-
1
The Kurdish labour party cause, Its Reflection overThe Iraqi – Turkish Relation 1984 – 2007
Published 2008-10-01“…Furthermore, the Turkish reaction against the activities of this party and its reflections over the relations between the two neighbours countries. Finally, the conclusions in which the researcher has concluded in order to settle the Kurdish cause in Turkey to enhance the Iraq – Turkish relations.…”
Get full text
Article -
2
De la secte à la tribu : les Moran et Matak du Haut-Assam
Published 2023-03-01“…Drawing from field interviews, from the Assamese chronicles (burañjī) and from colonial documentation, this is an attempt to reconstruct the interplay of differentiations by which the Moran and Matak define themselves in relation to each other, then in relation to their neighbours and finally within the Assamese society. It turns out that the segmental dynamics of the Vishnuite sect to which these societies are affiliated, that of the Mayamara, largely accounts for these differentiations.…”
Get full text
Article -
3
A Credible Routing Based on a Novel Trust Mechanism in Ad Hoc Networks
Published 2013-04-01“…In this protocol, a node makes a routing decision according to the trust values of its neighbour nodes. Finally, two routes are built: the main route with highest route trust value in the candidate routes and a backup route. …”
Get full text
Article -
4
Au-delà et en deçà du Périphérique
Published 2012-12-01“…Questioning how they relate to where they live also highlights the weight of a potent collective territorial stigmata, it also contributes to the ‘ghetto or no ghetto’ French sociological controversy by showing that the word “ghetto” is rejected and bears a highly negative connotation, being used to disqualify the territory of “the others” (the historical ghetto, the fictional ghetto, the American ghetto, the neighbourly ghetto). Finally, the paper addresses an idealtype of the mental and symbolic map of Paris (le Paris quotidien, le Paris poubelle and le blanc Paris) which highlights the power of social, cultural and racial legitimization and domination processes as well as the daily and routinized connections between Paris and the banlieues in which processes of social integration and desire for social mobility are crucial.…”
Get full text
Article -
5
A convolutional neural network with a two-stage LSTM model for tool presence detection in laparoscopic videos
Published 2020-09-01“…Then, LSTM was employed to include temporal information through a video clip of neighbour frames. Finally, the second LSTM was utilized to model temporal dependencies across the whole surgical video. …”
Get full text
Article -
6
HomeRun Vector Assembly System: a flexible and standardized cloning system for assembly of multi-modular DNA constructs.
Published 2014-01-01“…Further, with a three-module construct we showed quantitatively that there was minimal promoter leakage between neighbouring modules. Finally, we developed a method, in vitro Cre recombinase-mediated cassette exchange (RMCE) cloning, to regenerate a gateway destination vector from a previous multisite gateway cloning reaction, allowing access to existing DNA element libraries in conventional gateway entry clones, and simple creation of constructs ready for in vivo RMCE. …”
Get full text
Article -
7
Resurgence analysis of the Adler function at O $$ \mathcal{O} $$ (1/ N f 2 $$ {N}_f^2 $$ )
Published 2023-09-01“…We study in particular the first and second non-perturbative sectors, their relation to UV and IR renormalons, and how their presence influences the perturbative expansions in neighbouring sectors. Finally, finding that many non-perturbative sectors have asymptotic series, we derive relations among all of them, thus providing an interesting new perspective on the alien lattice for the Adler function.…”
Get full text
Article -
8
Asynchronous broadcast‐based event‐triggered control for discrete‐time clock synchronization
Published 2023-07-01“…And it is worth noting that the proposed algorithm in this paper is a distributed algorithm and does not require real‐time acquisition of information from neighbouring nodes. Finally, a numerical example is given to illustrate the effectiveness of the proposed event‐triggered control strategy. …”
Get full text
Article -
9
Oblique View Selection for Efficient and Accurate Building Reconstruction in Rural Areas Using Large-Scale UAV Images
Published 2022-07-01“…The georeferenced building instances are used to select oblique images that cover buildings by using nearest neighbours search. Finally, precise match pairs are generated from the selected oblique images and nadir images using their georeferenced principal points. …”
Get full text
Article -
10
ASKAT: Aspect Sentiment Knowledge Graph Attention Network for Recommendation
Published 2024-01-01“…After that, we propose a new graph attention network that uses sentiment-aware attention mechanisms to aggregate neighbour information. Finally, our experimental results on three datasets, Movie, Amazon book, and Yelp, show that our model consistently outperforms the baseline model in two recommendation scenarios, click-through-rate prediction and Top-k recommendation. …”
Get full text
Article -
11
DNA Modification Patterns within the Transposable Elements of the Fig (<i>Ficus carica</i> L.) Genome
Published 2021-02-01“…Furthermore, both the <i>Copia</i> and <i>Gypsy</i> retroelements showed higher modification rates in the LTR and coding regions compared with their neighbour regions. Finally, the unconventional methylation of retrotransposons is unrelated to the number of close genes, suggesting that the 4mC and 6mA frequency in LTR-retrotransposons should not be related to transcriptional repression in the adjacency of the element. …”
Get full text
Article -
12
Context-aware data-centric misbehaviour detection scheme for vehicular ad hoc networks using sequential analysis of the temporal and spatial correlation of the consistency between...
Published 2019“…Similarly, plausibility assessment reference models are built online and updated in a timely fashion using the Hampel filter and by utilizing the consistency assessment reference model of neighbouring information. Finally, a message is classified as suspicious if its consistency and plausibility scores deviate significantly from the context reference model. …”
Article