Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
37181
Biophoty: The Biofilm in Biography Theory
Published 2016-12-01“…The term “biopic”, designating properly speaking a Hollywood invention, introduces a deleterious conceptual-cum-ideological misunderstanding that inhibits theorization. …”
Get full text
Article -
37182
Modulation recognition method based on multi-inputs convolution neural network
Published 2019-11-01“…In order to identify the main modulation modes adopted in current satellite communication systems,a signal modulation recognition algorithm based on multi-inputs convolution neural network was proposed.With the prior information of the signals and knowledge of the network topological structure,the time-domain signal waveforms were converted into eye diagrams and vector diagrams to represent the shallow features of the signals.Meanwhile,the modulation recognition model based on multi-inputs convolution neural network was designed.Through the training of the network,the shallow features were deeply extracted and mapped.Finally,the signal modulation recognition task was completed.The simulation results show that compared with the traditional algorithms and deep learning algorithms,the proposed method has a better anti-noise performance,and the overall recognition rate of this algorithm can reach 95% when the signal-to-noise ratio is 5 dB.…”
Get full text
Article -
37183
Kinematics and Trajectory Planning Analysis of 5-DOF Manipulator
Published 2018-01-01“…Aiming at the designed 5-DOF manipulator,the forward kinematics model is established by using D-H method,and the closed expression of inverse kinematics is obtained by using the inverse transformation method and geometry method. …”
Get full text
Article -
37184
The Studio and the Craftsman as Artist: A Study in Periodical Poetics (1893–1900)
Published 2010-06-01“…Founded in 1893 by Charles Holme and edited by Gleeson White, this periodical was created to proclaim the achievements of the Arts and Crafts designers. As any periodical, however, The Studio was a commercial venture too. …”
Get full text
Article -
37185
Risk access control model for Hadoop
Published 2016-01-01“…A risk function of information entropy was designed from users’ his-torical behavior based on setting the tags of subject and object. …”
Get full text
Article -
37186
The Balaton as a Brand (Experiences of a Questionnaire Survey)
Published 2015-12-01“…The empirical research was designed to obtain answers to two questions: whether the image of the region well recognizable and the much-discussed "Balaton-brand" could be formed? …”
Get full text
Article -
37187
Handbook of Florida Water Regulation: Water Wells
Published 2019-05-01“… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
Get full text
Article -
37188
A microscopic image stitching algorithm with improved energy function
Published 2024-09-01“…Secondly, an improved energy function was designed and combined with the dynamic planning technique to effectively search for the optimal suture line in the overlapping region. …”
Get full text
Article -
37189
Préservation du patrimoine bâti et développement durable : une tautologie ? Les cas de Nantes et Angers
Published 2008-03-01“…While heritage is supposed to preserve designated elements, sustainable development can justify some necessary demolition in order to allow urban densification. …”
Get full text
Article -
37190
Handbook of Florida Water Regulation: Safe Drinking Water Act
Published 2019-05-01“… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
Get full text
Article -
37191
Data sharing scheme for 5G IoT based on blockchain
Published 2020-08-01“…The massive amount of IoT data has great value,but the existing cloud-based data sharing mechanism faces problems such as single points of failure and internal leakage,which can not ensure the secure sharing of user data.In order to achieve efficient and reliable data sharing,the blockchain technology was used to propose a 5G IoT data sharing scheme based on blockchain.Firstly,the proposed scheme designed data sharing framework and data sharing process,based on the lightning network solution,an off-chain transaction mechanism for data sharing of the internet of things was proposed.Experimental analysis shows that the 5G IoT data sharing framework based on blockchain has strong anti-attack ability and the off-chain transaction mechanism based on lightning network can greatly increase transaction throughput and reduce transaction delay.…”
Get full text
Article -
37192
2000-2015 : un âge d’or du format webdocumentaire
Published 2024-03-01“…A web documentary or an interactive documentary is a documentary film designed for the web, broadcast on the web and available for viewing on the web. …”
Get full text
Article -
37193
An evaluation of New Zealand political party Websites.
Published 2004-01-01“…This study examines the effectiveness of the Websites of New Zealand political parties, focusing on the functions that the parties were performing online and on how effectively they were delivering these functions. The research was designed to provide a quantitative evaluation of party Websites and to allow for longitudinal comparisons and comparisons between countries. …”
Get full text
Article -
37194
Handbook of Florida Water Regulation: Groundwater Discharge Regulations at the State Level
Published 2019-05-01“… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
Get full text
Article -
37195
Automatic prediction for IP backbone network traffic
Published 2020-08-01“…Efficient and reliable network traffic prediction is the basis of network planning and capacity expansion construction.Currently,there is no integral theoretical model to describe internet traffic.Most of the industry designs simplified and operable prediction models.Firstly,according to the characteristics of China Telecom’s IP backbone network traffic and its planning requirements,the IP backbone network traffic was analyzed and forecasted by using the multi-factor regression model and the function adaptive mode of time series.The characteristics,advantages,disadvantages and applicable scenarios of these two models were compared based on simulation of a large number of actual network data.A set of principles and methods for selecting prediction model and optimizing parameters were proposed.Then,an automatic forecasting system with the high performance of dealing with hundreds of time series was built to greatly simplify and improve the traffic prediction efficiency.Finally,the development orientation of network capacity extension and key points of future IP traffic prediction were prospected.…”
Get full text
Article -
37196
Fractal Control and Synchronization of the Discrete Fractional SIRS Model
Published 2020-01-01“…After discussing the fixed point of the fractional order system, controllers of Julia sets are designed by utilizing fixed point, which are introduced as a whole and a part in the models. …”
Get full text
Article -
37197
Network traffic classification method basing on CNN
Published 2018-01-01“…Since the feature selection process will directly affect the accuracy of the traffic classification based on the traditional machine learning method,a traffic classification algorithm based on convolution neural network was tailored.First,the min-max normalization method was utilized to process the traffic data and map them into gray images,which would be used as the input data of convolution neural network to realize the independent feature learning.Then,an improved structure of the classical convolution neural network was proposed,and the parameters of the feature map and the full connection layer were designed to select the optimal classification model to realize the traffic classification.The tailored method can improve the classification accuracy without the complex operation of the network traffic.A series of simulation test results with the public data sets and real data sets show that compared with the traditional classification methods,the tailored convolution neural network traffic classification method can improve the accuracy and reduce the time of classification.…”
Get full text
Article -
37198
Handbook of Florida Water Regulation: Florida Watershed Restoration Act
Published 2019-05-01“… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
Get full text
Article -
37199
SDN security control and forwarding method based on cipher identification
Published 2018-02-01“…Aimed at the limited matching fields and the lack of effective data source authentication mechanism in the software defined networking (SDN),a SDN security control forwarding method based on cipher identification was proposed.First,the cipher identification was generated according to the user identity,file attributes or business content and other characteristics,and the data stream was marked by the cipher identification and signed with the private key based on the cipher identification.Then,when the data stream entered and left the network,the forwarding device verified its signature to ensure the authenticity of the data.At the same time,the cipher identification was designed as a matching item recognized by the forwarding device,and the network forwarding behavior was defined based on the cipher identification,so a fine-grained network control capability could be formed based on people,things,and business flow.Finally,the validity of the method is verified by experimental analysis.…”
Get full text
Article -
37200
Handbook of Florida Water Regulation: Federal Insecticide, Fungicide, and Rodenticide Act
Published 2019-05-01“… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
Get full text
Article