Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
37901
Models, systems, networks in economics, engineering, nature and society
Published 2024-11-01“…The use of the developed neural networks allows to improve diagnostic studies for asynchronous machines of various capacities, easily adapt them to different dimensional designs, improve the quality of diagnostic services provided and reduce the labor costs of diagnostic specialists in the study of the parameters of the state of an electric machine.…”
Article -
37902
Using progress logs to research the information behaviour of higher education students in prison
Published 2024-06-01“…Development of the method. Progress logs are designed to capture individual-level qualitative data over a period of time, using prompts which build on previous prompts to generate rich data, allow opportunities for participant reflection and provide a narrative of progress. …”
Get full text
Article -
37903
Analysis of Dynamic Performance of Magnetic Field Modulated Gear
Published 2017-01-01“…But its stiffness is low,which will lead to the transient oscillations undergoing the torque of prime motor is disturbance or the velocity changes.Based on the analysis of the basic principle of magnetic gear,a magnetic field modulated gear is designed,whose transmission ratio is 5. 5,and the performance of the magnetic gear with different structures is analyzed by using the electromagnetic field finite element method. …”
Get full text
Article -
37904
Development of eHealth in Slovenia - Critical Issues and Future Directions
Published 2014-12-01“…The paper presents the review of eHealth projects in Slovenia, Austria and Denmark, and provides a comparative analysis of the eHealth development in designated countries. Focusing on the Slovenian experience, the paper summarizes the main deficiencies in the current eHealth settings, and finally outlines a set of applicable guidelines for an effective development and implementation of highly intricate and complex eHealth project. …”
Get full text
Article -
37905
Deep reinforcement learning-based resource reservation algorithm for emergency Internet-of-things slice
Published 2020-09-01“…Based on the requirements of ultra-low latency services for emergency Internet-of-things (EIoT) applications,a multi-slice network architecture for ultra-low latency emergency IoT was designed,and a general methodology framework based on resource reservation,sharing and isolation for multiple slices was proposed.In the proposed framework,real-time and automatic inter-slice resource demand prediction and allocation were realized based on deep reinforcement learning (DRL),while intra-slice user resource allocation was modeled as a shape-based 2-dimension packing problem and solved with a heuristic numerical algorithm,so that intra-slice resource customization was achieved.Simulation results show that the resource reservation-based method enable EIoT slices to explicitly reserve resources,provide a better security isolation level,and DRL could guarantee accuracy and real-time updates of resource reservations.Compared with four existing algorithms,dueling deep Q-network (DQN) performes better than the benchmarks.…”
Get full text
Article -
37906
Time, Infrastructure and Knowledge: Rethinking Temporality in the Anthropocene
Published 2025-02-01“…Addressing the concept of “non-trivial futures”, he argues that the Anthropocene aligns with and strengthens capitalism’s recursive temporality and secular eschatology, opening space for conservative or reactionary designs. Finally, Paolo Savoia traces a “revival” of natural history in the environmental humanities, enabled by temporal short-circuits between the 16th and 21st centuries. …”
Get full text
Article -
37907
EXPERIMENTAL OPTIMIZATION OF AERODYNAMIC DRAG COEFFICIENT OF A MINIBUS MODEL WITH NON-SMOOTH SURFACE PLATE APPLICATION
Published 2023-02-01“… In this study non-smooth surface plate application was experimentally investigated to flow control around a scaled minibus model in a wind tunnel. 1/15 scaled minibus model and non-smooth surface plate were designed in SolidWorks® Cad program and produced in 3-D printer. …”
Get full text
Article -
37908
Identification of Early Citrus Black Spot Symptoms (Identificacíon de los Síntomas Iniciales de la Mancha Negra de los Cítricos)
Published 2018-08-01“… This identification sheet was designed to assist packinghouse employees to identify the early yet subtle symptoms of citrus black spot. …”
Get full text
Article -
37909
Short wave protocol signals recognition based on Swin-Transformer
Published 2022-11-01“…Aiming at the problem that it is difficult to identify the protocol to which the signal belongs in the complex SW channel environment, a SW protocol signal recognition algorithm based on Swin-Transformer neural network model was proposed.Firstly, the gray-scale time-frequency map of the signal was obtained by using the time-frequency analysis method as the input of the neural network.Secondly, a neural network model based on swing transformer was designed to extract the features of the signal time-frequency map.Finally, the mapping relationship between the features and the protocol was established to realize the recognition of the signal protocol.The simulation results show that the recognition accuracy of the proposed algorithm is close to 100% in the Gaussian channel with SNR greater than -4 dB, which is higher than the existing algorithms.In addition, under the channel conditions of strong interference and multipath delay fading, the proposed algorithm still has a high SW protocol signals recognition rate.…”
Get full text
Article -
37910
Self-Attention Multilayer Feature Fusion Based on Long Connection
Published 2022-01-01“…In order to fuse the high- and low-level features of image classification, a feature fusion module SCFF (selective cross-layer feature fusion) for long connections is designed in this work. The SCFF can connect the long-distance feature maps in different receptive fields in a top-down order and apply the self-attention mechanism to fuse them two by two. …”
Get full text
Article -
37911
Spectrum resource allocation method of maximizing transmission rate in cognitive heterogeneous wireless networks
Published 2019-09-01“…Aiming at the problem that it is difficult to allocate spectrum resources to secondary users efficiently in cognitive heterogeneous wireless networks with heterogeneous spectrum attributes,dynamic channel conditions and diverse service requirements,a spectrum resource allocation strategy with maximum transmission rate was proposed.Firstly,the strategy aimed at maximizing the total transmission rate,and constrained the limited spectrum resources and user service requirements to construct a non-linear multi-constrained spectrum resource allocation 0-1 planning model.Then a polynomial time complexity simplification method was designed.According to idle spectrum information,channel conditions,business requirements and allocation decision history information,and the benefit matrix was constructed and modified to achieve constraint simplification,and the execution efficiency was improved by improving the coefficient matrix transformation strategy of the traditional Hungarian algorithm.Finally,the performance of the method was compared and analyzed by experiments.Experimental results show that the proposed method has higher transmission rate and execution efficiency.…”
Get full text
Article -
37912
Research on adaptive fast sensing method of large-scale Ad Hoc network states based on four-quadrant classification
Published 2024-06-01“…Secondly, fast sensing strategy was designed for network state information in different quadrants, and network state information was encapsulated into management frames to achieve embedded transmission and reduce network overhead. …”
Get full text
Article -
37913
PANORAMIC DENTAL X-RAY AND PERIODONTITIS: A RETROSPECTIVE ANALYSIS OF RADIOGRAPHIC-BASED PERIODONTAL BONE LOSS (R-PBL)
Published 2024-12-01“…The measurements of the root length and total bone height were done on mesial and distal surfaces, using a special software processor specifically designed and used for radiographic measurements. The R-PBL scores were analyzed for every surface (mesial and distal), on the entire sample and on gender subgroups. …”
Get full text
Article -
37914
Dokumenty (wybór Margaux Verdet) / Documents (selected by Margaux Verdet)
Published 2024-12-01“…From January 27, 1946 to January 5, 1947, Ad Reinhardt published in the magazine PM a series of "art pages"- a term designating full pages presenting drawings and collages. …”
Get full text
Article -
37915
Modeling and Analysis of Multifocus Picture Division Algorithm Based on Deep Learning
Published 2022-01-01“…In order to solve some problems of deep learning in image feature extraction and classification, this paper designs a modeling method of multifocus image segmentation algorithm based on deep learning. …”
Get full text
Article -
37916
PoSW:novel secure deduplication scheme for collaborative cloud applications
Published 2017-07-01“…In order to solve the problems of secure access and deduplication to the shared file in the cloud environment,a novel notion called proof of shared ownership (PoSW) was formalized,and a formal definition of the PoSW was given.Furthermore,a PoSW scheme and an enhanced version of that were proposed.In the PoSW scheme,secure shared file dispersal,convergent encryption and secret sharing algorithm were employed to transform the shared file realize the sharing and authorization for the shared file,and then a novel challenge-response protocol was proposed to achieve the proof of shared ownership and the foundation for the secure deduplication of the shared file was provided.An enhanced PoSW scheme was designed to improve the availability and reliability for different kinds of the shared files by introducing the multi-cloud server providers and using the strategies of both data duplication and secret file dispersal.Security analysis and performance evaluation show the security and efficiency of the proposed scheme.…”
Get full text
Article -
37917
Rôle de la formation à la pratique réflexive selon les phases de carrière. Cas des enseignants tunisiens
Published 2024-11-01“…The researcher, playing the role of trainer, designs a continuing training approach inspired by Kolb's experiential model Vacher’s ARPEGE one, which he implements in place of the traditional model provided by the inspector, and in agreement with him. …”
Get full text
Article -
37918
Routing algorithm for railway monitoring linear WSN based on improved PSO
Published 2022-05-01“…To solve the problems of short network lifetime and large data transmission delay, caused by unbalanced node energy consumption of linear wireless sensor network in railway monitoring scenario, a routing algorithm based on particle swarm optimization theory and breadth first search was proposed.The fitness function was constructed based on the relative energy consumption, spacing and load of candidate cluster heads.The local search ability of particle swarm algorithm was enhanced by adjusting the inertia weight coefficient to set up the cluster head optimal set.Meanwhile, a path cost function driven by energy consumption and delay was built up, and the optimal main path from the source node to the sink node was obtained by breadth first search.Lastly, a Q-learning alternative path updating and route maintenance mechanism based on discrete Markov decision process (MDP) was designed.Simulation results show that the proposed algorithm can balance the node energy consumption effectively, and has also advantages in prolonging the network lifetime and reducing the data transmission delay.…”
Get full text
Article -
37919
À l’épreuve de la « Bastille de Barberousse ». Trajectoire carcérale d’Arezki Kehal et des militants du PPA sous le Front Populaire
Published 2024-09-01“…The “Bastille de Barberousse” played a central role in the politicization of prisoners, in the face of the repressive colonial machinery designed to counter the independence aspirations of Algerian nationalists. …”
Get full text
Article -
37920
STUDY ON MODE III FRACTURE TOUGHNESS OF ADHESIVE BONDED STRUCTURE
Published 2024-02-01“…Failure mode of bonded structure under different adhesive types and different adhesive thickness was discussed by designing the edge ring crack torsion test which can truly reflect mode III fracture toughness. …”
Get full text
Article