Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
34281
Forecast uncertainties real-time data-driven compensation scheme for optimal storage control
Published 2025-03-01“…This study introduces a real-time data-driven battery management scheme designed to address uncertainties in load and generation forecasts, which are integral to an optimal energy storage control system. …”
Get full text
Article -
34282
About Innovative Content of Subject-Oriented Pedagogical Education
Published 2019-11-01“…The effectiveness of this model is confirmed by the high level of students’ mastery of designing methods and constructing the educational process, as well as their positive experience in the implementation of educational activities.…”
Get full text
Article -
34283
Position/Force Tracking Impedance Control for Robotic Systems with Uncertainties Based on Adaptive Jacobian and Neural Network
Published 2019-01-01“…Then, a robust term is designed to compensate the external disturbances and the approximation errors of RBFNN. …”
Get full text
Article -
34284
Multiple redundant flow fingerprint model based on time slots
Published 2023-02-01“…With the increasingly widespread use of the Internet, various network security problems are frequently exposed, while the “patching” style security enhancement mechanisms cannot effectively prevent the growing security risks.The researchers in the field of network security believe that the future Internet architecture should take security as a basic attribute to provide the native security support which is also called as endogenous safety and security.In order to support the data trustworthiness of endogenous security, a time-slot based multiple redundant flow fingerprint model was designed and implemented based on the research of the watermark (or fingerprint) mechanism.The proposed model used only three time slot intervals and operated the packets within the specified time slots, so that the fingerprint can be embedded without conflicting with the adjacent bit operations.Redundant coding was introduced to improve the fingerprint robustness, and the behaviors such as jitter or malicious disruptions by attackers in the network were considered.Furthermore, the impacts of delayed interference, spam packet interference and packet loss interference were analyzed.The analytical results show that the robustness of the fingerprint model improves with increasing redundant bits when the packet distribution in the network stream is given.Besides, in order to reduce the consumption of time and space and improve the efficiency and accuracy of packet operations, a flow fingerprinting prototype system was designed and implemented based on the kernel, and its efficiency and robustness were evaluated.The experimental result show that the model has high robustness.Additionally, the application scenario of the model was elaborated, which can effectively detect man-in-the-middle attacks and prevent network identity spoofing with the help of the flow fingerprinting model.…”
Get full text
Article -
34285
Optimal Scheme for Process Quality and Cost Control by Integrating a Continuous Sampling Plan and the Process Yield Index
Published 2018-01-01“…The single level continuous sampling plan (CSP-1) is an in-line process control tool that has been commonly adopted in various manufacturing industries. However, CSP-1 is designed for only satisfying the quality constraint. …”
Get full text
Article -
34286
Seismic vulnerability analysis of reinforced concrete frame with infill wall considering in-plane and out-of-plane interactions
Published 2022-09-01“…Based on the test data on masonry infill walls, this paper designs a performance indicator for infill wall in the light of IP-OOP interactions, and determines the response threshold of each damage state. …”
Get full text
Article -
34287
Re-evaluation of the Bahariya Formation carcharodontosaurid (Dinosauria: Theropoda) and its implications for allosauroid phylogeny.
Published 2025-01-01“…In 1996, a relatively complete carcharodontosaurid cranium was described from similar aged rocks in Morocco and designated the neotype of the species Carcharodontosaurus saharicus in 2007. …”
Get full text
Article -
34288
A Modular Step-Up DC–DC Converter Based on Dual-Isolated SEPIC/Cuk for Electric Vehicle Applications
Published 2025-01-01“…The modular DC–DC boost converter proposed in this paper is designed to achieve a high voltage step-up ratio for the input FC voltages through the use of isolated series-connecting boosting submodules connected. …”
Get full text
Article -
34289
The function of the indicative, structural, evaluative, and characteristic criteria in the analysis of the generative process of meaning and signification in linguistic and literar...
Published 2021-06-01“…In spite of the distinction between the "designation of meaning" based on Saussure's semiotic theory and the "lack of designation of meaning," based on the belief in the dark layers and the mystery of the text, it seems according to structuralism, semiotic theories of Saussure and post-structuralism can achieve an understanding of the literary text and the process of meaning emergence and criteria in the linguistic structures and literary signs of the text and difference between word level to meaning in linguistic work and sign to meaning in literary work. …”
Get full text
Article -
34290
Clustering and Prediction Analysis of the Coordinated Development of China’s Regional Economy Based on Immune Genetic Algorithm
Published 2021-01-01“…According to the characteristics of the model, an improved immune genetic algorithm is designed to solve the problem, and the effectiveness of the immune genetic algorithm is verified through an example.…”
Get full text
Article -
34291
Systematic Review into Diagnostics for Post-Kala-Azar Dermal Leishmaniasis (PKDL)
Published 2013-01-01“…Only a few of these studies reported a valid estimate of diagnostic accuracy, as most were case-control designs or used a reference standard with low sensitivity. …”
Get full text
Article -
34292
Systemic Impacts of National Civilized Cities on Sustainable Development: A Quasi-Experimental Analysis of Economic and Environmental Outcomes in China
Published 2025-01-01“…This paper explores the systemic relationship between urban civilization initiatives and economic prosperity by examining the economic impact of China’s “National Civilized City” (NCC) designation. We begin by synthesizing literature that addresses the complex interactions between urban development and environmental sustainability, emphasizing a systems approach. …”
Get full text
Article -
34293
Modeling the Effects of Formulary Exclusions: How Many Patients Could Be Affected by a Specific Exclusion?
Published 2024-03-01“…**Background:** Medication formularies, initially designed to promote the use of cost-effective generic drugs, are now designed to maximize financial benefits for the pharmacy benefit management companies that negotiate purchase prices. …”
Get full text
Article -
34294
A method for locating fault sections of power optical communication network intelligent operation and maintenance equipment off-grid based on Dijkstra algorithm
Published 2023-01-01“…In order to determine the mapping relationship between the off grid fault section and the fault current distribution, and find the shortest path between the off grid fault section and the fault current distribution, an off grid fault section location method based on Dijkstra algorithm was designed for the intelligent O&M equipment of the electro-optical communication network.The LightGBM algorithm in the data-driven method was selected to determine the mapping relationship between the off grid fault section and the fault current distribution through a large number of samples.Based on Dijkstra algorithm, the shortest path of mapping relationship was found, and the off network fault section was searched.The location platform for off grid fault section of intelligent operation and maintenance equipment of power optical communication network was designed to realize the location and alarm of off grid fault point, namely, signal loss of intelligent operation and maintenance equipment.The comparison experiment shows that the location result of this method was the closest to the actual location and the most accurate in the off network fault section location caused by the interruption of optical cable in the SDH ring network circuit area, the off network fault section location caused by the fault of optical cable in the multi way bus section, and the off network fault section location scenario caused by the fault of optical cable in the multi way bus section in the ring power area.It effectively improved the accuracy of fault location and has good applicability.…”
Get full text
Article -
34295
Optimal Limb Length Ratio of Quadruped Robot Minimising Joint Torque on Slopes
Published 2009-01-01“…For the same reason, a robot’s structure needs to be suitably designed for locomotion in its working environment. …”
Get full text
Article -
34296
THE DRAMATIC APPROACH OF I. HOFFMAN IN STRUCTURING THE SPACE OF FASHION
Published 2016-06-01“…A concrete material, where the action of the concept is demonstrated, it is the demonstration of clothing on seasonal fashion shows of designer`s collection. The methodology is the dramatic approach of I. …”
Get full text
Article -
34297
A Modified Dijkstra Algorithm for ROS Based Autonomous Mobile Robots
Published 2023-03-01“…In this study, an AMR was designed to execute different path planning algorithms. …”
Get full text
Article -
34298
Active Fault Tolerant Control Based on a Novel Tracking Differentiator for Elevating Stage Control System
Published 2018-01-01“…The simulation results show that the fault diagnosis method is simple and timely, the designed tracking differentiator is fast and effective, and the effect of the fault tolerant control based on smooth switching strategy is also satisfactory.…”
Get full text
Article -
34299
Bidirectional measurement differential positioning method for LEO communication satellites
Published 2024-04-01“…In scenarios such as direct-to-handset satellite, terminal designs were often configured to communicate with only one satellite, making the exploration of single-satellite positioning methods of urgent significance. …”
Get full text
Article -
34300
Investigating fraction computation problem-solving among pre-service primary school teachers
Published 2024-10-01“…This study explores how Pre-Service Primary School Teachers approach problem-solving in fractional computations. A workbook is designed to support pre-service primary school teachers ' computational thinking in fraction-context challenges. …”
Get full text
Article