Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
37821
Le numérique à l’université : facteur explicatif des méthodes pédagogiques ?
Published 2018-11-01“…We highlight a positive and significant effect of the use of certain digital technologies on the deployment of pedagogies designed to make students more involved in their learning. …”
Get full text
Article -
37822
Predicting the Elastic Modulus of Nanoparticle-Reinforced Polymer Matrix Composites Based on Digital Image Processing and Finite Elements
Published 2022-01-01“…In this paper, the interfacial layer is designed as a spring model with the help of the effective modulus law, a statistical debonding criterion is proposed to represent the proceeding changes, and metallurgical methods are used to optimize the particles and prepare different composites with uniform dispersion. …”
Get full text
Article -
37823
Wind Instrumentalist’s Magnet-assisted Embouchure Denture
Published 2024-12-01“…Embouchure dentures are designed for their carrier purpose, primarily to suit the functional needs of the orofacial muscles, ensuring that there is no dislodgment of the dentures during the blowing of wind instruments. …”
Get full text
Article -
37824
comparison of the impacts of in-person and virtual conference attendance
Published 2024-09-01“…The questionnaire was designed to gather data relating to in-person and virtual conference attendance. …”
Get full text
Article -
37825
High-precision indoor fast positioning algorithm based on carrier phase
Published 2022-01-01“…In order to improve the positioning accuracy and the speed of position solution in indoor wireless environment, a high-precision indoor fast positioning algorithm based on carrier phase was proposed.By introducing the reference terminal, the influence of clock error between devices on the accuracy of the positioning algorithm was completely eliminated by using the double difference between the carrier phase measurements of the terminal to be positioned and the reference terminal.Taking advantage of the invariability of integer ambiguity during the phase-locked loop lock-off, an iterative integer ambiguity resolution algorithm based on multi-time point measurement data was designed, and the fast integer ambiguity resolution was realized.After the integer ambiguity was solved, the terminal to be located could be located with high precision by using accurate carrier phase difference measurement.The simulation results show that the positioning algorithm proposed can completely overcome the influence of clock error on positioning performance, and can achieve centimeter-level positioning accuracy at very few sampling time points.…”
Get full text
Article -
37826
Shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means
Published 2021-02-01“…To solve the problem that most studies had not fully considered the sensitivity of location to privacy budget and the influence of trajectory shape, which made the usability of published trajectory poor, a shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means was proposed.Firstly, according to the topological relationship of geographic space, relative entropy was used to calculate the sensitivity of real location to privacy budget, a real-time calculation method of location sensitive privacy level was designed, and a new privacy model was built in combination with differential privacy budget.Secondly, K-means algorithm was used to cluster the release position to obtain the release position set that was most similar to the real position direction, and Fréchet distance was introduced to measure the similarity between the release track and the real track, so as to improve the availability of the release track.Experiments on real data sets show that the proposed trajectory protection mechanism has obvious advantages in trajectory availability compared with others.…”
Get full text
Article -
37827
La 44e élection présidentielle :un événement révélateur des mutations de la société américaine
Published 2008-10-01“…C’est dans cette perspective que s’inscrit ce premier texte rédigé au moment où les deux partis politiques (au travers des délégués) ont désigné leur candidat après une série d’élections qui se sont déroulé dans les Etats de la fédération. …”
Get full text
Article -
37828
Resources used by Lebanese Secondary Physics Teachers' for Teaching Electricity: Types, Objectives and Factors Affecting their Selection
Published 2018-03-01“…For this aim, a qualitative approach was used and the research was designed as a collective case study where four teachers were purposefully selected. …”
Get full text
Article -
37829
Experimental and numerical study of cemented bone-implant interface behavior
Published 2010-12-01“…The experimental setup was designed to allow cyclic loading of the sample of pelvic bone with implanted cemented acetabular component. …”
Get full text
Article -
37830
Surface Treatment and Comparative Analysis for the Performance Assessment of Crushed Brick Aggregates as Coarse Aggregate Substitutes in Concrete
Published 2024-12-01“…This research paper investigates the feasibility of utilizing recycled bricks as an alternative to traditional aggregates in concrete mixtures. Various mix designs were developed with a variable water-to-cement (w/c) ratio for the and fine aggregate, while the composition of coarse aggregates was modified to examine the effects on the physical and mechanical properties of fresh and hardened concrete. …”
Get full text
Article -
37831
Developing intercultural competence by teaching literature: principles and practice from a case-study in two Algerian universities
Published 2019-11-01“…Finally, we provide recommendations in terms of theory and practice for teachers and syllabus designers who intend to use literary texts for intercultural learning. …”
Get full text
Article -
37832
Provably secure rational delegation computation protocol
Published 2019-07-01“…A provably secure rational delegation computation scheme was proposed to solve the requirement of security issues in rational delegate computation.Firstly,game theory was introduced into delegation computation and according to rational participants behavior preferences analysis,a rational delegate computing game model was designed.Secondly,according to the equilibrium demand of game model and the security requirement of rational delegation computation,a rational security model was established.Thirdly,combining Yao's garbled circuit with its advantages of re-randomization,as well as full homomorphic encryption technology,the rational delegation computation protocol was constructed.And the combination of strategies in the protocol could reach the Nash equilibrium state.Finally,the security of the protocol and the privacy of the input and output were proved according to the rational security model,and the performance analysis shows the validity of the protocol.The proposed rational delegation computing protocol not only satisfies the traditional security,but also considers the behavioral preference of participants,which is more in line with the delegationcomputing mode under the big data environment.…”
Get full text
Article -
37833
Matching and Optimization for the Parameter of Electric City Vehicle Powertrain
Published 2017-01-01“…Under the double pressures of energy crisis and environmental problems,the governments and the automobile enterprises have paid much attention to the pure electric vehicle which has advantages of zero emission,low noise and wide range of energy sources.Electric car is not very different from conventional cars,whether in the main structure or in the appearance.The main change is made in terms of drivetrain.Taking the pure electric city car as our research target,the power transmission system parameter is analyzed and designed,according to the vehicle parameters,power and economy requirements,the vehicle power system parameter is matched.The matched parameters of power system preliminarily is optimized from improving the transmission efficiency,taking the shortest time of acceleration and working conditions driving range maximum as optimization goal.The fitness function of transmission speed ratio is constituted of objective function and constraints condition by using a penalty function.The optimization is carried out by genetic algorithm,the optimal parameters of power system are obtained.…”
Get full text
Article -
37834
Joint Wear Prediction and Experiments Considering the Influences of Coating and Spherical Joint Clearances
Published 2025-01-01“…In order to verify the correctness of the theoretical analysis method of the system dynamics considering coating and joint clearances in the previous stage, this paper independently designed and built the RSSP experimental platform of the spatial four-bar mechanism by taking the shear fork mechanism of the soybean picking and separating machine in farming operations, and measured the dynamic changes in the execution components and the wear depth of the spherical shell surface in different working conditions. …”
Get full text
Article -
37835
ROBOT TRAJECTORY PLANNING BASED ON 4-1-4 SPLINE INTERPOLATION WITH THE SAME INTERPOLATION TIME
Published 2020-01-01“…A new type of upper extremity exoskeleton rehabilitation robot is designed,which have 5-degree of freedom.Firstly,the mechanical structure of the robot is analyzed. …”
Get full text
Article -
37836
Resource Optimization Technology Using Genetic Algorithm in UAV-Assisted Edge Computing Environment
Published 2022-01-01“…First, a UAV-assisted mobile edge computing (MEC) system is designed to help users execute computation tasks through the UAV or relaying to the ground base station. …”
Get full text
Article -
37837
Coronary Plaque Boundary Enhancement in IVUS Image by Using a Modified Perona-Malik Diffusion Filter
Published 2014-01-01“…For this problem, we propose a modified PMD filter which is designed in special reference to the coronary plaque boundary detection. …”
Get full text
Article -
37838
CONTRIBUTORS TO SCHEDULE DELAYS IN PUBLIC CONSTRUCTION PROJECTS IN SAUDI ARABIA: OWNERS’ PERSPECTIVE
Published 2013-12-01“…These findings can support the Government in improving the regulations to meet the construction market needs, owners in planning and designing and evaluating policy, contractors and managers in planning and taking external and internal risks when costing and scheduling contracts, consultants in applying comprehensive contract information, and workers in conducting their day-to-day activities. …”
Get full text
Article -
37839
Talent Commodification In Ruangguru Marketing Interests: Analysis of The Show Program Clash of Champion
Published 2025-01-01“…Program Clash of Champions broadcast on the YouTube platform as a gameshow, designed as an academic and competitive show for students by combining educational and entertainment content. …”
Get full text
Article -
37840
Privacy cloud storage scheme based on fog computing
Published 2019-03-01“…As one of the core applications in cloud computing field,cloud storage attracts a large number of users depending on its powerful storage capacity.However,in this storage schema,users’ data is stored completely in cloud server.In other word,users’ right of control on data is lost and users are facing privacy leakage risk.Traditional privacy protection scheme is usually based on encryption technology,but the attack from the inside of cloud server can’t be resisted effectively by these kinds of methods.Once the password gets compromised,users’ data will be stolen.In order to solve this problem,a three-level secure cloud storage scheme based on fog computing was proposed and a Hash-Solomon code algorithm was designed.A small part of data was stored in local machine and fog server,which can take full advantage of cloud storage and protect the privacy of data.Through the theoretical safety analysis and experimental test,the feasibility of our scheme is proved,and it is really a powerful supplement to existing cloud storage scheme.…”
Get full text
Article