Showing 38,881 - 38,900 results of 46,768 for search '"Design"', query time: 0.20s Refine Results
  1. 38881

    Research on HMM based link prediction method in heterogeneous network by Rong QIAN, Jianting XU, Kejun ZHANG, Hongyu DONG, Fangyuan XING

    Published 2022-05-01
    “…In order to solve the problem that incomplete mining of structural information and semantic information in heterogeneous networks, a link prediction method combining meta-path-based analysis and hidden Markov model was proposed for link prediction of heterogeneous network.Considering that clustering could effectively capture the structural information of heterogeneous network, the k-means algorithm was improved to obtain the initial clustering center method based on the minimum distance mean square error, and it was applied to the hidden Markov model, first-order cluster hidden markov model (C-HMM<sup>(1)</sup>) link prediction method, and a link prediction method for heterogeneous network with second-order cluster hidden Markov model (C-HMM<sup>(2)</sup>) were designed.Further, considering the feature information of the data, a link prediction method called ME-HMM that combined the maximum entropy model and the second-order Markov model was proposed.The experimental results show that the ME-HMM has higher link prediction accuracy than the C-HMM, and the ME-HMM method has better performance than the C-HMM method because it fully considers the feature information of the data.…”
    Get full text
    Article
  2. 38882

    Topic-oriented measurement of microblogging network by Wei LIU, Li-hong WANG, Rui-guang LI

    Published 2013-11-01
    “…According to the dynamic and temporal characteristics of the topic-generated network, a method of quantitative calculation was designed, and then the topic-oriented research on the network measurement technology from many aspects such as the features of the content was conducted, as well as the network topology and the characteristics of the user behavior. …”
    Get full text
    Article
  3. 38883

    Promoting Shared Metacognition in Online Learning: The Practices of Distributed Teaching Presence and the Relationships to Cognitive Presence by Ye Chen, Lixuan Chen

    Published 2024-12-01
    “…The implications for research and practices in designing and facilitating shared metacognitive learning experience are also discussed.…”
    Get full text
    Article
  4. 38884

    FPGA multi-unit parallel optimization and implementation of post-quantum cryptography CRYSTALS-Kyber by Bin LI, Xiaojie CHEN, Feng FENG, Qinglei ZHOU

    Published 2022-02-01
    “…In lattice-based post-quantum cryptography, polynomial multiplication is complicated and time-consuming.In order to improve the computational efficiency of lattice cryptography in practical applications, an FPGA multi-unit parallel optimization and implementation of post-quantum cryptography CRYSTALS-Kyber was proposed.Firstly, the flow of Kyber algorithm was described and the execution of NTT, INTT and CWM were analyzed.Secondly, the overall structure of FPGA was given, the butterfly arithmetic unit was designed by pipeline technology, and the Barrett modulus reduction and CWM scheduling optimization were used to improve the calculation efficiency.At the same time, 32 butterfly arithmetic units were executed in parallel, which shortens the overall calculation cycle.Finally, the multi-RAM channel was optimized to improve the memory access efficiency with alternate data access control and RAM resource reuse.In addition, with the loosely coupled architecture, the overall operation scheduling was realized by DMA communication.The experimental results and analysis show that the proposed scheme implemented can complete NTT, INTT and CWM operations within 44, 49, and 163 clock cycles, which is superior to other schemes and has high energy efficiency ratio.…”
    Get full text
    Article
  5. 38885

    Application Research on Testing Efficiency of Main Drainage Pump in Coal Mine Using Thermodynamic Theories by Deyong Shang

    Published 2017-01-01
    “…On the basis of analyzing the theories, the protective sleeve and the base of the temperature sensor are designed to measure the water temperature at inlet and outlet of the pump. …”
    Get full text
    Article
  6. 38886

    Analysis of Printed Circuit Boards strains using finite element analysis and digital image correlation by Liviu Marsavina, Alexandru Falk, Octavian Pop

    Published 2020-01-01
    “…Circuit boards (PCBs) are designed to mechanically support and electrically connect an electronic component assembly. …”
    Get full text
    Article
  7. 38887

    Teaching Quality Evaluation of Ideological and Political Courses in Colleges and Universities Based on Machine Learning by Lijun Qiao

    Published 2022-01-01
    “…By comparing the advantages and disadvantages of traditional machine learning classification algorithms, a classifier based on weighted naive Bayes is analyzed and designed for teaching evaluation, and the specific process of evaluation model construction is introduced. …”
    Get full text
    Article
  8. 38888

    User group based multi-satellite handover strategy for LEO satellite networks by Hongtao ZHU, Qing GUO

    Published 2022-04-01
    “…LEO satellite network plays an important role in global communication in the future mobile communication.In large-scale LEO satellite networks, frequent concurrent handoffs by a large number of users will reduce the handover success rate and increase the signaling overhead.In order to solve this problem, a multi satellite handover strategy based on user group for LEO satellite networks was proposed.When triggering the handover, the user will send the candidate handover satellites that meet its own communication needs to the access satellite.The access satellite groups users considered the conditions of user handover success rate, satellite throughput rate and satellite load balancing to complete the whole handover process.A signaling interaction process of handover strategy based on user group was designed, and the signaling overhead of group handover was analyzed.The simulation results show that the multi-satellite handover strategy of LEO satellite network based on user group can effectively reduce the transmission of network repeated signaling and reduce the system signaling overhead.At the same time, it can effectively improve the user handover success rate and satellite throughput, and balance the satellite network load.…”
    Get full text
    Article
  9. 38889

    Kinematics Analysis and Trajectory Optimization of the Hybrid Welding Robot by Cai Ganwei, Ban Caixia, Tian Junwei, Zhang Kechen

    Published 2023-12-01
    “…Aiming at this kind of problem, combined with the characteristics of series mechanism and parallel mechanism, a new type of six-degree-of-freedom (6DOF)series-parallel hybrid welding robot mechanism is designed. The standard D-H model is used to describe the relationship between the adjacent links of the robot, the kinematic model of the robot is established using the Matlab Robotics toolbox, the correctness of the parameters of the robot connecting rod is verified, and the working space of the robot is further calculated. …”
    Get full text
    Article
  10. 38890

    Improved 2D Discrete Hyperchaos Mapping with Complex Behaviour and Algebraic Structure for Strong S-Boxes Generation by Musheer Ahmad, Eesa Al-Solami

    Published 2020-01-01
    “…Secondly, a hyperchaotic key-dependent substitution-box generation process is designed, which is based on the bijectivity-preserving effect of multiplication with permutation matrix to obtain satisfactory configuration of substitution-box matrix over the enormously large problem space of 256!. …”
    Get full text
    Article
  11. 38891

    APPLICATION OF OCCLUSAL SPLINTS IN THE DIGITAL ERA: A SERIES OF THREE CASE REPORTS by Lenka Vavrickova, Jan Schmidt, Hana Hubalkova, Doriana Agop Forna, Martin Kapitan

    Published 2024-12-01
    “…The results emphasize the effectiveness of customized splint designs in managing complex temporomandibular disorders and related orofacial conditions.…”
    Get full text
    Article
  12. 38892

    Emergency Flight Control Based on the Fan Wing by Lin Meng, Shuo Wang, Ye Chen, Yang Gao

    Published 2021-01-01
    “…The difficulties in designing the emergency control system in both the longitudinal and lateral controls are analyzed. …”
    Get full text
    Article
  13. 38893

    Rethinking Indonesian Anti-Money Laundering Laws in the Age of Online Gaming Economies by Shelvi Rusdiana, Tantimin, Winda Fitri

    Published 2024-10-01
    “…Indonesia’s Anti-Money Laundering (AML) laws were originally designed to combat traditional financial crimes; however, the rise of virtual items in online gaming economies presents new challenges. …”
    Get full text
    Article
  14. 38894

    An Artificial Intelligence Approach for Verifying Persons by Employing the Deoxyribonucleic Acid (DNA) Nucleotides by Raid Rafi Omar Al-Nima, Marwa Mawfaq Mohamedsheet Al-Hatab, Maysaloon Abed Qasim

    Published 2023-01-01
    “…It utilizes a unique identity for each person acquired from DNA nucleotides, and it can verify individuals efficiently with high performance. The ADAR has been designed and applied to multiple datasets, namely, the DNA classification (DC), sample DNA sequence (SDS), human DNA sequences (HDS), and DNA sequences (DS). …”
    Get full text
    Article
  15. 38895

    Les lits des princes franconiens à la fin du Moyen Âge by Uta Piereth

    Published 2019-09-01
    “…It comprises representations designed to help visitors understand how a prince’s bed chamber was furnished at the time and what different court beds looked like. …”
    Get full text
    Article
  16. 38896

    Kinematics Analysis of 1T3R Parallel Mechanism with Decoupling-reducing Structure based on Hybrid Drive by Guowang Chen, Li Du, Linxian Che, Junkun Hong, Mafei Bao

    Published 2019-07-01
    “…Based on the position feature set theory and decoupling principle of parallel mechanism, a new kind of structure decoupled parallel mechanism with hybrid driving and local motion decoupling is designed and its movement is one translation and three rotations (1T3R). …”
    Get full text
    Article
  17. 38897

    DDoS attack detection and defense based on hybrid deep learning model in SDN by Chuanhuang LI, Yan WU, Zhengzhe QIAN, Zhengjun SUN, Weiming WANG

    Published 2018-07-01
    “…Software defined network (SDN) is a new kind of network technology,and the security problems are the hot topics in SDN field,such as SDN control channel security,forged service deployment and external distributed denial of service (DDoS) attacks.Aiming at DDoS attack problem of security in SDN,a DDoS attack detection method called DCNN-DSAE based on deep learning hybrid model in SDN was proposed.In this method,when a deep learning model was constructed,the input feature included 21 different types of fields extracted from the data plane and 5 extra self-designed features of distinguishing flow types.The experimental results show that the method has high accuracy,it’s better than the traditional support vector machine (SVM) and deep neural network (DNN) and other machine learning methods.At the same time,the proposed method can also shorten the processing time of classification detection.The detection model is deployed in SDN controller,and the new security policy is sent to the OpenFlow switch to achieve the defense against specific DDoS attack.…”
    Get full text
    Article
  18. 38898

    Non-Orthogonality of QAM and Sunflower-like Modulated Coherent-State Signals by Kentaro Kato

    Published 2025-01-01
    “…The findings provide valuable insights for designing useful quantum signal constellations.…”
    Get full text
    Article
  19. 38899

    Lithuanian Language Curricula by Giedrė Čepaitienė

    Published 2024-03-01
    “…We know the authors of the first two curricula: the curriculum for the academic year 1905–1906 at Panevėžys Teacher Training Seminary was designed by Vladimiras Lukinas, and the following year, the curriculum for the same seminary was developed by Jonas Jablonskis. …”
    Get full text
    Article
  20. 38900

    Federated edge learning model based on multi-level proxy permissioned blockchain by GE Li’na, LI Haiao, WANG Jie

    Published 2024-04-01
    “…The multi-level proxy permission blockchain was designed to establish a trusted underlying environment for federated edge learning, and the hierarchical model aggregation scheme was implemented to alleviate the pressure of model training. …”
    Get full text
    Article