Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
36721
Some New Transformation Properties of the Nielsen Generalized Polylogarithm
Published 2014-01-01“…By use of these transformation formulas presented, new fast algorithms for Nielsen generalized polylogarithm Sn,p(z) can be designed. For sn,p=Sn,p(1), a new recurrence formula is also given. …”
Get full text
Article -
36722
Research on algorithm for raster map multi-level sharing based on region incrementing color visual cryptography
Published 2019-09-01“…In view of the characteristics of raster map,important data of the map were divided into different map layers by using the idea of map segmentation.A regional incremental color visual cryptographic scheme for raster map sharing was designed,and a model based on this scheme was proposed.At the same time,the specific application process was given.In order to solve the problem of large pixel expansibility and poor visual effect of image recovery in traditional regional incremental visual cryptography scheme,random numbers and the access structure optimization were used.Construction of the method was simple and the additional overhead of generating and saving the encryption matrix was avoided.The experimental results show that the scheme can achieve multilevel raster map sharing with the map’s perfect recovery,meanwhile the extension of the scheme pixel is greatly reduced.…”
Get full text
Article -
36723
Robust Control of Wind Turbines by Using Singular Perturbation Method and Linear Parameter Varying Model
Published 2016-01-01“…Then stability and robust properties of the open-loop linear singularly perturbed system are analyzed using linear matrix inequalities (LMIs). An algorithm of designing a stabilizing state-feedback controller is proposed which can guarantee the robust property of the closed-loop system. …”
Get full text
Article -
36724
Chitosan-Based Nanogel Enhances Chemotherapeutic Efficacy of 10-Hydroxycamptothecin against Human Breast Cancer Cells
Published 2019-01-01“…In this work, a positively charged CS-based nanogel was designed and synthesized to inhibit the proliferation of breast cancer cell lines. …”
Get full text
Article -
36725
What Is the Role of Beta-Agonist Bronchodilators in the Day-to-Day Treatment of Chronic Asthma?
Published 1995-01-01“…New longer acting inhaled beta-agonists designed for regular use are being introduced and their exact role remains to be defined. …”
Get full text
Article -
36726
Fabrication of Customized Sectional Impression Trays in Management of Patients with Limited Mouth Opening: A Simple and Unique Approach
Published 2013-01-01“…The present case reports describe the fabrication of sectional custom trays designed for dentulous patients with chronic tobacco-induced submucous fibrosis.…”
Get full text
Article -
36727
Additive Consistency and Group Decision-Making Consensus Analysis of Hesitant-Intuitionistic Fuzzy Preference Relations
Published 2025-01-01“…Firstly, to preserve the original decision information effectively, the consistency improvement algorithm is designed to identify decision information requiring modification and subsequently execute a localized adjustment process. …”
Get full text
Article -
36728
Common Freshwater Fish Parasites Pictorial Guide: Flagellates
Published 2005-08-01“… This publication is one in a series of pictorial guides that is designed to assist in the identification of common freshwater fish parasites. …”
Get full text
Article -
36729
3D Large-Pose Face Alignment Method Based on the Truncated Alexnet Cascade Network
Published 2020-01-01“…Aiming at the low accuracy of large-pose face alignment, a cascade network based on truncated Alexnet is designed and implemented in the paper. The parallel convolution pooling layers are added for concatenating parallel results in the original deep convolution neural network, which improves the accuracy of the output. …”
Get full text
Article -
36730
Novel Constrained Dual Mobility Hip Prosthesis to Combat Instability in Revision Total Hip Arthroplasty whilst Preserving Normal Function
Published 2020-01-01“…With the patient’s long-term desire to return to work and ride a bicycle with his children, the patient agreed to proceed with a novel, custom-designed, constrained dual mobility liner which allowed unrestricted movement. …”
Get full text
Article -
36731
Application of 5.8 GHz optical fiber converged communication in transmission line monitoring system
Published 2016-07-01“…When in the depths of the mountains,2G/3G signal is weak or don't exist,or when the high definition video is needed,2G/3G couldn't meet requirements of such high bandwidth,so that communication is intermittent or interrupt,resulting in the condition monitoring data is difficult to transmit reliably to the master station.To solve this problem,2G/3G+5.8 GHz or 5.8 GHz +OPGW converged communication mode was proposed,the signal could be switched automatically to the 5.8 GHz communication mode,and transmits back to the master station after converging the main line and OPGW.Based on the optical fiber converged communication,the transmission line monitoring system and work flow were designed and the application example and the future development prospect were given finally.…”
Get full text
Article -
36732
Real-Time Control Strategy of Elman Neural Network for the Parallel Hybrid Electric Vehicle
Published 2014-01-01“…Through researching the instantaneous control strategy and Elman neural network, the paper established equivalent fuel consumption functions under the charging and discharging conditions of power batteries, deduced the optimal control objective function of instantaneous equivalent consumption, established the instantaneous optimal control model, and designs the Elman neural network controller. Based on the ADVISOR 2002 platform, the instantaneous optimal control strategy and the Elman neural network control strategy were simulated on a parallel HEV. …”
Get full text
Article -
36733
A Novel Terminal Sliding Mode Variable Structure Model Reference Adaptive System Observer for Permanent Magnet Synchronous Motors
Published 2024-01-01“…In addition, a novel reaching law (NRL) is designed to replace the traditional exponential reaching law (TRL) to suppress the chattering phenomenon in the sliding mode control. …”
Get full text
Article -
36734
Analysis of the Dynamic Balance Condition of Crank-group Mechanism
Published 2016-01-01“…It is also proved that such institutions can achieve the balance of force and moment by adding the counterweight without inertia weight mechanism,the application of this dynamic balance method of crank- group mechanism has a theoretical significance for designing the physical prototype experiment and choosing the parameters of counterweight.…”
Get full text
Article -
36735
Damage identification in RC bridges by confronting two approaches: visual inspection and numerical analysis
Published 2023-04-01“…The present article aims to summarize the research study that was conducted the efficiency of methods and techniques designed for the detection and localization of faults in civil engineering structures, particularly in bridge structures. …”
Get full text
Article -
36736
Quantitative method for network security situation based on attack prediction
Published 2017-10-01“…To predict the attack behaviors accurately and comprehensively as well as to quantify the threat of attack,a quantitative method for network security situation based on attack prediction was proposed.By fusing the situation factors of attacker,defender and network environment,the capability of attacker and the exploitability rate of vulnerability were evaluated utilizing the real-time detected attack events,and the expected time-cost for attack-defense were further calculated.Then an attack prediction algorithm based on the dynamic Bayesian attack graph was designed to infer the follow-up attack actions.At last,the attack threat was quantified as the security risk situation from two levels of the hosts and the overall network.Experimental analysis indicates that the proposed method is suitable for the real adversarial network environment,and is able to predict the occurrence time of attack accurately and quantify the attack threat reasonably.…”
Get full text
Article -
36737
Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain
Published 2022-08-01“…To solve the security hazards of identity information and transaction data and the time-consuming problem of traditional single-level encryption methods in the current application scenarios of consortium blockchain, a privacy protection scheme of consortium blockchain based on fair blind signature and hierarchical encryption was proposed.Considering the strong centrality and poor security of the existing fair blind signature scheme, it was redesigned with zero-knowledge proof technology to be applicable for consortium blockchain application scenario.Based on the Paillier homomorphic encryption algorithm, a supervisable hierarchical encryption method was designed, and the method realized the supervision of encrypted transaction data information and reduced the time cost of the encryption and decryption process.The security analysis and simulation results show that the proposed scheme can effectively resist malicious attacks such as tampering and eavesdropping and significantly improve the encryption efficiency.…”
Get full text
Article -
36738
Privacy-preserving scheme for logistics systems based on 2D code and information hiding
Published 2017-11-01“…With regard to the user privacy leakage problem in existing logistics systems,a privacy-preserving scheme for logistics systems based on 2D code and information hiding was proposed.The information hiding tech-nique was used in the proposed scheme to embed the user privacy information into the 2D code on the logistics waybill to achieve access control.To secure the user privacy information,a JPEG image stenographic algorithm for 2D code was designed.Experimental results demonstrate that this algorithm can guarantee the high undetectable performance and the stego 2D code can be correctly decoded.Using the proposed scheme,the institution or the per-son that has the access right can obtain the important privacy information so that the express can be delivered cor-rectly and the user privacy can be preserved.…”
Get full text
Article -
36739
Low pilot overhead parametric channel estimation scheme for RIS-assisted mmWave MIMO systems
Published 2024-09-01“…Firstly, a channel training mechanism with low pilot overhead was designed using a few passive reflection units and constructing a phase shift matrix. …”
Get full text
Article -
36740
Projective Synchronization of Nonidentical Fractional-Order Memristive Neural Networks
Published 2019-01-01“…Firstly, based on the sliding mode control theory, a new fractional-order integral sliding mode controller is designed to ensure the occurrence of sliding motion. …”
Get full text
Article