Showing 40,681 - 40,700 results of 46,768 for search '"Design"', query time: 0.19s Refine Results
  1. 40681

    Spatial Equilibrium Evaluation and Diagnosis of Regional Water Resources Based on Comprehensive Gini Coefficient and Subtractive Set Pair Potential by DONG Tao, DONG Guoqiang, HU Yong, FENG Yaolong, ZHANG Jun

    Published 2024-10-01
    “…Concurrently, the subtractive set pair potential in these three regions, manifested as partial reverse potential or reverse potential, designates them as vulnerable regions that impact the spatial equilibrium state of water resources in Chongqing. …”
    Get full text
    Article
  2. 40682

    Security access permission authentication simulation of multi-source network big data based on blockchain by Bin LI, Hui HE, Zhongying ZHAO, Jingwei GUO

    Published 2024-02-01
    “…The frequent interaction and storage of big data in multi-source networks have broken traditional data silos, enabling cross regional and cross organizational data access, posing significant challenges to data security and privacy protection.As one of the technologies to protect data and resource security, access authentication faces enormous communication loads while obtaining trust from all data nodes, which can cause data loss and damage.Therefore, a blockchain based research method for multi-source network big data security access permission authentication was proposed.The transformation status of data in network transmission using similarity relationships was measured, and the probability of multi-source network data access based on the similarity matrix was calculated.The data security access contracts were established through blockchain technology, calibrating data access attributes and transaction ciphertexts, and compressing data within corresponding attributes.The access reliability based on the purpose of the access was analyzed, reliability was used as the standard to correspond to the security level, rules under different levels of reliability were accessed, specific permissions were authenticated for data security access, and implementation methods were designed.The experimental results show that using different data attribute contents as testing conditions, encrypting and decrypting data in both conventional and attack modes, the new method can achieve fast authentication response and secure access to network data.…”
    Get full text
    Article
  3. 40683

    The Role of Environmental Monitoring in Promoting Green Creativity by Taha Ibrahim Mohamed, Abbas Ali Abdulhassan

    Published 2023-01-01
    “…The main objective of the research article is to demonstrate the role played by environmental monitoring in promoting green creativity by creating competitive new products, services, processes, procedures and systems designed to use natural resources at the lowest level and to provide a better quality of life. …”
    Get full text
    Article
  4. 40684

    Enhancing language learning: EFL teachers’ insights on online autonomous learning activities by Ahmed Al Shlowiy, Praveen Raj

    Published 2024-09-01
    “…These resources include several activities designed to meet students’ requirements, promote self-learning, and fit their learning preferences. …”
    Get full text
    Article
  5. 40685

    Numerical simulation of creep notched bar of P91 steel by Norhaida Ab Razak, C. M. Davies

    Published 2022-09-01
    “… Numerous components designed for use at elevated temperatures now exhibit multiaxial stress states as a result of geometric modification and material inhomogeneity. …”
    Get full text
    Article
  6. 40686

    Exploring Polymer-Modified Concrete and Cementitious Coating with High-Durability for Roadside Structures in Xinjiang, China by Yinchuan Guo, Aiqin Shen, Xiaohui Sun

    Published 2017-01-01
    “…In addition, the performances of six types of readily available coating materials, including the acrylic latex modified cementitious coating designed in this study, were tested in freeze-thaw condition with the presence of chloride ions. …”
    Get full text
    Article
  7. 40687

    Parallel association rules incremental mining algorithm based on information entropy and genetic algorithm by Yimin MAO, Qianhu DENG, Zhigang CHEN

    Published 2021-05-01
    “…Aiming at the problems that in the big data environment, the Can-tree based incremental association rule algorithm had problems such as too much space occupation of the tree structure, inability to dynamically set the support threshold, and too much time consumption during the data transfer process between the Map and Reduce stages, the Map Reduce-based parallel association rules incremental mining algorithm using information entropy and genetic algorithm (MR-PARIMIEG)was proposed.Firstly, a similar items merging based on information entropy (SIM-IE) was designed to merge similar data items, and a Can tree based on the merged data set was constructed, thereby reducing the space occupation of the tree structure.Secondly, the dynamic support threshold obtaining using genetic algorithm (DST-GA) was proposed to obtain the relatively optimal dynamic support threshold in the big data environment, and frequent itemset mining was performed according to this threshold to avoid the unnecessary time consumption caused by mining redundant frequent patterns.Finally, in the process of MapReduce parallel operation, the parallel LZO data compression algorithm was used to compress the output data of the Map stage, thereby reducing the size of the transmitted data, and finally improving the running speed of the algorithm.Experimental simulation results show that MR-PARIMIEG has better performance when mining frequent item sets in the big data environment, and it is suitable for parallel processing of larger data sets.…”
    Get full text
    Article
  8. 40688

    A Ship Emerges in the Distance... People Stand and Applaud. The (Un)obvious Contexts of the Wrocław Sea Festival Celebrations in June 1945 by Joanna Nowosielska-Sobel

    Published 2024-01-01
    “…The realisation of this goal has been designed in the form of presenting and analysing the (un)obvious contexts of the Sea Festival celebrations in Wrocław in 1945, which have not yet (similarly to other parts of the “Recovered Territories”) received the attention they deserve from historians. …”
    Get full text
    Article
  9. 40689

    Developing Seismic Risk Prediction Functions for Structures by Naveed Ahmad, Qaisar Ali, Muhammad Adil, Akhtar Naeem Khan

    Published 2018-01-01
    “…Prototype buildings are designed respecting the existing building stock and investigated through nonlinear static and dynamic time history analyses. …”
    Get full text
    Article
  10. 40690

    Accurate Recognition and Simulation of 3D Visual Image of Aerobics Movement by Wenhua Fan, Hyun Joo Min

    Published 2020-01-01
    “…The convolutional neural network and the deep neural network based on autoencoder are designed and applied to aerobics action 3D visual image test set for recognition and comparison. …”
    Get full text
    Article
  11. 40691

    Analysis and Synthesis of Double Negative Dielectric Media Rectenna Systems for Ambient Microwave Energy Harvesting by Apostolia Karampatea, Katherine Siakavara

    Published 2018-01-01
    “…The hybrid schemes DNG dipole antenna were designed for the Universal Mobile Telecommunication System (UMTS) frequency band, but the method is general and would be applied to any other frequency band and also with other antenna types.…”
    Get full text
    Article
  12. 40692

    Feature Selection and Classification Optimization of Transformer Oil Odor Data With Recursive Feature Elimination Using Grid Search and Cross-Validation by Bilge Han Tozlu

    Published 2025-01-01
    “…In this study, an electronic nose system was developed to detect the duration of oil usage in power transformers based on its smell. In the system designed with eleven inexpensive gas sensors, a total of 200 transformer oil odors with four different usage periods were analyzed. …”
    Get full text
    Article
  13. 40693

    THE TEACHERS’ BELIEFS IN TEACHER WRITTEN CORRECTIVE FEEDBACK ON THE STUDENTS' WRITING by Dyah Fitri Mulati, Joko Nurkamto, Nur Arifah Drajati

    Published 2020-02-01
    “…This study addresses the teachers’ beliefs in the specific teaching writing strategy that is commonly used by the teachers in Indonesia to assist students’ writing, teacher written corrective feedback. It was designed as a case study surveying two teachers from a secondary school in Lampung as its respondents. …”
    Get full text
    Article
  14. 40694

    SOIL COMPACTION AND ITS IMPACT ON SOIL PROPERTIES, MICROBIOME, GREENHOUSE GAS EMISSION AND PLANT ROOT GROWTH by Poonam Bhatt, Prashant Raj Giri, Balchisu Napari

    Published 2024-06-01
    “…This comprehensive review paper contributes valuable insights for designing sustainable agricultural practices prioritizing soil health, ecosystem resilience, and food security.…”
    Get full text
    Article
  15. 40695

    Novel defense based on softmax activation transformation by Jinyin CHEN, Changan WU, Haibin ZHENG

    Published 2022-04-01
    “…Deep learning is widely used in various fields such as image processing, natural language processing, network mining and so on.However, it is vulnerable to malicious adversarial attacks and many defensive methods have been proposed accordingly.Most defense methods are attack-dependent and require defenders to generate massive adversarial examples in advance.The defense cost is high and it is difficult to resist black-box attacks.Some of these defenses even affect the recognition of normal examples.In addition, the current defense methods are mostly empirical, without certifiable theoretical support.Softmax activation transformation (SAT) was proposed in this paper, which was a light-weight and fast defense scheme against black-box attacks.SAT reactivates the output probability of the target model in the testing phase, and then it guarantees privacy of the probability information.As an attack-free defense, SAT not only avoids the burden of generating massive adversarial examples, but also realizes the advance defense of attacks.The activation of SAT is monotonic, so it will not affect the recognition of normal examples.During the activation process, a variable privacy protection transformation coefficient was designed to achieve dynamic defense.Above all, SAT is a certifiable defense that can derive the effectiveness and reliability of its defense based on softmax activation transformation.To evaluate the effectiveness of SAT, defense experiments against 9 attacks on MNIST, CIFAR10 and ImageNet datasets were conducted, and the average attack success rate was reduced from 87.06% to 5.94%.…”
    Get full text
    Article
  16. 40696

    2022 IJSPT Orthopedic Summit Research Abstracts by International Journal of Sports Physical Therapy

    Published 2022-10-01
    “…The 2022 abstracts include contemporary orthopaedic and rehabilitation topics across various research designs. Each abstract presents only a brief summary of a research project / presentation and does not permit full assessment of the scientific rigor with which the work was conducted. …”
    Get full text
    Article
  17. 40697

    Comparison of One-Drill Protocol to Sequential Drilling In Vitro and In Vivo by Sihana Rugova, Marcus Abboud

    Published 2025-01-01
    “…This aligns with emerging views on the importance of optimized drilling protocols and designs to reduce heat generation and better preserve surrounding bone structure.…”
    Get full text
    Article
  18. 40698

    An Overview on Dry Eye Treatment: Approaches for Cyclosporin A Delivery by Burçin Yavuz, Sibel Bozdağ Pehlivan, Nurşen Ünlü

    Published 2012-01-01
    “…New treatment approaches are designed to modify the underlying disease process. …”
    Get full text
    Article
  19. 40699

    An Imputation Method for Missing Traffic Data Based on FCM Optimized by PSO-SVR by Qiang Shang, Zhaosheng Yang, Song Gao, Derong Tan

    Published 2018-01-01
    “…Finally, numerical experiment is designed from three perspectives to test the performance of the proposed method. …”
    Get full text
    Article
  20. 40700

    Research on industrial Internet security detection and response based on digital twin by MA Jiali, GUO Yuanbo, FANG Chen, CHEN Qingli, ZHANG Qi

    Published 2024-06-01
    “…Finally, anomaly localization was achieved through the analysis of violations of the STL specification set, and corresponding STL weak specifications were designed through the analysis of known device faults to achieve anomaly classification. …”
    Get full text
    Article