Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
34801
The discernibility approach for multi-granulation reduction of generalized neighborhood decision information systems
Published 2024-12-01“…Then, the multi-granulation reduction of GNDISs by the discernibility tool provided a theoretical foundation for designing algorithms of multi-granulation reduction of DISs.…”
Get full text
Article -
34802
Argentine ant, Linepithema humile (Mayr) (Insecta: Hymenoptera: Formicidae)
Published 2021-09-01“…Linepithema humile has been designated as a tramp ant species, meaning that it has an incredible ability to spread and establish in new areas and is difficult to control. …”
Get full text
Article -
34803
Applying Noise-Based Reverse Correlation to Relate Consumer Perception to Product Complex Form Features
Published 2022-01-01“…Consumer behavior knowledge is essential to designing successful products. However, measuring subjective perceptions affecting this behavior is a complex issue that depends on many factors. …”
Get full text
Article -
34804
Cooperative Control of Multistation Passenger Inflows in Case of Irregular Large-Scale Passenger Flows
Published 2022-01-01“…An improved particle swarm optimization algorithm was designed to determine an optimal solution, and a case study on the Chengdu metro in China was carried out to examine the performance of the model. …”
Get full text
Article -
34805
Potential Adverse Consequences of Combination Therapy with Gabapentin and Pregabalin
Published 2021-01-01“…Gabapentinoids comprise the medications gabapentin and pregabalin. These were designed to not only look chemically like the central inhibitory neurotransmitter gamma-aminobutyric acid (GABA) but also act like it. …”
Get full text
Article -
34806
Lightweight face image restoration algorithm based on multi-scale feature fusion
Published 2024-08-01“…Secondly, a multi-scale feature attention fusion module was designed in the jump connection to fully fuse the information of different scale features, and the embedded residual block reduced the semantic gap between features to improve the repair accuracy of the model. …”
Get full text
Article -
34807
Identification of Early Citrus Black Spot Symptoms (Identificacíon de los Síntomas Iniciales de la Mancha Negra de los Cítricos)
Published 2018-08-01“… This identification sheet was designed to assist packinghouse employees to identify the early yet subtle symptoms of citrus black spot. …”
Get full text
Article -
34808
Stiffness Adjustment Analysis of Continuous Origami Manipulators
Published 2023-07-01“…Aiming at the stiffness adjustment of the continuous manipulator designed by the deformed Miura origami mechanism, the influence of geometric parameters on the stiffness of the origami robot arm is discussed. …”
Get full text
Article -
34809
Support models for sustainable development of small cities
Published 2023-09-01“…The practical significance of the study lies in the possibility of using proposals for designing programs and projects for small cities’ development.…”
Get full text
Article -
34810
ABAC access control policy generation technique based on deep learning
Published 2020-12-01“…To solve the problem of automatic generation of access control policies, an access control policy generation framework based on deep learning was proposed.Access control policy based on attributes could be generated from natural language texts.This technology could significantly reduce the time cost of access control policy generation and provide effective support for the implementation of access control.The policy generation problem was decomposed into two core tasks, identification of access control policy sentence and access control attribute mining.Neural network models such as BiGRU-CNN-Attention and AM-BiLSTM-CRF were designed respectively to realize identification of access control policy sentence and access control attribute mining, so as to generate readable and executable access control policies.Experimental results show that the proposed method has better performance than the benchmark method.In particular, the average F1-score index can reach 0.941 in the identification task of access control policy sentence, which is 4.1% better than the current state-of-the-art method.…”
Get full text
Article -
34811
BLSENet: A Novel Lightweight Bilinear Convolutional Neural Network Based on Attention Mechanism and Feature Fusion Strategy for Apple Leaf Disease Classification
Published 2024-01-01“…To solve this problem, a lightweight bilinear convolutional neural network (CNN) model named BLSENet based on attention mechanism is designed. The model consists of two subnetworks, and each subnetwork is embedded with a Squeeze-and-Excitation (SE) module. …”
Get full text
Article -
34812
Volunteering as a Form of Students’ Educational Activities in the Context of the University’s Third Mission
Published 2021-09-01“…Volunteering in the educational process is understood as students’ gratuitous activities aimed at solving urgent social problems and designed to increase students’ social and civic activity. …”
Get full text
Article -
34813
Integrative Teaching Strategy for Developing Writing Skills in Non-Linguistics Master Students
Published 2020-06-01“…The suggested strategy provides a theoretical foundation for designing an integrated teaching strategy that incorporates three basic components: teaching writing skills and subskills in a foreign language, using an online teaching platform, and the universality of the scientific language that underlies scientists’ professional communication all over the world. …”
Get full text
Article -
34814
Research on meaningful image encryption algorithm based on 2-dimensional compressive sensing
Published 2022-05-01“…Aiming at the problems that the existing compressive sensing-based meaningful image encryption algorithms have low visual security of the encrypted images and poor quality of the reconstructed images, a 2-dimensional compressive sensing-based (2DCS) meaningful image encryption algorithm was proposed.Firstly, a chaotic pseudo-random sequence generation method associated with plaintext was designed, and the global random permutation and grayscale transformation operations were used for pre-encryption to improve the decrypted image quality.The generated pre-encrypted image was used as the input for 2DCS, and the secret image was generated after the compression encryption and quantization operations.Secondly, the relationship between the hidden and the modified data was considered, and an adaptive embedding method was adopted to modify the carrier coefficient values to improve the visual security of meaningful encrypted image.Finally, the 2-dimensional projection gradient reconstruction method was adopted to decompress and decrypt to obtain the decrypted image.The experimental results show that, compared with the existing algorithms, the proposed algorithm not only improves the visual security of encrypted image and the quality of reconstructed image, but also can resist noise and cropping attacks.…”
Get full text
Article -
34815
EMPIRICAL STUDY OF INFLUENCE OF FINANCIAL INNOVATION ON ORGANISATIONAL PERFORMANCE OF SELECTED NIGERIAN INSURANCE COMPANIES
Published 2023-11-01“…The data collection instruments for the study were structured questionnaires designed for the study. Path Analysis was used to analyse the data. …”
Get full text
Article -
34816
Investigation of Flow Behavior around Corotating Blades in a Double-Spindle Lawn Mower Deck
Published 2005-01-01“…To learn more, a combination of computational and experimental studies was performed to investigate the effects of blade and housing designs on a flow pattern inside a <math alttext="1.1un{m}"> <mn>1.1</mn><mtext>m</mtext> </math> wide corotating double-spindle lawn mower deck with side discharge. …”
Get full text
Article -
34817
Multivariate Image Analysis Applied to Cross-Laminated Timber: Combined Hyperspectral Near-Infrared and X-ray Computed Tomography
Published 2023-01-01“…Engineered wood products, such as cross-laminated timber (CLT), are becoming more popular in the designs of modern sustainable buildings. This increased production of CLT requires more robust, yet less labour-intensive means to assess the material characteristics of whole CLT panels. …”
Get full text
Article -
34818
Efficient and secure multi-user outsourced image retrieval scheme with access control
Published 2021-10-01“…In the cloud-based image retrieval services, the cloud server may not be fully trusted in which may arise privacy concerns.Some privacy-preserving image retrieval schemes have been proposed to protect image privacy.However, the traditional privacy-preserving image retrieval schemes have some weaknesses, such as inefficient and single-user setting.Therefore, an efficient and secure multi-user outsourced image retrieval (EMIR) scheme with access control was proposed.EMIR utilized matrix decomposition and proxy re-encryption to achieve multi-user outsourced image retrieval.By leveraging the techniques of one-time pad and matrix transformation, EMIR supported efficient and secure image retrieval based on Euclidean distance similarity in a privacy-preserving manner.In addition, EMIR applied locality sensitive hashing (LSH) to build searchable indexes in a privacy-preserving manner, which could improve the image retrieval performance.Specifically, a lightweight access control strategy by using role-based polynomial function was designed to authorize the legality of the query user.Security analysis shows that EMIR can protect the confidentiality of the images and the queries.The extensive experiments demonstrate that EMIR achieves efficient image retrieval.…”
Get full text
Article -
34819
Method and Application of Urban 3D Rapid Modeling of Geology Based on CAD Borehole Logs
Published 2022-01-01“…Aiming at the problems of cumbersome modeling process, low modeling efficiency, and accuracy of traditional modeling methods based on borehole data, in this paper, a fast 3D geological modeling method based on CAD borehole data is proposed. The method first designed a method for rapidly extracting borehole log information which is based on .Net API (c#). …”
Get full text
Article -
34820
Prognosis, Controversies and Assessment of Bone Erosion or Invasion of Oral Squamous Cell Carcinoma
Published 2025-01-01“…While there appears to be some evidence that medullary bone infiltration is prognostic, further well-designed studies are warranted.…”
Get full text
Article