Suggested Topics within your search.
Suggested Topics within your search.
- Electronics 3
- Government policy 2
- Prevention 2
- Social aspects 2
- Terrorism 2
- African literature 1
- Aquatic plants 1
- Automobiles 1
- Business Mathematics 1
- Cultural pluralism 1
- Domestic relations courts 1
- Ecophysiology 1
- Effect of underwater light on 1
- Electrical engineering 1
- FICTION / Fantasy / Short Stories 1
- History 1
- History and criticism 1
- Juvenile literature 1
- Maintenance and repair 1
- Mnemonics 1
- Moral and ethical aspects 1
- Multiculturalism 1
- Nursing 1
- Pharmacology 1
- Photosynthesis 1
- Plants 1
- Psychological aspects 1
- Psychology 1
- Technological innovations 1
- Terrorists 1
-
4921
Interesting Examples of Violation of the Classical Equivalence Principle but Not of the Weak One
Published 2018-01-01“…., Greenberger gravitational Bohr atom and the tree-level scattering of different quantum particles by an external weak higher-order gravitational field, are thoroughly investigated afterwards. …”
Get full text
Article -
4922
DARK SOIL PITS AND GRAVES IN VOLCANIC CAVE C6.1, KRONG NO, DAK NONG PROVINCE: DOCUMENTATION AND DISCUSSION
Published 2023-12-01“…As a result of the investigation and excavation of cave C6.1 conducted in 2017, 2018, and 2019, we have discovered vestiges of nine dark soil pits and seven relatively intact graves, together with teeth and other human remains scattered in the cultural layer. This is an important source of information on the racial composition of the prehistoric inhabitants of the Central Highlands during the Neolithic period, as well as the paleoenvironment, environmental adaptations, and flora and fauna that prehistoric inhabitants exploited for their livelihoods. …”
Get full text
Article -
4923
On the presence of electric dipole and toroidal moments in non-Hermitian QED
Published 2025-01-01“…It is shown that the scattering potential computed in terms of the Born approximation receives phenomenological modifications due to non-hermitian effects. …”
Get full text
Article -
4924
1s2p RIXS Calculations for 3d Transition Metal Ions in Octahedral Symmetry
Published 2018-01-01“…We present a series of 1s2p resonant inelastic X-ray scattering (RIXS) calculations for 3d transition metal ions in octahedral symmetry covering each ground state between 3d0 and 3d9. …”
Get full text
Article -
4925
Au-Loaded Titanium Dioxide Nanoparticles Synthesized by Modified Sol-Gel/Impregnation Methods and Their Application to Dye-Sensitized Solar Cells
Published 2014-01-01“…The fabricated cell with up to 1.0 mol% Au-loaded TiO2 could enhance the performance by localized surface plasmon effect and scattering property.…”
Get full text
Article -
4926
Efficient Computation of Wideband RCS Using Singular Value Decomposition Enhanced Improved Ultrawideband Characteristic Basis Function Method
Published 2016-01-01“…The singular value decomposition (SVD) enhanced improved ultrawideband characteristic basis function method (IUCBFM) is proposed to efficiently analyze the wideband scattering problems. In the conventional IUCBFM, the SVD is only applied to reduce the linear dependency among the characteristic basis functions (CBFs) due to the overestimation of incident plane waves. …”
Get full text
Article -
4927
Realization of PPPoE Fast Forwarding in Distributed ACR
Published 2014-03-01“…The large-scale involvement of the large-scale access convergence router was described for the significance of application of multiple access networks.In the background of network convergence,the role of ACR in the network was analyzed.Based on the thought of forwarding and control element separation(ForCES)of distributed system, the PPPoE protocol principle and process were analyzed, and the PPPoE access technology was achieved in ACR.The test results show that,the implementation of PPPoE based on a distributed system can meet the requirement of large-scale access application scene,and ACR can support high bandwidth for thousands of concurrent.…”
Get full text
Article -
4928
EMULATION OF SOFTWARE-DEFINED NETWORK USING MININET
Published 2021-02-01“…Most network devices such as routers and switches that implement SDN functionalities are expensive. …”
Get full text
Article -
4929
Hierarchical division-based cache storage strategy in content-centric networking
Published 2016-01-01“…According to the strategy, content was grouped into different hierarchies by the cooperation Interest package, Data package and the local PIT of routers, so that the contents could be cached in different nodes along the delivery path. …”
Get full text
Article -
4930
Optical Characterization of Porous Sputtered Silver Thin Films
Published 2013-01-01“…The optical properties of various porous silver films, grown with a commercial DC sputter coater, were investigated and compared for different plasma parameters. …”
Get full text
Article -
4931
Intelligent routing strategy in the Internet of things based on deep reinforcement learning
Published 2019-06-01“…At the era of the Internet of things,networking mode that connects everything would bring tremendous increase in the data volume and challenge the traditional routing protocols.The limitations of the existing routing protocols was analyzed when facing the data explosion and then the routing selection problem was re-modeled as a Markov decision process.On this basis,the deep reinforcement learning technique was utilized to choose the next-hop router for data transmission task in order to shorten the transmission path length while network congestion was avoided.The simulation results demonstrate that the congestion probability can be reduced significantly and the network throughput can be enhanced by the proposed strategy.…”
Get full text
Article -
4932
Integrated Analysis of Water Ice Detection in Erlanger Crater, Lunar North Pole: Insights from Chandrayaan-1 Mini-SAR and Chandrayaan-2 DFSAR Data
Published 2024-12-01“…The results reveal a correlation between the hybrid polarimetric models (m-delta, m-chi, and m-alpha) and fully polarimetric parameters (entropy, anisotropy, and alpha), suggesting that volume scattering predominates inside the crater walls, while surface and double bounce scattering are more prevalent in the right side of the crater wall and surrounding areas. …”
Get full text
Article -
4933
Time slot-based RED algorithm on self-similar flows:SFRED
Published 2010-01-01“…Based on fractional Brownian motion(FBM),one calculation of the packet drop probability in the RED algorithm was derived under self-similar flows.Based on the self-similarity and the long-range dependence characteristics of Internet network traffics,a time slot-based RED algorithm on self-similar flows(SFRED) was proposed to the router queue management.The packet drop probability is calculated in every time-slot so that the burden is greatly reduced.It is simulated by NS2 and the experimental results show that the algorithm SFRED outperforms RED.SFRED can control the queue length under adaptive flows with a good throughput.…”
Get full text
Article -
4934
Edge-first-based cooperative caching strategy in information centric networking
Published 2017-03-01“…In order to optimize the replica placement in information centric networking,an edge-first-based cooperative caching strategy (ECCS) was proposed.According to the strategy,cache decision was made during the interest forwarding stage.The decision result and statistic information would been forwarded to upstream routers step by step.Utilizing the information,upstream nodes could update their cache information table immediately to achieve cooperative caching.The experimental results indicate ECCS can achieve salient performance gain in terms of server load reduction ratio,average hop reduction ratio,average cache hit ratio,compared with current strategies.…”
Get full text
Article -
4935
Anonymity handover authentication protocol based on group signature for wireless Mesh network
Published 2016-10-01“…In order to ensure that the Mesh network mobile client video,voice and other real-time strong applications without interruption,a secure and efficient handover authentication was very important.To protect the privacy of mobile nodes,an anonymity handover authentication protocol was proposed based on group signature for wireless mesh network.Compared with other handover authentication protocols based on group signature,the proposed scheme did not involve the group signature correlation operation,and the group signature algorithm was only carried out on the router.The pro-posed protocol not only enhances the security but also performs well in authentication efficiency and privacy-preserving.…”
Get full text
Article -
4936
Au fil de nos souvenirs : le 17 octobre 1961, emblème des violences policières
Published 2007-11-01“…Then, the reference to a unique event becomes less visible and scatters in various directions. From an evocation to another, from an entrepreneur de mémoire to another, the memory of October 17th, 1961, supported by photographs left by Kagan, becomes the symbol of police violence. …”
Get full text
Article -
4937
Analysis on Optimization of Agricultural Products Supply Chain Based on Dynamic System
Published 2022-01-01“…In the complex supply chain of agricultural products, they are scattered upstream and downstream. It is difficult to form agglomeration scale effect, information asymmetry between supply chain nodes, and poor hardware environment of supply chain. …”
Get full text
Article -
4938
Strategic Litigation in a Time of Populism: Poland’s Experience
Published 2024-08-01“…I argue that strategic litigation was an important tool used by civil society and crucial for countering democratic backsliding in Poland in 2015–2023. …”
Get full text
Article -
4939
Les pancartes méconnues de l’abbaye de Saint-Rigaud (dernier tiers du xie siècle). Transmission, confection, signification
Published 2025-01-01“…An examination of these pancartae from three perspectives – archival conservation, principles of composition and social significance – shows that they are the result of a process of documentary unification involving the selection of scattered texts, rewriting on a new medium and the creation of a thematic discourse. …”
Get full text
Article -
4940
Mycobacterium bovis tuberculosis in a neonatal holstein calf
Get full text
Article