Showing 1,041 - 1,060 results of 1,211 for search 'Sakath~', query time: 1.97s Refine Results
  1. 1041

    Investigation of Fish Resource in the Yongding River System by ZHOU Xushen, HU Zhen, CUI Wenyan, XU Ning, WANG Liming

    Published 2020-01-01
    “…There are 31 species appeared inexisting species and historical data, but 13 existing species do not appear in the historical data.The historical investigation might be incomprehensive,so the 13 species should be included in thehistorical data. …”
    Get full text
    Article
  2. 1042
  3. 1043
  4. 1044

    Didactique des langues-cultures, genre, intersectionnalité et empowerment féministe : un entretien avec Véronique Perry by Véronique Perry, Eléonore de Beaumont

    Published 2023-07-01
    “…Since the publication of her PhD thesis in 2011, Aspects du genre dans la didactique de l’anglais (Aspects of gender in English didactics), she has been developing a hybrid, feminist pedagogical approach to teaching English to science and technology students at the Université Toulouse Paul Sabatier. In this interview, I first discuss with her the danger of disciplinary compartmentalization, both for didactics of language & culture and for gender (Perry, 2003), and second, the evolution of what she calls "gender culture" (2011) in France and its influence on didactics. …”
    Get full text
    Article
  5. 1045

    Elektronik Müziğin Gelişimi Ve Türk Bestecilerin Elektronik Müziğe Katkıları Evolution Of Electronic Music And The Contributions Of Turkish Composers To Electronic Music by Kadri Yılmaz Erdal

    Published 2016-12-01
    “…Literatür taraması ve doküman incelenmesi sonucu elde edilen verilerin de işaret ettiği üzere besteci ve icracıların yeni ihtiyaçları, müzik endüstrisi içerisinde ses kayıt teknolojilerinin ortaya çıkması ve gelişimiyle yeni tını ve ifade şekillerinin dünyaca ünlü birçok besteci tarafından kullanılması, bunun müzik sanatı üzerindeki etkilerinin neler olduğu, müzik ve teknolojideki gelişimin Türkiye’deki müzik kültürü ve besteciler üzerindeki etkileri ve Türkiye’de elektronik müzikle ilgili faaliyetler ve çalışma alanları ile ilgili öneriler ortaya koyulmaya çalışılmıştır.…”
    Get full text
    Article
  6. 1046

    Marc Richir és a fenomenológia új megalapozása by István Fazakas

    Published 2018-04-01
    “…Ugyanakkor Husserl fantáziafenomenológiájának egy sajátos értelmezését adja. A szövegben ezen értelmezés főbb pontjait vázolom fel a képzelet és a fantázia közti különbségre, az időiség problémájára, a „perceptív” fantáziára és az észlelés transzcendentális dedukciójára fektetvén a hangsúlyt. …”
    Get full text
    Article
  7. 1047

    Sumanaus valdymo teoriniai modeliai: taikymas vietos savivaldos analizei by Tomas Martinaitis

    Published 2024-04-01
    “…Straipsnio pabaigoje kritiškai įvertinamas esamas sumanaus valdymo nacionalinis modelis ir formuojamas naujas sumanaus valdymo vietos savivaldoje teorinis modelis, padedantis geriau atskleisti pačią sumanaus valdymo sąvoką. Kitaip sakant, straipsnio pabaigoje plačiau pristatomi siūlomų dimensijų implikuojami klausimai ir uždaviniai praktinei analizei. …”
    Get full text
    Article
  8. 1048

    Dynamic trust model based on recommendation chain classification in complex network environment by Lin ZHANG, Huan XING, Ru-chuan WANG, Chao-jie WU

    Published 2015-09-01
    “…According to the recommendation information processing problem in complex network environment,a trust model based on the recommendation chain classification was proposed.The classification method was based on honesty attribute of nodes,which could choose an effective recommendation chain on the basis of practical experience data.The recommendation information dissemination parameters were based on the information gain,which made recommendation information be more accurate.The factor of time was also considered in this model.The ability of interaction and the one of honesty were distinguished clearly.The concept of information entropy in information theory was used in the final ag-gregation calculation of direct trust and recommendation trust,which could get rid of the ambiguity of the previous sub-jective parameter settings.The main polymerization parameters could be continuously corrected with the interactions in order to achieve the situation being closest to the reality.Simulation results show the validity of recommendation chain classification and the rationality of the parameter settings in the proposed model.…”
    Get full text
    Article
  9. 1049

    Investigation and Assessment of the Influence of Cascaded Hydropower Plants on Fish Resources in the Qiuxiangjiang River by LIU Jie, CHEN Lan, CUI Ke, ZHANG Lijuan, LIU Xieting, LI Xin, HU Guocheng

    Published 2020-01-01
    “…The development of cascaded hydropower plants in middle and small rivers has a significant impact on fish resources,mainly includes the destruction of fish habitat.The Qiuxiangjiang River belongs to the first-class tributary of the Dongjiang River in Guangdong Province.This paper evaluates the present situation of fish resources in the Qiuxiangjiang River by aquatic ecosystem investigation and sampling analysis,and compares it with historical data.The results show that due to cascade hydropower development and other human activities in the Qiuxiangjiang River Basin,the suitable habitat for fish decreases.The species and numbers of fish decrease sharply compared with historical records.The fish population structure is relatively unstable,and the fish diversity also gradually reduces.Therefore,for the cascade hydropower development in middle and small rivers,attention should be paid to overall planning the entire river basin,protecting the integrity of the river's aquatic ecosystem,and strictly requiring hydropower plants to build discharge facilities and strengthen supervision of their operation.…”
    Get full text
    Article
  10. 1050

    Rajongás, elmeél és virtus. A német koraromantika polemikus „Schäftesbury”-interpretációja by Péter Tánczos

    Published 2014-10-01
    “…A Shaftesbury-féle koncepció sajátos esztétizálását a wit-Witz, a virtus és virtuoso, illetve a rajongás és képzés fogalmak változásai mentén elemzem. …”
    Get full text
    Article
  11. 1051

    Conceptual Creative Realism as a Methodological Model of Islamic Science: A Critical Review by Mohammad Reza Taghavi, Seyed Saeid Zahed

    Published 2017-05-01
    “…The aim of the present study was a review of “Conceptual Creative Realism” as a methodological model of Islamic science (Iman & Kelateh Sadati, 1392). The model had some strong points including a new presentation of science structure as well as a new definition congruent with the Islamic point of view entered in a new paradigm. …”
    Get full text
    Article
  12. 1052

    Türk Modernleşmesi, Tiyatro ve Yerli Oyun Temsilleri by İbrahim Aktürk

    Published 2024-06-01
    “…Tiyatro sanatı da bu etkiden nasibi almış ve özellikle yerli eserlerin yazılması, yerli oyunların sahnelenmesi gibi konularda bu ilişkinin belirleyiciliği tartışma konusu olmuştur. …”
    Get full text
    Article
  13. 1053

    Quantum secure communication algorithm based on cyclic code and information compression by Hongyang MA, Xin ZHANG, Peng’ao XU, Fen LIU, Xingkui FAN

    Published 2020-03-01
    “…For the problem that the classical secure communication was challenging to transmit information,a quantum secure communication algorithm based on cyclic code and information compression was proposed.First,the data was encoded into two sets of data with different lengths by the sender,one set of data was used for cycling coding and the other one was used to compress coding.Second,single-photon sequence was transmitted to the receiver on the quantum channel by the sender.The error number was used as the basis of channel security detection.If the channel was secure,quantum states were encoded for the data,and segment transmitted by quantum stabilizer codes.The error caused by the environment can be overcome according to characteristic of the stable code.Finally,the information was decoded after receiving the quantum information,then recirculated and decompressed to obtain data.The security analysis shows that the quantum secure communication algorithm can resist the attack of jamming and spoofing attacked.The simulation results show that good results can be obtained to 5 segments for data compression.…”
    Get full text
    Article
  14. 1054

    Barbárság, egyenlőtlenség, elidegenedés? Kiútkeresés Claude Lefort és Pierre Clastres politikai gondolkodásában by M. Miklós Merényi

    Published 2017-04-01
    “… A XX. századi francia politikai filozófia egyik megújítójának tartott Claude Lefort-t és a hivatása „kopernikuszi fordulatát” sürgető politikai antropológust, Pierre Clastres-t barátságukon túl az kötötte össze, hogy vizsgálódásaik az egyes társadalmi formákra jellemző, sajátos politikai tapasztalatokra irányították a figyelmet. …”
    Get full text
    Article
  15. 1055
  16. 1056

    Code vulnerability detection method based on graph neural network by Hao CHEN, Ping YI

    Published 2021-06-01
    “…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
    Get full text
    Article
  17. 1057
  18. 1058

    GAD:topology-aware time series anomaly detection by Qi QI, Runye SHEN, Jingyu WANG

    Published 2020-06-01
    “…To solve the problems of anomaly detection,intelligent operation,root cause analysis of node equipment in the network,a graph-based gated convolutional codec anomaly detection model was proposed for time series data such as link delay,network throughput,and device memory usage.Considering the real-time requirements of network scenarios and the impact of network topology connections on time series data,the time dimension features of time series were extracted in parallel based on gated convolution and the spatial dependencies were mined through graph convolution.After the encoder composed of the spatio-temporal feature extraction module encoded the original input time series data,the decoder composed of the convolution module was used to reconstruct the time series data.The residuals between the original data and the reconstructed data were further used to calculate the anomaly score and detect anomalies.Experiments on public data and simulation platforms show that the proposed model has higher recognition accuracy than the current time series anomaly detection benchmark algorithm.…”
    Get full text
    Article
  19. 1059

    Approach of glowworm swarm optimization based virtual machine placement by Shengchao XU, Maohua XIONG, Tianqi ZHOU

    Published 2022-03-01
    “…In a cloud data center, one of the most important problems is using novel virtual machine placement strategy to promote the physical resource utilization.An approach of glowworm swarm optimization based virtual machine placement for cloud data centers called GSO-VMP was proposed.In the virtual placement, GSO algorithm was used to find a near-optimal solution.Each physical host had a luciferin value which represented the available CPU utilization.Whenever a VM was placed to a physical host, luciferin value of this physical host was updated.GSO-VMP algorithm could search the more available physical host within local range and thus the virtual migration numbers had been decreased and low energy consumption had been obtained.GSO-VMP had been evaluated using CloudSim with real-world workload data.The experimental results show that GSO-VMP has good performance in resource wastage and energy consumption.…”
    Get full text
    Article
  20. 1060

    A dual speech encryption algorithm based on improved Henon mapping and hyperchaotic by Qiuyu ZHANG, Yujie SONG

    Published 2021-12-01
    “…Aiming at the problems of small key space, poor security, low encryption efficiency, and the inability to realize the trade-off between key complexity and encryption efficiency of existing speech chaotic encryption algorithms, a dual speech encryption algorithm based on improved Henon mapping and hyperchaotic was proposed.Firstly, the traditional Henon mapping was improved by extending the control parameter range and taking the nonlinear trigonometric function as the input parameter variable, which made the Henon mapping have larger chaotic space and higher chaotic complexity.Secondly, the improved Henon mapping was used to generate pseudorandom sequence, and the speech data was encrypted single time without repeated scrambling to obtain the first time encryption results of the speech data.Finally, Lorenz hyperchaotic system was adopted to encrypt the speech data after the first time encryption by Arnold secondary scrambling encryption and XOR diffusion encryption to obtaining the final ciphertext speech data.The experimental results show that, compared with the existing methods, the proposed algorithm have larger key space, higher encryption efficiency, and stronger robustness against various cryptographic attacks.…”
    Get full text
    Article