Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
38881
Research on HMM based link prediction method in heterogeneous network
Published 2022-05-01“…In order to solve the problem that incomplete mining of structural information and semantic information in heterogeneous networks, a link prediction method combining meta-path-based analysis and hidden Markov model was proposed for link prediction of heterogeneous network.Considering that clustering could effectively capture the structural information of heterogeneous network, the k-means algorithm was improved to obtain the initial clustering center method based on the minimum distance mean square error, and it was applied to the hidden Markov model, first-order cluster hidden markov model (C-HMM<sup>(1)</sup>) link prediction method, and a link prediction method for heterogeneous network with second-order cluster hidden Markov model (C-HMM<sup>(2)</sup>) were designed.Further, considering the feature information of the data, a link prediction method called ME-HMM that combined the maximum entropy model and the second-order Markov model was proposed.The experimental results show that the ME-HMM has higher link prediction accuracy than the C-HMM, and the ME-HMM method has better performance than the C-HMM method because it fully considers the feature information of the data.…”
Get full text
Article -
38882
Topic-oriented measurement of microblogging network
Published 2013-11-01“…According to the dynamic and temporal characteristics of the topic-generated network, a method of quantitative calculation was designed, and then the topic-oriented research on the network measurement technology from many aspects such as the features of the content was conducted, as well as the network topology and the characteristics of the user behavior. …”
Get full text
Article -
38883
Promoting Shared Metacognition in Online Learning: The Practices of Distributed Teaching Presence and the Relationships to Cognitive Presence
Published 2024-12-01“…The implications for research and practices in designing and facilitating shared metacognitive learning experience are also discussed.…”
Get full text
Article -
38884
FPGA multi-unit parallel optimization and implementation of post-quantum cryptography CRYSTALS-Kyber
Published 2022-02-01“…In lattice-based post-quantum cryptography, polynomial multiplication is complicated and time-consuming.In order to improve the computational efficiency of lattice cryptography in practical applications, an FPGA multi-unit parallel optimization and implementation of post-quantum cryptography CRYSTALS-Kyber was proposed.Firstly, the flow of Kyber algorithm was described and the execution of NTT, INTT and CWM were analyzed.Secondly, the overall structure of FPGA was given, the butterfly arithmetic unit was designed by pipeline technology, and the Barrett modulus reduction and CWM scheduling optimization were used to improve the calculation efficiency.At the same time, 32 butterfly arithmetic units were executed in parallel, which shortens the overall calculation cycle.Finally, the multi-RAM channel was optimized to improve the memory access efficiency with alternate data access control and RAM resource reuse.In addition, with the loosely coupled architecture, the overall operation scheduling was realized by DMA communication.The experimental results and analysis show that the proposed scheme implemented can complete NTT, INTT and CWM operations within 44, 49, and 163 clock cycles, which is superior to other schemes and has high energy efficiency ratio.…”
Get full text
Article -
38885
Application Research on Testing Efficiency of Main Drainage Pump in Coal Mine Using Thermodynamic Theories
Published 2017-01-01“…On the basis of analyzing the theories, the protective sleeve and the base of the temperature sensor are designed to measure the water temperature at inlet and outlet of the pump. …”
Get full text
Article -
38886
Analysis of Printed Circuit Boards strains using finite element analysis and digital image correlation
Published 2020-01-01“…Circuit boards (PCBs) are designed to mechanically support and electrically connect an electronic component assembly. …”
Get full text
Article -
38887
Teaching Quality Evaluation of Ideological and Political Courses in Colleges and Universities Based on Machine Learning
Published 2022-01-01“…By comparing the advantages and disadvantages of traditional machine learning classification algorithms, a classifier based on weighted naive Bayes is analyzed and designed for teaching evaluation, and the specific process of evaluation model construction is introduced. …”
Get full text
Article -
38888
User group based multi-satellite handover strategy for LEO satellite networks
Published 2022-04-01“…LEO satellite network plays an important role in global communication in the future mobile communication.In large-scale LEO satellite networks, frequent concurrent handoffs by a large number of users will reduce the handover success rate and increase the signaling overhead.In order to solve this problem, a multi satellite handover strategy based on user group for LEO satellite networks was proposed.When triggering the handover, the user will send the candidate handover satellites that meet its own communication needs to the access satellite.The access satellite groups users considered the conditions of user handover success rate, satellite throughput rate and satellite load balancing to complete the whole handover process.A signaling interaction process of handover strategy based on user group was designed, and the signaling overhead of group handover was analyzed.The simulation results show that the multi-satellite handover strategy of LEO satellite network based on user group can effectively reduce the transmission of network repeated signaling and reduce the system signaling overhead.At the same time, it can effectively improve the user handover success rate and satellite throughput, and balance the satellite network load.…”
Get full text
Article -
38889
Kinematics Analysis and Trajectory Optimization of the Hybrid Welding Robot
Published 2023-12-01“…Aiming at this kind of problem, combined with the characteristics of series mechanism and parallel mechanism, a new type of six-degree-of-freedom (6DOF)series-parallel hybrid welding robot mechanism is designed. The standard D-H model is used to describe the relationship between the adjacent links of the robot, the kinematic model of the robot is established using the Matlab Robotics toolbox, the correctness of the parameters of the robot connecting rod is verified, and the working space of the robot is further calculated. …”
Get full text
Article -
38890
Improved 2D Discrete Hyperchaos Mapping with Complex Behaviour and Algebraic Structure for Strong S-Boxes Generation
Published 2020-01-01“…Secondly, a hyperchaotic key-dependent substitution-box generation process is designed, which is based on the bijectivity-preserving effect of multiplication with permutation matrix to obtain satisfactory configuration of substitution-box matrix over the enormously large problem space of 256!. …”
Get full text
Article -
38891
APPLICATION OF OCCLUSAL SPLINTS IN THE DIGITAL ERA: A SERIES OF THREE CASE REPORTS
Published 2024-12-01“…The results emphasize the effectiveness of customized splint designs in managing complex temporomandibular disorders and related orofacial conditions.…”
Get full text
Article -
38892
Emergency Flight Control Based on the Fan Wing
Published 2021-01-01“…The difficulties in designing the emergency control system in both the longitudinal and lateral controls are analyzed. …”
Get full text
Article -
38893
Rethinking Indonesian Anti-Money Laundering Laws in the Age of Online Gaming Economies
Published 2024-10-01“…Indonesia’s Anti-Money Laundering (AML) laws were originally designed to combat traditional financial crimes; however, the rise of virtual items in online gaming economies presents new challenges. …”
Get full text
Article -
38894
An Artificial Intelligence Approach for Verifying Persons by Employing the Deoxyribonucleic Acid (DNA) Nucleotides
Published 2023-01-01“…It utilizes a unique identity for each person acquired from DNA nucleotides, and it can verify individuals efficiently with high performance. The ADAR has been designed and applied to multiple datasets, namely, the DNA classification (DC), sample DNA sequence (SDS), human DNA sequences (HDS), and DNA sequences (DS). …”
Get full text
Article -
38895
Les lits des princes franconiens à la fin du Moyen Âge
Published 2019-09-01“…It comprises representations designed to help visitors understand how a prince’s bed chamber was furnished at the time and what different court beds looked like. …”
Get full text
Article -
38896
Kinematics Analysis of 1T3R Parallel Mechanism with Decoupling-reducing Structure based on Hybrid Drive
Published 2019-07-01“…Based on the position feature set theory and decoupling principle of parallel mechanism, a new kind of structure decoupled parallel mechanism with hybrid driving and local motion decoupling is designed and its movement is one translation and three rotations (1T3R). …”
Get full text
Article -
38897
DDoS attack detection and defense based on hybrid deep learning model in SDN
Published 2018-07-01“…Software defined network (SDN) is a new kind of network technology,and the security problems are the hot topics in SDN field,such as SDN control channel security,forged service deployment and external distributed denial of service (DDoS) attacks.Aiming at DDoS attack problem of security in SDN,a DDoS attack detection method called DCNN-DSAE based on deep learning hybrid model in SDN was proposed.In this method,when a deep learning model was constructed,the input feature included 21 different types of fields extracted from the data plane and 5 extra self-designed features of distinguishing flow types.The experimental results show that the method has high accuracy,it’s better than the traditional support vector machine (SVM) and deep neural network (DNN) and other machine learning methods.At the same time,the proposed method can also shorten the processing time of classification detection.The detection model is deployed in SDN controller,and the new security policy is sent to the OpenFlow switch to achieve the defense against specific DDoS attack.…”
Get full text
Article -
38898
Non-Orthogonality of QAM and Sunflower-like Modulated Coherent-State Signals
Published 2025-01-01“…The findings provide valuable insights for designing useful quantum signal constellations.…”
Get full text
Article -
38899
Lithuanian Language Curricula
Published 2024-03-01“…We know the authors of the first two curricula: the curriculum for the academic year 1905–1906 at Panevėžys Teacher Training Seminary was designed by Vladimiras Lukinas, and the following year, the curriculum for the same seminary was developed by Jonas Jablonskis. …”
Get full text
Article -
38900
Federated edge learning model based on multi-level proxy permissioned blockchain
Published 2024-04-01“…The multi-level proxy permission blockchain was designed to establish a trusted underlying environment for federated edge learning, and the hierarchical model aggregation scheme was implemented to alleviate the pressure of model training. …”
Get full text
Article