Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
36941
Key technology and application of intelligent connected patrol vehicles for security scenario
Published 2020-04-01“…Practical applications combined with industry scene is a common problem in the present artificial intelligence technology.Facing the security application scenario,the practice landing of unmanned technology -- intelligent connected patrol vehicle was studied.Integrating different sensors such as camera,LiDAR,inertial navigation system (INS),etc,the awareness system can accurately identify the platform itself,road conditions and target behavior using key technology such as artificial intelligence (AI),data fusion.Combining human intelligence (HI) in scene cognition of human experience and artificial intelligence (AI) in cognition of computing,a hybrid intelligent cognitive system using to security scene was built.Based on human in the loop system architecture and technology such as 5G ,vehicle to everything (V2X),edge computing,etc,different interactions between human ,machine and environment were designed,which ensured the safe and reliable operation of the system and increased the work efficiency by a wide margin.…”
Get full text
Article -
36942
Elisabeth of Bohemia on the Soul
Published 2023-03-01“…While Elisabeth clearly offers the problem of interaction, it is only one of several worries each of which is designed to show that Descartes’ account of the soul is insufficient. …”
Get full text
Article -
36943
Dinâmicas territoriais do espaço agrário na Amazônia: a dendeicultura na microrregião de Tomé-Açu (PA)
Published 2012-11-01“…We analyzed this space how the uses are designed from the territory controlled by private interests of palm culture; uses that threaten their production of the peasant way of life, especially with the formation of the land market and also the association between of palm oil agribusiness and family farming. …”
Get full text
Article -
36944
Représentation sociale du milieu marin et iconographie du territoire chez des élus de communes littorales françaises
Published 2015-06-01“…Participants were asked to perform two verbal association tasks designed to explore their representations of the coastal part of their municipality. …”
Get full text
Article -
36945
Risk control method for power data support based on embedded technology
Published 2024-02-01“…In order to improve the ability of bad data identification and fault location accuracy in power system risk control, a new risk control method for power systems using embedded technology was designed.S3C2440 chip was used as the central processing unit, the phasor measurement unit (PMU) technology was used to identify bad data in the power system, improving the efficiency of identification.Improved on the basis of traditional multiverse algorithms, fault localization was based on data collected by PMU, effectively improving the accuracy of fault localization.In the simulation experiment, the efficiency of identifying bad data by the proposed method has been improved by at least 33.76%, the accuracy of fault localization has been improved by 26.33%, and the efficiency has been improved by at least 43.4%.The proposed method has good risk control capabilities in the power system.…”
Get full text
Article -
36946
Status Data and Communication Aspects in Dynamically Clustered Network-on-Chip Monitoring
Published 2012-01-01“…The analysis shows that the monitoring system should be carefully designed in terms of data diffusion and routing and monitoring algorithms to obtain the potential performance improvement.…”
Get full text
Article -
36947
DZENBUDIZMO FENOMENOLOGIJA
Published 2001-01-01“…Within the latter context, these structures open what for Zen is emptiness, pointing to a level of experience for whose designation we lack words. For phenomenology this level is prior to active or passive constitution and thematization. …”
Get full text
Article -
36948
Handbook of Florida Water Regulation: Pollutant Storage Tank Systems
Published 2019-05-01“… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
Get full text
Article -
36949
Un prince français en Suède. Les stratégies de légitimation dans l’édification de la dynastie Bernadotte (1810-1844)
Published 2020-10-01“…His coronation as the ruler of the Kingdoms of Sweden and Norway, founded in 1814, marked the birth of a new dynasty since his son, Oscar I, was designated Crown Prince of the unified Kingdom. As soon as he was elected to the throne, Jean-Baptiste Bernadotte realized the benefits of having his son at his side to legitimize his reign. …”
Get full text
Article -
36950
Les références spatiales et temporelles des paysages forestiers du rewilding en Europe : imaginaires, discours et projets
Published 2020-07-01“…Moreover, while the proponents of rewilding "look" to the past, they also develop futuristic projects designed over long periods of time. The implementation of rewilding operations integrates simple transpositions of these models as well as the complexity of local histories. …”
Get full text
Article -
36951
4-H Livestock Judging: Introduction and Leader's Guide
Published 2012-01-01“…It serves as a curriculum resource within the Florida 4-H program, specifically designed for teaching livestock judging to young people aged 11-18. …”
Get full text
Article -
36952
PFM:a SMS4 algorithm against high-order power analysis attacks
Published 2010-01-01“…A fixed-value mask algorithm for SMS4 was proposed in order to resist power analysis attack based SMS4.Firstly,an atomic mask algorithm of SMS4 was designed to resist against high-order power analysis attack based on the study of the structure of SMS4 algorithm,the intermediate variables were masked in the method.Secondly,pseudo-random fixed-value mask method(PFM) was proposed based on the above method,when its hardware implementation aiming at low power and less areas was considered about.Moreover,PFM has the ability to resist against high-order power analysis attacks when applied to the sensor node of special environment of communication.Finally,the experimental results show that the proposed algorithm has the ability to effectively resist second high-order differential power analysis attack without increasing much power and hardware resources.…”
Get full text
Article -
36953
Handbook of Florida Water Regulation: State Regulatory Powers
Published 2019-05-01“… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
Get full text
Article -
36954
„Momenty wychowawcze” w projektowaniu procesu kształcenia kulturowej kompetencji dzieci
Published 2019-09-01“…The aim of the study was to diagnose Janusz Korczak’s “educational moments” in designing the process of developing cultural competence. …”
Get full text
Article -
36955
Handbook of Florida Water Regulation: Florida Department of Health
Published 2019-05-01“… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
Get full text
Article -
36956
Multidimensional QoS cloud computing resource scheduling method based on stakeholder perspective
Published 2019-06-01“…A multidimensional cloud computing architecture is designed and a multidimensional cloud resource scheduling model is constructed based on the stakeholder perspective of cloud users and cloud service providers to meet the high QoS requirements of cloud users (such as task execution time and task completion time) with low computing costs (such as energy consumption,economic costs and system availability).For the second-level cloud resource scheduling,an MQoS cloud resource scheduling algorithm based on multiple Greedy algorithm is proposed.The experimental results show that under the four cloud computing application scenarios with no aftereffects,the MQoS cloud resource scheduling algorithm has an overall increase of 206.42%~228.99% and 34.26%~56.93 in terms of multidimensional QoS degree compared with FIFO and M2EC algorithms.It has an average overall reduction of 0.48~0.49 and 0.20~0.27 in terms of cloud data center load balance difference.…”
Get full text
Article -
36957
Active deception defense method based on dynamic camouflage network
Published 2020-02-01“…In view of the problem that the existing honeypots often fail to resist the penetration attack due to the lack of confidentiality,an active deception defense method based on dynamic camouflage network (DCN) was presented.The definition of DCN was given firstly,and then the attacker-defender scenario of active deception based on DCN was described.Next,the interaction process of the attacker-defender scenario was modeled by using a signaling game,whose equilibrium can guide the selection of optimal deception strategy.Furthermore,to quantify the payoffs accurately,the two-layer threat penetration graph (TLTPG) was introduced.Finally,the solution for game equilibrium was designed,through which pure strategy and mixed strategy could be calculated simultaneously.The experimental results show that,based on the dynamic camouflage network,the perfect Bayesian equilibrium can provide effective guidance for the defender to implement the optimal defense strategy and maximize the benefits of the defender.In addition,the characteristics and rules of active deception defense DCN-based are summarized.…”
Get full text
Article -
36958
Handbook of Florida Water Regulation: Toxic Substances Control Act
Published 2019-05-01“… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
Get full text
Article -
36959
Risk assessment of autonomous vehicle based on six-dimensional semantic space
Published 2024-01-01“…To address the problems of inadequate extraction of risk elements and low robustness of risk scenario assessment in autonomous vehicles, a risk assessment framework based on six-dimensional semantic space was proposed, which included risk element extraction based on six-dimensional semantic space and risk scenario assessment based on knowledge graph.Formerly, the semantic space was constructed with RGB and IR data mapped, and rich features were extracted using inter-modal correlations for explicit and potential risk elements.Subsequently, risk elements were distilled into a knowledge graph by semantic role annotation and entity fusion, and an inference method was designed by combining node completion and risk level function for accurate risk assessment.Simulations show that the proposed method surpasses current MSMatch and iSQRT-COV-Net in accuracy, false/missed alarm rate, and processing time.…”
Get full text
Article -
36960
Strategies for trading in money markets
Published 2025-01-01“…From the interviews with banking experts, some basic requirements for the job profile of money market traders were defined, 5 strategies for money trading designed and related risks identified. …”
Get full text
Article