Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
42441
Trust evaluation optimization mechanism for cloud user behavior based on FANP
Published 2022-04-01“…The open cloud computing environment is facing security challenges and the traditional user behavior evaluation mechanism cannot guarantee the security of the cloud.In order to scientifically and quantitatively evaluate the user’s behavior trust, ensure the scientific and reasonable weight assignment, improve the security and credibility of user behavior under the cloud platform, a trust evaluation optimization mechanism combined with fuzzy analytic network process (FANP) was designed.In the proposal, user behavior trust evaluation based on one control target was extended to include two control target modules which were historical access behavior and current access environment.At the same time, the historical access behavior module was divided into two aspects: conventional behavior and gray behavior, and the current access environment module was divided into two directions: information integrity and access security.The corresponding control criteria was divided to construct the analytic network process (ANP) model under different control objectives.The limit hypermatrix under each target module was calculated to obtain the final stability weight of each element with the help of network analytic hierarchy process software.And the real user behavior data under the development platform was selected to comprehensively calculate the trust degree under different modules as the final behavior evaluation result.The expansion of the user behavior evaluation module refined the evaluation granularity, which makes the evaluation results more objective and accurate.In the cloud environment with the same malicious ratio, the optimization mechanism has better recognition effect, and it can identify cloud users with low trust efficiently and effectively, so as to improve the security and legitimacy of the cloud.At the same time, it also provids new research direction for solving the problem of user security and credibility, and effective risk control in the cloud environment.…”
Get full text
Article -
42442
Daily Plasmaspheric TEC Variations From COSMIC GPS Observations Based on RBF Neural Network‐Kriging Method
Published 2023-07-01“…In this paper, a novel joint method of radial basis function neural network—Kriging (RBF‐Kr) method is designed to construct the daily PTEC model using the Constellation Observing System for Meteorology, Ionosphere and Climate Global Positioning System observations during the low (2009) and high (2013) solar activity years. …”
Get full text
Article -
42443
Bone Formation from Porcine Dental Germ Stem Cells on Surface Modified Polybutylene Succinate Scaffolds
Published 2016-01-01“…Designing and providing a scaffold are very important for the cells in tissue engineering. …”
Get full text
Article -
42444
Dynamic Stiffness Measurements of Road Pavements by Means of Impact Hammer in a Non-Resonant Configuration
Published 2025-01-01“…During the work, a measurement aid device named Test Automation Device (TAD) was designed and implemented to increase the quality of the measurements. …”
Get full text
Article -
42445
Promoting Preservice Teachers’ Attitudes toward Socioscientific Issues
Published 2018-01-01“…For this purpose, a semester-long socioscientific issues course was designed and implemented. Data were collected from a science education group (preservice science teachers) and a non-science education group (preservice social-science teachers). …”
Get full text
Article -
42446
Simulation and Analysis of a Split Drill Bit for Pneumatic DTH Hammer Percussive Rotary Drilling
Published 2024-01-01“…In this paper, several types of split drill bits for different drilling technologies are designed. The flow field characteristics of one of the split drill bits is analyzed based on the computational fluid dynamics (CFD) method, with four technic parameters considered, which are input flow rate, number of inlet holes, angle of injection exhaust holes, and diameter of injection exhaust holes, respectively. …”
Get full text
Article -
42447
Molecular docking and quantitative structure-activity relationships for a series of Trypanosoma cruzi dihydroorotate dehydrogenase inhibitors
Published 2025-01-01“…Although restricted to a congeneric series and focused solely on 2D and 3D descriptors, these QSAR models and molecular docking analyses identified key properties and intermolecular interactions for designing and optimizing new compounds as potent T. cruzi DHODH inhibitors.…”
Get full text
Article -
42448
Graph convolutional network as a fast statistical emulator for numerical ice sheet modeling
Published 2025-01-01“…Although several deep learning emulators using graphic processing units (GPUs) have been proposed to accelerate ice sheet modeling, most of them rely on convolutional neural networks (CNNs) designed for regular grids. Since they are not appropriate for the irregular meshes of ISSM, we use a graph convolutional network (GCN) to replicate the adapted mesh structures of the ISSM. …”
Get full text
Article -
42449
Performance Level of Physical Education Students: Basis for the Development of Task-Based Teaching Strategies
Published 2024-12-01“…Thus, this study aims to determine the performance level of the Grade 10 PE students and the extent of implementation of the Grade 10 PE curriculum in Mahaplag, Leyte Division, with the end view of designing a task-based teaching strategy in Physical Education. …”
Get full text
Article -
42450
THD Reduction of Improved Single Source MLI Using Upgraded Black Widow Optimization Algorithm
Published 2023-01-01“…The reduced structure MLI is designed with three asymmetrical DC voltage sources of ratio 1 : 2 : 4 to generate 15-level output voltage which requires reduced number of switching devices in comparison with the existing topologies of equivalent voltage level. …”
Get full text
Article -
42451
Increase of the productive level as a demand for the conscious content assimilation of Philosophy: student´s perception
Published 2019-02-01“…There was an increase of the productive assimilation level in the seminar guidelines and practical lessons, on the bases of designing integrating questions. The number of questions decreased. …”
Get full text
Article -
42452
Novel techniques for efficient PAPR reduction in NOMA systems for future wireless networks
Published 2025-01-01“…Fifth-generation (5G) networks are designed to overcome critical challenges, including achieving high data rates, supporting massive device connectivity, and ensuring low latency. …”
Get full text
Article -
42453
Research on Concrete Beam Damage Detection Using Convolutional Neural Networks and Vibrations from ABAQUS Models and Computer Vision
Published 2025-01-01“…In this study, the vibration data of two beam-ABAQUS models were used as the input data for a newly designed deep learning-based structural health monitoring method. …”
Get full text
Article -
42454
Application of Regional Climatic Models to Assess the Performance Evaluation of Changes on Flood Frequency in Woybo Catchment, Ethiopia
Published 2022-01-01“…This research paves way to reduce the negative impacts of flooding and plays a vital role in providing estimates of recurrence floods which are used in designing roads, dams, and bridges for sustainable water resources management.…”
Get full text
Article -
42455
The Role of Iran’s «Soft Power» in Confronting Iranophobia
Published 2019-09-01“…«Soft power» is a set of activities designed by a government or regional and international actors aimed to influence external public opinion, promote external image or attract support for a particular policy, which is implemented through all the available tools and new technologies. …”
Get full text
Article -
42456
Interpersonal relationships as coping mechanisms during bed rest: a thematic synthesis literature review
Published 2025-01-01“…Bed rest (BR) studies are primarily designed to investigate the effects of weightlessness on the human body, but they are also used to study the effects of physical inactivity. …”
Get full text
Article -
42457
Investigating the Impact of Automated Vehicles on the Safety and Operation of Low-Speed Urban Networks
Published 2024-01-01“…In addition, this study discusses the implications for designing and operating safe, low-speed urban road networks. …”
Get full text
Article -
42458
A Combined Model for Simulating the Spatial Dynamics of Epidemic Spread: Integrating Stochastic Compartmentalization and Cellular Automata Approach
Published 2025-04-01“…The model presented in this paper is designed to simulate the spatial distribution of diseases in a spatially structured population. …”
Get full text
Article -
42459
Estimating Weak Pulse Signal in Chaotic Background with Jordan Neural Network
Published 2020-01-01“…Then, a Jordan neural network- (JNN-) based model is designed, which can minimize the error squared sum by mixing the single-point jump model for targeting signal. …”
Get full text
Article -
42460
DFCNformer: A Transformer Framework for Non-Stationary Time-Series Forecasting Based on De-Stationary Fourier and Coefficient Network
Published 2025-01-01“…To tackle this challenge, this paper introduces a forecasting model called DFCNformer (De-stationary Fourier and Coefficient Network Transformer), designed to mitigate accuracy degradation caused by non-stationarity in time-series data. …”
Get full text
Article