Showing 37,941 - 37,960 results of 46,768 for search '"Design"', query time: 0.15s Refine Results
  1. 37941

    The Construction of Sports Health Management Model Based on Deep Learning by Junniao Meng, Song Wang

    Published 2022-01-01
    “…Secondly, this article designs a plan for sports health management of sports interventions and compares and analyzes the data before and after health management. …”
    Get full text
    Article
  2. 37942

    Path Planning of Continuum Robot Based on Path Fitting by Guochen Niu, Yunxiao Zhang, Wenshuai Li

    Published 2020-01-01
    “…A reasonable experiment is designed based on MATLAB, and simulation and analysis results demonstrate excellent performance of this method and feasibility of path planning.…”
    Get full text
    Article
  3. 37943

    A Robotic Guide for Blind People. Part 1. A Multi-National Survey of the Attitudes, Requirements and Preferences of Potential End-Users by Marion A. Hersh, Michael A. Johnson

    Published 2010-01-01
    “…They considered the robot's appearance to be very important but did not like any of the proposed designs. From their comments, respondents wanted the robot to be discreet and inconspicuous, small, light weight and portable, easy to use, robust to damage, require minimal maintenance, have a long life and a long battery life.…”
    Get full text
    Article
  4. 37944

    INFLUENCE STUDY ON THE LOGO OF AN ENGINE CONNECTING ROD TO ITS FATIGUE STRENGTH by JIA DeWen, SONG Dong, LEI JiLin, DENG Wei, CUI ZhiZhong, ZHANG TaoTao

    Published 2019-01-01
    “…Then three schemes were designed and the influence on the distance between the logo words, the height of logo to connecting rod body surface and the positing of the logo to stress were analysis, the results showed that: the stress was reduced by appropriately increasing the spacing between logo words. …”
    Get full text
    Article
  5. 37945

    Alienation, Adoption or Adaptation? Aestheticist Paintings by Women by Pamela Gerrish Nunn

    Published 2011-11-01
    “…In scrutinising Aestheticism, feminist scholarship has found the usual characteristics: a band of male actors, achievers and heroes, an extensive use of female imagery, and an investment in the idea or fantasy of Woman in the absence (designed or accidental) of actual women. With regard to Aestheticism as a literary trend, scholars working under the influence of feminism, from Elaine Showalter on, have restored female agency to the territory, re-instating the achievements of various women writers in shaping Aestheticism in its own time, while provoking a reassessment of its meanings and messages through this problematising of the authority of its traditional movers and shakers (Schaffer and Psomiades, Women and British Aestheticism, 1999; Schaffer, The Forgotten Female Aesthetes, 2000). …”
    Get full text
    Article
  6. 37946

    Weakly supervised semantic segmentation and optimization algorithm based on multi-scale feature model by Changzhen XIONG, Hui ZHI

    Published 2019-01-01
    “…In order to improve the accuracy of weakly-supervised semantic segmentation method,a segmentation and optimization algorithm that combines multi-scale feature was proposed.The new algorithm firstly constructs a multi-scale feature model based on transfer learning algorithm.In addition,a new classifier was introduced for category prediction to reduce the failure of segmentation due to the prediction of target class information errors.Then the designed multi-scale model was fused with the original transfer learning model by different weights to enhance the generalization performance of the model.Finally,the predictions class credibility was added to adjust the credibility of the corresponding class of pixels in the segmentation map,avoiding false positive segmentation regions.The proposed algorithm was tested on the challenging VOC 2012 dataset,the mean intersection-over-union is 58.8% on validation dataset and 57.5% on test dataset.It outperforms the original transfer-learning algorithm by 12.9% and 12.3%.And it performs favorably against other segmentation methods using weakly-supervised information based on category labels as well.…”
    Get full text
    Article
  7. 37947

    La place de l’imagination dans le dispositif didactique universitaire : une double fonction identitaire à créer by Marie-Pierre Dencuff

    Published 2019-07-01
    “…This contribution analyzes a university training device in French didactics at the primary level designed in the form of a digital portfolio and in which the imagination is called upon to play an important role. …”
    Get full text
    Article
  8. 37948

    Early Warning Model of Sports Injury Based on RBF Neural Network Algorithm by Fuxing He

    Published 2021-01-01
    “…This paper analyzes the source of sports risk and the main injury factors, designs the sports injury estimation model based on big data analysis, establishes a new assessment model based on RBF neural network, and builds the big data network environment required for the model operation by improving the topological structure, combining big data and deep neural network. …”
    Get full text
    Article
  9. 37949

    EFFECT OF FDM PROCESS PARAMETERS ON TENSILE STRENGTH BASED ON FLUID THERMAL ANALYSIS (MT) by CHENG GuoFeng, DING ZiShan

    Published 2023-01-01
    “…The supplementary experiment is designed, and find the tensile strength of ploylactic acid(PLA) workpieces reach the maximum when the printing layer thickness is as far as small, the printing speed and the printing temperature are appropriate.…”
    Get full text
    Article
  10. 37950

    Video-based collaboration to develop language production skills by Sandra Vasconcelos, Ana Balula

    Published 2024-08-01
    “…Rooted in the Common European Framework of Reference for Languages, the study outlines an innovative activity designed for A1 level German learners, grounded in 3 phases: i) planning, ii) execution, and iii) evaluation and repair. …”
    Get full text
    Article
  11. 37951

    Multi-feature fusion classification method for communication specific emitter identification by Zunwen HE, Shuai HOU, Wancheng ZHANG, Yan ZHANG

    Published 2021-02-01
    “…A multi-feature fusion classification method based on multi-channel transform projection, integrated deep learning and generative adversarial network (GAN) was proposed for communication specific emitter identification.First, three-dimensional feature images were obtained by performing various transformations, the time and frequency domain projection of the signal was constructed to construct the feature datasets.GAN was used to expand the datasets.Then, a two-stage recognition and classification method based on multi-feature fusion was designed.Deep neural networks were used to learn the three feature datasets, and the initial classification results were obtained.Finally, through fusion and re-learning of the initial classification result, the final classification result was obtained.Based on the measurement and analysis of the actual signals, the experimental results show that the method has higher accuracy than the single feature extraction method.The multipath fading channel has been used to simulate the outdoor propagation environment, and the method has certain generalization performance to adapt to the complex wireless channel environments.…”
    Get full text
    Article
  12. 37952

    Radio frequency fingerprint data augmentation for indoor localization based on diffusion model by Haojun AI, Weike ZENG, Jingjie TAO, Jinying XU, Hanxiao CHANG

    Published 2023-11-01
    “…The radio frequency fingerprint indoor localization method ensures the accuracy by collecting a sufficient amount of fingerprints in the offline state to build a dense fingerprint database.A data augmentation method called FPDiffusion was proposed based on diffusion model to reduce the cost of fingerprint acquisition.Firstly, a temporal graph representation of the fingerprint sequence was constructed, the forward process of the diffusion model was accomplished by adding Gaussian noise, and a U-Net was utilized for the reverse process.The loss function of the network was designed according to the characteristics of radio frequency fingerprints.Finally, the computational process for generating dense fingerprints based on sparse fingerprints was presented.Experimental results demonstrate that FPDiffusion achieves 76% and 28% localization error reduction on K-nearest neighbor (KNN) and convolutional neural network (CNN) respectively, and significantly improves localization accuracy on KNN compared to Gaussian process regression (GPR) and GPR-GAN when only a small amount of labeled fingerprints is available.…”
    Get full text
    Article
  13. 37953

    Laser Noncontact Measurement Method for Elliptical Arc-toothed Cylindrical Gear by Zhou Ye, Song Aiping, Zhao Kunpeng, Yu Chenwei

    Published 2020-02-01
    “…Aiming at the lack of measurement methods for ellipsoidal arc-toothed cylindrical gears, a precision measuring device based on laser displacement sensor for elliptical arc-toothed cylindrical gear is designed. The geometric shape feature of the elliptical arc-toothed cylindrical gear is expounded, the composition and measurement principle of the laser non-contact measuring device are introduced, and the contour data model of the gear measuring section is established by laser measurement of the multiple radial cross-section profiles of the gear. …”
    Get full text
    Article
  14. 37954

    Archivi orali per la ricerca linguistica: l'italiano torinese by Daniela Mereu

    Published 2024-12-01
    “…This paper aims to present the research project Archivi orali per la ricerca linguistica: l'italiano torinese (‘Oral Archives for Linguistic Research: Turin Italian’), designed to document and describe the variety of Turin Italian through a collection of oral sources dating back to the second half of the 20th century, i.e. the Fondo Giorgina Levi Arian, preserved also in digitised form at the Archivio della Fondazione Istituto Piemontese “Antonio Gramsci”. …”
    Get full text
    Article
  15. 37955

    Analysis of Thermal Elastohydrodynamic Lubrication of Modified Gear Rack Transmission by Xu Caihong, Wang Youqiang, Zhang Tonggang, Wang Limei

    Published 2017-01-01
    “…Therefore,in order to in accordance with the requirements of the premise when designing the gear rack mechanism,the positive modification gear should be selected to avoid the negative modification gear.…”
    Get full text
    Article
  16. 37956

    Linguistic Validation of the Kannada Language Version of Pelvic Girdle Questionnaire by Nice Mathew, Veena Kiran Nambiar, Jyothi GS

    Published 2024-01-01
    “…Categorically the internal consistency for the activity subscale 1-20 was 0.860 while that of the symptoms subscale 21-25 was 0.804.Conclusion The PGQ-Kannada is a reliable and valid tool with high internal consistency for assessing disability resulting from pelvic girdle pain in gravid women. The PGQ-Kannada is designed to support research and clinical practice on pelvic girdle pain PGP in Karnataka aiming to enhance the well-being of pregnant and postpartum women. …”
    Get full text
    Article
  17. 37957

    In Search of Lost Weather: Temporal Reflexivity and Ecological Awareness in Participatory Performance by Jamie Harper

    Published 2020-12-01
    “…An alternative aesthetics of temporal reflexivity is presented through discussion of participatory performance projects using live action role-play drama that were designed and facilitated by the author during 2017-2018. …”
    Get full text
    Article
  18. 37958

    Robust deployment strategy for security data collection agent by 陈黎丽, 王震, 郭云川, 华佳烽, 姚宇超, 李凤华

    Published 2019-06-01
    “…With the frequent occurrence of “network black production” incidents,attackers strategically launch target attacks with the idea of “profit-seeking”.Existing network monitoring systems lack accurate and effective monitoring strategies for “strategic attacks”.Therefore,in an adversarial environment,how to optimize the deployment of collection agents for better monitoring results becomes an extremely important issue.Based on this,a robust deployment strategy of collection agents was proposed for the above mentioned problem.Firstly,the idea of attack-defense game was introduced to measure the collection agents,threat events and their relations,then the MADG model was built.Secondly,considering that the traditional accurate solution algorithm cannot solve the problem,the robust acquisition agent deployment algorithm called RCD algorithm was designed to approximate the problem by using the sub-module and non-growths of the objective function.Finally,the RCD algorithm was verified.The experimental results show that the above model and method is feasible,effective and expandable.…”
    Get full text
    Article
  19. 37959

    FATIGUE LIFE ANALYSIS OF CYLINDRICAL HELICAL COMPRESSION SPRING BASED ON WEIBULL DISTRIBUTION by FU Tao, WANG DeCheng, CHENG Peng

    Published 2020-01-01
    “…In order to study the processing method of spring fatigue data,a cylindrical helical compression spring with high service stress was designed and fatigue test was carried out. A new process of spring fatigue data processing is proposed. …”
    Get full text
    Article
  20. 37960

    Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user by Xiangyu WANG, Jianfeng MA, Yinbin MIAO

    Published 2019-02-01
    “…The traditional privacy-preserving image retrieval schemes not only bring large computational and communication overhead,but also cannot protect the image and query privacy in multi-user scenarios.To solve above problems,an efficient privacy-preserving content-based image retrieval scheme was proposed in multi-user scenarios.The scheme used Euclidean distance comparison technique to rank the pictures according to similarity of picture feature vectors and return top-k returned.Meanwhile,the efficient key conversion protocol designed in proposed image retrieval scheme allowed each search user to generate queries based on his own private key so that he can retrieval encrypted images generated by different data owners.Strict security analysis shows that the user privacy and cloud data security can be well protected during the image retrieval process,and the performance analysis using real-world dataset shows that the proposed image retrieval scheme is efficient and feasible in practical applications.…”
    Get full text
    Article