Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
37261
Recent developments in the Canadian economy: Fall 2024
Published 2024-10-01“…An integrated data module designed to support the analysis of current economic conditions, which includes monthly summaries for selected economic indicators, is available at Canadian Economic Tracker(Statistics Canada n.d.). …”
Get full text
Article -
37262
Florida Wetlands: Extension Web Site
Published 2004-09-01“…The Florida Wetlands Extension web site is designed to provide you with a better understanding of wetlands and wetland-related issues in Florida where these ecosystems are such a prominent feature. …”
Get full text
Article -
37263
Association rules recommendation algorithm supporting recommendation nonempty
Published 2017-10-01“…Existing association rule recommendation technologies were focus on extraction efficiency of association rule in data mining.However,it lacked consideration of recommendation balance between popular and unusual data and efficient processing.In order to improve the quality and efficiency of personalized recommendation and balance the recommendation weight of cold and hot data,the problem of mining frequent itemset based on association rule was revaluated and analyzed,a new evaluation metric called recommendation RecNon and a notion of k-pre association rule were defined,and the pruning strategy based on k-pre frequent itemset was designed.Moreover,an association rule mining algorithm based on the idea was proposed,which optimized the Apriori algorithm and was suitable for different evaluation criteria,reduced the time complexity of mining frequent itemset.The theoretic analysis and experiment results on the algorithm show that the method improved the efficiency of data mining and has higher RecNon,F-measure and precision of recommendation,and efficiently balance the recommendation weight of cold data and popular one.…”
Get full text
Article -
37264
A Lissajous Curve–Based Method for Busbar Protection
Published 2024-01-01“…Using this property, an algorithm was designed to distinguish between internal and external faults. …”
Get full text
Article -
37265
Secure D2D underlaying cellular communication based on artificial noise assisted
Published 2015-10-01“…A secure communication scheme based on artificial noise assisted from base station(BS)was proposed to improve the system secrecy rate of the D2D underlaying cellular.Firstly,the system secrecy rate was modeled.Then the BS with multi-antennas added artificial noise(AN)in cellular user’s signal as well as designed beam vectors of the desired signal and artificial noise to maximize system secrecy rate.In the end,a joint optimization scheme based on the fairness constraint was introduced to optimize beam vectors of the desired signal,the power allocation for BS’s information signal and AN and the D2D power control.Simulation results show that the system ergodic secrecy rate can be improved 2.7 bit·s<sup>−1</sup>·Hz<sup>−1</sup>more than the schemes based on SVD and zero-forcing at most.…”
Get full text
Article -
37266
Valutare, progettare, implementare. I percorsi punitivo-rieducativi del sistema penale minorile tra giustizia riparativa e terzo settore
Published 2024-06-01“…Hence the proliferation of re-educational (stay in the community, probation for social service, criminal mediation). These tools, designed with the aim of combining the punitive aspect with that of subjective repentance, try to carry on the implementation of personal skills, remaining in the balance between the need to guarantee the expiation of the sentence and that of producing new subjectivities, able to free themselves from conditions of social marginality as long as the characteristics suitable for inclusion in the productive system are acquired.…”
Get full text
Article -
37267
Asynchronous perception algorithm based on energy detection
Published 2017-03-01“…In the future heterogeneous wireless networks,since primary user (PU) and cognitive secondary user (SU) are not coordinated to be synchronous,it will result in sense timing difference between PU’s transmitter and SU’s receiver.For this asynchronous sense case,a new asynchronous sensing algorithm based on Bayesian estimation theory was proposed.A unified dynamic state space model was first proposed to describe the observable energy relationship with dynamic PU state and unknown timing difference.Then,an iterative estimation scheme was designed using stochastic finite set and the rules of maximum posterior probability.Finally,approximated estimation results were obtained by using a particle filter.The simulation results show that the proposed asynchronous scheme significantly eliminates the uncertainty of the received signal information and thus improves the spectrum sensing performance by obtaining the time difference accurately.…”
Get full text
Article -
37268
Analysis of Static Stiffness and Dynamic Characteristic of a New Pipe Handling Robot
Published 2021-08-01“…In order to improve the processing efficiency of aviation conduit, a new type of three coordinate conduit handling robot is designed to cooperate with the CNC pipe bender for straight pipe bending. …”
Get full text
Article -
37269
Higher-order topology for collective motions
Published 2024-12-01“…Then, interactions in hypergraph are designed between both individuals and sub-groups. It not only enhances connectivity of the interaction network but also mitigates its localized feature. …”
Get full text
Article -
37270
Construction and application of a multi-objective rolling horizon optimization mathematical model in intelligent dispatching for telecom operators
Published 2024-10-01“…Additionally, an adaptive multi-objective optimization algorithm was designed, incorporating techniques such as adaptive weight adjustment, multi-objective optimization, and rolling horizon optimization to solve the multi-objective optimization model. …”
Get full text
Article -
37271
Research on asynchronous robust federated learning method in vehicle computing power network
Published 2024-12-01“…Secondly, a model selection method was designed, and potential malicious model detection and vehicle reputation evaluation methods are proposed to further enhance the robustness of the system. …”
Get full text
Article -
37272
Resources Scheduling Algorithm in Power Wireless Private Network Based on SDON
Published 2017-01-01“…According to the characteristics of OFDM resource allocation and the numerical control separation and programmable feature of SDON, different scheduling methods are designed for different services. Simulation analysis shows that this algorithm can effectively improve the system throughput, guarantee QoS, and improve the transmission performance of different services.…”
Get full text
Article -
37273
Data management based on blockchain and edge computing for Internet of things
Published 2020-06-01“…The popularity of smart devices has driven the development of the application of Internet of things (IoT) technology,and the resulting massive amount of IoT data has brought challenges to traditional centralized data management methods,such as performance,privacy,and security.Therefore,a data management framework of IoT based on blockchain and edge computing was proposed to support the distributed IoT data management.The distributed storage and access control could be provided by the framework for the IoT data.At the same time,a set of the built-in encryption scheme was designed to protect the data security and privacy and safeguard the data ownership.By introducing edge computing,the scalability bottleneck of the blockchain the system was relieved.The processes of data storage and data access based on this framework were given,and the algorithm of the system implementation based on the smart contract technology was explained in detail.Experiments show that the IoT data management system based on this framework outperforms the traditional cloud-based data management systems.…”
Get full text
Article -
37274
Building Science Identity Through Mentorship Vision Boards
Published 2024-12-01“… This qualitative study describes a novel intervention designed to build science identity in first-year civil engineering students. …”
Get full text
Article -
37275
Decision-aided-based multiple blind PN code estimation algorithm of asynchronous CDMA signal
Published 2020-08-01“…Aiming at the problem of blind estimation of multi-user pseudo-code of multi-path asynchronous code division multiple access (CDMA) signal,using the finite element (FA) characteristic of transmitted symbol,a decision aid (DA) method based on maximum likelihood was proposed.A two-step iterative estimation structure for PN code,transmitted bit and channel was designed to realize the estimation of multiple user code in asynchronous CDMA system with superior performance.Moreover,the Cramer-Rao bound (CRB) of PN code estimation in asynchronous CDMA signal was derived to evaluate the performance of proposed method.Simulation indicates significant improvement in performance which is close to the theory bound of the proposed method compared to commonly-used iterative least square with projection (ILSP) method.The method can also achieve superior estimation when the user number increases.…”
Get full text
Article -
37276
Compression strategies selection method based on classification of HBase data
Published 2016-04-01“…HBase data was classified into cold and hot data according to the access frequency of each data file and an access level would be designated to each file. On this base, an evaluation layer was added and a compression strategies selection method based on access level with integration of neighbor sector and statistic column based selection methods. …”
Get full text
Article -
37277
Improved continuous enhancement routing solution for energy-aware data aggregation in wireless sensor networks
Published 2018-05-01“…Given that transmissions are the most energy-demanding operation, routing algorithms should consider efficient use of transmissions in their designs in order to extend the network lifetime. To tackle these challenges, a centralized algorithm is proposed, called improved continuous enhancement routing (ICER), for computing routing trees of refined quality, based on data aggregation while being aware of the battery energy state. …”
Get full text
Article -
37278
The Perfect Way to Predict the Severity of Acute Pancreatitis: The Search Continues
Published 2004-01-01“…This study was designed to determine the clinical utility of three rating scales (Ranson's, Acute Physiology And Chronic Health Evaluation [APACHE] II and Glasgow) in predicting the severity of acute pancreatitis experienced by patients known to have human immunodeficiency virus (HIV) or acquired immunodeficiency syndrome (AIDS). …”
Get full text
Article -
37279
A protocol for loading Calcein-AM into extracellular vesicles from mammalian cells for clear visualization with a fluorescence microscope coupled to a deconvolution system.
Published 2025-01-01“…In this study, we adapted a protocol originally designed for EVs analysis by flow cytometry using Calcein-AM, and convert it into a useful and effective tool for visualizing EVs by epifluorescence microscopy coupled with a deconvolution system. …”
Get full text
Article -
37280
Trajectory Tracking of Autonomous Ground Vehicles with Actuator Dead Zones
Published 2021-01-01“…Finally, the trajectory tracking control strategy is designed, and simulation comparison shows the effectiveness of the compensate method. …”
Get full text
Article