Suggested Topics within your search.
Suggested Topics within your search.
- History and criticism 7
- Politics and government 7
- Constitutional law 6
- History 6
- Law 6
- Methodology 6
- Economic conditions 5
- Mass media 5
- Swahili language 5
- English language 4
- Management 4
- Philosophy 4
- Research 4
- Study and teaching 4
- Women 4
- kiswahili 4
- kiswahili language 4
- Economic development 3
- Economic policy 3
- Evaluation 3
- Information technology 3
- Interpretation and construction 3
- Moral and ethical aspects 3
- Public administration 3
- Administration 2
- Agriculture 2
- Application software 2
- Appreciation 2
- Automobiles 2
- Children 2
-
8601
Regular and Chaotic Behavior on the Convection in a Rotating Ferrofluid in Porous Medium under Helical Force
Published 2022-01-01“…This article deals with the control of chaos on the convective motion in a ferrofluid filled in a rotating porous medium and under the helical force effect. …”
Get full text
Article -
8602
Complex Dynamics Analysis for a Cournot-Bertrand Mixed Game Model with Delayed Bounded Rationality
Published 2013-01-01“…Furthermore, considering the memory of the market, a delayed Cournot-Bertrand mixed model is considered and the results show that the delayed system has the same Nash equilibrium and has a higher chance of reaching steady states or cycles than the model without delay. …”
Get full text
Article -
8603
Chaotic sequence based polar code encrypted scheme in negative secrecy capacity case
Published 2020-10-01“…A chaos based encrypted polar coding scheme,which could be applied to the negative secrecy capacity case,was proposed.Chaotic sequences were employed to encrypt the information bits and fill the frozen bits.And multi-block polar coding structure was also employed in the proposed scheme.The proposed scheme was featured as lower complexity and higher secrecy transmission rate.Corresponding mathematical analysis had been performed in terms of the error probability,security and transmission rate.The result reveals that the proposed scheme can achieve reliability,security in negative secrecy capacity case.What’s more,it has relatively low complexity and high secrecy transmission rate compared with the existing schemes.…”
Get full text
Article -
8604
CHAOSKAMPF IN THE ORTHODOX BAPTISM RITUAL
Published 2017-12-01“…Such statements are direct references to Old and New Testament texts in which water has negative connotations, being associated with hostile or chaotic aspects of existence. …”
Get full text
Article -
8605
Mrs Erlynne, Forms, Functions and Figures of Negation in Oscar Wilde’s Society Comedies
Published 2010-12-01“…Others, mostly outcasts or adventurers, but also inside outsiders, resent society as it is and bring chaos in this outwardly well-ordered, but basically corrupted and hypocritical cosmos. …”
Get full text
Article -
8606
A New Scheme on Synchronization of Commensurate Fractional-Order Chaotic Systems Based on Lyapunov Equation
Published 2016-01-01“…A simple but practical method to synchronize many familiar fractional-order chaotic systems has been put forward. A new theorem is proposed for a class of cascade fractional-order systems and it is applied in chaos synchronization. …”
Get full text
Article -
8607
Nonlinear Dynamics of a Blade Rotor with Coupled Rubbing of Labyrinth Seal and Tip Seal
Published 2021-01-01“…The paths of the system for entering and exiting chaos are analyzed.…”
Get full text
Article -
8608
Chaotic Behavior in a Switched Dynamical System
Published 2008-01-01“…By considering the voltage input as a bifurcation parameter, we observe that the obtained simulations show that the buck converter is prone to have subharmonic behavior and chaos. We also present the corresponding bifurcation diagram. …”
Get full text
Article -
8609
A novel chaotic system with one absolute term: stability, ultimate boundedness, and image encryption
Published 2025-01-01“…This system has a countable finite coexisting nested attractors. …”
Get full text
Article -
8610
Chaotic dynamics of string around the charged Kiselev black hole
Published 2025-01-01“…Dynamics of a string near the event horizon of the charged Kiselev black hole is studied in this paper. …”
Get full text
Article -
8611
Addressing Sexual Violence: The Reality and Strategies of Female Ojek (Motorbike Ride Service) Drivers in Banyumas Regency
Published 2024-12-01“… The emergence of the phenomenon of female online motorcycle taxi drivers in the Banyumas district shows that women’s emancipation has taken place. Transportation has become a daily need for Banyumas residents, this is used by some women to earn a living. …”
Get full text
Article -
8612
Menaces pesant sur une population de Galagos nains, Galagoides demidoff phasma (Galagonidae, Primates), dans un quartier périphérique de la ville de Kinshasa à N’Djili-Brasseries e...
Published 2014-01-01“…Le milieu est caractérisé par une flore composée de forêts entrecoupées de savanes arbustives ou arborées, de champs de cultures locales et d’habitations. La faune comprend de petites espèces de vertébrés comme des amphibiens, des reptiles, des oiseaux et des mammifères dont des rats, des chats sauvages, des chauves-souris, des écureuils et seulement une espèce de primates de petite taille appelés galagos nains ou Galagoides demidoff phasma. …”
Get full text
Article -
8613
Structure of basic emotions as a factor of emotional intelligence of high school students
Published 2023-04-01“…Emotional reaction is recognized as a specific type of knowledge that can enable a person to solve environmental problems successfully and correlate with the category of intelligence. …”
Get full text
Article -
8614
New image encryption algorithm based on double chaotic system and compressive sensing
Published 2022-10-01“…Image encryption technology plays an important role in today’s multimedia applications and Internet information security transmission.However, most image encryption algorithms still have problems, for example, cipher images occupied high bandwidth during transmission, image encryption speed is slow, image encryption algorithms are not associated with plain image, and there is no complete ciphertext feedback mechanism.These problems all affect the security and easy use of image encryption algorithms.In order to solve the above problems, the compressive sensing technology and chaotic system were studied, and a new image encryption algorithm based on double chaotic system and compressive sensing with plaintext association was proposed.The plaintext image association key was used to associate the plain image hash value with the Logistic chaotic system parameters.Discrete wavelet transform, was used to sparse the plain image.Then the random measurement matrix was generated by the Logistic chaos system, and the image was encrypted once by combining the compressive sensing technique and the random measurement matrix to obtain the intermediate image.The intermediate image was hashed again, and the Rucklidge chaos system initial value was associated with the plain image hash value together.The Rucklidge chaotic system and encryption algorithm were used to control the intermediate image for secondary encryption and accordingly obtain the cipher image.The encryption algorithm was a new plaintext correlation encryption algorithm, which used the image’s own pixel value to control the scrambling of the intermediate image.It also enhanced the plaintext association and established a ciphertext feedback mechanism.Simulation results and performance analysis show that the algorithm has good encryption performance.The encrypted image can be compressed according to the compression ratio, effectively reducing the size of the cipher image.Moreover, it is resistant to common attacks such as known plaintext attack, selective plaintext attack and differential attack, which is better than other common image encryption algorithms.…”
Get full text
Article -
8615
Study on perspective taking in online discussions among university students with hearing impairments
Published 2024-11-01“…These recommendations can be utilised to assess students’ online discussions and their ability to consider alternative perspectives.…”
Get full text
Article -
8616
Control of Chaotic Calcium Oscillations in Biological Cells
Published 2021-01-01“…We particularly show that in the majority of chaos cases, the reactor to cell coupling can induce the generation of regular calcium oscillations as the coupling strength is varied. …”
Get full text
Article -
8617
W poszukiwaniu teorii operacji specjalnej
Published 2024-02-01“…In modern literature, instructions and doctrines, both Englishlanguage and national, one can encounter interchangeably used expressions: special operations, special tasks or special actions. …”
Get full text
Article -
8618
Neural network-based aeroelastic system identification for predicting flutter of high flexibility wings
Published 2025-01-01“…Abstract Flutter is an extremely significant academic topic in both aerodynamics and aircraft design. Since flutter can cause multiple types of phenomena including bifurcation, period doubling, and chaos, it becomes one of the most unpredictable instability phenomena. …”
Get full text
Article -
8619
Imaginaries of Judicial Practices in Cali, Colombia
Published 2015-05-01“…In this sense, it is not only the central imaginaries of the state justice system and judicial processes but also the idea of justice itself that is marked by tediousness, delay and chaos, imaginaries of the system that were identified by the users and the officials involved in the administration of the system. …”
Get full text
Article -
8620
Des réussites bien particulières dans un dispositif de coprésence du champ de la protection de l’enfance : entre énigmes et paris
Published 2022-03-01“…This article focuses on moments of copresence between a parent, a child, and a professional in the course of ordinary activities (chatting, eating, playing, etc.) within a placement apparatus in the field of child protection in Switzerland. …”
Get full text
Article