Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
36201
Directions, benefits, and digitalisation effectiveness determining
Published 2022-06-01“…The digital technologies’ development requires the determination of directions and advantages of their implementation and using, designing the ways and implementation structure. The article proposes the directions and marks advantages of introduction, use, and development of digital technologies, and identifying and analysis of market entities and the structure of their interaction. …”
Get full text
Article -
36202
VisuaLies: Towards a Classification of Misinfovis Situations
Published 2025-01-01“… This paper presents VisuaLies, a workshop designed to engage citizens in identifying misleading information visualisations (Misinfovis). …”
Get full text
Article -
36203
Research and practice on power big data security governance system
Published 2019-11-01“…The blackmail attacks and data leakage problems of big data had become increasingly serious in recent years,and the state had successively issued a series of relevant laws and regulations to clarify the requirements for big data security work.Power big data assets had the characteristics of large data volume,wide distribution,high utilization value and high sensitivity.It was urgent to carry out research on big data security governance technology.Based on the analysis of the challenges faced by power big data security,the power big data security governance system was designed,the power big data security governance requirements were put forward,and the data security management and control was verified by the research and development of power big data security governance platform.…”
Get full text
Article -
36204
User similarity-based collaborative filtering recommendation algorithm
Published 2014-02-01“…User similarity was introduced for redefining the attribute similarity and similarity composition as well as the method of similarity calculating, then a new collaborative filtering recommendation algorithm based on user attrib-utes was designed and some methods for user satisfaction and quality of recommendations were presented. …”
Get full text
Article -
36205
Handbook of Florida Water Regulation: Pollutant Storage Tank Systems
Published 2019-05-01“… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
Get full text
Article -
36206
EFFECT OF WELDED STRUCTURE ON THE STRENGTH OF THE AIRHSIP MEMBRANE
Published 2021-01-01“…In order to investigate the material properties of the welded structure in the airship and the effect of the welded structure on the membrane strength,the test specimens and schemes were designed for uniaxial tensile test,uniaxial cyclic test,and biaxial tensile test according to the airship engineering experience and structural stress distribution. …”
Get full text
Article -
36207
Révéler et démasquer
Published 2004-09-01“…The Soviet newspapers in the Stalinist USSR are not simple instruments, designated to enhance the campaigns of the power. Far from the first pages, one can also find a place for the denunciation of some of the problems of the country. …”
Get full text
Article -
36208
La critique d’espace public : dire le politique du projet de paysage
Published 2021-09-01“…Since 2018, a group of practitioners and researchers from schools of architecture and/or landscape architecture noting the scarcity of criticism of the landscape architecture of public spaces, and particularly of the landscape projects at the inception of these spaces, has been seeking to define the epistemological conditions for such a critique and has thus investigated the political dimension of the designing of the public space. The article presents four critiques carried out by the group between 2018 and 2020 of landscape projects: the Linear Forest (Paris), the Coeur de Maine (Angers), the Place des Artisans (Lille) and the Place Jean-Jaurès (Marseille). …”
Get full text
Article -
36209
Correspondences between Czech and English Coreferential Expressions
Published 2015-09-01“…We focus on central pronouns, relative pronouns, and anaphoric zeros. We designed an alignment-refining algorithm for English personal and possessive pronouns and Czech relative pronouns that improves the quality of alignment links not only for the classes it aimed at but also in general. …”
Get full text
Article -
36210
Dynamic Server Cluster Load Balancing in Virtualization Environment with OpenFlow
Published 2015-07-01“…Furthermore, a load balancing solution based on software defined networks (SDN) technology is applied in this paper, and it is designed and implemented in OpenFlow network. We combine network management and server state monitor in this scheme, in which the OpenFlow switches forward the request to the least comprehensive loading server by modifying the packet.…”
Get full text
Article -
36211
Edge intelligence-assisted routing protocol for Internet of vehicles via reinforcement learning
Published 2023-11-01“…To achieve a highly reliable and adaptive packet routing protocol in a complex urban Internet of vehicles, an end-edge-cloud edge intelligence architecture was proposed which consisted of an end user layer, an edge collaboration layer, and a cloud computing layer.Based on the proposed edge intelligence architecture, an packet routing protocol based on multi-intelligent reinforcement learning technologies was designed.The experimental results show that the proposed protocol could significantly improve the transmission delay and the packet reception rate in the interval of 29.65%~44.06% and 17.08%~25.38% compared to the state-of-the-art transmission mechanism for emergency data (TMED), intersection fog-based distributed routing protocol (IDR), and double deep Q-net based routing protocol (DRP).…”
Get full text
Article -
36212
Minimum latency data aggregation scheduling in MR-MC wireless sensor networks
Published 2014-10-01“…The problem of minimum latency data aggregation scheduling in single-radio single-channel wireless sensor networks is a NPC problem and many solutions have been proposed.In multi-radio multi-channel networks,the latency may be lower as a node may receive transmission data from other different nodes simultaneously.It formulates the minimum latency data aggregation scheduling into an optimization problem with joint consider of tree structure,time slot assignment,channel assignment and radio assignment.The problem is divided into constructing data aggregation tree and designing a node schedule subproblems.For each subproblem,heuristic algorithm has been proposed.The simulation results show that the proposed algorithm achieve good performance.…”
Get full text
Article -
36213
Handbook of Florida Water Regulation: Florida Pesticide Law
Published 2019-05-01“… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
Get full text
Article -
36214
Indoor dynamic environment lo calization algorithm based on transfer learning
Published 2018-08-01“…The accuracy of the traditional indoor fingerprint lo calization system is limited bymany factors,such as the density of the reference location node in the fingerprint database and the characteristics of the indoor environment.When the indoor environment changes dynami cally,the RSS fluctuates,and usually does notmeet the assumption of the same distribution.Therefore,it was difficult to obtain high-precision requirements for conventional fingerprint positioningmethod.Aiming at the problem that the traditional algorithm couldn’t locate accurately,an algorithm based on the indoor fingerprint database was designed and implemented.The algorithm adopted the idea ofmigration learning to embed different data sets into the latent feature space,and the adverse effects of environmental changes on the system weremitigated.The simulation results show that the average positioning error of this algorithm is 1.23m.…”
Get full text
Article -
36215
Are Cows Comfortable in Modern Dairy Facilities?
Published 2018-12-01“…Facilities should be designed to assure that calves, heifers and cows are comfortable and can successfully grow and develop in order to reach peak performance. …”
Get full text
Article -
36216
Ethylene Polymerization through Neutral Nickel Complexes Bearing Cyclic Imides
Published 2022-01-01“…These Ni(II) complexes are designed to bear 2-aminobiphenyl and 4-tritylaniline. …”
Get full text
Article -
36217
Intelligent Planning Framework for Star-Walk Mission Based on Multimodal Observation Requirements Information
Published 2022-09-01“…Combined with the current requirement and research for rapid intelligent planning of star-walk observation mission, and a framework based on multimodal observation requirements such as voice and text was designed.The framework aimed to satisfied the requirements and focued on breaking through three key issues for future emergency rescue applications: multimodal requirement interpretation, full-elements resource coordination and complex emergency missions planning, and to open the automatic link between observation requirement, resource planning and mission planning by making full use of deep learning methods.On these bases, the framework had the ability to provided rapid remote sensing observation information with a specified time and made full play to the comprehensive eff ectiveness of remote sensing information resources.…”
Get full text
Article -
36218
QR code security management system based on WPKI and iris recognition
Published 2018-05-01“…Aiming at the deficiency of existing QR code security technology,a security management system based on WPKI and iris recognition was designed and implemented.The system uses digital certificates to sign the hashed information for the user to verify the source of the QR code based on WPKI technology.Through the public security household registration management system,WPKI/CA system,server and mobile client four subsystems to standardize the management of the production and identification of QR code,and the application for the certificate of the user real name certification combined with biometric identification technology,indirectly realizing the binding of digital certificates and user physical identities to form a set of accountability mechanisms.Test results show that the system can meet accuracy and robustness requirements.…”
Get full text
Article -
36219
Research and Application on Communication Resource Management System in Nuclear Power Plants
Published 2015-06-01“…In order to unify communication resources management of nuclear power plant,ensure the communication network work high reliably,reduce the maintenance cost and increase its work efficiency,the communication resource management system for nuclear power plants was designed and built. Through the management platform,communication system work efficiency was improved,strong support for higher authorities was provided to macro management communication resources,paperless work was achieved in communication field,all the communication resources such as communication wiring layout,voice equipments,power grid communication information were collected and managed automatically. …”
Get full text
Article -
36220
An Efficient Distributed Forensic System Based on Hadoop:Principle and Method
Published 2014-01-01“…An efficient distributed forensics system based on Hadoop technique, which can support multiple concurrent media scene forensics work, was designed and implemented, and through the dispatch control services would be evidence of different data storage media to a different distributed data storage server, each forensic task runtime could monopolize a forensic medium to achieve a parallel multiple media forensic analysis. …”
Get full text
Article