Suggested Topics within your search.
Suggested Topics within your search.
- Sociolinguistics 4
- Criminal law 3
- Philosophy 3
- Effective teaching 2
- Elementary school teaching 2
- English language 2
- History 2
- History and criticism 2
- Rhetoric 2
- Academic writing 1
- African American psychologists 1
- Anatomy 1
- Anthropometry 1
- Benefactors 1
- Black people 1
- Clinical cases 1
- Consumers 1
- Consumption (Economics) 1
- Criticism 1
- Diabetes 1
- Diabetes Mellitus, Type 2 1
- Dissertations, Academic 1
- Economics 1
- Electrocardiography 1
- English 1
- Ethnopsychology 1
- Etiology 1
- Ex-convicts 1
- Fathers and sons 1
- Genanalyse 1
-
2561
Design of automatic routing algorithm based on overlapping hierarchical induction
Published 2018-02-01“…Aiming at the problem of impulse noise with large amplitude fluctuation and strong time-varying characteristics,which seriously affected the communication performance of power carrier network,the power line network topology and the classical routing algorithm of power line carrier communication were analyzed,and on this basis,an algorithm of overlapping hierarchical induction algorithm (OHIA) was proposed,which proved the feasibility of the algorithm and gave the inductive factor transfer algorithm,route addressing process and forecast based route maintenance strategy.Through the NS-3 simulation platform to establish the PLC model,respectively,ant colony algorithm and overlapping layer induced PLC automatic routing algorithm were simulated.The simulation results show that compared with the ant colony algorithm,the proposed algorithm improves the success rate of the first communication in the strong time-varying channel environment,and makes great progress in the large-scale networking of PLC.…”
Get full text
Article -
2562
Testing the Validity of Spatial Beta Convergence for the Countries of Southern Europe
Published 2024-12-01“…The methodology used is based on classical descriptive statistics, convergence analyses (sigma, beta, gamma) and spatial autocorrelation studies. …”
Get full text
Article -
2563
Markov game modeling of mimic defense and defense strategy determination
Published 2018-10-01“…Network mimic defense technology enhances the robustness of active defense through the redundancy,dynamic and diversity as well as the decision feedback mechanism.However,little work has been done for its security assessment and existing classic game models are not suitable for its dynamic characteristics and lack of universality.A Markov game model was proposed to analyze the transfer relationship between offensive and defensive status and the measurement method of safety and reliability of mimic defense,and calculated the offensive and defensive game equilibrium through non-linear programming algorithm to determine the best defensive strategy considering performance.Experiments give a comparison with the multi-target hiding technique and shows that the mimic defense has a higher defensive effect.Combining with the specific network case,the specific attack and defense path for the exploit of the system vulnerability is given and the effectiveness of the defense strategy algorithm is verified.…”
Get full text
Article -
2564
Mujeres en el ballet: maestras, bailarinas y productoras en Guadalajara
Published 2021-08-01“…The history of classical dance in Latin America is linked to the colonial history of the continent and to its emancipation movements. …”
Get full text
Article -
2565
Regularization of the Boundary-Saddle-Node Bifurcation
Published 2018-01-01“…We derive a local topological normal form for the BSN bifurcation and study its local dynamics by applying the classical Filippov’s convex method and a novel regularization approach. …”
Get full text
Article -
2566
Cloud native intelligent operation and maintenance technology
Published 2020-12-01“…Relying on the advantages of simple and fast applications,easy deployment of applications,and on-demand scaling of running applications,cloud native technology has been rapidly promoted.However,with the application of cloud native,the system architecture has become more complex and the scale of resources has become larger,and there is an urgent need for more intelligent operation and maintenance.Using intelligent operation and maintenance can better assist cloud-native application development,reduce operation and maintenance costs,and improve service quality.The application scenarios,key points,classic practices and existing problems of intelligent operation and maintenance were analyzed,and a cloud-native intelligent operation and maintenance architecture were proposed,and the main principles of the three scenarios:the trend prediction,data anomaly detection and fault location diagnosing in the core service algorithm platform were introduced in detail,and finally the future of intelligent operation and maintenance were looked forward.…”
Get full text
Article -
2567
Transpoiesis: the art of doing organization without becoming one
Published 2025-01-01“…Transpoiesis offers a particularly instructive model in the digital age, when classical explanations often fail to account for the rapid pace of change, innovation, flexibility and decentralized collaboration that characterize modern organizations. …”
Get full text
Article -
2568
New minimum exposure path problem and its solving algorithm in wireless sensor networks
Published 2016-01-01“…As unable to set up the corresponding graph model, the classic methods (such as grid-based method and Voronoi-based method) in solving MEP problem would no longer work to BPA-MEP problem. …”
Get full text
Article -
2569
Analytical Relations and Statistical Estimations for Sums of Powered Integers
Published 2025-01-01“…Finding analytical closed-form solutions for the sums of powers of the first <i>n</i> positive integers is a classical problem of number theory. Analytical methods of constructing such sums produce complicated formulae of polynomials of a higher order, but they can be presented via the first two power sums. …”
Get full text
Article -
2570
The Gendered Dimension of Crime: An Analysis of Female Criminality
Published 2024-12-01“…This situation led to the development of specific theories about female crime, distinguishing itself from classical explanatory models focused on male crime. …”
Get full text
Article -
2571
Availability evaluation method for extended epidemic model and Markov chain based IoT
Published 2021-04-01“…To reflect the availability status of the Internet of things (IoT) under malware diffusion, an availability evaluation method of IoT based on the extended epidemic model SEIRD and Markov chain was proposed.According to actual states of IoT nodes, the classic epidemic model SIR was extended to establish the node state transition model SEIRD.From the dynamic change process of each state of IoT nodes, the dynamic probability equations of IoT nodes belonging to five states were constructed, the Markov matrix reflecting the state transition was obtained, and an availability calculation method of an IoT node was achieved.Taking typical star and cluster IoT topologies as examples, the availability evaluation methods of the whole IoT with different topologies were given.Experiments provide suggestions for administrators how to reasonably deploy the number of normal working nodes and routes.The research results have theoretical significance for improving IoT availability and promoting the successful IoT applications.…”
Get full text
Article -
2572
La pilule : biologisation de la contraception et régulation sociale
Published 2014-12-01“…As this view on the constructedness of gendered and sexual bodies differs from the classical constructionist approach and its focus on behaviours (mainly in relation to medical mediation, time, consciousness and effort), the efficacy of the pill is attributed to the opposition between the two technologies of gender. …”
Get full text
Article -
2573
Pulse state-interval modulation and experiment in the hostile environments
Published 2014-03-01“…Based on the Shannon classical communication theory,the atmospheric modulation model of wireless laser communication was investigated for enhancing wireless laser communication adaptability of the atmospheric channel.Firstly,the conversion relations of SER and BER was discussed,from error theory perspectives analysis atmospheric optical wireless communications.Afterwards,by analyzing Shannon limit communication rate of wireless laser communication in atmospheric channel,the importance of atmospheric channel bandwidth gradually came out.On the basis of this,an efficiency pulse state-interval coded modulation was present and its characteristics were estimated.Finally,the feasibility of the PSIM and the importance of atmospheric channel bandwidth to wireless laser communication were proved by wireless laser communication experiment in the hostile environments,At the end,a prospect was pointed out that atmospheric channel properties feedback technique in real time might be a key and precondition in all-weather wireless optical communication.…”
Get full text
Article -
2574
Rubi as a Text: A Note on the Ruby Gloss Encoding
Published 2023-02-01“…The system can also be described as complex in terms of text linearity: the ruby gloss, originally developed from vernacular glosses to Classical Chinese texts, is now a device for presenting a parallel text alongside the main text. …”
Get full text
Article -
2575
Gastric volvulus: a case report
Published 2010-11-01“…In 1904, Borchardt described the classic triad of epigastric distension with pain, difficulty for the nasogastric tube to pass and nausea without vomiting. …”
Get full text
Article -
2576
L’inattendu du terrain
Published 2023-06-01“…For the past few years, a group of academics from Shanghai have been staying at the site regularly; they have taken an active part in the academy’s activities, initially as teachers of Classical Chinese, then as involved researchers. Through an analysis of the unexpected reversal in the relationship that I established with them—initially perceiving them as colleagues only to later discover fieldwork interlocutors in them—I show how their role within the academy is increasingly mobilised by the clerics to conceive the future of Putuoshan.…”
Get full text
Article -
2577
Entrepreneurship as a dynamic field of study: a bibliometric analysis of research output
Published 2017-07-01“…The most-cited research was identified by setting a standardised threshold number of citations based on the Hindex called ‘H-Classics’, which is sensitive to the particular characteristics of each research area. …”
Get full text
Article -
2578
Travelling wave solutions of the reaction-diffusion mathematical model of glioblastoma growth: An Abel equation based approach
Published 2014-11-01“…The solutions are obtained by using the Chiellini lemma and the Lemke transformation, respectively, and the corresponding equations represent generalizations of the classical Fisher--Kolmogorov equation. The biological implications of two classes of solutions are also investigated by using both numerical and semi-analytical methods for realistic values of the biological parameters.…”
Get full text
Article -
2579
Pokolenie Alfa w szkole. Działania projektowo-wdrożeniowe z wykorzystaniem ICT
Published 2022-12-01“…A lot of attention was paid to solutions inspired by Lego sets: Lego MINDSTORMS, Lego Classic, Lego Education etc. …”
Get full text
Article -
2580
Variations in Aggressive and Indolent Behaviour of Central Dentinogenic Ghost Cell Tumor
Published 2020-01-01“…Both the cases exhibited classic histopathological features. These two unconventional cases of DGCT with a follow-up are being reported here to highlight the variation in behaviour and presentation and also to understand the aggressive nature of the tumor.…”
Get full text
Article