Showing 38,741 - 38,760 results of 46,768 for search '"Design"', query time: 0.18s Refine Results
  1. 38741

    Construction and Application of Music Audio Database Based on Collaborative Filtering Algorithm by Jianfei Zheng

    Published 2022-01-01
    “…Finally, experiments are designed to verify whether the music audio database based on collaborative filtering algorithm can correctly retrieve the target music audio data. …”
    Get full text
    Article
  2. 38742

    MEVDT: Multi-modal event-based vehicle detection and tracking datasetDeep Blue Data by Zaid A. El Shair, Samir A. Rawashdeh

    Published 2025-02-01
    “…Additionally, MEVDT includes manually annotated ground truth labels — consisting of object classifications, pixel-precise bounding boxes, and unique object IDs — which are provided at a labeling frequency of 24 Hz. Designed to advance the research in the domain of event-based vision, MEVDT aims to address the critical need for high-quality, real-world annotated datasets that enable the development and evaluation of object detection and tracking algorithms in automotive environments.…”
    Get full text
    Article
  3. 38743

    Jiles-Atherton-Based Hysteresis Identification of Joint Resistant Torque in Active Spacesuit Using SA-PSO Algorithm by Zhao-yang Li, Yue-hong Dai, Jun-yao Wang, Peng Tang

    Published 2022-01-01
    “…Compared with the modified PSO algorithm, the convergence rate of the designed SA-PSO algorithm is advanced by 6.25% and 20.29%, and the fitting accuracy is improved by 14.45% and 46.5% for upper limb joint model. …”
    Get full text
    Article
  4. 38744

    The Metropolises of the Islamic World in the Process of Globalization and the Global City Comparative Study: Tehran and Istanbul by mohsen abedidorcheh

    Published 2024-12-01
    “…The results of this comparative study can guide city administrators in designing a more suitable future landscape for these cities, ultimately leading to achieving global city status.…”
    Get full text
    Article
  5. 38745

    Investigation of plasmid profiles of enterococcus faecalis isolated from mastitic cow milks by Mehmet Öztürk, Süheyla Türkyılmaz

    “…<p> <b>Conclusions:</b> Further studies should be designed to investigate the plasmids of other enterococci stains isolated from mastitis cow&#8217;s milks whether plasmids are responsible for antibiotic resistance.…”
    Get full text
    Article
  6. 38746

    Computer assisted language learning in English language classrooms in Bosnia and Herzegovina by Džanić Nihada Delibegović, Hasanspahić Amila

    Published 2020-12-01
    “…The paper examines the application of computer assisted language learning (CALL) in English language classes in Bosnia and Herzegovina. The research was designed as an empirical examination of the attitudes of teachers and students on the successful application of computer assisted language learning in English language classrooms in Bosnia and Herzegovina. …”
    Get full text
    Article
  7. 38747

    Source-free domain transfer algorithm with reduced style sensitivity for medical image segmentation. by Jian Lin, Xiaomin Yu, Zhengxian Wang, Chaoqiong Ma

    Published 2024-01-01
    “…In response to this scenario, source-free domain transfer algorithm with reduced style sensitivity (SFDT-RSS) is designed. SFDT-RSS initially pre-trains the source domain model by using the generalization strategy and subsequently adapts the pre-trained model to target domain without accessing source data. …”
    Get full text
    Article
  8. 38748

    La topographie et les fortifications celtiques de l’oppidum biturige de Châteaumeillant-Mediolanum (Cher) by Sophie Krausz

    Published 2008-04-01
    “…Whilst the murus gallicus, constructed around 100 BC, seems to have been designed as a symbolic limit to the oppidum, the extra-high dump was defensive in intent. …”
    Get full text
    Article
  9. 38749

    ROLLER BEARING FAULT RECOGNITION METHOD BASED ON CYCLIC AUTOCORRELATION AND MULTI-DOMAIN KERNEL LIMIT LEARNING MACHINE by WANG XiaoHui, WANG GuangBing, XIANG JiaWei, HUANG Zhen, SUI GuangZhou

    Published 2020-01-01
    “…According to characteristics of the bearing signal,the second-order cyclic demodulation information was introduced into machine learning,and a multi-domain kernel extreme learning machine(MKELM) based on the combination of cyclic autocorrelation(CAF) frequency domain features and time domain features(TD) was proposed to accurately identify the bearing status.The algorithm constructed a CAF function based on the second-order cyclic characteristics of the bearing signal to extract the cyclic frequency domain features of the samples,then combined them with the time domain feature quantities of the samples.The matching factors of multi-domain feature vectors was designed to fuse TD and CAF feature vectors; finally,the fused CAF-TD sample features was input into the kernel extreme learning machine for cluster regression.The spindle bearing experimental results show that the cyclic frequency domain statistics extracted based on CAF can sensitively reflect the signal characteristics.Compared with the classic classifier,the CAF-TD multi-domain kernel extreme learning machine can extract more feature information from limited samples and obtain more accurate diagnostic result.…”
    Get full text
    Article
  10. 38750

    Fault Mechanism Analysis of Transmission System for a Shearer Rocker Arm by Zhang Yanchao, Wu Luji, Yin Minghu, Cui Yahui, Guo Zhipeng

    Published 2018-01-01
    “…The research work provides a valuable reference for designing,using and maintaining of heavy-duty gear transmission systems.…”
    Get full text
    Article
  11. 38751

    Network threat situation assessment based on unsupervised multi-source data feature analysis by Hongyu YANG, Fengyan WANG

    Published 2020-02-01
    “…Aiming at the limitations of supervised neural network in the network threat testing task relying on data category tagging,a network threat situation evaluation method based on unsupervised multi-source data feature analysis was proposed.Firstly,a variant auto encoder-generative adversarial network (V-G) for security threat assessment was designed.The training data set containing only normal network traffic was input to the network collection layer of V-G to perform the model training,and the reconstruction error of the network output of each layer was calculated.Then,the reconstruction error learning was performed by the three-layer variation automatic encoder of the output layer,and the training abnormal threshold was obtained.The packet threat was tested by using the test data set containing the abnormal network traffic,and the probability of occurrence of the threat of each group of tests was counted.Finally,the severity of the network security threat was determined according to the probability of threat occurrence,and the threat situation value was calculated according to the threat impact to obtain the network threat situation.The simulation results show that the proposed method has strong characterization ability for network threats,and can effectively and intuitively evaluate the overall situation of network threat.…”
    Get full text
    Article
  12. 38752

    Automated crowdturfing attack in Chinese user reviews by Li’na WANG, Xiaodong GUO, Run WANG

    Published 2019-06-01
    “…The text-oriented automated crowdturfing attack has a series of features such as low attack cost and strong concealment.This kind of attack can automatically generate a large number of fake reviews,with harmful effect on the healthy development of the user review community.In recent years,researchers have found that text-oriented crowdturfing attacks for the English review community,but there was few research work on automated crowdsourcing attacks in the Chinese review community.A Chinese character embedding LSTM model was proposed to automatically generate Chinese reviews with the aim of antomated crowdturfing attacks,which model trained by a combination with Chinese character embedding network,LSTM network and softmax dense network,and a temperature parameter T was designed to construct the attack model.In the experiment,more than 50 000 real user reviews were crawled from Taobao's online review platform to verify the effectiveness of the attack method.Experimental results show that the generated fake reviews can effectively fool linguistics-based classification detection approach and texts plagiarism detection approach.Besides,the massive manually evaluation experiments also demonstrate that the generated reviews with the proposed attack approach perform well in reality and diversity.…”
    Get full text
    Article
  13. 38753

    THE ROLE AND SOCIO-ECOLOGICAL FUNCTIONALITY OF TAX TOOLS IN THE CONTEXT OF THE INDUSTRY 4.0 PARADIGM by M. V. Karp, A. V. Zakharova, L. S. Samodelko

    Published 2021-02-01
    “…The tax system of any state is designed to ensure and regulate economic processes in order to support development and solve socio-ecological and economic problems. …”
    Get full text
    Article
  14. 38754

    Voss, du roman de Patrick White au livret de David Malouf : simple adaptation ou transformation de l’imaginaire national ? by Anne Le Guellec-Minel

    Published 2008-02-01
    “…This article first undertakes to analyse a few aspects of Malouf’s generic rewriting of the source text, which suggest that insofar as the opera was designed as a monumental celebration to Australian achievement, the libretto does seem to betray, to a certain extent, the novel’s criticism of heroic posturing and complacent patriotism, and to collaborate in the institutional recuperation of what remains a controversial work. …”
    Get full text
    Article
  15. 38755

    Digital Storytelling: Boosting Literacy Practices in Students at A1-Level by Pedro Alejandro González Mesa

    Published 2020-01-01
    “…Finally, negotiation in the group roles, as writer, designer and media creator, played an important role when working in groups. …”
    Get full text
    Article
  16. 38756

    RELATION OF COAL FREEZING ADHESIVE STRENGTH WITH WATER-LUBRICATING COEFFICIENT OF KINETIC FRICTION by WANG ChunHua, XU HanWen, HAO ZhiYong, QU Hui, WANG ZhongXian

    Published 2016-01-01
    “…Through the freezing adhesive strength test device designed by ourselves,under conditions of- 25℃ temperature and 3h freezing time,freezing adhesive characteristic of four different materials with moisture content 40% of the coal slime were tested. …”
    Get full text
    Article
  17. 38757

    Multiple Power-Saving MSSs Scheduling Methods for IEEE802.16e Broadband Wireless Networks by Shih-Chang Huang

    Published 2014-01-01
    “…The proposed methods are designed for the Unsolicited Grant Service (UGS) of IEEE802.16e. …”
    Get full text
    Article
  18. 38758

    Contact Simulation and Dynamic Performance Test of Ease-off Modified High Reduction Hypoid Gears by Gu Dewan, Wei Bingyang, Ren Minghui, He Hongtu

    Published 2023-05-01
    “…The dynamic performance test of HRH gear reducers has been completed, the gear meshing transmission performance is excellent, and the meshing quality is stable, which verifies the reasonable control of the designed HRH gear modification amount, and the correct theoretical calculation and motion simulation.…”
    Get full text
    Article
  19. 38759

    Prescribed Performance Guidance Law with Multiple Constraints by Xu Li, Jikun Ye, Chijun Zhou, Xiao Tang

    Published 2022-01-01
    “…In the terminal guidance phase of intercepting aerial target, a guidance law, satisfying impact angle constraint, acceleration constraint, and second-order dynamic characteristic of interceptor autopilot, is designed based on the prescribed performance control and dynamic surface control method. …”
    Get full text
    Article
  20. 38760

    The role of the Indonesian child protection commission in the Papua province conflict by Yuspani Asemki, Titin Purwaningsih

    Published 2024-12-01
    “…Notably, despite its designated mandate, the current role of KPAI appears inadequate, particularly in times of conflict, exacerbating the vulnerability of Papuan children and magnifying their potential as social liabilities. …”
    Get full text
    Article