable importance from the theoretical values in 5G communication and performance optimization of polar code.…”
    Get full text
    Article
  15. 23575

    Efficient anonymous roaming authentication scheme using certificateless aggregate signature in wireless network by Dan LIU, Run-hua SHI, Shun ZHANG, Hong ZHONG

    Published 2016-07-01
    “…Furthermore, based on the proposed signature scheme, a novel roaming authentication scheme with anonymity was presented, in which it simplified the traditional three-party au-thentication model. The theoretical analysis shows that this scheme is secure and effective, and thus it is especially suit-able for large-scale wireless mobile networks.…”
    Get full text
    Article
  16. 23576

    Analysis of Static and Dynamic Characteristic of a Transfer Gearbox based on Finite Element by Xue Song, Yu Cungui, Xu Zuguo

    Published 2018-01-01
    “…The purpose of this is to provide theoretical basis and guidance for the following structural optimization design. …”
    Get full text
    Article
  17. 23577

    Optimal configuration algorithm for static segment of FlexRay by Yong XIE, Ren-fa LI, Hua-bin RUAN, Xin PENG

    Published 2012-11-01
    “…FlexRay,which could provide high data bandwidth,time determinism and reliability,was recognized as the standard of the next generation automotive buses,but the complexity of the configuration hindered its wide application in automotive electronics systems.Slot ID assignment of static segment was the key part of its configuration.Started from the system-level point of view,a new system-level scheduling unit model was defined.Based on confining the iable slot IDs and analyzing delay for each scheduling unit,a branch and bound-based searching was carried on to search the optimal slot ID assignment plan that realized the minimization of system’s end-to-end delay.Both theoretical proving and experimental results show that the slot ID assignment method is optimal in optimizing system’s end-to-end delay.…”
    Get full text
    Article
  18. 23578

    Analyser les pratiques d’enseignement-apprentissage de la lecture des textes littéraires : quelle modélisation pour quels enjeux ? by Jean-Louis Dufays

    Published 2017-06-01
    “…Conceived as an essay of theoretical discussion, the article starts from the observation that the analysis of teaching-learning practices in the reading of literary texts is torn between two types of competing modeling: one centered on the expected activity of the teacher and / or students, the other centered on observing actual practices. …”
    Get full text
    Article
  19. 23579

    Verdade, ficção e memórias da violência na narrativa de Valêncio Xavier by Fernanda Valim Côrtes Miguel

    Published 2013-01-01
    “…We also part from the attempt to recover and discuss some aspects of the complex theoretical discussion that takes place between literature, history and writing. …”
    Get full text
    Article
  20. 23580

    ASSESSMENT OF THE BRICS MONETARY POLICY by A. A. Aliev

    Published 2020-02-01
    “…A set of theoretical, practical and methodological issues of determining the economic status of the state, based on the use of indicators of stability, dynamic and qualitative indicators of state development has been examined for obtaining a generalized assessment of monetary policy on the example of the BRICS countries. …”
    Get full text
    Article