Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
38541
Calculation of Capillary Rise Height of Soils by SWCC Model
Published 2018-01-01“…Based on the BCC model and principles of thermodynamics, the soil-water characteristic curve test is designed for the purpose of calculating the pore distribution of soil samples. …”
Get full text
Article -
38542
Sociologia e gestão ambiental: considerações a partir de uma Reserva Extrativista Marinha
Published 2017-01-01“…The local committees, assemblies and the joint designing of rules and plans foster the interactive learning, despite the capital inequalities of the involved actors.…”
Get full text
Article -
38543
Development of ethnofun to improve computational thinking of junior high school students grade VII
Published 2024-10-01“…Method: The research employed the Research and Development (R&D) method using the AADIE model, focusing on designing and implementing ethnomathematics-based learning media. …”
Get full text
Article -
38544
Failure evidences of reduced span bridges in case of extreme rainfalls The case of Livorno
Published 2018-09-01“…The Italian territory has about 460.000 small bridges, mostly designed without the support of technical codes or a proper interaction between the hydraulic and structural aspects. …”
Get full text
Article -
38545
MECHANICAL ANALYSIS OF THE DRILL BIT IN THE DUAL CASING SIDETRACKING
Published 2016-01-01“…The analysis and calculation could provide the reference to designing the sidetracking bit and determinating construction parameters in the dual casing sidetracking process.…”
Get full text
Article -
38546
Optimal energy efficiency routing strategy based on community in mobile social network
Published 2017-05-01“…An optimal energy efficiency routing strategy based on community was proposed,which minimized the network energy consumption under the given delay constraint.Firstly the expected energy consumption and delay of message delivery in the connected network were obtained through Markov chain.Then the comprehensive cost function for delivering message from source node to destination node was designed,which was combined with energy consumption and delay.Thus,the optimization function to comprehensive cost of relay node delivering message was obtained,and further the reward function of relay node was gotten.Finally the optimal expected reward of optimal relay node was achieved using the optimal stopping theory,so as to realize the optimal energy efficiency routing strategy.In simulations,the average energy consumption,the average delay and the average delivery ratio of routing optimization strategy were compared with those of other routing strategies in related literatures.The results show that the strategy proposed has smaller average energy consumption,shorter average delay and higher average delivery ratio,gaining better energy consumption optimization effect.…”
Get full text
Article -
38547
Application of LCD-SVD Technique and CRO-SVM Method to Fault Diagnosis for Roller Bearing
Published 2015-01-01“…Thirdly, a support vector machine (SVM) classifier based on Chemical Reaction Optimization (CRO) algorithm, called CRO-SVM method, is designed for classification of fault location. Lastly, the proposed method is validated by two experimental datasets. …”
Get full text
Article -
38548
Research and Implementation of Intelligent Home Pension System Based on Speech and Semantic Recognition
Published 2022-01-01“…In this method, data transmission, instruction uploading, and receiving are completed by designing the communication interface of home appliance terminal to build the wireless intelligent home communication subsystem, and the voice module of IfI is adopted. …”
Get full text
Article -
38549
Just noticeable distortion model based on entropy masking in DCT domain
Published 2023-02-01“…In order to improve the threshold accuracy of JND (just noticeable distortion) model in DCT (discrete cosine transform) domain and avoid cross-domain operation, entropy masking effect was introduced into DCT-based JND model.Firstly, starting from the free-energy theory and the Bayesian inference, an autoregressive model based on texture-energy similarity in DCT domain was designed to simulate the spontaneous prediction behavior of visual perception.Secondly, the mapping relationship between visual perception and prediction residuals were explored to obtain the disorder intensity in block level.Thirdly, the entropy masking effect was modeled as a JND threshold modulation factor of disorder intensity.Finally, the JND model in DCT domain for the entropy masking was proposed by fusing the contrast sensitivity function, the luminance adaptive masking, the contrast masking.Compared with the existing JND model in DCT domain, the proposed model performed all operations in DCT domain, which was more efficient and concise.The subjective and objective experimental results indicate that the proposed JND model shows greater tolerance to distortion with better perceptual quality.…”
Get full text
Article -
38550
The State Symbols of Bosnia and Herzegovina during the Twentieth Century
Published 2025-02-01“…In analysing these changes, the author examined a number of legal texts and contemporary discussions, revealing that the political elites responsible for designing Bosnia and Herzegovina’s symbols often oscillated between traditional heraldic inspirations from the Middle Ages and the unconventional modern desire for neutral solutions. …”
Get full text
Article -
38551
Image encryption algorithm based on multi-direction pixel continuous folding mechanism and Radon transform
Published 2017-09-01“…The image encryption algorithm based on multi-direction pixel continuous folding mechanism and Radon transform was proposed.Firstly,the initial plaintext was equally segmented to get left and right sub-blocks.Then the Radon transform was used to obtain the radon projection spectrum image by processing the left and right blocks at 0~180 degrees.And Radon projection spectrum image of left block was permutated by Arnold map,while the Radon projection spectrum image of right block was permutated based on gravity model to get two su-scrambling ciphers,then the entire scrambled image is formed by combining them.To diffuse pixels from multiple directions in space,four direction continuous folding mechanism was designed to change the pixel values by using the diffusion function corresponding to four different directions for realizing image encryption.The experimental results show that this algorithm has higher security and attack resistance with more uniform of pixel distribution in output cipher compared with the current image encryption technology.…”
Get full text
Article -
38552
User Random Access Technology Based on Beam Hopping Satellite Communication System
Published 2022-03-01“…On the basis of geosynchronous earth orbit multi-beam satellite communication systems, this paper designed the process of user random access to the network and specifi c signaling interaction under the agile beam mechanism, and proposed the scheduling strategy and allocation scheme of the agile signaling beam.This scheme increased the fl exibility of access resource allocation under the premised of ensured that all users could accessed the network, eff ectively improved the utilization rate of satellite network resources.The request of user access to the satellite communication network belongs to the burst type, it is more suitable to use the random competition access, so this paper based on the general random competition access strategy, proposed an adaptive random competition access algorithm based on the heat value, based on the heat value predicted by the network side, the user selects diff erent random access strategies for access.Through the simulation and analysis of the optimization algorithm, it is proved that the algorithm could eff ectively reduced the probability of access collision under various network loads, so as to achieved the purpose of users quickly accessing the network.…”
Get full text
Article -
38553
Using Primary Care Parenting Interventions to Improve Outcomes in Children with Developmental Disabilities: A Case Report
Published 2012-01-01“…Such brief interventions are cost effective, can be widely disseminated, and have been designed to be delivered within primary health care settings. …”
Get full text
Article -
38554
Idéologies de genre et construction des savoirs en sciences phonétiques
Published 2016-11-01“…Phonetic literature produces the idea of gender binary in the very way research questions and hypotheses are formulated and experimental protocols designed. For example, in phonetic texts, the expression “opposite gender/sex” appears frequently, and the human vocal apparatus is systematically described as sexually dimorphic.…”
Get full text
Article -
38555
Multi-Ground Station Collaborative Measurement and Control Technology for Giant Constellation System
Published 2023-03-01“…Measurement and control technology is the key technology to ensure the effi cient operation, maintenance and management of the constellation system.In recent years, with the continuous expansion of the constellation scale, mega-constellation system has gradually formed, which makes the demand for constellation measurement and control show an explosive growth, which puts forward new requirements for the completion of the constellation system measurement and control tasks.Firstly, the constraints of the megaconstellation system measurement and control tasks and the equipment constraints of the ground measurement and control station were analyzed, and the problem modeling was given; Secondly, an interaction method of the ground station agent based on the learning planning segment was proposed, by introduced the constraint penalty operator and the multi-ground station joint the penalty operator was designed to optimized the objective function.Finally, a multi-ground station Agent reinforcement learning algorithm was proposed to solved the multi-ground station cooperative task assignment strategy.Simulation experiments showed that when the task scale was large, the method had a gain of 12%~20% compared with the traditional algorithm in the diff erent scenarios mentioned.…”
Get full text
Article -
38556
Dialogue mechanisms between astrocytic and neuronal networks: A whole-brain modelling approach.
Published 2025-01-01“…Addressing this oversight, we introduce a biophysical neural mass network model, designed to capture the dynamic interplay between astrocytes and neurons via glutamatergic and GABAergic transmission pathways. …”
Get full text
Article -
38557
Topology control of satellite networks for multi-layer and multi-domain mega-constellation
Published 2024-07-01“…Secondly, a topology control architecture with the on-orbit controller as the core and the ground network control as the auxiliary, was designed to provide normal operation service guarantee. …”
Get full text
Article -
38558
Study on Meshing Mechanism of Teeth Back and Dynamic Contact- impact of Gear Pair
Published 2016-01-01“…The study has a certain reference value for designing gear system in the aspects of reducing vibration and noise.…”
Get full text
Article -
38559
An Energy-Efficient MAC Protocol Employing Dynamic Threshold for Wireless Sensor Networks
Published 2012-10-01“…Energy efficiency is a critical issue for sensor network since the network lifetime depends on efficient management of the energy resource of sensor nodes. Particularly, designing energy efficient MAC protocol has a significant influence on the performance of wireless sensor network with regards to the energy. …”
Get full text
Article -
38560
Communication Availability-Based Scheduling for Fair Data Collection with Path-Constrained Mobile Sink in Wireless Sensor Networks
Published 2015-10-01“…To effectively transfer sensing data to a sink node, system designers should consider the characteristic of wireless sensor networks in the way of data transmission. …”
Get full text
Article