Suggested Topics within your search.
Suggested Topics within your search.
- Economic development 4
- Economic policy 4
- Teaching 3
- College readers 2
- Economic aspects 2
- Economic conditions 2
- English language 2
- Globalization 2
- History 2
- Political science 2
- Problems, exercises, etc 2
- Rhetoric 2
- Academic writing 1
- Accounting 1
- Advertising 1
- Artificial intelligence 1
- Authoritarianism 1
- Branding (Marketing) 1
- Classroom management 1
- Communication in marketing 1
- Criticism 1
- Economics 1
- Education 1
- Ego (Psychology) 1
- Elections 1
- Entrepreneurship 1
- Epidemiology 1
- Fashion design 1
- Fashion drawing 1
- Finance 1
-
2341
GBSS:researches on group-based semantic search
Published 2006-01-01“…A group-based semantic search method-GBSS was presented.With regard to architecture,GBSS introduced a hybrid architecture in which the storage and search of raw data was based on DHT network,but the storage and search of meta-data was based on unstructured P2P network.With regard to search algorithm,GBSS presented a file grouping method without users’ description and constructs friend relations between nodes based on search interests and sharing files.The design idea came from some conclusions of P2P researches and complex network researches.The forwarding of user requests came use of friend relations in search process,which integrated effective caching strategy.The simulation tests prove that the GBSS algorithm is efficient,stable,and the performance improved times compared with traditional algorithms.…”
Get full text
Article -
2342
Research on QR code logistics privacy based on segmented encryption and time-limited control
Published 2019-08-01“…In view of the disadvantages of the existing logistics system in the market in user privacy protection,a privacy protection scheme based on QR code segmentation encryption,hierarchical authorization and time-limited control was proposed.This scheme segments all the recipient information into RSA and Base64 encryption,after integration,it is embedded into the QR code.In the process of logistics transportation and delivery,different levels of QR code decryption permissions are granted to different branches or transfer centers to view the designated content.At the same time,the QR code automatically becomes invalid after the user signs for it,so as to protect the user's privacy.The core idea of the scheme is to minimize the contact group of recipient information and reduce the possibility of user information disclosure.…”
Get full text
Article -
2343
Donner la parole : à quel prix ?
Published 2022-06-01“…Through the prism of the case provided by Jean Hatzfeld's collection of testimonies in Rwanda, the aim is to measure the effects of the importation into literary studies of the notions of "restitution", "exchange of gifts" and "countergift", inherited from the works of Marcel Mauss and Pierre Bourdieu. Based on the idea that non-fictional literature forms are linked to deontological and political demands for the restoration of debt, this article argues that collections of voices require the overcoming of the assimilation of literature to the universal, in order to emphasize its commitments and effects within the chain of exchange that constitutes the social bond. …”
Get full text
Article -
2344
Leaving the chasm behind: Autoethnography, creativity and the search for identity in academia
Published 2022-08-01“…The findings support Bochner’s (1994) idea that social science research can benefit from deliberately value-laden stories alongside empirical data and theories. …”
Get full text
Article -
2345
Research on intrusion detection system based on two-level algorithm
Published 2005-01-01“…To the limitation of current intrusion detection models, an idea of formulating an intrusion detection model system (TAIDS) based on the GMTH Two-level algorithm was presented. …”
Get full text
Article -
2346
New Rights and the Space of Practices: Italian Contributions to a Theory of the Urban Commons
Published 2015-06-01“…What is revealed is that they prove to be mutually reliant, and that, when combined, they offer heuristically fruitful perspectives for the advancement of the idea of commons today. A particular emphasis is placed on the difference between customs and practices, the former being the base for traditional arrangements of commoning, the latter being the potential principle for new types of arrangements today. …”
Get full text
Article -
2347
Promotion de la laïcité à l’école et entreprise de moralisation : une équivalence ?
Published 2017-12-01“…In particular, I shall develop the idea that the relation to "values" can not be a determinant of behavior, but rather a resource among others to (justify) an action or to rationalize it. …”
Get full text
Article -
2348
The Perspectival Nature of Leibnizian Relations
Published 2023-03-01“…I argue that we should take seriously Leibniz’s idea of non-ideal relations inhering in one subject. …”
Get full text
Article -
2349
Les métaphores comestibles dans les rituels mexicains
Published 2013-12-01“…This article introduces a method of semantic decoding of certain dishes cooked as part of the rituals of the Aztecs at the time of Spanish Conquest and of several contemporary Indian groups. Starting from the idea that, in a ritual nothing is unpredictable and everything has a sense, it introduces a reflection about the categories of metaphor and metonymy conceived as two founding mechanisms of the human mind, at the same time distinct and closely linked, which express themselves in a verbal and material manner. …”
Get full text
Article -
2350
DDoS defense with IP traceback and path identification
Published 2011-01-01“…A novel idea to combine both IP traceback and path identification(Pi) was proposed,and malicious packets could be identified and filtered at located upstream nodes.Then a practical packet marking and filtering scheme was proposed.The nodes along the path out of the destination domain deployed Pi.Meanwhile the border router of the destination domain deployed the traceback marking scheme.The victim could retrieve related information from arrived malicious packets.Then Pi-based filtering could be implemented at the border ingresses.A practical marking,storing and filtering scheme was provided in detail.The results of large-scale simulations with authoritative Internet topologies show the scheme is effective to alleviate attack impacts on the victim and upstream links in the destination domain.…”
Get full text
Article -
2351
Lo humano en la Antropología médica de A. Damasio
Published 2024-12-01“…To do this, three key notions that define this idea in Antonio Damasio are presented: emotional reflection, sentimental ethics and the gradualist theory of consciousness. …”
Get full text
Article -
2352
The Importance of Recognition for Equal Representation in Participatory Processes: Lessons from Husby
Published 2013-06-01“…While sharing the general idea of the value of participatory processes, we will investigate some problematic features involved and suggest how some of these can be remedied. …”
Get full text
Article -
2353
A simplified model of the process of medical attention. Assistance, educational and investigative implications
Published 2011-04-01“…In this article a simplified model is proposed or general of the process of medical attention whose employment possesses assistance, educational and investigative implications; elaborated on the base of the address of the mental activity that the doctor develops during the execution of the process. Starting from this idea we identify three moments or phases like components of the pattern: 1) the obtaining of information, 2) the interpretation of the information, and 3) the taking of decisions; each one of which possesses a specific objective in function of the general objective of the process, besides other particularities. …”
Get full text
Article -
2354
Multi-type spectrum resources joint distribution algorithm based on guaranteed QoS
Published 2016-01-01“…The definition of the spectrum availability in terms of static spectrum,semi-static spectrum and dynamic spectrum and the definition of service requirement index based on M-LWDF QoS definition were proposed.A spectrum allocation method and a redistribution method combined with spectrum availability and subscriber requirement were presented.The main idea of the method is that subscriber requirement and availability of spectrum resource are quantified,and then spectrum resources are allocated to subscribers by a one-to-one mapping based on their quantified values in the same sequence.Compared with the random distribution scheme and the dynamic scheme following static allocation,simulation results show that the scheme presented can obviously improve system performance in average number of failure distribution and average total data rate.…”
Get full text
Article -
2355
Régimes institutionnels de ressources et théorie de la régulation
Published 2008-01-01“…Lipietz). We develop the idea that one of the major contributions of the IRR framework to the TR from a sustainability perspective is its ability to describe the different configurations of resource regimes and thus to explain, and even predict, their effects on the sustainability of a resource.…”
Get full text
Article -
2356
Research on quantum key distribution technology in intelligent substation
Published 2018-10-01“…In order to improve the security of the communication data of the power system,the feasibility of the application of quantum key distribution technology in the monitoring system of the intelligent substation was analyzed and demonstrated by combining the state of quantum key distribution technology and intelligent substation monitoring system.The technical scheme,intelligent substation monitoring system combined with quantum key distribution was put forward.On the premise of using the existing power communication system framework,the networking idea of intelligent substation monitoring system and quantum key distribution technology was presented,which was“quantum key + power vertical encryption authentication gateway”.And the network scheme was verified and analyzed,which proved the stability and feasibility of the networking scheme in practical application.Therefore,no need to adjust the existing communication network framework,the application scheme can be realized on a large scale.…”
Get full text
Article -
2357
Problematyka relacji osobowych w ujęciu Janusza Korczaka w odniesieniu do wychowawców i nauczycieli. Rekonstrukcja teoretyczno-empiryczna
Published 2019-09-01“…In Conclusions the created reconstruction of the way Janusz Korczak understood mutual relations was interpreted in the context of the idea of dialogical personalism. It is a theoretical and empirical article based on Korczak’s works, the materials collected during a visit to Korczakianum. …”
Get full text
Article -
2358
L’identité dans The Talos Principle, The Stanley Parable et The Swapper
Published 2018-10-01“…Through the games Talos Principle (Croteam, Devolver digital, december 2014), The Stanley Parable (Galatic cafe, october 2013) et The Swapper (Facepalm Games, may 2013), this study asks character/avatar's identity linked to their environment and themselves to make the idea of reciprocal grants emerges in identity development.…”
Get full text
Article -
2359
The gospel contra Nietzsche: a South African literary critique of Wille zur Macht
Published 2017-06-01“… A century of scholarship has shed countless photons of light on the reception of Friedrich Nietzsche’s ideas in numerous countries. Still largely unilluminated, however, are South African reactions to his scepticism and moral pessimism. …”
Get full text
Article -
2360
Being an environmentalist among Catholics ... The School of Integral Ecology Leaders and Other Initiatives of the St. Francis of Assisi Ecological Movement (REFA)
Published 2020-03-01“…Francis of Assisi Ecological Movement (REFA), which emerged over 30 years ago in the environment of Polish Franciscans and which ever since has been propagating the idea of engaging Christians in environmental protection issues. …”
Get full text
Article