Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
34781
Rethinking Indonesian Anti-Money Laundering Laws in the Age of Online Gaming Economies
Published 2024-10-01“…Indonesia’s Anti-Money Laundering (AML) laws were originally designed to combat traditional financial crimes; however, the rise of virtual items in online gaming economies presents new challenges. …”
Get full text
Article -
34782
An Artificial Intelligence Approach for Verifying Persons by Employing the Deoxyribonucleic Acid (DNA) Nucleotides
Published 2023-01-01“…It utilizes a unique identity for each person acquired from DNA nucleotides, and it can verify individuals efficiently with high performance. The ADAR has been designed and applied to multiple datasets, namely, the DNA classification (DC), sample DNA sequence (SDS), human DNA sequences (HDS), and DNA sequences (DS). …”
Get full text
Article -
34783
Kinematics Analysis of 1T3R Parallel Mechanism with Decoupling-reducing Structure based on Hybrid Drive
Published 2019-07-01“…Based on the position feature set theory and decoupling principle of parallel mechanism, a new kind of structure decoupled parallel mechanism with hybrid driving and local motion decoupling is designed and its movement is one translation and three rotations (1T3R). …”
Get full text
Article -
34784
DDoS attack detection and defense based on hybrid deep learning model in SDN
Published 2018-07-01“…Software defined network (SDN) is a new kind of network technology,and the security problems are the hot topics in SDN field,such as SDN control channel security,forged service deployment and external distributed denial of service (DDoS) attacks.Aiming at DDoS attack problem of security in SDN,a DDoS attack detection method called DCNN-DSAE based on deep learning hybrid model in SDN was proposed.In this method,when a deep learning model was constructed,the input feature included 21 different types of fields extracted from the data plane and 5 extra self-designed features of distinguishing flow types.The experimental results show that the method has high accuracy,it’s better than the traditional support vector machine (SVM) and deep neural network (DNN) and other machine learning methods.At the same time,the proposed method can also shorten the processing time of classification detection.The detection model is deployed in SDN controller,and the new security policy is sent to the OpenFlow switch to achieve the defense against specific DDoS attack.…”
Get full text
Article -
34785
Non-Orthogonality of QAM and Sunflower-like Modulated Coherent-State Signals
Published 2025-01-01“…The findings provide valuable insights for designing useful quantum signal constellations.…”
Get full text
Article -
34786
Lithuanian Language Curricula
Published 2024-03-01“…We know the authors of the first two curricula: the curriculum for the academic year 1905–1906 at Panevėžys Teacher Training Seminary was designed by Vladimiras Lukinas, and the following year, the curriculum for the same seminary was developed by Jonas Jablonskis. …”
Get full text
Article -
34787
Federated edge learning model based on multi-level proxy permissioned blockchain
Published 2024-04-01“…The multi-level proxy permission blockchain was designed to establish a trusted underlying environment for federated edge learning, and the hierarchical model aggregation scheme was implemented to alleviate the pressure of model training. …”
Get full text
Article -
34788
Research on resource allocation algorithm of centralized and distributed Q-learning in machine communication
Published 2021-11-01“…Under the premise of ensuring partial machine type communication device (MTCD)’s quality of service (QoS) requirements, the resource allocation problem was studied with the goal of maximizing system throughput in the massive machine type communication (mMTC) scenario.Two resource allocation algorithms based on Q-learning were proposed: centralized Q-learning algorithm (team-Q) and distributed Q-learning algorithm (dis-Q).Firstly, taking into account MTCD’s geographic location and multi-level QoS requirements, a clustering algorithm based on cosine similarity (CS) was designed.In the clustering algorithm, multi-dimensional vectors that represent MTCD and data aggregator (DA) were constructed, and MTCDs can be grouped according to the CS value between multi-dimensional vectors.Then in the MTC network, the team-Q learning algorithm and dis-Q learning algorithm were used to allocate resource blocks and power for the MTCD.In terms of throughput performance, team-Q and dis-Q algorithms have an average increase of 16% and 23% compared to the dynamic resource allocation algorithm and the greedy algorithm, respectively.In terms of complexity performance, the dis-Q algorithm is only 25% of team-Q algorithm and even below, the convergence speed is increased by nearly 40%.…”
Get full text
Article -
34789
Reliability Evaluation of Pavement Life-Cycle Assessment Model
Published 2018-01-01“…The functional equivalent pavement structures were designed, and the corresponding energy consumption and CO2 emission were calculated by the LCA model. …”
Get full text
Article -
34790
Weakly Supervised Real-Time Object Detection Based on Salient Map Extraction and the Improved YOLOv5 Model
Published 2022-01-01“…An improved YOLOv5 model is proposed to transfer clear target features to deeper network layers by designing a jump connection operation, thereby solving the problem of feature ambiguity. …”
Get full text
Article -
34791
How to Assess Whether Qualified Evaluations of e-Government Projects Are Conducted? The Case of Slovenia
Published 2015-12-01“…Using these 13 parameters and 7 additional questions about the knowledge and use of evalution methods a questionnaire was designed and applied in a survey on Slovenian public administration. …”
Get full text
Article -
34792
Research on Business Requirement Analysis and Network Architecture of CDN for Power Grid
Published 2015-05-01“…The CDN network safety protection requirements were analyzed;the electric power CDN control platform and the electric power CDN test bed were designed and developed.…”
Get full text
Article -
34793
A Lightweight Conditional Diffusion Segmentation Network Based on Deformable Convolution for Surface Defect Detection
Published 2025-01-01“…Second, the efficient feature extraction block is proposed to address the problem of modeling varying defects, which is designed with a partial deformable convolutional layer that can fully extract geometric features of the diverse defects to further enhance the modeling power of the proposed network. …”
Get full text
Article -
34794
Study on adaptive modulation in D2D communications over Nakagami-m fading channel
Published 2018-09-01“…A novel adaptive modulation based on nondata-aided error vector magnitude (NDA-EVM) was proposed to solve the problem of lower spectral efficiency in device to device (D2D) communication over Nakagami-m fading channel.The NDA-EVM was used to evaluate the channel quality.The relationship between NDA-EVM and symbol error ratio (SER) was derived according to the maximum likelihood method.Thereafter,the adaptive modulation mechanism of MQAM with the SER constraint was designed.Considering the joint effect of finite-length queuing and fading channel,the system packet loss rate and spectral efficiency was analyzed.Theoretical analysis and simulation experiments show that NDA-EVM based adaptive modulation accurately gives the modulation threshold and evaluates the relationship between QoS and packet loss rate,the proposed algorithm improves system spectral efficiency while maintaining low algorithm complexity,spectral efficiency improves by 0.752 bit·(s·Hz)<sup>-1</sup>,compared with traditional algorithm.…”
Get full text
Article -
34795
Optimal Method for Allocation of Tractors and Trailers in Daily Dispatches of Road Drops and Pull Transport
Published 2022-01-01“…Focusing on this mixed integer nonlinear problem, an improved ant search algorithm is designed. Finally, with Sichuan’s Anji Logistics Enterprise as the background, this tractor scheduling optimization model is applied to an ideal network and a real scenario. …”
Get full text
Article -
34796
MULTI-OBJECTIVE PARAMETER OPTIMIZATION OF μ-EDM ON GREY RELATIONAL ANALYSIS AND ENTROPY WEIGHT METHOD (MT)
Published 2023-01-01“…In order to meet the requirements of machining accuracy indexes such as the entry, exit and shape of micro-hole, a multi-objective parameter optimization weigh method for micro electrical discharge machining(EDM) based on grey relational analysis(GRA) and entropy weight method is proposed.By designing orthogonal experiment and processing test for H62 brass, the grey relational coefficient of each index of the experiment result sequence is calculated.The entropy weight method and grey relational analysis method are used to comprehensively evaluate the model, and the grey relational degree of each experiment sequence is obtained, and the mean value analysis is carried out to realize the transformation from multi-objective optimization to single objective optimization.The research results show that the entry Overcut(EnOV), exit Overcut(ExOV) and taper(TA) of the optimized process parameters are reduced by 8.97%, 4.11% and 8.33% respectively compared with those of the H-22 group with the largest grey relational degree, and the machining accuracy of micropores is improved.…”
Get full text
Article -
34797
Nonalternant Extension of Multiple Resonance Emitter via Palladium-Catalyzed [5+2]-Annulation
Get full text
Article -
34798
Syntactic and Prosodic Forms of First Names in Institutional Interaction Involving Multiple Participants
Published 2013-12-01“…After asking a question as a sequence-initiating action, the teacher or host designates the next speaker by name. The use of first names is situatedly examined in terms of turn-taking organization and prosodic characteristics. …”
Get full text
Article -
34799
Maintaining Wireless Connectivity Constraints for Robot Swarms in the Presence of Obstacles
Published 2011-01-01“…Given a swarm of point robots with specified initial and final configurations and a set of desired communication links consistent with the above criteria, we explore the problem of designing inputs to achieve the final configuration while preserving the desired links for the duration of the motion. …”
Get full text
Article -
34800
PDO Economy and Quality Agri-Food District in the wine sector: Blockchain and digitalization as tools for the twin transition
Published 2024-12-01“…The twin transition has great potential for the development of the wine sector, although its benefits for the valorisation of the Protected Designation of Origin (PDO) economy and at the quality districts level are not explored in depth either in the theoretical or empirical literature. …”
Get full text
Article