Cloud Technology: Conquest of Commercial Space Business

Author(s):  
Khaled Elbehiery ◽  
Hussam Elbehiery
Pneumologie ◽  
2014 ◽  
Vol 68 (02) ◽  
Author(s):  
AG Lenz ◽  
T Stoeger ◽  
D Cei ◽  
M Schmidmeir ◽  
N Pfister ◽  
...  

Author(s):  
Todd Decker

Hymns for the Fallen listens closely to forty years of Hollywood combat films produced after Vietnam. Ever a noisy genre, post-Vietnam war films have deployed music and sound to place the audience in the midst of battle and to stimulate reflection on the experience of combat. Considering landmark movies—such as Apocalypse Now, Saving Private Ryan, The Thin Red Line, Black Hawk Down, The Hurt Locker, and American Sniper—as well as lesser known films, Todd Decker shows how the domain of sound, an experientially rich, culturally resonant aspect of the cinema, not only invokes the realities of war, but also shapes the American audience’s engagement with soldiers and veterans as flesh-and-blood representatives of the nation. Hymns for the Fallen explores all three elements of film sound—dialogue, sound effects, music—and considers how expressive and formal choices on the soundtrack have turned the serious war film into a patriotic ritual enacted in the commercial space of the cinema.


1998 ◽  
Author(s):  
Rebecca Cowen-Hirsch ◽  
Stuart Timerman ◽  
David Alianti ◽  
Gilbert Duke

Author(s):  
Мадина Усенбай ◽  
Акмарал Иманбаева

Конфиденциальность является одним из важных параметров для повышения безопасности в сети, цель которого - сохранить секретную информацию. Рассмотрена модель доверия, состоящая из текущих и прошлых оценок на основе репутации объекта в сети. В модели используется параметр времени для защиты конфиденциальности пользователя для статических и динамических объектов, например, в IoT или облачной технологии. Confidentiality is one of the important parameters for increasing security on the network, the coal of which is to keep secret information. A trust model consisting of current and past assessments based on the object reputation in the network is considered. The model uses a time parameter to protect user privacy for static and dynamic objects, for example, in IoT or cloud technology.


Author(s):  
Florian Agbuya ◽  
Gerard Francesco Apolinario ◽  
Dianne Marie Ramos ◽  
JD Mark Villanueva ◽  
Princess Zafe ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document