Showing 36,401 - 36,420 results of 46,768 for search '"Design"', query time: 0.19s Refine Results
  1. 36401

    WmFall: WiFi-based multistage fall detection with channel state information by Xu Yang, Fangyuan Xiong, Yuan Shao, Qiang Niu

    Published 2018-10-01
    “…Considering that falling and sitting are very similar to each other, a special method is designed for distinguishing them with deep learning algorithm. …”
    Get full text
    Article
  2. 36402

    Helping Adolescents with Greater Psychosocial Needs: Subjective Outcome Evaluation Based on Different Cohorts by Daniel T. L. Shek, Tak Yan Lee

    Published 2012-01-01
    “…(Positive Adolescent Training through Holistic Social Programmes) is designed to help students with greater psychosocial needs. …”
    Get full text
    Article
  3. 36403

    Endogenous trusted network architecture for intelligent sharing by Shaoyong GUO, Yuanyuan QI, Meiling DAI, Xuesong QIU, Feng QI, Ping ZHANG

    Published 2020-11-01
    “…To address the needs of intelligent sharing of network resources,blockchain and artificial intelligence were integrated with the network,and an endogenous trusted resource intelligent sharing network architecture was proposed to make network asset sharing have endogenous trust.Based on distributed alliance blockchain,an integration mechanism of on-chain identification and off-chain resource was proposed to achieve credible management of network resources.Security and trusted sharing protocols for network data was designed to synchronize data consensus within the network.Based on smart contract,network resource scheduling and service composition methods were presented to achieve trusted service sharing.Finally,the proposed architecture was applied to decentralized scenarios such as domain name resolution,cross domain authentication,and virtual network operation.The proposed architecture realizes the integration of blockchain and network and supports the endogenous trusted sharing of network assets.…”
    Get full text
    Article
  4. 36404

    PUBLIC AWARENESS OF GLUCOSE-6-PHOSPHATE DEHYDROGENASE(G6PD) DEFICIENCY CAUSES AND PREVALENCE FACTORS by Muath Salman Almuhaini et al

    Published 2024-10-01
    “…A random sample of 86 participants was asked to fill a pre-designed questionnaire examining the awareness and knowledge level about G6PD deficiency. …”
    Get full text
    Article
  5. 36405

    Research on link prediction model based on hierarchical attention mechanism by Xiaojuan ZHAO, Yan JIA, Aiping LI, Kai CHEN

    Published 2021-03-01
    “…In order to solve the problem that the existing graph attention mechanism tends to cause attention distribution to certain relations with high frequency when performing link prediction related tasks, a new link prediction model based on hierarchical attention mechanism was proposed.In the link prediction task, a hierarchical attention mechanism was designed to give different attention to the relationships of different relationship types connected to a given entity in the knowledge graph according to the relationship in the prediction task.While the characteristics of multi-hop neighbor entities were pay attention to, the relationship characteristics was pay more attention to find the relationship type that matches the target relationship.Through comparison experiments with the mainstream models on multiple benchmark data sets, the results show that the performance of the model is better than the mainstream models and has good robustness.…”
    Get full text
    Article
  6. 36406

    "Anatheism" within the framework of theodicy: from theistic thinking to thepaschitic thinking in a pastoral hermeneutics by D. J. Louw

    Published 2016-06-01
    “…It discusses both inclusive and exclusive approaches to the theodicy issue, and proposes a paradigm shift from threat power to intimate, vulnerable power. A diagram is designed in order to identify different metaphors for God in pastoral caregiving. …”
    Get full text
    Article
  7. 36407

    Research on non-orthogonal transmission strategy for content delivery in caching networks by Long YANG, Hanyang LI, Mengmeng REN, Bingtao HE, Yuchen ZHOU, Jian CHEN

    Published 2023-10-01
    “…A two-stage adaptive non-orthogonal/orthogonal multiple access transmission scheme was designed for content delivery scenarios in wireless caching networks.For the scheme, a high-reliability user scheduling strategy was proposed, and the analytical expression of the outage probability and its asymptotic expression in high signal-to-noise ratio regime were derived by theoretical analysis.The analysis results indicate that the proposed strategy can achieve full spatial diversity gain.Simulation results demonstrate that compared with the instantaneous channel state information-based scheduling strategy, the random scheduling strategy, and the conventional orthogonal multiple access transmission strategy, the proposed strategy can achieve better content delivery reliability than existing strategies by obtaining the spatial diversity gain.…”
    Get full text
    Article
  8. 36408

    Adaptive delay scheduling algorithm based on data center load analysis by JIN Jia-hui, LUO Jun-zhou, SONG Ai-bo, DONG Fang

    Published 2011-01-01
    “…Current delay scheduling algorithms,based on static waiting time threshold,can not adapt to dynamic load of a data center.To address this issue,an adaptive waiting time threshold model was proposed.Based on this model,an adap-tive delay scheduling algorithm(ADS) was designed.ADS adjusts jobs’ waiting time threshold dynamically to reduce the job response time,according to the information of idle servers’ arrival intensity,available network bandwidth and job running status.A prototype system using ADS was developed,on which the validation of the adaptive waiting time threshold model and the evaluation of ADS’s performance were carried out.It is shown that ADS outperforms previous delay scheduling algorithms in term of the job response time.…”
    Get full text
    Article
  9. 36409

    Utilisation et rôles des exemples lors d’enseignements universitaires de chimie by Isabelle Kermen

    Published 2016-10-01
    “…The teachers surveyed agree about the place and caracteristics of examples, about their cognitive, pedagogical, motivational or mediative functions On the contrary they disagree when it comes to designate what is done in practical sessions, which are essentially examples for some and concrete situations for others. …”
    Get full text
    Article
  10. 36410

    Block cipher mode research based on identifier of text files by Tong-ming ZHANG, Jian-feng GUAN

    Published 2017-03-01
    “…The electronic code book(ECB)mode cannot conceal the data model of the plaintext and has only one private key to the whole plaintext.A block cipher mode based on identity for text files was proposed,which ab-sorbed the advantages of block cipher mode and the feature of plaintext string.A double Hash mapping structure was designed and one layer of the mapping structure maps the plaintext into discontinuous groups,another one which was based on the concept of identify library produced corresponding private key to the plaintext group.The model overcame the discontinuous group and single private key problem and effectively improved the security of the cipher text.The experiment results show that the new model has better security,flexibility and extensibility.…”
    Get full text
    Article
  11. 36411

    Compatibility study between IMT and inter-satellite service systems in 25.25~27.5 GHz frequency band by Zhaojun QIAN, Tan WANG, Long KANG, Bo LI

    Published 2016-12-01
    “…In addition, the tradeoff between the total number of IMT BS and its transmission power was analyzed with certain interference margin.These results are useful for designing and deployment of IMT systems in 25.25~27.5 GHz band 5G spectrum planning in the future.…”
    Get full text
    Article
  12. 36412

    Sick Day Management for Adults with Diabetes Who Take Insulin by Nancy Gal, Linda B. Bobroff

    Published 2017-08-01
    “…The best way for people with diabetes to prevent a minor illness from becoming a major illness is to have a personalized sick day plan designed with their health care provider before they become ill. …”
    Get full text
    Article
  13. 36413

    Method for detecting collusion attack node in road condition information sharing based on reputation point by Shichang XUAN, Hao TANG, Wu YANG

    Published 2021-04-01
    “…Aiming at the problem that on occasion of the release of false road condition information by collusion nodes in the Internet of vehicles collaboratively, message authenticity could not be guaranteed in the process of road condition information sharing, a method for detecting collusion attack nodes in road condition information sharing based on reputation points was proposed.In the process of road condition information aggregation, a malicious information detection algorithm was designed to detect false messages issued by colluding nodes, which could ensure the authenticity and accuracy of messages delivered in the system.Experimental results show that the proposed method has higher detection efficiency for collusion nodes and adaption to a proportion of collusion nodes through security evaluation and experiments in comparison with the existing schemes.…”
    Get full text
    Article
  14. 36414

    Modification of Homotopy Perturbation method for addressing systems of PDEs by Osama Alkhazaleh

    Published 2025-03-01
    “…This work employs a refined variation of the Homotopy Perturbation Method (HPM), termed the Modified Homotopy Perturbation Method (MHPM), designed to obtain accurate solutions for significant systems of partial differential equations (PDEs). …”
    Get full text
    Article
  15. 36415

    Accompagner les pratiques masturbatoires des adolescent.e.s dans des institutions pour personnes dites autistes : gestion du collectif, crainte de l’intime by Adrien Primerano

    Published 2018-06-01
    “…Drawing on a fourteen-month ethnographic study conducted within three specialized institutions for young people designated as autistic, and thirty interviews with its professionals, this article addresses discourses and practices related to masturbation. …”
    Get full text
    Article
  16. 36416

    Global Asymptotic Almost Periodic Synchronization of Clifford-Valued CNNs with Discrete Delays by Yongkun Li, Jianglian Xiang

    Published 2019-01-01
    “…Second, based on the Banach fixed point theorem, we establish the existence and uniqueness of almost periodic solutions of the considered neural networks. Then, by designing a novel state-feedback controller and constructing a proper Lyapunov function, we study the global asymptotic synchronization of the considered neural networks. …”
    Get full text
    Article
  17. 36417

    DYNAMIC ANALYSIS OF DOUBLE COMPOSITE BEAM WITH MOVING MASS by ZHAO Liang, LIU LiHua

    Published 2019-01-01
    “…The conclusions obtained here provide theoretical references for designing the structures with high strength and light weight.…”
    Get full text
    Article
  18. 36418

    Equilibrium Adsorption of Two-Component Organic Solutes from Aqueous Solutions on Activated Carbon by A. Seidel, G. Reschke, S. Friedrich, D. Gelbin

    Published 1986-09-01
    “…Significant displacement of one solute by the other was observed. The designation of the more strongly adsorbed component depends on the relative concentration of the two solutes in the mixture and on the pH. …”
    Get full text
    Article
  19. 36419

    Handbook of Florida Water Regulation: Introduction by Michael T. Olexa, Luke D'Isernia, Laura Minton, Dulcy Miller, Sarah Corbett

    Published 2019-05-01
    “… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
    Get full text
    Article
  20. 36420

    Configurations, deformations, mutations. Criteria of morphological analysis in adaptive reuse by Elena Guidetti, Alessandro Massarente

    Published 2021-06-01
    “…Since many buildings tend to survive over time the functions for which they were designed, it is necessary to analyze reuse interventions through a diachronic process. …”
    Get full text
    Article