Showing 2,561 - 2,580 results of 5,318 for search '"Classicism"', query time: 0.05s Refine Results
  1. 2561

    Design of automatic routing algorithm based on overlapping hierarchical induction by Jianhong ZHENG, Heyun CHEN, Pengguang ZHOU, Hao XU

    Published 2018-02-01
    “…Aiming at the problem of impulse noise with large amplitude fluctuation and strong time-varying characteristics,which seriously affected the communication performance of power carrier network,the power line network topology and the classical routing algorithm of power line carrier communication were analyzed,and on this basis,an algorithm of overlapping hierarchical induction algorithm (OHIA) was proposed,which proved the feasibility of the algorithm and gave the inductive factor transfer algorithm,route addressing process and forecast based route maintenance strategy.Through the NS-3 simulation platform to establish the PLC model,respectively,ant colony algorithm and overlapping layer induced PLC automatic routing algorithm were simulated.The simulation results show that compared with the ant colony algorithm,the proposed algorithm improves the success rate of the first communication in the strong time-varying channel environment,and makes great progress in the large-scale networking of PLC.…”
    Get full text
    Article
  2. 2562

    Testing the Validity of Spatial Beta Convergence for the Countries of Southern Europe by Dora Szendi

    Published 2024-12-01
    “…The methodology used is based on classical descriptive statistics, convergence analyses (sigma, beta, gamma) and spatial autocorrelation studies. …”
    Get full text
    Article
  3. 2563

    Markov game modeling of mimic defense and defense strategy determination by Xingming ZHANG, Zeyu GU, Shuai WEI, Jianliang SHEN

    Published 2018-10-01
    “…Network mimic defense technology enhances the robustness of active defense through the redundancy,dynamic and diversity as well as the decision feedback mechanism.However,little work has been done for its security assessment and existing classic game models are not suitable for its dynamic characteristics and lack of universality.A Markov game model was proposed to analyze the transfer relationship between offensive and defensive status and the measurement method of safety and reliability of mimic defense,and calculated the offensive and defensive game equilibrium through non-linear programming algorithm to determine the best defensive strategy considering performance.Experiments give a comparison with the multi-target hiding technique and shows that the mimic defense has a higher defensive effect.Combining with the specific network case,the specific attack and defense path for the exploit of the system vulnerability is given and the effectiveness of the defense strategy algorithm is verified.…”
    Get full text
    Article
  4. 2564

    Mujeres en el ballet: maestras, bailarinas y productoras en Guadalajara by Cristina Castellano

    Published 2021-08-01
    “…The history of classical dance in Latin America is linked to the colonial history of the continent and to its emancipation movements. …”
    Get full text
    Article
  5. 2565

    Regularization of the Boundary-Saddle-Node Bifurcation by Xia Liu

    Published 2018-01-01
    “…We derive a local topological normal form for the BSN bifurcation and study its local dynamics by applying the classical Filippov’s convex method and a novel regularization approach. …”
    Get full text
    Article
  6. 2566

    Cloud native intelligent operation and maintenance technology by Long XUE, Gang LU, Qi ZHOU, Huiyan ZHANG, Tingjun WAN

    Published 2020-12-01
    “…Relying on the advantages of simple and fast applications,easy deployment of applications,and on-demand scaling of running applications,cloud native technology has been rapidly promoted.However,with the application of cloud native,the system architecture has become more complex and the scale of resources has become larger,and there is an urgent need for more intelligent operation and maintenance.Using intelligent operation and maintenance can better assist cloud-native application development,reduce operation and maintenance costs,and improve service quality.The application scenarios,key points,classic practices and existing problems of intelligent operation and maintenance were analyzed,and a cloud-native intelligent operation and maintenance architecture were proposed,and the main principles of the three scenarios:the trend prediction,data anomaly detection and fault location diagnosing in the core service algorithm platform were introduced in detail,and finally the future of intelligent operation and maintenance were looked forward.…”
    Get full text
    Article
  7. 2567

    Transpoiesis: the art of doing organization without becoming one by Christian Schröder

    Published 2025-01-01
    “…Transpoiesis offers a particularly instructive model in the digital age, when classical explanations often fail to account for the rapid pace of change, innovation, flexibility and decentralized collaboration that characterize modern organizations. …”
    Get full text
    Article
  8. 2568

    New minimum exposure path problem and its solving algorithm in wireless sensor networks by Miao YE, ping WANGYu, Cai DAI, li WANGXiao

    Published 2016-01-01
    “…As unable to set up the corresponding graph model, the classic methods (such as grid-based method and Voronoi-based method) in solving MEP problem would no longer work to BPA-MEP problem. …”
    Get full text
    Article
  9. 2569

    Analytical Relations and Statistical Estimations for Sums of Powered Integers by Stan Lipovetsky

    Published 2025-01-01
    “…Finding analytical closed-form solutions for the sums of powers of the first <i>n</i> positive integers is a classical problem of number theory. Analytical methods of constructing such sums produce complicated formulae of polynomials of a higher order, but they can be presented via the first two power sums. …”
    Get full text
    Article
  10. 2570

    The Gendered Dimension of Crime: An Analysis of Female Criminality by Halima MENANI

    Published 2024-12-01
    “…This situation led to the development of specific theories about female crime, distinguishing itself from classical explanatory models focused on male crime. …”
    Get full text
    Article
  11. 2571

    Availability evaluation method for extended epidemic model and Markov chain based IoT by Xiaotong YE, Wenfei SUN, Shigen SHEN

    Published 2021-04-01
    “…To reflect the availability status of the Internet of things (IoT) under malware diffusion, an availability evaluation method of IoT based on the extended epidemic model SEIRD and Markov chain was proposed.According to actual states of IoT nodes, the classic epidemic model SIR was extended to establish the node state transition model SEIRD.From the dynamic change process of each state of IoT nodes, the dynamic probability equations of IoT nodes belonging to five states were constructed, the Markov matrix reflecting the state transition was obtained, and an availability calculation method of an IoT node was achieved.Taking typical star and cluster IoT topologies as examples, the availability evaluation methods of the whole IoT with different topologies were given.Experiments provide suggestions for administrators how to reasonably deploy the number of normal working nodes and routes.The research results have theoretical significance for improving IoT availability and promoting the successful IoT applications.…”
    Get full text
    Article
  12. 2572

    La pilule : biologisation de la contraception et régulation sociale by Claire Grino

    Published 2014-12-01
    “…As this view on the constructedness of gendered and sexual bodies differs from the classical constructionist approach and its focus on behaviours (mainly in relation to medical mediation, time, consciousness and effort), the efficacy of the pill is attributed to the opposition between the two technologies of gender. …”
    Get full text
    Article
  13. 2573

    Pulse state-interval modulation and experiment in the hostile environments by Yi-ning MU, He WANG, Ping LI, Hui-lin JIANG

    Published 2014-03-01
    “…Based on the Shannon classical communication theory,the atmospheric modulation model of wireless laser communication was investigated for enhancing wireless laser communication adaptability of the atmospheric channel.Firstly,the conversion relations of SER and BER was discussed,from error theory perspectives analysis atmospheric optical wireless communications.Afterwards,by analyzing Shannon limit communication rate of wireless laser communication in atmospheric channel,the importance of atmospheric channel bandwidth gradually came out.On the basis of this,an efficiency pulse state-interval coded modulation was present and its characteristics were estimated.Finally,the feasibility of the PSIM and the importance of atmospheric channel bandwidth to wireless laser communication were proved by wireless laser communication experiment in the hostile environments,At the end,a prospect was pointed out that atmospheric channel properties feedback technique in real time might be a key and precondition in all-weather wireless optical communication.…”
    Get full text
    Article
  14. 2574

    Rubi as a Text: A Note on the Ruby Gloss Encoding by Kazuhiro Okada, Satoru Nakamura, Kiyonori Nagasaki

    Published 2023-02-01
    “…The system can also be described as complex in terms of text linearity: the ruby gloss, originally developed from vernacular glosses to Classical Chinese texts, is now a device for presenting a parallel text alongside the main text. …”
    Get full text
    Article
  15. 2575

    Gastric volvulus: a case report by Emilio Guerra Pérez, Marcial Llamas Fonte, Lidia Torres Aja

    Published 2010-11-01
    “…In 1904, Borchardt described the classic triad of epigastric distension with pain, difficulty for the nasogastric tube to pass and nausea without vomiting. …”
    Get full text
    Article
  16. 2576

    L’inattendu du terrain by Claire Vidal

    Published 2023-06-01
    “…For the past few years, a group of academics from Shanghai have been staying at the site regularly; they have taken an active part in the academy’s activities, initially as teachers of Classical Chinese, then as involved researchers. Through an analysis of the unexpected reversal in the relationship that I established with them—initially perceiving them as colleagues only to later discover fieldwork interlocutors in them—I show how their role within the academy is increasingly mobilised by the clerics to conceive the future of Putuoshan.…”
    Get full text
    Article
  17. 2577

    Entrepreneurship as a dynamic field of study: a bibliometric analysis of research output by Luis Javier Cabeza Ramírez, Sandra Mª Sánchez Cañizares, Fernando J. Fuentes García

    Published 2017-07-01
    “…The most-cited research was identified by setting a standardised threshold number of citations based on the Hindex called ‘H-Classics’, which is sensitive to the particular characteristics of each research area. …”
    Get full text
    Article
  18. 2578

    Travelling wave solutions of the reaction-diffusion mathematical model of glioblastoma growth: An Abel equation based approach by Tiberiu Harko, Man Kwong Mak

    Published 2014-11-01
    “…The solutions are obtained by using the Chiellini lemma and the Lemke transformation, respectively, and the corresponding equations represent generalizations of the classical Fisher--Kolmogorov equation. The biological implications of two classes of solutions are also investigated by using both numerical and semi-analytical methods for realistic values of the biological parameters.…”
    Get full text
    Article
  19. 2579

    Pokolenie Alfa w szkole. Działania projektowo-wdrożeniowe z wykorzystaniem ICT by Eunika Baron-Polańczyk, Agnieszka Nowak-Łojewska

    Published 2022-12-01
    “…A lot of attention was paid to solutions inspired by Lego sets: Lego MINDSTORMS, Lego Classic, Lego Education etc. …”
    Get full text
    Article
  20. 2580

    Variations in Aggressive and Indolent Behaviour of Central Dentinogenic Ghost Cell Tumor by Radhika Manoj Bavle, Sudhakara Muniswamappa, Soumya Makarla, Reshma Venugopal

    Published 2020-01-01
    “…Both the cases exhibited classic histopathological features. These two unconventional cases of DGCT with a follow-up are being reported here to highlight the variation in behaviour and presentation and also to understand the aggressive nature of the tumor.…”
    Get full text
    Article