Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Customer relations 2
- Customer services 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Leadership 2
- Anxiety Disorders 1
- Bioinformatics 1
- Business 1
- Cognitive Therapy 1
- Collectors and collecting 1
- Computer programs 1
- Computer simulation 1
- Connecting with others 1
- Critical thinking 1
- Data processing 1
- Educational leadership 1
- Electronic Health Records 1
- Feminism 1
- Gender mainstreaming 1
- Intensive care nursing 1
- Knowing yourself 1
- MEDICAL / Pharmacology 1
- MEDICAL / Test Preparation & Review 1
- Medical Informatics Applications 1
- Medical informatics 1
- Medical technology 1
- Medical telematics 1
-
981
Mardin’deki Camilerin Minare Yapısı
Published 2021-10-01“…Bu bağlamda Hristiyanların Çan kulelerindeki detayları anımsatan birçok biçim minarelerde de mevcuttur. Minare sanatı dönemin başa geçenlerinin sanatsal zevkinden etkilendiğinden dolayı, değişiklik gösterebilmektedir. …”
Get full text
Article -
982
Arapça Edebi Metinlerde Üslup Değişimi Göstergesi Olarak Söz Sanatları Yoğunluğu: Bânet Su’âd ve Kasîde-i Bürde Örneği
Published 2024-11-01“…Ayrıca Bânet Su’âd kasidesinde beyân sanatları yoğunluğu daha homojen bir yapı arz etmekteyken Kasîde-i Bürde’de bazı beyitler çok yoğun beyân sanatı içerirken bazılarında herhangşi bir beyân sanatı bulunmamaktadır. …”
Get full text
Article -
983
Research on technology of data encryption and search based on access broker
Published 2018-07-01“…Broker executed searchable encryption (BESE) scheme was proposed for the confidentiality issues of cloud application data.The scheme did not need to modify the cloud application or user habits,thus had strong applicability.Firstly,systematic and quantitative analysis on BESE scheme was conducted in terms of query expressiveness,performance and security.Then,the main challenges of BESE scheme including securely sharing index and encrypted data between brokers were pointed out,and corresponding schemes were proposed to address the above challenges.The experimental results show that the BESE scheme can effectively protect the user data in the cloud,achieve a variety of search functions,and has high efficiency and security.…”
Get full text
Article -
984
Preventing Foodborne Illness: Listeriosis
Published 2009-08-01“…Schneider, Renée Goodrich-Schneider, Michael A. Hubbard, and Dirk Sampath, is one in a series of facts sheets discussing common foodborne pathogens of interest to food handlers, processors, and retailers. …”
Get full text
Article -
985
A tulajdon és az igazságosság viszonya Hume-nál
Published 2019-10-01“…Amellett érvelek, hogy Hume elmélete nem egyszerűen Locke tételeinek cáfolata akart lenni, hanem az eredeti teória egy sajátos, modernizált változata is. Írásom első részében bemutatom, miért nyújtanak szignifikáns segítséget Hume érzelmekről szóló fejtegetései társadalomfilozófiájának alaposabb megértésében. …”
Get full text
Article -
986
Eko-teologia jako forma chrześcijańskiej diakonii wobec stworzenia
Published 2009-06-01“…He moves beyond anthropocentrism and tries to balance the traditional emphasis on God’s creative work by insisting that a doctrine of creation should culminate in the Sabbath celebration.…”
Get full text
Article -
987
Research on extended access control mechanism in online social network
Published 2021-10-01“…Aiming at the problem of inability to extend control over the data published by users in social networks, an extended access mechanism based on privacy labels was proposed.This mechanism granted users and data different types of labels based on the number of user relationship hops and resource forwarding hops, so as to achieve fine-grained extended access control to the data.The generation algorithm and distribution method of privacy labels were proposed.The constraint rules of privacy label were designed and the possible policy conflicts were analyzed.Finally, the test proves that the mechanism achieves fine-grained extended control in social networks, and proves its security and validity of the mechanism.…”
Get full text
Article -
988
Preventing Foodborne Illness: Listeriosis
Published 2009-08-01“…Schneider, Renée Goodrich-Schneider, Michael A. Hubbard, and Dirk Sampath, is one in a series of facts sheets discussing common foodborne pathogens of interest to food handlers, processors, and retailers. …”
Get full text
Article -
989
Le rapport au savoir en formation continue : les effets de l’inconscient chez un professeur des écoles. Une étude de cas
Published 2019-11-01“…Conducting clinical research interviews linked to the filmed observation of a swimming session allowed the collection of data.The interpretative analysis of the subject's speech reveals several unconscious manifestations for the non-use of knowledge related to the concepts of « Real », « enjoyment » and « already there ». …”
Get full text
Article -
990
Resources scheduling and cooperative management of space-based information networks
Published 2017-10-01“…Along with the expansion of the range and space of space-based information networks,and the enhancement of network cognitive ability,real-time,reliability and safety were needed to satisfy higher requirements.The demands of space-based information network designing referred to different platforms and users,random access in anytime,heterogeneous network architecture,cooperative management of different type of resource,and so on.Space-based network operation had the characteristic of high-dynamic,multi-type and big data.The realization of efficient resource management was discussed,and the analysis of multiple dimensions to objects in space-based information networks was realized,the design of dynamic space-based resource virtualization was further mentioned,scheduling and cooperative management was mentioned.…”
Get full text
Article -
991
An industrial internet business management platform that supports the cloud-native
Published 2022-05-01“…Aiming at the trend of industrial enterprises facing the evolution from the traditional business management information architecture to the cloud-native platform management, an evolutionary architecture of the transitional industrial internet business management platform was proposed, including platform base, management business domain, industrial business domain.Overall, the platform base, the management business domain, and the industrial business domain are vertically penetrated through the network to allow different levels of management business applications and industrial business applications to directly use related data.The platform realizes the sharing of integrated digital capabilities, intensification and integrated management and control, and facilitates the rapid replication and promotion of applications of industrial group enterprises and that similar subsidiaries at all levels.…”
Get full text
Article -
992
Deployment scheme of RSU based on connection time in VANET
Published 2017-04-01“…For the roadside unit (RSU) placement problem in vehicular Ad Hoc network (VANET),the deployment scheme of RSU based on connection time was proposed.The scheme find the optimal positions of RSU for maximizing the number of vehicles while ensuring a certain level of connection time under the limited number of RSU.The problem was modeled as a maximum coverage problem,and a binary particle swarm algorithm was designed to solve it.The simulation experiment was carried out with the real Beijing road network map and taxi GPS data.The simulation results show that the algorithm is convergent,stable and feasible.Compared with the greedy algorithm,the proposed scheme can provide continuous network service for more vehicles.…”
Get full text
Article -
993
-
994
Előszó
Published 2019-04-01“…A játéktevékenység a fenomenológiai filozófia egyik kitüntetett témája, amennyiben az a világhoz való viszonyulásunk sajátos módozatait fedi fel. Ahogy a konferenciafelhívás fogalmaz: „A játék egy sajátos köztes fenomén, mely valahogy mégis képes rá, hogy élesebb megvilágításba helyezzen minden mást. …”
Get full text
Article -
995
Public key searchable encryption scheme based on blockchain
Published 2020-04-01“…Aiming at the trapdoor security problem of the public key encryption scheme,a random number constructing trapdoor and index was introduced to defend against keyword guessing attacks from the server and avoid data leakage caused by server curious behavior.Research on trusted issues of third parties,the blockchain mechanism with a searchable encryption scheme was combined,and smart contracts as trusted third parties for retrieval was used,which could prevent keyword guessing attacks inside the server and ensure retrieval.The correctness of the results,thereby limiting the malicious behavior of the server when sending data.The solution was analyzed for security and the verification scheme satisfies IND-KGA security.Experiments in real data sets,compared with other programs,prove that the program has certain advantages in time overhead.…”
Get full text
Article -
996
Research of ASP service compination model based on workflow
Published 2007-01-01“…A method of ASP service integration based on Workflow and data pump technology was proposed,the method applied workflow technology to realize procedure integratation of ASP serveice,and data pump technology to realize the integration of data.The key of ASP service integration was the control flow with the data stream,the control flow used the workflow technology,but the data stream performance data pump.In the ASP combination model realization technology based on workflow it discussed the thought of ASPWF model,with the establishment steps and designed the engine algo-rithm.It analyzed the SLA flow processing case of telecommunication enterprise operation in example,explained how to unifie the superiorities of workflow and the small granularity ASP combination service model,in order to enhance the whole system efficiency.…”
Get full text
Article -
997
A szenzorális színház szerepe a speciális nevelési területek színterén – egy szisztematikus szakirodalom-elemzés eredményei
Published 2024-12-01“…A multiszenzoros színházi élmények célja, hogy a sajátos nevelési igényű és fogyatékossággal élő gyermekeket szórakoztatva fejlessze, valamint, hogy egyfajta szenzoros megtapasztalásban elmerülve bevonhassa az előadás menetébe is. …”
Get full text
Article -
998
Ideas of enterprise informationization based on user experience
Published 2016-03-01“…On the purpose of solving the problems of the traditional modes,such as difficult to realize the user personalized design,tough to fuse data,and unable to respond to the user demand,some ideas of construction mode for experience informationization based on user experience were presented.Extending from the traditional enterprise informatization,the new mode based on the massive amounts of data.The new mode uses the data asset-like management for guarantee,and uses the service-oriented data processing method for support,to achieve the user experience application,which is form an end user perspective.In the end,a typical application scenario including data trading platform,data asset-like management,high-speed computing service,and public platform,was put forward.…”
Get full text
Article -
999
Új központi hivatal felel Magyarország védelmi tervezésének összehangolásáért
Published 2024-12-01“…Ennek fő felelőse a 2022-ben központi hivatalként megalakult és a Miniszterelnöki Kabinetiroda alá tartozó Védelmi Igazgatási Hivatal, amelynek főigazgató-helyettese, Lakatos Tibor r. dandártábornok beszélt a szervezetről és a legfontosabb feladataikról. …”
Get full text
Article -
1000
High-efficient RPL routing for analyzing mobility of nodes
Published 2019-08-01“…To deal with the mobility of nodes in low-power and lossy network(LLN),the adaptive transmission rate based game-theory mobile RPL (GT-mRPL) was proposed.GT-mRPL uses variable transmission rate-based game theory to achieve higher packet delivery ratio and better throughput.In a mobile environment,a game was designed for nodes competing to send data.The payoff function was defined to assess the profit gained from increasing data transmission rate (utility function) against the cost induced by the presence of mobile nodes (mobility function).Other factor was also taken into account in formulating the payoff function including the energy consumption.Simulation results show that in the presence of mobility,GT-mRPL reduces the packet lost ratio and improves the throughput.…”
Get full text
Article