Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
33721
Test and Development of Comprehensive Performance Test System for Shift Tower
Published 2018-01-01“…In order to study the comprehensive performance of shift tower in the manual transmission,a performance test system for the shift tower is designed. The test system adopts the selection and shift motor to drive the shift tower to realize the operating function of the gear selection and shift. …”
Get full text
Article -
33722
Research on federated learning approach based on local differential privacy
Published 2022-10-01“…As a type of collaborative machine learning framework, federated learning is capable of preserving private data from participants while training the data into useful models.Nevertheless, from a viewpoint of information theory, it is still vulnerable for a curious server to infer private information from the shared models uploaded by participants.To solve the inference attack problem in federated learning training, a local differential privacy federated learning (LDP-FL) approach was proposed.Firstly, to ensure the federated model training process was protected from inference attacks, a local differential privacy mechanism was designed for transmission of parameters in federated learning.Secondly, a performance loss constraint mechanism for federated learning was proposed and designed to reduce the performance loss of local differential privacy federated model by optimizing the constraint range of the loss function.Finally, the effectiveness of proposed LDP-FL approach was verified by comparative experiments on MNIST and Fashion MNIST datasets.…”
Get full text
Article -
33723
Hurst and priority adaptive RED combined with dynamic scheduling algorithm based on AOS
Published 2012-10-01“…In order to efficiently transmit different types of high-capacity and burst data,based on virtual channel multiplexing technology on advanced orbiting systems(AOS),a Hurst and priority adaptive random early detection(RED) combined with dynamic scheduling algorithm named HPRED-DS was proposed.In queue management state,the algorithm designed an adaptive two-level packet dropping strategy based on Hurst parameter and priority.In virtual channel scheduling state,a VIP,synchronous and asynchronous mixed virtual channels scheduling mode was designed.Meanwhile,the algorithm efficiently combined queue management and virtual channel scheduling.Experimental results show that on the basis of maintaining high treatment efficiency and throughput,the algorithm stabilizes queue length,reduces delay and delay jitter,can meet various services’transmitting requirement.…”
Get full text
Article -
33724
Adaptive particle filter for state estimation with application to non‐linear system
Published 2022-12-01“…Simultaneously, from the perspective of improving the resampling method, a new resampling technique based on the random resampling method has been designed and fused to this filter. The comparison and analysis of two simulation schemes have been conducted to assess the performance of the designed filtering algorithm. …”
Get full text
Article -
33725
Multi-user fine-grained task offloading scheduling strategy under cloud-edge-end collaboration
Published 2024-04-01“…Application tasks were firstly divided and subtask priorities were designed. Then, a multi-user subtask scheduling scheme was proposed and an improved simulated annealing particle swarm algorithm was designed to minimize the total system cost to achieve the optimal offloading decision. …”
Get full text
Article -
33726
Bruno Munari, la polysensorialité des livres pour la jeunesse
Published 2024-12-01“…The work of Bruno Munari (1907-1998) holds a significant place in the Italian tradition of the artist’s book, characterized by recognized and impactful production. Munari, as a designer, artist, and writer, experimented with various techniques and genres, anticipating many future trends, especially in the field of children’s books. …”
Get full text
Article -
33727
SDN security prediction method based on bayesian attack graph
Published 2021-11-01“…Existing researchers use threat modeling and security analysis system to evaluate and predict SDN (software defined network) security threats, but this method does not consider the vulnerability utilization of SDN controller and the location of devices in the network, so the security evaluation is not accurate.In order to solve the above problems, according to the probability of device vulnerability utilization and device criticality, combined with PageRank algorithm, a algorithm to calculate the importance of each device in SDN was designed; according to SDN attack graph and Bayesian theory, a method to measure the success probability of device being attacked was designed.On this basis, a SDN security prediction method based on Bayesian attack graph was proposed to predict the attacker's attack path.Experimental results show that this method can accurately predict the attacker's attack path and provide more accurate basis for security defense.…”
Get full text
Article -
33728
Hierarchical scalable storage architecture for massive electronic bill
Published 2019-05-01“…The rise of e-commerce and other network services have greatly promoted the development of electronic bill service,while traditional data storage schemes can no longer satisfy the rapid access requirements of massive electronic bill data.To solve these problems,a hierarchical scalable storage architecture for massive electronic bill was proposed,which combined hash modular algorithm and consistent hash algorithm,and supported fast data locating.A horizontal expansion scheme based on hash modular algorithm was designed to reduce the amount of data that needed to migrate when adding or deleting data nodes.Besides,a data caching scheme based on hot data and a load balancing scheme based on access delay were designed and implemented,further improving the speed of data access.Finally,the experiments prove the effectiveness of proposed architecture and schemes.…”
Get full text
Article -
33729
Intestinal Motility after Ileal Pouch-Anal Anastomosis
Published 1990-01-01“…Measures designed to slow intestinal transit, increase absorption and reduce stool output are under investigation.…”
Get full text
Article -
33730
Multi-party efficient audit mechanism for data integrity based on blockchain
Published 2021-12-01“…A blockchain-based data integrity multi-party high-efficiency audit mechanism (MBE-ADI) for the big data environment was proposed.A hybrid Merkle DAG structure based on data domain was built to organize data, and realized the simultaneous verification of a large number of unstructured data in the big data environment.In order to deal with the problem of large amount of data in the big data environment, a multi copy deterministic verification method based on BLS signature was designed to realize the efficient verification of data integrity supporting multiple copies.A dual verification audit architecture based on consortium blockchain was designed to realize decentralized automatic audit and audit history credible traceability.At the same time, data integrity verification services were provided for data owners and data users to realize reliable acquisition of data.The test proves the feasibility of the system and the efficiency of data integrity audit.…”
Get full text
Article -
33731
Toxicity of Common Indoor Household Insecticides Registered in Florida
Published 2019-09-01“…Insecticides are designed to control insect pests, but they can also be toxic (poisonous) to desirable plants and animals, including humans. …”
Get full text
Article -
33732
Formalism as Mysticism: Reading Jewish American Poets Louis Zukofsky and Charles Reznikoff
Published 2014-01-01“…Pourtant, la critique les rassemble de plus en plus comme poètes juifs américains de l’entre-deux-guerres. A travers cette désignation aux contours souvent flous, le formalisme du dernier vingtième siècle se réinvente aux sources identitaires présumées des précurseurs qu’il se désigne. …”
Get full text
Article -
33733
A Novel Method for Constructing Grid Multi-Wing Butterfly Chaotic Attractors via Nonlinear Coupling Control
Published 2016-01-01“…And a piecewise linear function, which is taken into the linear coupling controller, is designed to form a nonlinear coupling controller; thus a five-dimensional chaotic system is produced, which is able to generate gird multi-wing butterfly chaotic attractors. …”
Get full text
Article -
33734
Research on Architecture of LEO Satellite Internet of Things and Key Technologies
Published 2021-12-01“…First, we analyzed the composition and demand characteristics of LEO satellite IoTs, and designed an architecture of LEO satellite IoTs.Second, to extracted characteristics of electromagnetic environment and channel, we studied electromagnetic environment and channel sensing methods through constructing neural network model.Then, we investigated an active terminal-identifi cation method for detecting active terminals.Finally, considered multiple-input multiple-output as the main approach to improved the capacity of terrestrial mobile communication systems, we explored a pair of algorithms of mining satellite spatial resources for realizing the collision mitigation and capacity improvement of LEO IoT terminals.Simulation results showed that the designed method sofmining spatial-domain resources could mitigated eff ectively signal collisions among IoT terminals, and improved signifi cantly the concurrent accessing number of LEO satellite IoT terminals.…”
Get full text
Article -
33735
C3S:research of CI-based concurrent transmission strategy for intelligent sensing system
Published 2019-01-01“…Concurrent transmission technology has important sense for Intelligent Sensing System (ISS).The C3S strategy based with constructive interference (CI) was proposed.C3S was composed of intelligent clock synchronization layer,intelligent energy consumption allocation layer and intelligent parallel pipeline layer.The intelligent clock synchronization layer designed ICCA,a CI-based intelligent clock calibration algorithm.The intelligent energy allocation layer designed CIES,a energy adaptive scheduling scheme for CI,Moreover,a CI-based parallel pipeline CI2P was implemented in the intelligent parallel pipeline layer.The experimental results show that the C3S strategy can effectively improve the packet receiving rate of the concurrent transmission in ISS.It can also reduce the energy consumption of ISS and improve the channel utilization rate of ISS.…”
Get full text
Article -
33736
Coordinated Control of Slip Ratio for Wheeled Mobile Robots Climbing Loose Sloped Terrain
Published 2014-01-01“…First, a slope-based wheel-soil interaction terramechanics model is built, and an online slip coordinated algorithm is designed based on the goal of optimal drive efficiency. …”
Get full text
Article -
33737
Multiaxial fatigue of in-service aluminium longerons for helicopter rotor-blades
Published 2018-07-01“…It is not above the designed equivalent stress level. Crack growth period estimation in longerons based on fatigue striation spacing or meso-beach-marks measurements has shown that monitoring system introduced designer in longerons can be effectively used for in-time crack detecting independently on the failed section when can appeared because of various type of material faults or in-service damages.…”
Get full text
Article -
33738
Robust Control for the Suspension Cable System of the Unmanned Helicopter with Sensor Fault under Complex Environment
Published 2021-01-01“…Simulation studies are given to show the efficiency of the designed robust antiswing control strategy.…”
Get full text
Article -
33739
Multi-authority attribute-based encryption access control model for cloud storage
Published 2015-06-01“…The existing attribute-based encryption access control studies are mostly based on single authority,and this scheme is apt to be under attack to cause exposure of secret keys.Thus,a multi-authority access control model PRM-CSAC is proposed.Based on CP-ABE method,a multi-authority attribute-based encryption scheme is designed to improve security level.Minimized attribute grouping algorithm is designed to distribute keys to users according to needs,which can reduce unnecessary attribute key distribution and decrease the amount of re-encryption attributes.The read and write attribute are added to strengthen the control of owners.The analysis shows that the proposed scheme can meet the security requirement of access control in cloud,and it also has less response time and system cost.…”
Get full text
Article -
33740
Self-correcting complex semantic analysis method based on pre-training mechanism
Published 2019-12-01“…In the process of knowledge service,in order to meet the fragmentation management needs of intellectualization,knowledge ability,refinement and reorganization content resources.Through deep analysis and mining of semantic hidden knowledge,technology,experience,and information,it broke through the existing bottleneck of traditional semantic parsing technology from Text-to-SQL.The PT-Sem2SQL based on the pre-training mechanism was proposed.The MT-DNN pre-training model mechanism combining Kullback-Leibler technology was designed to enhance the depth of context semantic understanding.A proprietary enhancement module was designed that captured the location of contextual semantic information within the sentence.Optimize the execution process of the generated model by the self-correcting method to solve the error output during decoding.The experimental results show that PT-Sem2SQL can effectively improve the parsing performance of complex semantics,and its accuracy is better than related work.…”
Get full text
Article