Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
39761
Deep learning-based method for mobile social networks with strong sparsity for link prediction
Published 2024-06-01“…To address the issue of strong sparsity in link prediction for mobile social networks, a deep learning-based prediction method named DLMSSLP (deep learning-based method for mobile social networks with strong sparsity for link prediction) was developed. This method was designed to employ a combination of a Graph Auto-Encoder (GAE), feature matrix aggregation, and multi-layer long short-term memory networks (LSTM). …”
Get full text
Article -
39762
User authentication of industrial internet based on HHT transform of mouse behavior
Published 2022-06-01“…The rapid development of the industrial internet had caused widespread concern about the network security, and the end-user authentication technology was considered a research hotspot.According to the characteristics of human-computer interaction in industrial internet, an experimental website was designed.24 users' mouse behavior data in an uncontrolled environment were collected within 2.5 years to conduct case studies.Hilbert-Huang transform (HHT) was used to extract frequency domain features of mouse behavior signals, combined with time domain features to form a time-frequency joint domain feature matrix of 163-dimensional to characterize user mouse behavior patterns.Bagged tree, support vector machine (SVM), Boost tree and K-nearest neighbor (KNN) were used to build a user authentication model, and the comparison result showed that the Bagged tree had the best internal detection effect in this case, with an average false acceptance rate (FAR) of 0.12% and an average false rejection rate (FRR) of 0.28%.In external detection, the FAR was 1.47%.Compared with the traditional mouse dynamics method, the frequency domain information of mouse behavior extracted by HHT can better realize the user authentication, and provide technical support the security of the industrial internet.…”
Get full text
Article -
39763
Handover algorithm for space-air-ground integrated network based on location prediction model
Published 2024-12-01“…A network handover algorithm utility function characterized by quality of service (QoS) requirements, handover cost, and network load balancing was designed. A distributional deep Q-network (D-DQN) was employed to select the network nodes that could maximize long-term goals for execution handover. …”
Get full text
Article -
39764
Inhibition of Carrageenan-Induced Cutaneous Inflammation by PPAR Agonists Is Dependent on Hepatocyte-Specific Retinoid X Receptor Alpha
Published 2006-01-01“…The identification of RXRα as an important factor involved in the antiedema effect produced by agonists of the three PPAR subtypes is a significant achievement towards the goal of designing novel, effective anti-inflammatory drugs.…”
Get full text
Article -
39765
Automatic incident detection in smart city using multiple traffic flow parameters via V2X communication
Published 2018-11-01“…Moreover, these systems are designed for freeways/highways and are less compatible with city scenario due to its highly variable traffic density factor. …”
Get full text
Article -
39766
DDAC: a feature extraction method for model of image steganalysis based on convolutional neural network
Published 2022-05-01“…To solve the problem that for image steganalysis based on convolution neural network, manual designed filter kernels were used to extract residual characteristics, but in practice, these kernels filter were not suitable for each steganography algorithm and have worse performance in application, a directional difference adaptive combination (DDAC) method was proposed.Firstly, the difference was calculated between center pixel and each directional pixel around, and 1 × 1 convolution was adopted to achieve linear combinations of directional difference.Since the combination parameters self-adaptively update according to loss function, filter kernels could be more effective in extracting diverse residual characteristics of embedding information.Secondly, truncated linear unit (TLU) was applied to raise the ratio of embedding information residual to image information residual.The model’s coveragence was accelerated and the ability of feature extraction was promoted.Experimental results indicate that substituting the proposed method could improve the accuracy of Ye-net and Yedroudj-net by 1.30%~8.21% in WOW and S-UNIWARD datasets.Compared with fix and adjustable SRM filter kernels methods, the accuracy of test model using DDAC increases 0.60%~20.72% in various datasets, and the training progress was more stable.DDAC-net was proved to be more effective in comparsion with other steganalysis model.…”
Get full text
Article -
39767
Mechanisms for introduction of pseudo ductility in fiber reinforced polymer composites- a review
Published 2023-07-01“…Hence there is a need to explore the state of art technological developments in designing toughened composites by minimizing their factor of safety. …”
Get full text
Article -
39768
Stochastic Modeling and Availability Optimization of Nuts Manufacturing Plant Using Markov Process and Particle Swarm Optimization
Published 2024-12-01“…These findings are beneficial for system designers and maintenance engineers to propose the maintenance strategies. …”
Get full text
Article -
39769
Software Defi ned Satellite Network Assisted Multi-Domain Routing Strategy for Aeronautical Networks
Published 2022-09-01“…Satellite network layer and aeronautical network layer are treated as important parts of the next generation network, which will lead the world into the era of global interconnection.However, the high mobility and sparse distribution of aircraft limit the application of traditional routing algorithms originally designed for ground-based ad-hoc networks.Therefore, this paper used the aeronautical network to access software defi ned satellite network (Sat-SDN) for realizing real-time communication and state synchronization between aircraft via the inter-satellite and satellite-to-aircraft links.In order to extend the aeronautical networking and transmission mechanism to the global scope, a multiple domain division method was proposed, and an inter domain routing algorithm was presented.By analogy the refl ection principle of light, a routing learning method which limited the broadcasting of routing learning packets into a specifi c area was proposed, and eff ectively avoided severe communication overhead caused by state synchronization and fl ooding learning in large-scale networks.The real aircraft data was used for experimental simulation to compared the performance of proposed low-cost inter-domain routing algorithm (LIRA) with existing solutions.The simulation results showed that LIRA could eff ectively reduced the communication overhead and improved the transmission quality.…”
Get full text
Article -
39770
Strategic adoption: unveiling the impact of e-Bupot application in government agencies
Published 2024-06-01“…The e-Bupot application for government agencies is an information technology solution provided by the Directorate General of Taxes (DGT) of Republic of Indonesia. The e-Bupot is designed to simplify the fulfillment of tax obligations and enhance the overall convenience of taxpayers. …”
Get full text
Article -
39771
Modeling the relationship between the perceived negotiation styles and conflict management among physical education experts
Published 2017-08-01“…Standard questionnaire of negotiation styles designed by Pierre was used as a measuring tool. Also, testing the conflict management strategies, standard questionnaire of Robbins was used. …”
Get full text
Article -
39772
Multiple Adversarial Domains Adaptation Approach for Mitigating Adversarial Attacks Effects
Published 2022-01-01“…Although neural networks are near achieving performance similar to humans in many tasks, they are susceptible to adversarial attacks in the form of a small, intentionally designed perturbation, which could lead to misclassifications. …”
Get full text
Article -
39773
Past, Present, and Future Perspectives on the Integration of AI Into Walkability Assessment Tools: A Systematic Review
Published 2025-01-01“…Furthermore, AI tools empower walkability assessment by facilitating mapping, scoring, designing pedestrian routes, and uncovering previously unconsidered factors. …”
Get full text
Article -
39774
Research on gating alignment strategy for flow scheduling in satellite formation
Published 2024-08-01“…Secondly, an online rolling gray scale prediction algorithm was designed to predict the delay of inter-node links, and based on the prediction results, the gated list deviation of neighboring nodes could be corrected dynamically to ensure the consistency of multi-node gated scheduling. …”
Get full text
Article -
39775
Smart Battery Storage Integration in An IoT-Based Solar-Powered Waste Management System
Published 2024-12-01“…A prototype system, designed, developed, and simulated using Proteus circuit simulation, incorporates IoT sensors, solar panels, and smart battery storage to optimise energy use and improve waste collection efficiency. …”
Get full text
Article -
39776
Linguistic Features and English Interference on Bahasa Indonesia Usage among Indonesian TikTok Users
Published 2024-04-01“…To investigate this issue, this study is designed to explore linguistic features affected by language interference and factors contributing to such language interference on TikTok, specifically among Indonesian TikTok users. …”
Get full text
Article -
39777
FPGA Implementation of Reconfigurable Finite State Machine with Input Multiplexing Architecture Using Hungarian Method
Published 2018-01-01“…The mathematical model for designing a complex digital system is a finite state machine (FSM). …”
Get full text
Article -
39778
The Quality of Ranking during Simulated Pairwise Judgments for Examined Approximation Procedures
Published 2019-01-01“…In order to provide credible and high quality results, the problem is studied via a properly designed and coded seminal simulation algorithm, executed in Wolfram Mathematica 8.0.…”
Get full text
Article -
39779
Performance Trades for Multiantenna GNSS Multisensor Attitude Determination Systems
Published 2018-01-01“…This study is motivated by the need for system designers, scientists, and engineers of airborne astronomical and remote sensing platforms to better determine which system configuration is most suitable for their specific application. …”
Get full text
Article -
39780
Prevention of unplanned extubation in neonatal patients: Protocol for a systematic review and meta-analysis.
Published 2025-01-01“…This study aimed to describe a systematic review and meta-analysis protocol that will identify and assess the effect of primary intervention measures designed to prevent UPE in NICU. A search will be carried out in the following databases: PubMed/Medline, EMBASE, Scopus, CINAHL, Cochrane Library, SciELO, and LILACS. …”
Get full text
Article