Showing 37,261 - 37,280 results of 46,768 for search '"Design"', query time: 0.17s Refine Results
  1. 37261

    Recent developments in the Canadian economy: Fall 2024 by Guy Gellatly, Carter McCormack

    Published 2024-10-01
    “…An integrated data module designed to support the analysis of current economic conditions, which includes monthly summaries for selected economic indicators, is available at Canadian Economic Tracker(Statistics Canada n.d.). …”
    Get full text
    Article
  2. 37262

    Florida Wetlands: Extension Web Site by Mark Clark

    Published 2004-09-01
    “…The Florida Wetlands Extension web site is designed to provide you with a better understanding of wetlands and wetland-related issues in Florida where these ecosystems are such a prominent feature. …”
    Get full text
    Article
  3. 37263

    Association rules recommendation algorithm supporting recommendation nonempty by Ming HE, Wei-shi LIU, Jiang ZHANG

    Published 2017-10-01
    “…Existing association rule recommendation technologies were focus on extraction efficiency of association rule in data mining.However,it lacked consideration of recommendation balance between popular and unusual data and efficient processing.In order to improve the quality and efficiency of personalized recommendation and balance the recommendation weight of cold and hot data,the problem of mining frequent itemset based on association rule was revaluated and analyzed,a new evaluation metric called recommendation RecNon and a notion of k-pre association rule were defined,and the pruning strategy based on k-pre frequent itemset was designed.Moreover,an association rule mining algorithm based on the idea was proposed,which optimized the Apriori algorithm and was suitable for different evaluation criteria,reduced the time complexity of mining frequent itemset.The theoretic analysis and experiment results on the algorithm show that the method improved the efficiency of data mining and has higher RecNon,F-measure and precision of recommendation,and efficiently balance the recommendation weight of cold data and popular one.…”
    Get full text
    Article
  4. 37264

    A Lissajous Curve–Based Method for Busbar Protection by M. Sarlak

    Published 2024-01-01
    “…Using this property, an algorithm was designed to distinguish between internal and external faults. …”
    Get full text
    Article
  5. 37265

    Secure D2D underlaying cellular communication based on artificial noise assisted by Xiao-lei KANG, Xin-sheng JI, Kai-zhi HUANG

    Published 2015-10-01
    “…A secure communication scheme based on artificial noise assisted from base station(BS)was proposed to improve the system secrecy rate of the D2D underlaying cellular.Firstly,the system secrecy rate was modeled.Then the BS with multi-antennas added artificial noise(AN)in cellular user’s signal as well as designed beam vectors of the desired signal and artificial noise to maximize system secrecy rate.In the end,a joint optimization scheme based on the fairness constraint was introduced to optimize beam vectors of the desired signal,the power allocation for BS’s information signal and AN and the D2D power control.Simulation results show that the system ergodic secrecy rate can be improved 2.7 bit·s<sup>−1</sup>·Hz<sup>−1</sup>more than the schemes based on SVD and zero-forcing at most.…”
    Get full text
    Article
  6. 37266

    Valutare, progettare, implementare. I percorsi punitivo-rieducativi del sistema penale minorile tra giustizia riparativa e terzo settore by Fabio Ricciardi

    Published 2024-06-01
    “…Hence the proliferation of re-educational (stay in the community, probation for social service, criminal mediation). These tools, designed with the aim of combining the punitive aspect with that of subjective repentance, try to carry on the implementation of personal skills, remaining in the balance between the need to guarantee the expiation of the sentence and that of producing new subjectivities, able to free themselves from conditions of social marginality as long as the characteristics suitable for inclusion in the productive system are acquired.…”
    Get full text
    Article
  7. 37267

    Asynchronous perception algorithm based on energy detection by Pan YU, Bin LI, Cheng-lin ZHAO

    Published 2017-03-01
    “…In the future heterogeneous wireless networks,since primary user (PU) and cognitive secondary user (SU) are not coordinated to be synchronous,it will result in sense timing difference between PU’s transmitter and SU’s receiver.For this asynchronous sense case,a new asynchronous sensing algorithm based on Bayesian estimation theory was proposed.A unified dynamic state space model was first proposed to describe the observable energy relationship with dynamic PU state and unknown timing difference.Then,an iterative estimation scheme was designed using stochastic finite set and the rules of maximum posterior probability.Finally,approximated estimation results were obtained by using a particle filter.The simulation results show that the proposed asynchronous scheme significantly eliminates the uncertainty of the received signal information and thus improves the spectrum sensing performance by obtaining the time difference accurately.…”
    Get full text
    Article
  8. 37268

    Analysis of Static Stiffness and Dynamic Characteristic of a New Pipe Handling Robot by Yan Sun, Song Li, Xiangchen Liu

    Published 2021-08-01
    “…In order to improve the processing efficiency of aviation conduit, a new type of three coordinate conduit handling robot is designed to cooperate with the CNC pipe bender for straight pipe bending. …”
    Get full text
    Article
  9. 37269

    Higher-order topology for collective motions by Zijie Sun, Tianjiang Hu

    Published 2024-12-01
    “…Then, interactions in hypergraph are designed between both individuals and sub-groups. It not only enhances connectivity of the interaction network but also mitigates its localized feature. …”
    Get full text
    Article
  10. 37270

    Construction and application of a multi-objective rolling horizon optimization mathematical model in intelligent dispatching for telecom operators by LI Fang, MA Xiaoliang, LIU Ying, LI Yuan, XIN Sheng

    Published 2024-10-01
    “…Additionally, an adaptive multi-objective optimization algorithm was designed, incorporating techniques such as adaptive weight adjustment, multi-objective optimization, and rolling horizon optimization to solve the multi-objective optimization model. …”
    Get full text
    Article
  11. 37271

    Research on asynchronous robust federated learning method in vehicle computing power network by YIN Hongbo, WANG Shuai, ZHANG Ke, ZHANG Yin

    Published 2024-12-01
    “…Secondly, a model selection method was designed, and potential malicious model detection and vehicle reputation evaluation methods are proposed to further enhance the robustness of the system. …”
    Get full text
    Article
  12. 37272

    Resources Scheduling Algorithm in Power Wireless Private Network Based on SDON by Ningzhe Xing

    Published 2017-01-01
    “…According to the characteristics of OFDM resource allocation and the numerical control separation and programmable feature of SDON, different scheduling methods are designed for different services. Simulation analysis shows that this algorithm can effectively improve the system throughput, guarantee QoS, and improve the transmission performance of different services.…”
    Get full text
    Article
  13. 37273

    Data management based on blockchain and edge computing for Internet of things by Guanjie CHENG, Zhengjie HUANG, Shuiguang DENG

    Published 2020-06-01
    “…The popularity of smart devices has driven the development of the application of Internet of things (IoT) technology,and the resulting massive amount of IoT data has brought challenges to traditional centralized data management methods,such as performance,privacy,and security.Therefore,a data management framework of IoT based on blockchain and edge computing was proposed to support the distributed IoT data management.The distributed storage and access control could be provided by the framework for the IoT data.At the same time,a set of the built-in encryption scheme was designed to protect the data security and privacy and safeguard the data ownership.By introducing edge computing,the scalability bottleneck of the blockchain the system was relieved.The processes of data storage and data access based on this framework were given,and the algorithm of the system implementation based on the smart contract technology was explained in detail.Experiments show that the IoT data management system based on this framework outperforms the traditional cloud-based data management systems.…”
    Get full text
    Article
  14. 37274

    Building Science Identity Through Mentorship Vision Boards by Andrea Jonahs, Adama Olumo

    Published 2024-12-01
    “… This qualitative study describes a novel intervention designed to build science identity in first-year civil engineering students. …”
    Get full text
    Article
  15. 37275

    Decision-aided-based multiple blind PN code estimation algorithm of asynchronous CDMA signal by Zhaoyang QIU, Tianyun LI, Xiangming CHEN

    Published 2020-08-01
    “…Aiming at the problem of blind estimation of multi-user pseudo-code of multi-path asynchronous code division multiple access (CDMA) signal,using the finite element (FA) characteristic of transmitted symbol,a decision aid (DA) method based on maximum likelihood was proposed.A two-step iterative estimation structure for PN code,transmitted bit and channel was designed to realize the estimation of multiple user code in asynchronous CDMA system with superior performance.Moreover,the Cramer-Rao bound (CRB) of PN code estimation in asynchronous CDMA signal was derived to evaluate the performance of proposed method.Simulation indicates significant improvement in performance which is close to the theory bound of the proposed method compared to commonly-used iterative least square with projection (ILSP) method.The method can also achieve superior estimation when the user number increases.…”
    Get full text
    Article
  16. 37276

    Compression strategies selection method based on classification of HBase data by Hai-yan WANG, Cai-hang FU

    Published 2016-04-01
    “…HBase data was classified into cold and hot data according to the access frequency of each data file and an access level would be designated to each file. On this base, an evaluation layer was added and a compression strategies selection method based on access level with integration of neighbor sector and statistic column based selection methods. …”
    Get full text
    Article
  17. 37277

    Improved continuous enhancement routing solution for energy-aware data aggregation in wireless sensor networks by Edson Ticona-Zegarra, Rafael CS Schouery, Leandro A Villas, Flávio K Miyazawa

    Published 2018-05-01
    “…Given that transmissions are the most energy-demanding operation, routing algorithms should consider efficient use of transmissions in their designs in order to extend the network lifetime. To tackle these challenges, a centralized algorithm is proposed, called improved continuous enhancement routing (ICER), for computing routing trees of refined quality, based on data aggregation while being aware of the battery energy state. …”
    Get full text
    Article
  18. 37278

    The Perfect Way to Predict the Severity of Acute Pancreatitis: The Search Continues by Daniel C Sadowski

    Published 2004-01-01
    “…This study was designed to determine the clinical utility of three rating scales (Ranson's, Acute Physiology And Chronic Health Evaluation [APACHE] II and Glasgow) in predicting the severity of acute pancreatitis experienced by patients known to have human immunodeficiency virus (HIV) or acquired immunodeficiency syndrome (AIDS). …”
    Get full text
    Article
  19. 37279

    A protocol for loading Calcein-AM into extracellular vesicles from mammalian cells for clear visualization with a fluorescence microscope coupled to a deconvolution system. by María-Angélica Calderón-Peláez, Jaime E Castellanos, Myriam L Velandia-Romero

    Published 2025-01-01
    “…In this study, we adapted a protocol originally designed for EVs analysis by flow cytometry using Calcein-AM, and convert it into a useful and effective tool for visualizing EVs by epifluorescence microscopy coupled with a deconvolution system. …”
    Get full text
    Article
  20. 37280

    Trajectory Tracking of Autonomous Ground Vehicles with Actuator Dead Zones by Pengfei Zhang, Qiyuan Chen, Tingting Yang

    Published 2021-01-01
    “…Finally, the trajectory tracking control strategy is designed, and simulation comparison shows the effectiveness of the compensate method. …”
    Get full text
    Article