Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
36801
English and French Teachers’ Assessment Practices in the Ukrainian Context: Understanding Language Assessment Literacy Needs Across Two Languages
Published 2025-01-01“…Seventy Ukrainian teachers completed a questionnaire designed to study their assessments that underpin their LAL. …”
Get full text
Article -
36802
Automatic Transfer Switch (ATS) for Floating Lift Net Powered by Hybrid Energy Source
Published 2025-01-01“…This study focuses on optimizing a hybrid energy system for a floating lift net utilizing solar panels (photovoltaic) and a backup generator managed by an Automatic Transfer Switch (ATS). The ATS system is designed to automatically switch to the backup generator when the primary photovoltaic system drops below a preset voltage threshold of 10V. …”
Get full text
Article -
36803
Concilier diversité des recherches sur l’histoire de Toulouse de 1680 à 1830 et unité d’un système d’information géographique : le cas d’UrbanHist
Published 2023-07-01“…In the case of Toulouse, the teams form the municipal archives and then from FRAMESPA have created the GIS named « UrbanHist », designed both to advance research and to communicate its results to a wide audience. …”
Get full text
Article -
36804
Cross-layer multi-channel MAC protocol combined with QoS search for cognitive wireless multi-hop networks
Published 2013-04-01“…In cognitive wireless multi-hop networks,the spectrum resources are highly variable and diverse.A cross-layer multi-channel MAC protocol combined with QoS search was proposed.The protocol combines the on-demand QoS search with dynamic spectrum allocation via cross-layer method,which only permits the transmission nodes to participate in the spectrum allocation and can guarantee the allocation results meet the QoS requirement.Besides,frequency division duplex transceivers are introduced to continuously listen to the common control channel,and an access algorithm is carefully designed to realize hybrid communication between nodes with erent number of transceivers.Extensive simulations show that our protocol can efficiently guarantees the QoS requirement for end-to-end transmission and significantly improves end-to-end throughput and delay.…”
Get full text
Article -
36805
Substrate Integrated Slot Array Antenna with Required Radiation Pattern Envelope
Published 2016-01-01“…As an example, a K-band 16 × 22 slot array antenna based on the substrate integrated waveguide (SIW) technology is designed, fabricated, and measured. Its radiation pattern can meet the class 3 antenna radiation pattern envelope of the European Telecommunications Standards Institute (ETSI) standard pattern. …”
Get full text
Article -
36806
Studying the Dynamics of Knowledge-Sharing Success Factors Based on Willing Criteria
Published 2022-03-01“…In order to analyse the strengths and weaknesses of the knowledge-sharing process in an organization and designing policies to improve it, the factors affecting the success of this process should be determined. …”
Get full text
Article -
36807
Confirmation method for the detection of malicious encrypted traffic with data privacy protection
Published 2022-02-01“…In order to solve the problem that excessive false positives in the detection of encrypted malicious traffic based on machine learning, secure two-party computation was used to compare character segments between network traffic and intrusion detection rulers without revealing the data content.Based on the comparison results, an intrusion detection feature matching algorithm was designed to accurately match keywords.A random verification strategy for users’ input was also proposed to facilitate the method.As a result, malicious users couldn’t use arbitrary data to participate in secure two-party calculations and avoid confirmation.The security and resource consumption of the method were theoretically analyzed and verified by a combination of real deployment and simulation experiments.The experimental results show that the proposed method can significantly improve the detection performance with low system resources.…”
Get full text
Article -
36808
Data Analysis for Predictive Maintenance of Servo Motors
Published 2020-01-01“…Our study offers a PLC-based vibration and temperature measurement system designed as a solution of this problem. In this system, vibration and temperature measurements were made while the servo motor was kept running. …”
Get full text
Article -
36809
Comprehensive experimental study on the impact of size and geometry of 3D-printed devices on solid-phase extraction efficiency and reproducibility
Published 2025-08-01“…These results provide valuable insights for designing optimized sorbent devices, contributing to advancements in solid-phase extraction.…”
Get full text
Article -
36810
Development of an Intelligent Communication Platform for Remote Practical Work in Education: Integrating AR, VR, and Cloud Technologies
Published 2024-01-01“…This paper presents the development of an intelligent communication platform designed for Remote Practical Works (RPWs) in educational settings. …”
Get full text
Article -
36811
Le rapport ordinaire à l’héritage bâti de l’époque de la colonisation française en Algérie : L’exemple de l’hôtel de ville de Kherrata (Bejaia)
Published 2018-12-01“…The methodology combines architectural and urban knowledge of the city with a questionnaire designed to understand the representations that the population has of this built as a heritage object.…”
Get full text
Article -
36812
Function Projective Synchronization of Two Complex Networks with Unknown Sector Nonlinear Input and Multiple Time-Varying Delay Couplings
Published 2022-01-01“…Based on Lyapunov stability theory and inequality transformation method, the robust adaptive synchronization controller is designed, by which the drive and response systems can achieve synchronization according to the function scaling factor. …”
Get full text
Article -
36813
Development and Prospect of Nanoarchitectured Solar Cells
Published 2015-01-01“…The fundamental principles and important features of these advanced solar cell designs are systematically reviewed and summarized in this paper, with a focus on the function and role of nanostructures and the key factors affecting device performance. …”
Get full text
Article -
36814
RESEARCH ON CALCULATION METHOD OF AXIAL COMPRESSION LOAD-CARRYING CAPACITY OF INTEGRALLY STIFFENED PANEL
Published 2017-01-01“…The accurate calculation of load-carrying capacity of integrally stiffened panels under axial compression is the key factor for designing and analyzing of wing panel,which is essential for the aircraft wing structural efficiency and weight control,it is necessary to study a method that can calculate the load-carrying capacity of integrally stiffened panels under axial compression accurately. …”
Get full text
Article -
36815
Connectivity analysis of IoV based on scale-free network
Published 2021-04-01“…The connectivity of moving vehicles is one of the critical metrics in Internet of vehicles (IoV) that critically influence the performance of data transmission.Due to the high-frequency dynamic changes of the network topology of the IoV, which causes the link to be easily disconnected frequently.It is a critical issue to reduce the probability of link disconnection, and reducing the randomness of link establishment improves the overall network connectivity.To solve the above problems, the network’s connectivity was analyzed under the line of sight path loss model and the interference model, and the dynamic growth (DN) algorithm was designed through the characterization of the IoV link in the real world.Moreover, a scale-free VANET was built through the network’s addition and deletion of nodes and link preference connections.Simulation results indicate that the overall connectivity of the network is improved by 16%.…”
Get full text
Article -
36816
Terminologie militante et changement social : le cas du terme femicide dans le discours de l’ONU sur la violence envers les femmes
Published 2022-11-01“…We observed the predominance of the term “femicide” compared to other terms designating acts of violence resulting in the death of one or several women, with a significant increase in its use in the 2010’s. …”
Get full text
Article -
36817
Adaptive Dynamic Programming-based Tracking Controls of Multi-Motor Driven Systems
Published 2025-01-01“…On the basis of the approximated dynamics, the optimal performance index is defined and the optimal tracking controls are designed. The adaptive dynamic programming based tracking controls can be divided into steady-state controls and optimal feedback controls. …”
Get full text
Article -
36818
A Q-Learning-Based Parameters Adaptive Algorithm for Formation Tracking Control of Multi-Mobile Robot Systems
Published 2022-01-01“…In order to handle the model uncertainties and external disturbances, a desired linear extended state observer is designed to develop an adaptive formation tracking control strategy. …”
Get full text
Article -
36819
Redsharc: A Programming Model and On-Chip Network for Multi-Core Systems on a Programmable Chip
Published 2012-01-01“…The reconfigurable data-stream hardware software architecture (Redsharc) is a programming model and network-on-a-chip solution designed to scale to meet the performance needs of multi-core Systems on a programmable chip (MCSoPC). …”
Get full text
Article -
36820
Actor-critic algorithm with incremental dual natural policy gradient
Published 2017-04-01“…The existed algorithms for continuous action space failed to consider the way of selecting optimal action and utilizing the knowledge of the action space,so an efficient actor-critic algorithm was proposed by improving the natural gradient.The objective of the proposed algorithm was to maximize the expected return.Upper and the lower bounds of the action range were weighted to obtain the optimal action.The two bounds were approximated by linear function.Afterward,the problem of obtaining the optimal action was transferred to the learning of double policy parameter vectors.To speed the learning,the incremental Fisher information matrix and the eligibilities of both bounds were designed.At three reinforcement learning problems,compared with other representative methods with continuous action space,the simulation results show that the proposed algorithm has the advantages of rapid convergence rate and high convergence stability.…”
Get full text
Article