Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
40681
Spatial Equilibrium Evaluation and Diagnosis of Regional Water Resources Based on Comprehensive Gini Coefficient and Subtractive Set Pair Potential
Published 2024-10-01“…Concurrently, the subtractive set pair potential in these three regions, manifested as partial reverse potential or reverse potential, designates them as vulnerable regions that impact the spatial equilibrium state of water resources in Chongqing. …”
Get full text
Article -
40682
Security access permission authentication simulation of multi-source network big data based on blockchain
Published 2024-02-01“…The frequent interaction and storage of big data in multi-source networks have broken traditional data silos, enabling cross regional and cross organizational data access, posing significant challenges to data security and privacy protection.As one of the technologies to protect data and resource security, access authentication faces enormous communication loads while obtaining trust from all data nodes, which can cause data loss and damage.Therefore, a blockchain based research method for multi-source network big data security access permission authentication was proposed.The transformation status of data in network transmission using similarity relationships was measured, and the probability of multi-source network data access based on the similarity matrix was calculated.The data security access contracts were established through blockchain technology, calibrating data access attributes and transaction ciphertexts, and compressing data within corresponding attributes.The access reliability based on the purpose of the access was analyzed, reliability was used as the standard to correspond to the security level, rules under different levels of reliability were accessed, specific permissions were authenticated for data security access, and implementation methods were designed.The experimental results show that using different data attribute contents as testing conditions, encrypting and decrypting data in both conventional and attack modes, the new method can achieve fast authentication response and secure access to network data.…”
Get full text
Article -
40683
The Role of Environmental Monitoring in Promoting Green Creativity
Published 2023-01-01“…The main objective of the research article is to demonstrate the role played by environmental monitoring in promoting green creativity by creating competitive new products, services, processes, procedures and systems designed to use natural resources at the lowest level and to provide a better quality of life. …”
Get full text
Article -
40684
Enhancing language learning: EFL teachers’ insights on online autonomous learning activities
Published 2024-09-01“…These resources include several activities designed to meet students’ requirements, promote self-learning, and fit their learning preferences. …”
Get full text
Article -
40685
Numerical simulation of creep notched bar of P91 steel
Published 2022-09-01“… Numerous components designed for use at elevated temperatures now exhibit multiaxial stress states as a result of geometric modification and material inhomogeneity. …”
Get full text
Article -
40686
Exploring Polymer-Modified Concrete and Cementitious Coating with High-Durability for Roadside Structures in Xinjiang, China
Published 2017-01-01“…In addition, the performances of six types of readily available coating materials, including the acrylic latex modified cementitious coating designed in this study, were tested in freeze-thaw condition with the presence of chloride ions. …”
Get full text
Article -
40687
Parallel association rules incremental mining algorithm based on information entropy and genetic algorithm
Published 2021-05-01“…Aiming at the problems that in the big data environment, the Can-tree based incremental association rule algorithm had problems such as too much space occupation of the tree structure, inability to dynamically set the support threshold, and too much time consumption during the data transfer process between the Map and Reduce stages, the Map Reduce-based parallel association rules incremental mining algorithm using information entropy and genetic algorithm (MR-PARIMIEG)was proposed.Firstly, a similar items merging based on information entropy (SIM-IE) was designed to merge similar data items, and a Can tree based on the merged data set was constructed, thereby reducing the space occupation of the tree structure.Secondly, the dynamic support threshold obtaining using genetic algorithm (DST-GA) was proposed to obtain the relatively optimal dynamic support threshold in the big data environment, and frequent itemset mining was performed according to this threshold to avoid the unnecessary time consumption caused by mining redundant frequent patterns.Finally, in the process of MapReduce parallel operation, the parallel LZO data compression algorithm was used to compress the output data of the Map stage, thereby reducing the size of the transmitted data, and finally improving the running speed of the algorithm.Experimental simulation results show that MR-PARIMIEG has better performance when mining frequent item sets in the big data environment, and it is suitable for parallel processing of larger data sets.…”
Get full text
Article -
40688
A Ship Emerges in the Distance... People Stand and Applaud. The (Un)obvious Contexts of the Wrocław Sea Festival Celebrations in June 1945
Published 2024-01-01“…The realisation of this goal has been designed in the form of presenting and analysing the (un)obvious contexts of the Sea Festival celebrations in Wrocław in 1945, which have not yet (similarly to other parts of the “Recovered Territories”) received the attention they deserve from historians. …”
Get full text
Article -
40689
Developing Seismic Risk Prediction Functions for Structures
Published 2018-01-01“…Prototype buildings are designed respecting the existing building stock and investigated through nonlinear static and dynamic time history analyses. …”
Get full text
Article -
40690
Accurate Recognition and Simulation of 3D Visual Image of Aerobics Movement
Published 2020-01-01“…The convolutional neural network and the deep neural network based on autoencoder are designed and applied to aerobics action 3D visual image test set for recognition and comparison. …”
Get full text
Article -
40691
Analysis and Synthesis of Double Negative Dielectric Media Rectenna Systems for Ambient Microwave Energy Harvesting
Published 2018-01-01“…The hybrid schemes DNG dipole antenna were designed for the Universal Mobile Telecommunication System (UMTS) frequency band, but the method is general and would be applied to any other frequency band and also with other antenna types.…”
Get full text
Article -
40692
Feature Selection and Classification Optimization of Transformer Oil Odor Data With Recursive Feature Elimination Using Grid Search and Cross-Validation
Published 2025-01-01“…In this study, an electronic nose system was developed to detect the duration of oil usage in power transformers based on its smell. In the system designed with eleven inexpensive gas sensors, a total of 200 transformer oil odors with four different usage periods were analyzed. …”
Get full text
Article -
40693
THE TEACHERS’ BELIEFS IN TEACHER WRITTEN CORRECTIVE FEEDBACK ON THE STUDENTS' WRITING
Published 2020-02-01“…This study addresses the teachers’ beliefs in the specific teaching writing strategy that is commonly used by the teachers in Indonesia to assist students’ writing, teacher written corrective feedback. It was designed as a case study surveying two teachers from a secondary school in Lampung as its respondents. …”
Get full text
Article -
40694
SOIL COMPACTION AND ITS IMPACT ON SOIL PROPERTIES, MICROBIOME, GREENHOUSE GAS EMISSION AND PLANT ROOT GROWTH
Published 2024-06-01“…This comprehensive review paper contributes valuable insights for designing sustainable agricultural practices prioritizing soil health, ecosystem resilience, and food security.…”
Get full text
Article -
40695
Novel defense based on softmax activation transformation
Published 2022-04-01“…Deep learning is widely used in various fields such as image processing, natural language processing, network mining and so on.However, it is vulnerable to malicious adversarial attacks and many defensive methods have been proposed accordingly.Most defense methods are attack-dependent and require defenders to generate massive adversarial examples in advance.The defense cost is high and it is difficult to resist black-box attacks.Some of these defenses even affect the recognition of normal examples.In addition, the current defense methods are mostly empirical, without certifiable theoretical support.Softmax activation transformation (SAT) was proposed in this paper, which was a light-weight and fast defense scheme against black-box attacks.SAT reactivates the output probability of the target model in the testing phase, and then it guarantees privacy of the probability information.As an attack-free defense, SAT not only avoids the burden of generating massive adversarial examples, but also realizes the advance defense of attacks.The activation of SAT is monotonic, so it will not affect the recognition of normal examples.During the activation process, a variable privacy protection transformation coefficient was designed to achieve dynamic defense.Above all, SAT is a certifiable defense that can derive the effectiveness and reliability of its defense based on softmax activation transformation.To evaluate the effectiveness of SAT, defense experiments against 9 attacks on MNIST, CIFAR10 and ImageNet datasets were conducted, and the average attack success rate was reduced from 87.06% to 5.94%.…”
Get full text
Article -
40696
2022 IJSPT Orthopedic Summit Research Abstracts
Published 2022-10-01“…The 2022 abstracts include contemporary orthopaedic and rehabilitation topics across various research designs. Each abstract presents only a brief summary of a research project / presentation and does not permit full assessment of the scientific rigor with which the work was conducted. …”
Get full text
Article -
40697
Comparison of One-Drill Protocol to Sequential Drilling In Vitro and In Vivo
Published 2025-01-01“…This aligns with emerging views on the importance of optimized drilling protocols and designs to reduce heat generation and better preserve surrounding bone structure.…”
Get full text
Article -
40698
An Overview on Dry Eye Treatment: Approaches for Cyclosporin A Delivery
Published 2012-01-01“…New treatment approaches are designed to modify the underlying disease process. …”
Get full text
Article -
40699
An Imputation Method for Missing Traffic Data Based on FCM Optimized by PSO-SVR
Published 2018-01-01“…Finally, numerical experiment is designed from three perspectives to test the performance of the proposed method. …”
Get full text
Article -
40700
Research on industrial Internet security detection and response based on digital twin
Published 2024-06-01“…Finally, anomaly localization was achieved through the analysis of violations of the STL specification set, and corresponding STL weak specifications were designed through the analysis of known device faults to achieve anomaly classification. …”
Get full text
Article