Showing 34,781 - 34,800 results of 41,732 for search '"Design"', query time: 0.20s Refine Results
  1. 34781

    Rethinking Indonesian Anti-Money Laundering Laws in the Age of Online Gaming Economies by Shelvi Rusdiana, Tantimin, Winda Fitri

    Published 2024-10-01
    “…Indonesia’s Anti-Money Laundering (AML) laws were originally designed to combat traditional financial crimes; however, the rise of virtual items in online gaming economies presents new challenges. …”
    Get full text
    Article
  2. 34782

    An Artificial Intelligence Approach for Verifying Persons by Employing the Deoxyribonucleic Acid (DNA) Nucleotides by Raid Rafi Omar Al-Nima, Marwa Mawfaq Mohamedsheet Al-Hatab, Maysaloon Abed Qasim

    Published 2023-01-01
    “…It utilizes a unique identity for each person acquired from DNA nucleotides, and it can verify individuals efficiently with high performance. The ADAR has been designed and applied to multiple datasets, namely, the DNA classification (DC), sample DNA sequence (SDS), human DNA sequences (HDS), and DNA sequences (DS). …”
    Get full text
    Article
  3. 34783

    Kinematics Analysis of 1T3R Parallel Mechanism with Decoupling-reducing Structure based on Hybrid Drive by Guowang Chen, Li Du, Linxian Che, Junkun Hong, Mafei Bao

    Published 2019-07-01
    “…Based on the position feature set theory and decoupling principle of parallel mechanism, a new kind of structure decoupled parallel mechanism with hybrid driving and local motion decoupling is designed and its movement is one translation and three rotations (1T3R). …”
    Get full text
    Article
  4. 34784

    DDoS attack detection and defense based on hybrid deep learning model in SDN by Chuanhuang LI, Yan WU, Zhengzhe QIAN, Zhengjun SUN, Weiming WANG

    Published 2018-07-01
    “…Software defined network (SDN) is a new kind of network technology,and the security problems are the hot topics in SDN field,such as SDN control channel security,forged service deployment and external distributed denial of service (DDoS) attacks.Aiming at DDoS attack problem of security in SDN,a DDoS attack detection method called DCNN-DSAE based on deep learning hybrid model in SDN was proposed.In this method,when a deep learning model was constructed,the input feature included 21 different types of fields extracted from the data plane and 5 extra self-designed features of distinguishing flow types.The experimental results show that the method has high accuracy,it’s better than the traditional support vector machine (SVM) and deep neural network (DNN) and other machine learning methods.At the same time,the proposed method can also shorten the processing time of classification detection.The detection model is deployed in SDN controller,and the new security policy is sent to the OpenFlow switch to achieve the defense against specific DDoS attack.…”
    Get full text
    Article
  5. 34785

    Non-Orthogonality of QAM and Sunflower-like Modulated Coherent-State Signals by Kentaro Kato

    Published 2025-01-01
    “…The findings provide valuable insights for designing useful quantum signal constellations.…”
    Get full text
    Article
  6. 34786

    Lithuanian Language Curricula by Giedrė Čepaitienė

    Published 2024-03-01
    “…We know the authors of the first two curricula: the curriculum for the academic year 1905–1906 at Panevėžys Teacher Training Seminary was designed by Vladimiras Lukinas, and the following year, the curriculum for the same seminary was developed by Jonas Jablonskis. …”
    Get full text
    Article
  7. 34787

    Federated edge learning model based on multi-level proxy permissioned blockchain by GE Li’na, LI Haiao, WANG Jie

    Published 2024-04-01
    “…The multi-level proxy permission blockchain was designed to establish a trusted underlying environment for federated edge learning, and the hierarchical model aggregation scheme was implemented to alleviate the pressure of model training. …”
    Get full text
    Article
  8. 34788

    Research on resource allocation algorithm of centralized and distributed Q-learning in machine communication by Yunhe YU, Jun SUN

    Published 2021-11-01
    “…Under the premise of ensuring partial machine type communication device (MTCD)’s quality of service (QoS) requirements, the resource allocation problem was studied with the goal of maximizing system throughput in the massive machine type communication (mMTC) scenario.Two resource allocation algorithms based on Q-learning were proposed: centralized Q-learning algorithm (team-Q) and distributed Q-learning algorithm (dis-Q).Firstly, taking into account MTCD’s geographic location and multi-level QoS requirements, a clustering algorithm based on cosine similarity (CS) was designed.In the clustering algorithm, multi-dimensional vectors that represent MTCD and data aggregator (DA) were constructed, and MTCDs can be grouped according to the CS value between multi-dimensional vectors.Then in the MTC network, the team-Q learning algorithm and dis-Q learning algorithm were used to allocate resource blocks and power for the MTCD.In terms of throughput performance, team-Q and dis-Q algorithms have an average increase of 16% and 23% compared to the dynamic resource allocation algorithm and the greedy algorithm, respectively.In terms of complexity performance, the dis-Q algorithm is only 25% of team-Q algorithm and even below, the convergence speed is increased by nearly 40%.…”
    Get full text
    Article
  9. 34789

    Reliability Evaluation of Pavement Life-Cycle Assessment Model by Jiale Huang, Fei Xiao, Yang Zhang

    Published 2018-01-01
    “…The functional equivalent pavement structures were designed, and the corresponding energy consumption and CO2 emission were calculated by the LCA model. …”
    Get full text
    Article
  10. 34790

    Weakly Supervised Real-Time Object Detection Based on Salient Map Extraction and the Improved YOLOv5 Model by Yue Ma, Zhuangzhi Zhi

    Published 2022-01-01
    “…An improved YOLOv5 model is proposed to transfer clear target features to deeper network layers by designing a jump connection operation, thereby solving the problem of feature ambiguity. …”
    Get full text
    Article
  11. 34791

    How to Assess Whether Qualified Evaluations of e-Government Projects Are Conducted? The Case of Slovenia by Jože Benčina, Tina Jukić

    Published 2015-12-01
    “…Using these 13 parameters and 7 additional questions about the knowledge and use of evalution methods a questionnaire was designed and applied in a survey on Slovenian public administration. …”
    Get full text
    Article
  12. 34792

    Research on Business Requirement Analysis and Network Architecture of CDN for Power Grid by Yirong Wang, Sining Wang, Ying Zou, Botao Yu

    Published 2015-05-01
    “…The CDN network safety protection requirements were analyzed;the electric power CDN control platform and the electric power CDN test bed were designed and developed.…”
    Get full text
    Article
  13. 34793

    A Lightweight Conditional Diffusion Segmentation Network Based on Deformable Convolution for Surface Defect Detection by Jiusheng Chen, Yibo Zhao, Haibing Wang

    Published 2025-01-01
    “…Second, the efficient feature extraction block is proposed to address the problem of modeling varying defects, which is designed with a partial deformable convolutional layer that can fully extract geometric features of the diverse defects to further enhance the modeling power of the proposed network. …”
    Get full text
    Article
  14. 34794

    Study on adaptive modulation in D2D communications over Nakagami-m fading channel by Xiaoping ZENG, Haiwei MAO, Fan YANG, Xin JIAN, Shiqi LI, Xin JIANG, Wei FANG

    Published 2018-09-01
    “…A novel adaptive modulation based on nondata-aided error vector magnitude (NDA-EVM) was proposed to solve the problem of lower spectral efficiency in device to device (D2D) communication over Nakagami-m fading channel.The NDA-EVM was used to evaluate the channel quality.The relationship between NDA-EVM and symbol error ratio (SER) was derived according to the maximum likelihood method.Thereafter,the adaptive modulation mechanism of MQAM with the SER constraint was designed.Considering the joint effect of finite-length queuing and fading channel,the system packet loss rate and spectral efficiency was analyzed.Theoretical analysis and simulation experiments show that NDA-EVM based adaptive modulation accurately gives the modulation threshold and evaluates the relationship between QoS and packet loss rate,the proposed algorithm improves system spectral efficiency while maintaining low algorithm complexity,spectral efficiency improves by 0.752 bit·(s·Hz)<sup>-1</sup>,compared with traditional algorithm.…”
    Get full text
    Article
  15. 34795

    Optimal Method for Allocation of Tractors and Trailers in Daily Dispatches of Road Drops and Pull Transport by Hao Chen, Wenxian Wang, Birong Cheng, Min Zhou

    Published 2022-01-01
    “…Focusing on this mixed integer nonlinear problem, an improved ant search algorithm is designed. Finally, with Sichuan’s Anji Logistics Enterprise as the background, this tractor scheduling optimization model is applied to an ideal network and a real scenario. …”
    Get full text
    Article
  16. 34796

    MULTI-OBJECTIVE PARAMETER OPTIMIZATION OF μ-EDM ON GREY RELATIONAL ANALYSIS AND ENTROPY WEIGHT METHOD (MT) by MO YuanDong, LIAN HaiShan, WANG YaZhi, HUANG ShuQi, ZHONG JiaJun

    Published 2023-01-01
    “…In order to meet the requirements of machining accuracy indexes such as the entry, exit and shape of micro-hole, a multi-objective parameter optimization weigh method for micro electrical discharge machining(EDM) based on grey relational analysis(GRA) and entropy weight method is proposed.By designing orthogonal experiment and processing test for H62 brass, the grey relational coefficient of each index of the experiment result sequence is calculated.The entropy weight method and grey relational analysis method are used to comprehensively evaluate the model, and the grey relational degree of each experiment sequence is obtained, and the mean value analysis is carried out to realize the transformation from multi-objective optimization to single objective optimization.The research results show that the entry Overcut(EnOV), exit Overcut(ExOV) and taper(TA) of the optimized process parameters are reduced by 8.97%, 4.11% and 8.33% respectively compared with those of the H-22 group with the largest grey relational degree, and the machining accuracy of micropores is improved.…”
    Get full text
    Article
  17. 34797

    Nonalternant Extension of Multiple Resonance Emitter via Palladium-Catalyzed [5+2]-Annulation by Weiwen Zhuang, Waiming Chong, Junzhi Liu

    “…Here, a green-yellow emitter consisting of two azepines was designed and synthesized via a palladium-catalyzed one-pot twofold [5+2]-annulation reaction with high selectivity and efficiency. …”
    Get full text
    Article
  18. 34798

    Syntactic and Prosodic Forms of First Names in Institutional Interaction Involving Multiple Participants by Dimitri Voilmy, Mari Wiklund

    Published 2013-12-01
    “…After asking a question as a sequence-initiating action, the teacher or host designates the next speaker by name. The use of first names is situatedly examined in terms of turn-taking organization and prosodic characteristics. …”
    Get full text
    Article
  19. 34799

    Maintaining Wireless Connectivity Constraints for Robot Swarms in the Presence of Obstacles by Joel M. Esposito

    Published 2011-01-01
    “…Given a swarm of point robots with specified initial and final configurations and a set of desired communication links consistent with the above criteria, we explore the problem of designing inputs to achieve the final configuration while preserving the desired links for the duration of the motion. …”
    Get full text
    Article
  20. 34800

    PDO Economy and Quality Agri-Food District in the wine sector: Blockchain and digitalization as tools for the twin transition by Graziella Benedetto, Maria Bonaventura Forleo

    Published 2024-12-01
    “…The twin transition has great potential for the development of the wine sector, although its benefits for the valorisation of the Protected Designation of Origin (PDO) economy and at the quality districts level are not explored in depth either in the theoretical or empirical literature. …”
    Get full text
    Article