Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
36161
Dynamic P2P trust model based on context factors
Published 2016-08-01“…A multi-dimensional trust model was constructed based on the context factors.The direct trust of the interac-tive entities was estimated by integrating the time-decay factor,the transaction impact factor and the participation fre-quency.The trust similarity algorithm was designed based on the Dice similarity and the feedback credibility was aggre-gated from multiple trust chains.The direct interaction,the evaluation similarity and the trust chain was integrated for calculating the recommendation trust.The peer's trust was evaluated by combing the direct trust and the recommendation trust.A new mechanisam was proposed for the trust's update,incentive or punishment according to the peer's behavior on the interaction.The practical example analysis shows that the proposed model can effectively explain the effect of the transaction contextual factors on the entity trust,and can improve the trust sensitivity to the context transaction factors.…”
Get full text
Article -
36162
Non-invasive eye tracking technology based on corneal reflex
Published 2012-12-01“…For the deficiencies that existing eye tracking devices are complex,have too many restrictions on the position,need to wear special equipment.A novel method of eye tracking technology using the five near-infrared light as the source of corneal reflex was put forward.This method did not need any wearing equipment,and could adapt to the natural head movement,the algorithm designed calculates the position of sight in high accuracy.A novel method of pupil edge fitting was put forward:fitted circularly and removed false points to get accurate position of pupil center,improved mapping accuracy.Used the GrayScale of image to initialize eye position quickly and accurately.Using the theory of cross-ratio invariance to make coordinate mapping,finally calculated the attention coordinate accurately.…”
Get full text
Article -
36163
Les liminalités dans les représentations du cycle solaire quotidien
Published 2020-07-01“…The transitions of the first type are sunrise and sunset, here called anchoring zones; they correspond to the notion of “thick boundary” developed by Desclés to designate the existence of intermediate spaces between categories; those of the second type are the midday and midnight points, here called pivots because they constitute zones of exchange and shifting between the rising sun and setting sun.…”
Get full text
Article -
36164
Security signaling optimization in optical network for smart substation
Published 2019-02-01“…The communication security issue brought by smart substation is of great importance and should not be ignored in backbone optical networks.To solve this problem,firstly,the communication security challenges faced by optical networks in smart substation environment were analyzed,a signaling security optimization technique for optical networks for smart substation services was proposed.A so-called light-weighted security signaling scheme was designed to establish the end-to-end trusted connection.Under the environment of multi-domain communication services in smart substation,evaluation simulation for the signaling interaction was conducted.Simulation results show that the proposed approach can greatly enhance the security ability of multi-domain optical network with better performance in term of connection success rate.…”
Get full text
Article -
36165
Synthesis, Characterization, and Spectroscopic Studies of Bis-(meso-4-methoxyphenyl)-Benziporphyrin and Its Pd-Metal Complex
Published 2021-01-01“…Here, a fairly and efficient synthesis of the free base and its metal complex is well designed. Dimethoxybenzene dicarbinol intermediate was prepared in excellent yields by reacting 4-methoxyphenylmagnesium bromide with isophthaladehyde in diethyl ether. …”
Get full text
Article -
36166
The development of Anthropocene Awareness Scale.
Published 2025-01-01“…After a series of reliability and factor analyses, the Anthropocene Awareness Scale was optimized into a unidimensional scale comprising eight items (Cronbach's alpha = 0.88). Designed to explore individual attitudes, the scale could provide quantitative researchers with an entry point into the Anthropocene discourse and facilitate empirical studies that generate evidence for environmental policies and education in the Anthropocene.…”
Get full text
Article -
36167
Byzantine-robust federated learning over Non-IID data
Published 2023-06-01“…The malicious attacks of Byzantine nodes in federated learning was studied over the non-independent and identically distributed dataset , and a privacy protection robust gradient aggregation algorithm was proposed.A reference gradient was designed to identify “poor quality” shared gradients in model training, and the influence of heterogeneity data on Byzantine node recognition was reduced by reputation evaluation.Meanwhile, the combination of homomorphic encryption and random noise obfuscation technology was introduced to protect user privacy in the process of model training and Byzantine node recognition.Finally, through the evaluation over the real-world datasets, the simulation results show that the proposed algorithm can accurately and efficiently identify Byzantine attack nodes while protecting user privacy and has good convergence and robustness.…”
Get full text
Article -
36168
Kognitiewe orientasie as determinant van verbruikersbesluitneming
Published 2022-11-01“…A fundamental problem, however, is that as a result of their complexity and cognitive substructure, the models which have been designed to express this approach cannot be easily verified in practice. …”
Get full text
Article -
36169
Economic Development Trend Prediction Model Based on Unsupervised Learning in the Internet of Things Environment
Published 2021-01-01“…In addition, this paper conducts effective research on the various modules of functional analysis, obtains the system functional architecture, constructs the system functional structure based on the actual situation, and analyzes the operating process of the system. Finally, this paper designs a simulation test based on actual data. The experimental research results show that the system model proposed in this paper has a good performance in the forecast of economic development trends, and the system can be used for forecasting in subsequent economic development forecasts.…”
Get full text
Article -
36170
An Analytical Approach on Thermally Induced Vibrations of Nonhomogeneous Tapered Plate
Published 2013-01-01“…A mathematical model to control the vibrations of a rectangular plate is constructed with an aim to assist engineers in designing and fabrication of various structures used in the field of science and technology, mostly used in satellite and aeronautical engineering. …”
Get full text
Article -
36171
THE CYCLOID MAGNETIC GEAR BASED ON HALBACH ARRAY
Published 2017-01-01“…The permanent magnets were arranged by Halbach in order to improve the magnetic flux leakage and the utilization of permanent magnets,and a prototype was designed and manufactured according to the working principle. …”
Get full text
Article -
36172
Key Plant, Key Pests: Holly (Ilex sp.)
Published 2019-03-01“… This series of Key Plant, Key Pests publications are designed for Florida gardeners, horticulturalists, and landscape professionals to help identify common pests associated with common Florida flora. …”
Get full text
Article -
36173
Privacy protection scheme of DBSCAN clustering based on homomorphic encryption
Published 2021-02-01“…In order to reduce the risk of data privacy leakage in the process of outsourced clustering, a privacy protection scheme of DBSCAN clustering based on homomorphic encryption was proposed.In order to encrypt the float data in the actual scene, three data preprocessing methods for different data accuracy were given, and a policy for choosing a proper data preprocessing method based on data characteristics, accuracy and computational cost was also proposed.For the ciphertext comparison operation that was not supported by homomorphic encryption, a protocol between the client and the cloud server was designed to realize the function of ciphertext comparison.Theoretical analysis and experimental results show that the proposed scheme can ensure the security of data privacy, and has a higher clustering accuracy rate and lower time overhead.…”
Get full text
Article -
36174
RESEARCH ON MEASUREMENT TECHNOLOGY OF CAPTO SHANK’S KEY DIMENSIONS USED IN HIGH SPEED MACHINING
Published 2019-01-01“…In order to accomplish accurate measurement for Capto shank’s key dimensions, based on analyzing Standard ISO detailedly measurement parameters were determined and measurement system for Capto shank was designed. Positioning scheme was decided according to the idea about restraining the degrees of freedom in space, axial positioning was achieved by shank’s own weight, radial positioning was achieved by the rational configuration of three supporting nails, and circumferential positioning was achieved by controlling ring gauge’s cavity dimension strictly. …”
Get full text
Article -
36175
Research and Comparison of Distribution Automation Communication Mode Based on a Typical Case
Published 2013-11-01“…Different communication modes have big influence on the real time, reliability and effectiveness of thesystem, and also there is a big difference between the construction and maintenance cost. Through designing thecommunication network in a switching station in Shanghai, the difference among optical fiber communication, powerline communication and wireless communication was analyzed and compared, which provided a reference for theconstruction of the distribution automation communication network.…”
Get full text
Article -
36176
An Artificial Bee Colony Algorithm for Uncertain Portfolio Selection
Published 2014-01-01“…In order to solve the proposed model, a modified artificial bee colony (ABC) algorithm is designed. Finally, a numerical example is given to illustrate the modelling idea and the effectiveness of the proposed algorithm.…”
Get full text
Article -
36177
Crash-Induced Vibration and Safety Assessment of Breakaway-Type Post Structures Made of High Anticorrosion Steels
Published 2016-01-01“…To disperse the impact force when a car crashes into a post, the post could be designed with a breakaway feature. In this study, we used a new high anticorrosion steel for the development of advanced breakaways. …”
Get full text
Article -
36178
4-H Horse and Pony Lease
Published 2018-04-01“…This lease form was designed to cover the basic agreement between a 4-H member and a horse owner. …”
Get full text
Article -
36179
Protestantes, curanderos y descreídos. Misiones interiores, religiosidad nacional-católica e intolerancia durante el primer franquismo, 1940-1960
Published 2022-07-01“…These pastoral interventions also had a coactive dimension –as they sought to exclude from public life any behaviour that was incompatible with the Catholic faith– and a coercive dimension –as they incorporated mechanisms designed to ensure that those who did not wish to do so joined in the missionary activities. …”
Get full text
Article -
36180
PROFESSOR WORK AT UNIVERSITY: DAILY PROBLEMS AND SOLUTIONS
Published 2016-12-01“…The educational programs should be designed according to the employers' requirements, particularly in such areas as computer engineering and programming. …”
Get full text
Article