Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
33701
Mechanically doped aluminum materials with peculiar physical and mechanical characteristics
Published 2001-02-01“…The article introduces results of investigation of the production technology, structure, physic and mechanical properties of new mechanical doped heat-resistant alloys of special designation…”
Get full text
Article -
33702
ProcessM: Intelligent Process Mining software
Published 2025-05-01“…ProcessM is an open-source software designed for users with limited technical expertise specializing in business process analysis. …”
Get full text
Article -
33703
Aggregated privacy-preserving auditing for cloud data integrity
Published 2015-10-01“…To solve the problem of data integrity in cloud storage,an aggregated privacy-preserving auditing scheme was proposed.To preserve data privacy against the auditor,data proof and tag proof were encrypted and combined by using the bilinearity property of the bilinear pairing on the cloud server.Furthermore,an efficient index mechanism was designed to support dynamic auditing,which could ensure that data update operations did not lead to high additional computation or communication cost.Meanwhile,an aggregation method for different proofs was designed to handle multiple auditing requests.Thus the proposed scheme could also support batch auditing for multiple owners and multiple clouds and multiple files.The communication cost of batch auditing was independent of the number of auditing requests.The theoretical analysis and experimental results show that the proposed scheme is provably secure.Compared with existing auditing scheme,the efficacy of the proposed individual auditing and batch auditing improves 21.5% and 31.8% respectively.…”
Get full text
Article -
33704
Methodology of software development with the use of the model of distributed object-based stochastic hybrid systems
Published 2022-03-01“…Such mathematical model is planned to be created for the system being designed along with the system specification at all stages of the software development.The following stages of the development are considered as building of preliminary mathematical model by designing its specification, choosing and specification of system metrics, statistical analysis of the model, approbation of the mathematical model in conditions close to real, analysis by analytical methods and the implementation. …”
Get full text
Article -
33705
Trabalho infantil e cultura camponesa: interpelações às políticas públicas
Published 2016-01-01“…However, public policies designed to eradicate child labor need to dialogue with the socio-cultural particularities of this world, so that they can be constructed having legitimacy and effectiveness.…”
Get full text
Article -
33706
Entropy and Selection: Life as an Adaptation for Universe Replication
Published 2017-01-01“…By this logic, intelligent life (as the least-entropic known entity) is more likely than black holes or anything else to be an adaptation designed by cosmological natural selection. This view contrasts with Smolin’s suggestion that black holes are an adaptation designed by cosmological natural selection and that life is the by-product of selection for black holes. …”
Get full text
Article -
33707
Proactive caching and personalized delivery mechanism of heterogeneous content for MAR applications in the Metaverse
Published 2024-10-01“…Then, based on the ECSD, heterogeneous content pre-caching mechanisms based on storage space division and user preference prediction were designed. Specially, by introducing the personalized recommendation mechanism of foreground content, a differentiated delivery strategy of foreground content was designed. …”
Get full text
Article -
33708
Cross-network access control mechanism for complex network environment
Published 2018-02-01“…,integration of multi-network and information flow in cross-network.These characteristics bring access control for complex network environment the new requirement of coarse-grained control,sticky policies and inconsistent operation semantics.To satisfy these requirements,cross-network access control mechanism in complex network environments (CACCN) was designed by mapping the cyberspace-oriented access control.First of all,the process of mapping was illustrated using the example of space-ground integrated networks.Next,a management model was proposed to manage the control elements in CACCN and a series of management functions were designed by using Z-notation.The analysis on practical example demonstrates that the mechanism can satisfy a series of access control requirements.…”
Get full text
Article -
33709
Observer le travail enseignant
Published 2014-01-01“…Firstly, the epistemological and theoretical bases for observation, designed as an operational method and source of knowledge production, will be presented. …”
Get full text
Article -
33710
Speech enhancement method based on multi-domain fusion and neural architecture search
Published 2024-02-01“…In order to further improve the self-learning and noise reduction ability of speech enhancement model, a speech enhancement method based on multi-domain fusion and neural architecture search was proposed.The multi-spatial domain mapping and fusion mechanism of speech signals were designed to realize the mining of real complex number correlation.Based on the characteristics of convolution pooling of the model, a complex neural architecture search mechanism was proposed, and the speech enhancement model was constructed efficiently and automatically through the designed search space, search strategy and evaluation strategy.In the comparison and generalization experiment between the optimal speech enhancement model and the baseline model, the two indexes of PESQ and STOI increase by 5.6% compared with the optimal baseline model, and the number of model parameters is the lowest.…”
Get full text
Article -
33711
Corps et vision du monde chez les Berbères de Kabylie
Published 2019-07-01“…Paradoxically, this terminological shortage is at the root of the production of a plethora of very important terms that, while designating the body and its various constituent parts, furnishes a broad range of expressions, metaphors and metonymies highly infused with meanings, allusions and symbols. …”
Get full text
Article -
33712
A spatial diversity cooperative spectrum sensing system based on blockchain and deep learning
Published 2023-10-01“…Cooperative spectrum sensing is a key technology in cognitive radio.A data-driven intelligent cooperative spectrum sensing system was proposed with spatial diversity running on a smart contract to address issues of security, privacy, incentive and hidden terminals in cooperative spectrum sensing.Specifically, a motivated spectrum sensing system was designed by taking advantage of the decentralization of blockchain technology and the immutability of data.Secondly, a deep learning-based approach was proposed to identify malicious users in the system.In addition, to achieve higher accuracy in recruiting sensing nodes more efficiently in the system, a hard decision cooperative spectrum sensing fusion algorithm based on performance weights and spatial diversity was designed.The experimental results indicate that the proposed solution outperforms traditional cooperative spectrum sensing algorithms in terms of security, privacy, motivation, and sensing accuracy.…”
Get full text
Article -
33713
Analyse d’une expérimentation de service public de covoiturage courte distance au prisme du concept de dispositif
Published 2021-10-01“…On the one hand, it explores the physical componants of the "carsharing station" and shows how they are designed to cross the "driver" and "passenger" user flows. …”
Get full text
Article -
33714
Satellite-Earth Integration Intelligent Resource Management and Control Architecture of Giant Sensing Constellation
Published 2022-09-01“…The giant sensing constellation will have the capabilities of on-board automatic processing, on-board independent planning, multisensors and multi-mode automatic switching.The traditional control mode of relying solely on the ground system can no longer meet the requirements of the giant sensing constellation.According to the requirements of intelligent and networked control, an integrated intelligent resource management and control architecture was proposed.It was based on the integration of satellite and earth.The work contents of satellite and earth were specifically designed.The interaction mechanism between satellite and earth was designed.The architecture it proposed could be well applied to the independent resource management and controlled of giant sensing constellation.The architecture realized the "networking, autonomy and intelligence" of the giant sensing constellation and it could played an important role in major national security emergency response and other tasks.…”
Get full text
Article -
33715
Network security threat warning method based on qualitative differential game
Published 2018-08-01“…Most current network security research based on game theory adopts the static game or multi-stage dynamic game model,which does not accord with the real-time change and continuity of the actual network attack-defense process.To make security threats warning more consistent with the attack-defense process,the threat propagation process was analyzed referring to the epidemic model.Then the network attack-defense game model was constructed based on the qualitative differential game theory,by which the evolution of the network security state could be predicted.Based on the model,the qualitative differential game solution method was designed to construct the attack-defense barrier and divide the capture area.Furthermore,the threat severity in different security states were evaluated by introducing multidimensional Euclidean distance.By designing the warning algorithm,the dynamic warning of the network security threat was realized,which had better accuracy and timeliness.Finally,simulation results verify the effectiveness of the proposed algorithm and model.…”
Get full text
Article -
33716
Toxicity of Common Indoor Household Insecticides Registered in Florida
Published 2019-09-01“…Insecticides are designed to control insect pests, but they can also be toxic (poisonous) to desirable plants and animals, including humans. …”
Get full text
Article -
33717
Trajectory privacy protection scheme based on differential privacy
Published 2021-09-01“…To solve the problem that the current sampling mechanism and data obfuscation method may raise insufficient data availability and privacy protection, a trajectory privacy protection scheme based on differential privacy was proposed.A new efficient sampling model based on time generalization and spatial segmentation was presented, and a k-means clustering algorithm was designed to process sampling data.By employing the differential privacy mechanism, the trajectory data was disturbed to solve the user privacy leaking problem caused by the attacker with powerful background knowledge.Simultaneously, to respond to the error boundary of the query range of pandemic, an effective prediction mechanism was designed to ensure the availability of released public track data.Simulation results demonstrate that compared with the existing trajectory differential privacy protection methods, the proposed scheme has obvious advantages in terms of processing efficiency, privacy protection intensity, and data availability.…”
Get full text
Article -
33718
THEORETICAL ANALYZING AND MODELING FOR ELECTROMAGNETIC VIBRATION OF PERMANENT MAGNET SYNCHRONOUS MOTOR
Published 2016-01-01“…The research on electromagnetic vibration is foundations of designing the low noising PMSM. The structure of PMSM is introduced. …”
Get full text
Article -
33719
CBGTPy: An extensible cortico-basal ganglia-thalamic framework for modeling biological decision making.
Published 2025-01-01“…Here we introduce CBGTPy, a virtual environment for designing and testing goal-directed agents with internal dynamics that are modeled on the cortico-basal-ganglia-thalamic (CBGT) pathways in the mammalian brain. …”
Get full text
Article -
33720
An Improved RSSI-Based Positioning Method Using Sector Transmission Model and Distance Optimization Technique
Published 2015-09-01“…The calculated distances designated for trilateration are also optimized to eliminate the abnormal distances from positioning calculations. …”
Get full text
Article