Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
36401
WmFall: WiFi-based multistage fall detection with channel state information
Published 2018-10-01“…Considering that falling and sitting are very similar to each other, a special method is designed for distinguishing them with deep learning algorithm. …”
Get full text
Article -
36402
Helping Adolescents with Greater Psychosocial Needs: Subjective Outcome Evaluation Based on Different Cohorts
Published 2012-01-01“…(Positive Adolescent Training through Holistic Social Programmes) is designed to help students with greater psychosocial needs. …”
Get full text
Article -
36403
Endogenous trusted network architecture for intelligent sharing
Published 2020-11-01“…To address the needs of intelligent sharing of network resources,blockchain and artificial intelligence were integrated with the network,and an endogenous trusted resource intelligent sharing network architecture was proposed to make network asset sharing have endogenous trust.Based on distributed alliance blockchain,an integration mechanism of on-chain identification and off-chain resource was proposed to achieve credible management of network resources.Security and trusted sharing protocols for network data was designed to synchronize data consensus within the network.Based on smart contract,network resource scheduling and service composition methods were presented to achieve trusted service sharing.Finally,the proposed architecture was applied to decentralized scenarios such as domain name resolution,cross domain authentication,and virtual network operation.The proposed architecture realizes the integration of blockchain and network and supports the endogenous trusted sharing of network assets.…”
Get full text
Article -
36404
PUBLIC AWARENESS OF GLUCOSE-6-PHOSPHATE DEHYDROGENASE(G6PD) DEFICIENCY CAUSES AND PREVALENCE FACTORS
Published 2024-10-01“…A random sample of 86 participants was asked to fill a pre-designed questionnaire examining the awareness and knowledge level about G6PD deficiency. …”
Get full text
Article -
36405
Research on link prediction model based on hierarchical attention mechanism
Published 2021-03-01“…In order to solve the problem that the existing graph attention mechanism tends to cause attention distribution to certain relations with high frequency when performing link prediction related tasks, a new link prediction model based on hierarchical attention mechanism was proposed.In the link prediction task, a hierarchical attention mechanism was designed to give different attention to the relationships of different relationship types connected to a given entity in the knowledge graph according to the relationship in the prediction task.While the characteristics of multi-hop neighbor entities were pay attention to, the relationship characteristics was pay more attention to find the relationship type that matches the target relationship.Through comparison experiments with the mainstream models on multiple benchmark data sets, the results show that the performance of the model is better than the mainstream models and has good robustness.…”
Get full text
Article -
36406
"Anatheism" within the framework of theodicy: from theistic thinking to thepaschitic thinking in a pastoral hermeneutics
Published 2016-06-01“…It discusses both inclusive and exclusive approaches to the theodicy issue, and proposes a paradigm shift from threat power to intimate, vulnerable power. A diagram is designed in order to identify different metaphors for God in pastoral caregiving. …”
Get full text
Article -
36407
Research on non-orthogonal transmission strategy for content delivery in caching networks
Published 2023-10-01“…A two-stage adaptive non-orthogonal/orthogonal multiple access transmission scheme was designed for content delivery scenarios in wireless caching networks.For the scheme, a high-reliability user scheduling strategy was proposed, and the analytical expression of the outage probability and its asymptotic expression in high signal-to-noise ratio regime were derived by theoretical analysis.The analysis results indicate that the proposed strategy can achieve full spatial diversity gain.Simulation results demonstrate that compared with the instantaneous channel state information-based scheduling strategy, the random scheduling strategy, and the conventional orthogonal multiple access transmission strategy, the proposed strategy can achieve better content delivery reliability than existing strategies by obtaining the spatial diversity gain.…”
Get full text
Article -
36408
Adaptive delay scheduling algorithm based on data center load analysis
Published 2011-01-01“…Current delay scheduling algorithms,based on static waiting time threshold,can not adapt to dynamic load of a data center.To address this issue,an adaptive waiting time threshold model was proposed.Based on this model,an adap-tive delay scheduling algorithm(ADS) was designed.ADS adjusts jobs’ waiting time threshold dynamically to reduce the job response time,according to the information of idle servers’ arrival intensity,available network bandwidth and job running status.A prototype system using ADS was developed,on which the validation of the adaptive waiting time threshold model and the evaluation of ADS’s performance were carried out.It is shown that ADS outperforms previous delay scheduling algorithms in term of the job response time.…”
Get full text
Article -
36409
Utilisation et rôles des exemples lors d’enseignements universitaires de chimie
Published 2016-10-01“…The teachers surveyed agree about the place and caracteristics of examples, about their cognitive, pedagogical, motivational or mediative functions On the contrary they disagree when it comes to designate what is done in practical sessions, which are essentially examples for some and concrete situations for others. …”
Get full text
Article -
36410
Block cipher mode research based on identifier of text files
Published 2017-03-01“…The electronic code book(ECB)mode cannot conceal the data model of the plaintext and has only one private key to the whole plaintext.A block cipher mode based on identity for text files was proposed,which ab-sorbed the advantages of block cipher mode and the feature of plaintext string.A double Hash mapping structure was designed and one layer of the mapping structure maps the plaintext into discontinuous groups,another one which was based on the concept of identify library produced corresponding private key to the plaintext group.The model overcame the discontinuous group and single private key problem and effectively improved the security of the cipher text.The experiment results show that the new model has better security,flexibility and extensibility.…”
Get full text
Article -
36411
Compatibility study between IMT and inter-satellite service systems in 25.25~27.5 GHz frequency band
Published 2016-12-01“…In addition, the tradeoff between the total number of IMT BS and its transmission power was analyzed with certain interference margin.These results are useful for designing and deployment of IMT systems in 25.25~27.5 GHz band 5G spectrum planning in the future.…”
Get full text
Article -
36412
Sick Day Management for Adults with Diabetes Who Take Insulin
Published 2017-08-01“…The best way for people with diabetes to prevent a minor illness from becoming a major illness is to have a personalized sick day plan designed with their health care provider before they become ill. …”
Get full text
Article -
36413
Method for detecting collusion attack node in road condition information sharing based on reputation point
Published 2021-04-01“…Aiming at the problem that on occasion of the release of false road condition information by collusion nodes in the Internet of vehicles collaboratively, message authenticity could not be guaranteed in the process of road condition information sharing, a method for detecting collusion attack nodes in road condition information sharing based on reputation points was proposed.In the process of road condition information aggregation, a malicious information detection algorithm was designed to detect false messages issued by colluding nodes, which could ensure the authenticity and accuracy of messages delivered in the system.Experimental results show that the proposed method has higher detection efficiency for collusion nodes and adaption to a proportion of collusion nodes through security evaluation and experiments in comparison with the existing schemes.…”
Get full text
Article -
36414
Modification of Homotopy Perturbation method for addressing systems of PDEs
Published 2025-03-01“…This work employs a refined variation of the Homotopy Perturbation Method (HPM), termed the Modified Homotopy Perturbation Method (MHPM), designed to obtain accurate solutions for significant systems of partial differential equations (PDEs). …”
Get full text
Article -
36415
Accompagner les pratiques masturbatoires des adolescent.e.s dans des institutions pour personnes dites autistes : gestion du collectif, crainte de l’intime
Published 2018-06-01“…Drawing on a fourteen-month ethnographic study conducted within three specialized institutions for young people designated as autistic, and thirty interviews with its professionals, this article addresses discourses and practices related to masturbation. …”
Get full text
Article -
36416
Global Asymptotic Almost Periodic Synchronization of Clifford-Valued CNNs with Discrete Delays
Published 2019-01-01“…Second, based on the Banach fixed point theorem, we establish the existence and uniqueness of almost periodic solutions of the considered neural networks. Then, by designing a novel state-feedback controller and constructing a proper Lyapunov function, we study the global asymptotic synchronization of the considered neural networks. …”
Get full text
Article -
36417
DYNAMIC ANALYSIS OF DOUBLE COMPOSITE BEAM WITH MOVING MASS
Published 2019-01-01“…The conclusions obtained here provide theoretical references for designing the structures with high strength and light weight.…”
Get full text
Article -
36418
Equilibrium Adsorption of Two-Component Organic Solutes from Aqueous Solutions on Activated Carbon
Published 1986-09-01“…Significant displacement of one solute by the other was observed. The designation of the more strongly adsorbed component depends on the relative concentration of the two solutes in the mixture and on the pH. …”
Get full text
Article -
36419
Handbook of Florida Water Regulation: Introduction
Published 2019-05-01“… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
Get full text
Article -
36420
Configurations, deformations, mutations. Criteria of morphological analysis in adaptive reuse
Published 2021-06-01“…Since many buildings tend to survive over time the functions for which they were designed, it is necessary to analyze reuse interventions through a diachronic process. …”
Get full text
Article