Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
14661
A contract-based cooperative spectrum sharing model in cognitive radio network
Published 2016-05-01“…A contract-based cooperative spectrum sharing model in cognitive radio network was proposed.In this model,secondary user offers relay service for primary user when primary user's channel is poor.In return,when primary user's channel is good,secondary user can use spectrum with the underlay mode under the condition that the interference is limited.Contract theory in economics was introduced to this framework,the problem of collaboration between the primary and secondary users was modeled as a contract design problem,and the effectiveness function of evaluate primary and secondary users on contract revenue was set up.And the differential evolution algorithm was used to solve the problem.Finally,in different circumstances,primary user collaboration and un-collaboration were contrasted.The results showed that the main users under the condition of no additional input spectrum,not only save the sending power,but also effectively improve the data transfer rate,and improve the energy efficiency and spectrum efficiency.…”
Get full text
Article -
14662
Efficient anonymous password-based authenticated key exchange scheme
Published 2009-01-01“…Password-based key exchange schemes was designed to provide entities communicating over a public network,and only sharing a(short) password with a session key(e.g.…”
Get full text
Article -
14663
STAKEHOLDERS’ EVALUATION OF LEARNING OUTCOMES IN EDUCATIONAL QUALITY ASSURANCE SYSTEM
Published 2016-12-01“…On the exampleof Bachelor Program in Electrical Engineering (Tomsk Polytechnic University) the authors discuss the results of comparative analysis of the intended and the acquired levels of proficiency defined by stakeholders for professional and personal attributes of engineering graduates, as well as for their skills to conceive, design, implement and operate technical products and systems in the enterprise, societal, and environmental context. …”
Get full text
Article -
14664
Study of high-speed malicious Web page detection system based on two-step classifier
Published 2017-08-01“…In view of the increasing number of new Web pages and the increasing pressure of traditional detection methods,the naive Bayesian algorithm and the support vector machine algorithm were used to design and implement a malicious Web detection system with both efficiency and function,TSMWD ,two-step malicious Web page detection.The first step of detection system was mainly used to filter a large number of normal Web pages,which was characterized by high efficiency,speed,update iteration easy,real rate priority.After the former filter,due to the limited number of samples,the main pursuit of the second step was the detection rate.The experimental results show that the proposed scheme can improve the detection speed of the system under the condition that the overall detection accuracy is basically the same,and can accept more detection requests in certain time.…”
Get full text
Article -
14665
Traffic Signal Setting at Urban Junctions and Fundamental Diagram: A Before–After Study
Published 2025-01-01“…The analysis at the link level may be extended in the future to the network level by incorporating the network fundamental diagram into the traffic signal setting design problem.…”
Get full text
Article -
14666
Improved Maximum Likelihood S-FSK Receiver for PLC Modem in AMR
Published 2012-01-01“…Some implementation results are presented to show that a communication throughput of 9.6 kbps is reachable with the designed S-FSK modem.…”
Get full text
Article -
14667
THE LGBTQA INTERCOLLEGIATE ATHLETES’ EXPERIENCES IN HIGHER EDUCATION INSTITUTIONS IN THE PHILIPPINES: BASIS FOR AN INSTITUTIONAL INCLUSIVE SPORTS PLAN
Published 2022-11-01“…This study used an explanatory sequential mixed method design to examine discrimination experienced by selected LGBTQA intercollegiate athletes from private and public higher education institutions in the Philippines. …”
Get full text
Article -
14668
Implementation of Internasional-Based Curriculum Alfa and Friends to Development Early Childhood Language
Published 2024-12-01“…The study highlights the importance of innovative and interactive methods, these findings have important implications for curriculum design, encouraging the adoption of similar approaches to improve children's early language acquisition and holistic development.…”
Get full text
Article -
14669
Numerical Investigation on the Flow Field of Muzzle Decompression Device for the Barrel Recoil Gun
Published 2024-01-01Get full text
Article -
14670
PENGEMBANGAN E-MODUL PEMANASAN GLOBAL BERBASIS EDUCATION FOR SUSTAINABLE DEVELOPMENT UNTUK SEKOLAH DASAR
Published 2024-05-01“…Electronic modes have been validated by media and design experts, materials experts, and pedagogic experts and have been tested on students. …”
Get full text
Article -
14671
Developing accessible routes in historic environments for wheelchair users using a smart mobile application
Published 2025-01-01“…In cities with historical heritage, wheelchair users cannot benefit from urban spaces due to the lack of design in the physical environment. In this study, Konya city centre (Turkey), which has a historical richness for the solution of this problem, is analysed according to Turkish Standard (TS9111), The Americans with Disabilities Act (ADA) and the United Nations (UN) standards for wheelchair users. …”
Get full text
Article -
14672
Research of the Virtual Machining Method of Vehicle Variable Ratio Gear based on Generation Method
Published 2016-01-01“…Besides,simulation verification of the variable ratio gear and rack is implemented in ADAMS and the feasibility of this method is verified by the contrastive analysis of the transmission ratio curve got by simulation and the designed transmission ratio curve.…”
Get full text
Article -
14673
APPLICABILITY INVESTIGATION OF FAILURE CRITERION FOR POST-BUCKLING ANALYSIS OF STIFFENED COMPOSITE PANELS
Published 2020-01-01“…This work can provide reference to the post-buckling design and analysis of stiffened composite panels.…”
Get full text
Article -
14674
Data-Driven Approximated Optimal Control for Chemical Processes with State and Input Constraints
Published 2019-01-01“…The objective of this paper is to design an applicable optimal control for chemical processes with known model structure and unknown model parameters. …”
Get full text
Article -
14675
Immunotherapy: An Optimal Control Theory Approach
Published 2005-07-01“…To better determine under what circumstances the tumor can be eliminated, we implement optimal control theory. We design two control functionals, the first functional having one control and the second having two controls, to maximize the effector cells and interleukin-2 concentration and to minimize the tumor cells. …”
Get full text
Article -
14676
-
14677
Communication between nodes in backscatter-assisted wireless powered communication network
Published 2021-06-01“…At present, there is almost no design on information transmission between the nodes in wireless powered communication network.The high-throughput information transmission between the nodes in backscatter assisted wireless powered communication network was studied.A scheme was proposed which consisted of backscattering/energy transmission phase and active communication phase.The maximum throughput was modeled as a convex optimization problem.Then, based on the relationship between the total backscatter communication duration and the threshold of node energy capture duration, the problem was decomposed into several sub problems that only need to optimize two backscatter durations.An efficient two-level golden section search algorithm was designed to solve the sub problems, and the optimal solution of the original problem was obtained from the optimal solutions of the sub problems.Simulation results show that, compared with pure active communication scheme and pure backscatter communication scheme, the proposed scheme can effectively improve the throughput.…”
Get full text
Article -
14678
Generating and Analysing Data for Applied Research on Emerging Technologies: A Grounded Action Learning Approach
Published 2004-01-01“…Therefore, it is necessary to design research approaches that can generate accessible and relevant data. …”
Get full text
Article -
14679
An Iterative Technique for the Synthesis of Active Antenna Oscillator Arrays
Published 2009-01-01“…A design procedure for the synthesis of a coupled active antenna oscillator array is presented. …”
Get full text
Article -
14680
A Sequential Optimization Sampling Method for Metamodels with Radial Basis Functions
Published 2014-01-01“…Metamodels have been widely used in engineering design to facilitate analysis and optimization of complex systems that involve computationally expensive simulation programs. …”
Get full text
Article