Showing 19,581 - 19,600 results of 22,124 for search 'stOrk~', query time: 2.14s Refine Results
  1. 19581

    The Line-Haul Feeder Vehicle Routing Problem: A Classification and Review by Majid Yousefikhoshbakht, Mohamadreza Chaharmahali, Zakir Hussain Ahmed

    Published 2023-01-01
    “…In this particular type of delivery issue, these vehicles must start from the warehouse, meet customers, and finally return to the depot. …”
    Get full text
    Article
  2. 19582

    Bone mineral density in human femurs of documented age-at-death in a comparative context by Emmanuel Gilissen, Sarah Tayach, Rosine Orban

    Published 2024-05-01
    “…This contribution aims at answering the question of the how and the why of invasive, micro-invasive and non-invasive analysis of anthropobiological remains, through the study of a collection comprising 51 skeletons of known age and sex (27 males and 24 females born between 1837 and 1916) stored in the Royal Belgian Institute of Natural Sciences. …”
    Get full text
    Article
  3. 19583

    La prison de Guingamp, de l’ombre à la lumière by Emmanuel Laot

    Published 2024-01-01
    “…Sold by the Department to the Government, it was used as a place for tax archival storage and even housing. Without any maintenance, it deteriorated heavily, victim of storms and fires. …”
    Get full text
    Article
  4. 19584

    Proxy re-encryption based multi-factor access control scheme in cloud by Mang SU, Guozhen SHI, Anmin FU, Yan YU, Wei JIN

    Published 2018-02-01
    “…Cloud computing is one of the space-ground integration information network applications.Users can access data and retrieve service easily and quickly in cloud.The confidentiality and integrity of the data cloud have a direct correspondence to data security of the space-ground integration information network.Thus the data in cloud is transferred with encrypted form to protect the information.As an important technology of cloud security,access control should take account of multi-factor and cipher text to satisfy the complex requirement for cloud data protection.Based on this,a proxy re-encryption based multi-factor access control (PRE-MFAC) scheme was proposed.Firstly,the aims and assumptions of PRE-MFAC were given.Secondly,the system model and algorithm was defined.Finally,the security and properties of PRE-MFAC were analyzed.The proposed scheme has combined the PRE and multi-factor access control together and realized the multi-factor permission management of cipher text in cloud.Meanwhile,it can make the best possible use of cloud in computing and storing,then reduce the difficulty of personal user in cryptographic computing and key managing.…”
    Get full text
    Article
  5. 19585

    A Chinese Knowledge Graph Dataset in the Field of Scientific Fitness by Shutong Du, Zhitong Liu, Bingyu Pan

    Published 2025-02-01
    “…The data is manually annotated on a professional platform and ultimately stored in a Neo4j graph database for visualization. …”
    Get full text
    Article
  6. 19586

    Právní institut apelace v pražském procesním traktátu Parvus ordinarius by Jakub Razim

    Published 2025-01-01
    “…One manuscript of the Parvus ordinarius, currently stored under the signature VIII.G.5 in the Prague National Library in Klementinum, serves as the source base for the study. …”
    Get full text
    Article
  7. 19587

    Strain-gradient effect on the crack tip dislocations density by Valery Shlyannikov, Andrey Tumanov, Ruslan Khamidullin

    Published 2020-09-01
    “…A couple effect of material work hardening and the crack tip distance is identified.…”
    Get full text
    Article
  8. 19588

    "A watering of her desert": Depression and (Dis)consolation in Jenny Diski’s Monkey’s Uncle by Diane GAGNERET

    Published 2024-12-01
    “…Jenny Diski’s work has consistently offered a direct and daring exploration of many facets of human experience, including the most traumatic. …”
    Get full text
    Article
  9. 19589

    Hollywood sur la Lune : les « Scientifilms », les Pulps et l’imaginaire science-fictionnel by Jay P. Telotte

    Published 2019-12-01
    “…This approach locates similar impulses for “reading” and shaping—via film—in stories that involved film or the film industry, in film-related advertising, in editorial matter and readers’ letters, in reviews, and in cover illustrations, all suggesting an interest in, even fascination with “scientifilms,” as they were often termed. …”
    Get full text
    Article
  10. 19590
  11. 19591

    Joyful Encounters: Learning to Play Well with Machines by Sandry Eleanor, Peaty Gwyneth

    Published 2021-01-01
    “…These encounters are often shaped by stories about the capabilities of machines and humans, while the interactions themselves go on to provoke new narratives. …”
    Get full text
    Article
  12. 19592

    Les « leçons d’histoire » revues et corrigées par le théâtre jeunes publics contemporain by Marie Sorel

    Published 2017-07-01
    “…The rewriting of tales and Robinsonade stories, the proliferation of narrative and retrospective voices, humour and fantasy are among the techniques applied by this reflective and hybrid theatre to question the modalities of writing history. …”
    Get full text
    Article
  13. 19593

    Du bateau au lycée professionnel : les représentations de l’enseignement et de l’apprentissage ouvragées par les enseignants de techniques maritimes by Maryvonne Merri, Sylviane Veillette

    Published 2014-01-01
    “…To do so, we gathered the stories of seven former sailors who became maritime technology and navigation teachers. …”
    Get full text
    Article
  14. 19594

    Morphological Accuracy Data Clustering: A Novel Algorithm for Enhanced Cluster Analysis by Abdel Fattah Azzam, Ahmed Maghrabi, Eman El-Naqeeb, Mohammed Aldawood, Hewayda ElGhawalby

    Published 2024-01-01
    “…In today’s data-driven world, we are constantly exposed to a vast amount of information. This information is stored in various information systems and is used for analysis and management purposes. …”
    Get full text
    Article
  15. 19595

    Intergenerational Transfers in Infant Mortality in Southern Sweden, 1740-1968 by Luciana Quaranta

    Published 2018-12-01
    “…This paper is one of five studies that analyses intergenerational transmissions in infant mortality by using a common program to create the dataset for analysis and run the statistical models with data stored in the Intermediate Data Structure. The results of this study show that in five rural parishes in Scania, the southernmost province of Sweden, during the years 1740-1968 infant mortality was transmitted across generations. …”
    Get full text
    Article
  16. 19596

    Anonymous whistleblowers reply scheme based on secret sharing by HE Kun, HUANG Yajing, DU Ruiying, SHI Min, LI Siqin, CHEN Jing

    Published 2024-12-01
    “…With the technology of distributed point functions and secret sharing, the message was stored in two separate mailbox databases of non-colluding servers, so that the identity of the data receiver was hidden from the attacker. …”
    Get full text
    Article
  17. 19597

    HOW TO ANALYZE BIG DATA: A STUDY ON UNDERSTANDING WHAT THE TURKISH THINK ABOUT SYRIAN REFUGEE CRISIS by Pınar Aslan, Tuğçe Ertem Eray

    Published 2019-07-01
    “…What is important at this stage is to create little stories out of big data and try to make them as meaningful as possible, say the experts. …”
    Get full text
    Article
  18. 19598

    The hypothalamus as the central regulator of energy balance and its impact on current and future obesity treatments by Bruna Bombassaro, Eliana P. Araujo, Licio A. Velloso

    Published 2025-01-01
    “…First-order hypothalamic neurons localized in the arcuate nucleus sense systemic signals that indicate the energy stores in the body. Through distinct projections, arcuate nucleus neurons communicate with second-order neurons, which are mostly localized in the paraventricular nucleus and in the lateral hypothalamus. …”
    Get full text
    Article
  19. 19599

    Conflicting Visions of War: Winston Churchill and Rudyard Kipling’s Evocation of the Boer War by Laïli Dor

    Published 2007-12-01
    “…Kipling also devoted several short stories to the subject, two of which (“A Sahib’s War” and “The Captive”, both published in Traffics and Discoveries in 1904) offer an interesting complement to his autobiographical account. …”
    Get full text
    Article
  20. 19600

    ‘Voices’ in the Courtroom. The role of notaries in the ‘Inquisitorial autobiography’ by José Luis Loriente Torres

    Published 2025-02-01
    “… Little is known about the workings of Inquisitorial notaries during the early modern period, particularly regarding their documentation methods within the courtroom. …”
    Get full text
    Article