Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
36321
Application of RQMC for CDO Pricing with Stochastic Correlations under Nonhomogeneous Assumptions
Published 2022-01-01“…In consideration of that the correlation between any two assets of the asset pool is always stochastic in the actual market and that collateralized debt obligation (CDO) pricing models under nonhomogeneous assumptions have no semianalytic solutions, we designed a numerical algorithm based on randomized quasi-Monte Carlo (RQMC) simulation method for CDO pricing with stochastic correlations under nonhomogeneous assumptions and took Gaussian factor copula model as an example to conduct experiments. …”
Get full text
Article -
36322
Research on elite hierarchical task offloading strategy based on reinforcement learning in edge-cloud collaboration scenario
Published 2022-03-01“…With the development of 5G and the enrichment of application functions, applications have put forward higher requirements on the computing capabilities of terminal devices.In order to improve the computing capabilities of terminal devices on applications and reduce the processing time of tasks, it is aimed at mobile edge computing environments, a task offloading method for edge-cloud collaboration was proposed,and an elite hierarchical evolutionary algorithm combined with reinforcement learning (RL-EHEA) was designed to perform offloading decisions, so that multiple tasks with dependencies and deadlines compete for computing resources.The simulation experiment results show that, compared with genetic algorithm (GA) and elite genetic algorithm (EGA), RL-EHEA can shorten task processing time and obtain better resource allocation strategy.…”
Get full text
Article -
36323
Reshaping the Riparian: Human Mobility and Fixed Infrastructure
Published 2015-03-01“…By the 20th century, the threat of hurricane driven storm surge prompted investments in additional levees designed to complement the river barriers and keep the sea out of the city. …”
Get full text
Article -
36324
Are Cows Comfortable in Modern Dairy Facilities?
Published 2018-12-01“…Facilities should be designed to assure that calves, heifers and cows are comfortable and can successfully grow and develop in order to reach peak performance. …”
Get full text
Article -
36325
QSA: Query Splitting-Based Anticollision for Mobile RFID-Based Internet-of-Things
Published 2013-07-01“…This paper presents a novel anticollision algorithm named Query Splitting-based Anticollision (QSA) for mobile RFID-based internet-of-things. By designing adaptive query, QSA reduces the number of collisions efficiently and makes it possible to identify multiple mobile tags without rollback. …”
Get full text
Article -
36326
Leveraging ICT for mobility future in a region in transition: the case of Piedmont
Published 2015-12-01“…Building upon previous studies of Internet usage, the results of an investigation into the role of the Internet to relax constraints in social practices are also mentioned as they offer interesting clues for designing new approaches to mobility.…”
Get full text
Article -
36327
Power, empowerment and organisational communication
Published 2022-10-01“…In the context of the increasing complexity of the organisational environment, this article suggests the application of organisational cybernetics to public relations theory, and it considers the role that organisational communication plays in releasing the productive power of employees and in designing effective organisations through the introduction of recursive organisational structures. …”
Get full text
Article -
36328
Bruxelles, une « ville inclusive », mais pour qui ?
Published 2024-11-01“…However, the implementation of the “inclusive city” produces hierarchies between minorized groups, depending on who is designated as a value producer. Thus, the article underlines how the implementation of the “inclusive city” builds “winning” and “losing” communities, inscribed in class, gender and race relations.…”
Get full text
Article -
36329
Biochemistry of the Phagosome: The Challenge to Study a Transient Organelle
Published 2011-01-01“…Phagocytes are specialized cells of the immune system, designed to engulf and destroy harmful microorganisms inside the newly formed phagosome. …”
Get full text
Article -
36330
Médicaments génériques : pivot de la reconstruction de l’industrie pharmaceutique
Published 2015-06-01“…While some of these regulations was designed against major pharmaceutical companies (Big Pharma), firms have often co-constructed the regulation with the intent to take advantage. …”
Get full text
Article -
36331
Application of the ANFIS Approach in the Research of the Impact of Lubricant Viscosity on Rear Axle Transmission Efficiency
Published 2015-01-01“…For the problem of the impact of the lubricant viscosity on the rear axle transmission efficiency,by using the adaptive neural- network fuzzy inference method,a five- dimensional transmission efficiency controller based on ANFIS structure is designed. By using the subtractive clustering method,a set of fuzzy rules with language property is generated adaptively. …”
Get full text
Article -
36332
Key Plant, Key Pest: Juniper (Juniperus sp.)
Published 2019-04-01“… This series of Key Plant, Key Pests publications is designed for Florida gardeners, horticulturalists, and landscape professionals to help identify common pests associated with common Florida flora. …”
Get full text
Article -
36333
Efficient signcryption scheme based on Cocks’ identity cryptosystem
Published 2020-12-01“…Most of the existing identity-based signcryption schemes are based on bilinear or multilinear pairing operations construction.To solve the problem of low efficiency caused by complex pair operation, a new efficient signcryption scheme based on the identity cryptosystem of Cocks was proposed.Firstly, the security model of the proposed scheme was formalized, and the definition of confidentiality and unforgeability was given.Secondly, the quadratic residue problem was used to realize the concrete construction of the proposed scheme, and the signature algorithm was designed in a logical step by combining Jacobi symbol operation.Finally, the security proofed that the scheme satisfied the confidentiality and unforgeability was given under the random prediction model.The efficiency analysis shows that compared with the existing identity-based signcryption scheme, the proposed scheme greatly improves the computing efficiency and has good characteristics of identity-based cryptosystem.…”
Get full text
Article -
36334
Construction of Information Security System of Power Generation Enterprise
Published 2014-01-01“…Based on this analysis, a five-level business system, as the network management, border security protection, mobile access security, host security, application security, was designed for power generation enterprise security reinforcement. …”
Get full text
Article -
36335
Editorial
Published 2012-01-01“…O tema escolhido "A ergonomia como meio de qualidade para o ambiente construído" uniu arquitetos, urbanistas, ergonomistas, engenheiros de produção, designers, gestores públicos e profissionais da área médica - profissionais, pesquisadores e alunos; que juntos se propuseram a debatê-lo durante o período de 13 a 15 de outubro de 2011. …”
Get full text
Article -
36336
Intelligent transmit power control algorithm for the multi-user interference of wireless network
Published 2022-02-01“…To deal with the inter-user interference problem in wireless networks, an intelligent transmit power control scheme was proposed to manage the inter-user interference and guarantee multiple users' quality of service.Firstly, considering the complex dynamic wireless channel environment, a transmit power control model that aims to maximize the weighted sum-rate of the wireless communication system was established.Then, an intelligent power control algorithm based on the actor-critic framework in deep reinforcement learning was designed to shorten the power control decision time.Simulation results show that the proposed algorithm converges quickly, and when there are 10 pairs transceivers, the computation time consumed by the intelligent power control method is only a quarter of the time consumed by the traditional optimal algorithm.…”
Get full text
Article -
36337
Electrochemical Intelligent Recognition of Mineral Materials Based on Superpixel Image Segmentation
Published 2022-01-01“…Based on all the experimental results, it can be seen that after the two-stage processing of the designed superpixel algorithm and the region merging algorithm, the final sandstone slice image segmentation results are close to the results of manual labeling, which is helpful for the subsequent research on sandstone component identification. …”
Get full text
Article -
36338
La matière des images dans The Duchess of Malfi
Published 2019-01-01“…The play recurrently offers descriptions of how images are designed, focusing on the very material from which they are made and upon which they are impressed. …”
Get full text
Article -
36339
Bousculer pour développer des compétences interculturelles en master MEEF
Published 2021-02-01“…In an MEEF master's degree programme at a university in the Hauts-de-France, the pedagogical system of intercultural training is designed in coherence with this paradigm so that students develop ICs. …”
Get full text
Article -
36340
Improved large data spectral clustering algorithm based on sampling subspace constraint
Published 2018-11-01“…On the basis of analyzing the equivalent function of the objective function of classical spectral clustering algorithm and the weighted kernel k-means objective function,an improved large-scale data spectrum clustring algorithm based on sampling subspace constraint was designed,the weighted kernel k-means iterative optimization was used to avoid the large resource consumption of Laplacian matrix feature decomposition,and by using data sampling and constraining the cluster center to the subspace generated by the sampling points,the use of all kernel matrices was avoided,thereby reducing the time-space complexity of classical algorithms.Theoretical analysis and experimental results show that the improved algorithm can greatly improve the clustering efficiency on the basis of maintaining similar clustering accuracy with the classic algorithm and verify the effectiveness of the proposed algorithm.…”
Get full text
Article