Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
33901
A New Approach to Assess the Quality of Small High-Speed Centrifugal Fans Using Noise Measurement
Published 1999-01-01“…The requirements for a special approach for the quality assessment of small high-speed centrifugal fans are outlined and a new parameter designating the noise levels from the product in comprehensive form will be discussed and described as a criterion for such quality assessment.…”
Get full text
Article -
33902
About the competence-based technology for educational environment survey
Published 2022-05-01“…This technology includes special matrix and “value-and-competence parallelepiped” designed as the instruments of university educational environment control and correction.…”
Get full text
Article -
33903
PhD in Public Administration and Management (By Coursework and Research) (PHDPAM-CW&R)
Published 2022“…is designed for those seeking academic research and teaching careers as faculty or professors in the study of governance, public administration, management and administrative sectors within Universities but also as professional career managers and administrators for a wide range of organizational contexts.…”
Get full text
Other -
33904
Scalability in SLA lattice through lattice orientation and hybrid frame and plate architectures
Published 2025-03-01“…Lightweighting has been a key goal for engineers and designers, with lattice structures widely explored as the building blocks for structural components. …”
Get full text
Article -
33905
A novel adaptive droop-based SoC balancing control strategy for distributed energy storage system in DC microgrid
Published 2025-04-01“…In the secondary control layer, a virtual voltage equalization controller (VVEC) is designed to reduce the influence of line impedance on SoC balance. …”
Get full text
Article -
33906
Mechanical properties and microbial assessment of additively manufactured diamond and gyroid Ti-6Al-4V ELI scaffolds for interbody fusion cages applications
Published 2025-01-01“…This study is meticulously designed to focus on both the mechanical and microbial assessments. …”
Get full text
Article -
33907
Dual band four port MIMO antenna with dual circular polarization for Wi-Fi/WiMAX applications
Published 2025-01-01“…An I shaped strip is used to join separate ground planes of designed E shaped monopole antenna to have same voltage levels. …”
Get full text
Article -
33908
THE EXPERIMENTAL PROGRAM "DEVELOPING SOCIAL INTELLIGENCE IN PRIMARY SCHOOL STUDENTS"
Published 2023-11-01“…This article presents an Experimental Program designed to enhance the social intelligence of primary school students. …”
Get full text
Article -
33909
Algorithm for scenario benefit route planning based on user’s requests
Published 2018-05-01“…Most of the existing research for point of interest route planning only consider the static properties of POI,however,the congestion of the hot spots and users’ discontent may greatly reduce the travel quality.In order to increase the tourists’ satisfaction,the dynamic attributes of POI was considered and a route planning algorithm based on user’s requests was proposed.Firstly,Markov-GM(1,1) forecasting algorithm was designed to predict the number of people in each scenic spot.Markov-GM(1,1) could make the average predication error 12.2% lower than the GM(1,1) algorithm by introducing the predication residual.And then,the forward refinement (FR) algorithm was designed which could avoid visiting the unnecessary place and satisfy user’s requests as well.The average solving time of forward refinement algorithm was 9.4% lower than TMT algorithm under the same amount of user’s requests.Finally,based on the factors such as spot popularity,KL divergence of time,visiting order and distance et al,the scenic route profit planning algorithm which could make the number of Rank 1-5 spots 34.8% higher than Time_Based algorithm and 47.3% higher than Rand_GA algorithm.…”
Get full text
Article -
33910
Optimization of LMBP high-speed railway wheel size prediction algorithm based on improved adaptive differential evolution algorithm
Published 2019-10-01“…Based on the analysis of the research status of wheel-to-life prediction at home and abroad and the repair of wheel-set wear and tear, this article designs and implements an adaptive differential evolution algorithm Levenberg–Marquardt back propagation wheel-set size prediction model. …”
Get full text
Article -
33911
The application research of ancient calligraphy recognition model based on improved filtering and AI technology in calligraphy education in colleges and universities
Published 2025-02-01“…The data showed that the recognition accuracy of the ancient Chinese character recognition model designed by this research is significantly higher than the common methods in the market. …”
Get full text
Article -
33912
D2D data sharing partner selection mechanism based on privacy degree and stability degree
Published 2019-12-01“…Device to device (D2D) data sharing has become a promising solution to offload cellular network traffic,but the privacy vulnerability and service instability of data sharing partners affect the quality of shared services.To solve this problem,a D2D data sharing partner selection mechanism based on degree of privacy degree and stability degree (named PSUS) was proposed.Firstly,the privacy information of the provider was abstracted and summarized,and the privacy measurement method was built according to the privacy preferences of the provider and the historical records of shared services,and the privacy degree of the provider in different shared services was obtained.Then,the data sharing process was designed based on privacy degree,and the provider cached data under the constraints of privacy preferences and participates in sharing services with low privacy to meet the provider's privacy requirements.Finally,on the basis of the provider who has satisfied the privacy requirements,a multi-index evaluation method was designed to evaluate the service stability of providers to select stable sharing partners.The feasibility of the proposed mechanism was demonstrated by analysis of performance.…”
Get full text
Article -
33913
Reforming the Welfare State: Camden 1965-73
Published 2011-06-01“…The outcome was a series of projects, including Fleet Road, Alexandra Road, Highgate New Town, Branch Hill and Maiden Lane, designed by members of Cook’s team, including Neave Brown, Peter Tábori and Gordon Benson and Alan Forsyth, as well as projects designed by up-and-coming private architects like Colquhoun & Miller, Edward Cullinan and Farrell Grimshaw. …”
Get full text
Article -
33914
Research on dynamic cooperative technology of manned and unmanned networked information system
Published 2023-07-01“…To meet the needs of information security sharing and systematic dynamic cooperation of manned and unmanned formations and to build a dynamic communication network, firstly, a networked high-precision system time synchronization scheme was designed, using integrated network link management strategy and wireless channel on-demand preference algorithm, and the time synchronization accuracy could be up to 100 nanosecond level.Secondly, a data privacy protection and secure sharing solution for airborne networks was built, implementing communication data security of manned and unmanned formation, and analyzing and discussing the performance and security to prove that the proposed solution has a provable high security strength.Meanwhile, a dynamic cooperation model of manned and unmanned formation was designed to discover, authenticate and revoke each node in real time, perform legitimacy identity verification, optimize allocation scheme for multi-objective information acquisition through multi-machine collaborative construction, differentiated data was used to transmit synchronize data, save network resources, improve data transmission efficiency, and meet the demand of systematic cooperative operations.…”
Get full text
Article -
33915
Optimal Control of Semiactive Two-Stage Vibration Isolation Systems for Marine Engines
Published 2021-01-01“…The optimal controller taking the minimum force transmitted from the engine to base as the control objective is designed. The system model and numerical simulation analysis are established using MATLAB. …”
Get full text
Article -
33916
Prevention and Detection Research of Intelligent Sports Rehabilitation under the Background of Artificial Intelligence
Published 2022-01-01“…In the inner loop, a sliding mode iterative learning controller is designed to suppress periodic disturbance and abnormal jitter and achieve stable tracking of the target trajectory. …”
Get full text
Article -
33917
Grouping Formation and Obstacle Avoidance Control of UAV Swarm Based on Synchronous DMPC
Published 2024-01-01“…Finally, the effectiveness of the designed algorithm and its superiority in obstacle avoidance are verified through simulations.…”
Get full text
Article -
33918
Massive access technology in 6G cellular Internet of things network
Published 2020-03-01“…To realize Internet of everything (IoE),the 6G cellular Internet of things (IoT) network need to provide wireless access with low power,massive connectivity and wide coverage.Through the analysis and research on the massive access technology in 6G cellular IoT network,especially in combination with the sporadic characteristics of IoT applications,a new access framework based on the grant-free random access protocol was designed to facilitate efficient massive access with limited spectrum resources.The proposed framework consisted of two phases.One was joint activity detection and channel estimation.The other was data transmission,which was divided into two categories,uplink data transmission and downlink data transmission,according to the different directions of data transmission.Due to the uncertainty of channel state information at the base station under the massive grant-free random access and considering the low power demand of 6G IoT devices,two robust uplink and downlink access algorithms were designed by maximizing the system energy efficiency.Extensive simulation results validate the effectiveness and robustness of the proposed algorithm.…”
Get full text
Article -
33919
Pairing-free certificateless blockchain-based access authentication method for spatial information network
Published 2024-08-01“…Furthermore, a certificateless public key without pairing and elliptic curve hybrid encryption algorithm based on blockchain was proposed, and an access authentication mechanism was designed to ensure the security of the access authentication process and the traceability of operations. …”
Get full text
Article -
33920
Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph
Published 2021-01-01“…Aiming at the problem of complex multi-step attack detection, the method of attack scenario construction oriented to cloud computing environment was studied.Firstly, a dynamic probabilistic attack graph model was constructed, and a probabilistic attack graph updating algorithm was designed to make it update periodically with the passage of time and space, so as to adapt to the elastic and dynamic cloud computing environment.Secondly, an attack intention inference algorithm and a maximum probability attack path inference algorithm were designed to solve the uncertain problems such as error and fracture of attack scenarios caused by false positive or false negative, and ensure the accuracy of attack scenario.Meanwhile, the attack scenario was dynamically evolved along with the dynamic probability attack graph to ensure the completeness and freshness of the attack scenario.Experimental results show that the proposed method can adapt to the elastic and dynamic cloud environment, restore the penetration process of attacker’s and reconstruct high-level attack scenario, and so provide certain references for building supervised and accountable cloud environment.…”
Get full text
Article