Suggested Topics within your search.
Suggested Topics within your search.
- Philosophy 11
- History 9
- Moral and ethical aspects 8
- Economic development 7
- Social service 7
- Research 6
- Economic policy 5
- History and criticism 5
- Management 5
- Mass media 5
- Social aspects 5
- Study and teaching 5
- Economic conditions 4
- Education 4
- Quantum theory 4
- methods 4
- Chemistry, Physical and theoretical 3
- Communication 3
- Criticism 3
- Culture 3
- Economic aspects 3
- Economics 3
- Educational leadership 3
- Globalization 3
- Information theory 3
- Jurisprudence 3
- Law 3
- Literature 3
- MATHEMATICS / Mathematical Analysis 3
- Number theory 3
-
23701
Short Paper - The Binary Linearization Complexity of Pseudo-Boolean Functions
Published 2024-10-01“…This motivates the definition of the linearization complexity of $f$ as the minimum such $k$. Our theoretical contributions are the proof that random polynomials almost surely have a high linearization complexity and characterizations of its value in case we do or do not restrict the set of admissible Boolean functions. …”
Get full text
Article -
23702
-
23703
Efficient communication protocol of group negotiation in VANET
Published 2018-01-01“…An efficient communication protocol of group negotiation was proposed.The protocol adopted self-checking authentication in group to avoid the nodes sending certificates to the authentication center which improved the efficiency of identification.At the same time,the group establishment among nodes which through negotiation ensured the communication confidentiality and prevented the phenomenon of single-point failure.Besides,a group key transmission scheme was proposed to reduce the frequency of authentication for legal vehicles and improve the speed of joining in the group.At the end,theoretical analysis and simulation results demonstrate that the proposed protocol not only meets the security requirements of communication in VANET,but also shows much better performance than previous reported schemes on verification delay,transmission overhead and average delay.…”
Get full text
Article -
23704
Medikalizace smrti na přelomu 18. a 19. století. Okamžik smrti, zdánlivá smrt a vzorce chování k mrtvým z hlediska dějin lékařství
Published 2013-01-01“…The first part introduces some of the author’s methodological and theoretical approaches to the topic. The second part is dedicated to the problem of apparent death which has its origins in the 40’ of the 18th century. …”
Get full text
Article -
23705
Study on Operating Characteristic of the New Type Wind Power Device based on Improved CVT Mechanism
Published 2016-01-01“…The new type of wind power device layout scheme is set up,and the transmission layout scheme theoretical model is completed. Finally,in the end,the performance parameters of the wind power device are compared and analyzed through the test method.The research result shows that,after the installation of the improved CVT mechanism,the energy conversion efficiency of the wind power device is improved,and the connecting shaft torque magnitude and change range of the blade and gearbox is reduced. …”
Get full text
Article -
23706
Fast barrier-free switching in synthetic antiferromagnets
Published 2025-01-01Get full text
Article -
23707
« No ifs or buts. / I didn’t say if or but, I said no » : Le sujet et son désir contre le discours de la psychiatrie
Published 2015-04-01“…The aim is to show how madness evolves from a theoretical construction in which it is a deviation from normalcy to a discourse that construes it as a response to the real, as defined by J. …”
Get full text
Article -
23708
Approximate Analytical Solution for a Coupled System of Fractional Nonlinear Integrodifferential Equations by the RPS Method
Published 2020-01-01“…The numerical results confirm the theoretical predictions and depict that the suggested scheme is highly convenient, is quite effective, and practically simplifies computational time. …”
Get full text
Article -
23709
Modélisation des problématisations historiques en classe et chez les historiens
Published 2017-06-01“…This is the way we intend to deal with modelling as in the problematization theoretical framework. One of the specificity of the modelling of problematizations lies in the fact that they hold together text of knowledge and text layout practices. …”
Get full text
Article -
23710
Infrastructures critiques, vulnérabilisation du territoire et résilience : assainissement et inondations majeures en Île-de-France
Published 2018-12-01“…The role played by the energy, transport and telecommunication networks in crises and post-disaster recovery is better understood, both from a theoretical and operational point of view. On the contrary, sanitation networks remain poorly appreciated and their vulnerability is underestimated. …”
Get full text
Article -
23711
Forecasting investments in fixed assets
Published 2022-09-01“…The article details the issues of forecasting investments in fixed assets. The theoretical aspects (foreign experience) of using various forms of predictive models based on the analysis of foreign scientific literature are considered. …”
Get full text
Article -
23712
Optimal path identification to defend against DDoS attacks
Published 2008-01-01“…A novel packet marking scheme,optimal path identification(OPi),was proposed to defend against DDoS at-tacks.Instead of using fixed 1 or 2 bit in previous schemes,in OPi a router deduces the traveling distance of an arrived packet by its TTL value and inserts a variable-length marking of 1~16 bit into the packet.The marking field is filled completely even the path is very short and the distinguishability is improved.OPi outperforms previous schemes,espe-cially when attacker paths adjoin user paths seriously.To obtain better performance,an OPi+TTL filtering strategy was proposed to frustrate attackers’ tries with spoofed initial TTL values.Theoretical analyses and simulations with actual Internet topologies show OPi performs excellently.…”
Get full text
Article -
23713
Low-overhead routing algorithm for opportunistic networks based on immunity information piggybacked by SV
Published 2014-10-01“…A novel routing algorithm,LRPI (low-overhead routing with piggybacked immunity information) was proposed.LRPI contains the following four new mechanisms:piggybacking the immune information with SV(summary vectors),fast generation of the immune information through a cross-layer method,an improved exchange mechanism of SV,and adaptive compression of SV.Based on the above new mechanism,LRPI not only avoids using special data structure but also can achieve the same immune function more quickly.Theoretical analysis and simulation results show that LRPI outperforms the classical epidemic routing algorithm and a few of its improvements in terms of control overhead,the number of saved packets,and average end-to-end delay.…”
Get full text
Article -
23714
RESEARCH FOR BLOW PRESSURE IMPACT ON THE DYNAMIC CHARACTERISTICS OF LIQUID-AIR HAMMER BASED ON MATLAB
Published 2017-01-01“…Blow pressure is the key factor to influence the dynamic characteristics of liquid-air hammer,in order to improving control accuracy of the forging equipment,liquid-air hammer was regard as research object,established liquid-air hammer blow process stages of non-plastic deformation and plastic deformation of Lagrange dynamics model,using the Matlab/Simulink numerical simulation to analyze movement regularity of liquid-air hammer blow process,researched for blow pressure impact on the dynamic characteristics of liquid-air hammer,provided the theoretical basis for the equipment later debugging in order to achieve the purpose of precise control.The field experiment results show that the control system can meet the requirements of liquid-air hammer precision blow process.…”
Get full text
Article -
23715
Teaching lifespace working by using the lifespace in teaching
Published 2007-03-01“…The teaching which I received on the concept of lifespace provided me with a theoretical base which drew upon the wider range of teaching on child development and group dynamics. …”
Article -
23716
Not Too Young to Run? Age requirements and young people in elected office
Published 2018-12-01“…We draw on qualitative interviews and gender literature to theorize that lower age limits have immediate and longer-term “mobilizing effects”, shifting the calculations of potential candidates in terms of the age at which they first decide to run for office.…”
Get full text
Article -
23717
Violence symbolique et résistances populaires
Published 2015-03-01“…After asserting the position of this concept within the (social) reproduction paradigm, this paper emphasizes the theoretical debates opened by the uses of this concept in the social sciences (and particularly in education sciences), especially initiated by the works of Paul Willis, but also Claude Grignon and Jean-Claude Passeron. …”
Get full text
Article -
23718
Interkulturele probleme in beeldkommunikasie
Published 2022-11-01“…Neither time nor space allows for a more intensive look at the theoretical principles on which the study of these three aspects or problems are based. …”
Get full text
Article -
23719
Introduction
Published 2019-12-01“…On the other hand, to reflect on how borders are a stimulating research topic to push anthropological theoretical and empirical research forward. Far from being marginal in anthropological knowledge, borders should be regarded as a prominent “laboratory” where anthropologists can search and find appropriate analytical tools to respond to major challenges of the contemporary world. …”
Get full text
Article -
23720
Joint amplitude and phase partition based physical layer key generation method
Published 2021-05-01“…A key generation method based on wireless channel physical layer features is of great significance for improving security of wireless transmission.An orthogonal frequency division multiplexing (OFDM) communication system based on time division duplex (TDD) with multipath fading channels was considered.Utilizing the advantages of OFDM multicarrier and the channel reciprocity and combining the phase and amplitude information of channel frequency response (CFR), two algorithms for physical layer key generation were proposed.Theoretical analysis and experimental simulation show that the proposed algorithm has more consistent and smaller overhead in information negotiation, in addition, the proposed algorithm can increase the key length and enhance randomness, and has a better defense capability against eavesdropping and active attacks of the illegal user.…”
Get full text
Article