Suggested Topics within your search.
Suggested Topics within your search.
- Law 9
- Administrative law 6
- Contracts 5
- History 5
- Constitutional law 4
- literature 4
- Corporation law 3
- Economic policy 3
- Evidence (Law) 3
- Philosophy 3
- Social conditions 3
- Social service 3
- Actions and defenses 2
- Administration 2
- Cardiovascular - life support 2
- Civil rights 2
- Crimes against 2
- Droit 2
- Economic development 2
- Education, Higher 2
- Educational leadership 2
- Effective teaching 2
- Electric equipment 2
- Electric wiring 2
- Electric wiring, Interior 2
- Elementary school teaching 2
- Histoire 2
- Human rights 2
- Insurance requirements 2
- Law and legislation 2
-
5481
REGULATION OF CARBON NANOTUBE CONDUCTIVE AGENT ON INITIAL CRACK OF SILICON COMPOSITE ELECTRODE
Published 2024-02-01“…The above experimental results are of great significance for the design and preparation of high capacity and long-life silicon composite electrode.…”
Get full text
Article -
5482
BEARING WEAR ANALYSIS IN MULTI-BEARING SPINDLE SYSTEM
Published 2021-01-01“…The results show that the spindle speed has a significant impact on bearing wear, and the change of spindle speed leads to a great difference of bearing wear law. Without bearing angular misalignment, the sum of the wear depth of the inner and outer raceways of each bearing in the spindle system is the smallest. …”
Get full text
Article -
5483
Study on the Effect of Foundation Pit Excavation on the Deformation of Adjacent Shield Tunnel
Published 2022-01-01“…The following conclusions are drawn: (1) the excavation of adjacent foundation pit will cause excessive displacement, settlement, and structural convergent deformation of shield tunnel, causing structural damage such as increasing of faulting, water leakage, and seeping. (2) With the decrease of the distance between the tunnel and the foundation pit, the convergent deformation of the tunnel increases continuously, and when the distance is less than 30 m, the increase of segment thickness greatly improves the convergent deformation of the structure. (3) The increase of segment thickness has no obvious effect on the resistance to longitudinal deformation. …”
Get full text
Article -
5484
Aménagement forestier et lutte contre la pauvreté au Burkina Faso
Published 2009-09-01“…A preliminary approach of woodcutters’ income structure has revealed the magnitude of wood fuel income on their other income sources, and also the great contribution of this activity on the improvement of woodcutters’ living conditions. …”
Get full text
Article -
5485
THE CHARACTER THUY KIEU IN THE TALE OF KIEU FROM THE PERSPECTIVE OF CONFUCIAN CULTURE
Published 2021-04-01“…And more importantly, that "morality" is inspired again, imbued with a loving soul, a great personality, and a noble philanthropic spirit. …”
Get full text
Article -
5486
Study on Directional Control Curtain Grouting Technology in Boulder-Cobble Strata
Published 2021-01-01“…The boulder-cobble strata has the characteristic of stranger permeability along the downstream direction of the river,but the impervious curtain perpendicular to the river is difficult to form.In order to solve this problem,the grouting pipe based on embedded flower pipe technology is reformed by directional mechanical transformation.The limited energy emitted by the slurry from the pulse grouting pump is used to make the slurry penetrate along the square direction of vertical seepage,and the direction is controllable,and the grouting material and process flow are optimized.The two indexes of certain pressure and single stage suction are taken as the grouting end standard,the problems that traditional grouting method of large-size stratum such as boulder-cobble stratuml is difficult to start pressure,the cement consumption is large,and the slurry permeability path usually extends to the upstream and downstream of the river are effectively solved.The grouting test shows that the directional curtain grouting technology has good applicability to the large particle size floating gravel stratum.After the directional control grouting treatment,the water permeability is greatly reduced,which meets the anti-seepage requirements of medium and low dam foundation;it has reference significance for similar projects.…”
Get full text
Article -
5487
EFFECT OF STATIC PRESSURE ON SURFACE INTEGRITY OF BERYLLIUM COPPER ALLOY TREATED BY ULTRASONIC ROLLING
Published 2022-01-01“…The surface hardness of the treated specimen can reach 43.3 HRC, which is 18.6% higher than that of the untreated specimen.The ultrasonic rolling treatment can transform the residual tensile stress on the surface of the material into residual compressive stress, which is of great significance for improving the surface mechanical properties of the material.…”
Get full text
Article -
5488
The Potential for a Networked Ionospheric Sounding Constellation
Published 2022-05-01“…The principal advantage of sounding over other methods is direct measurement of the peak density, where a networked implementation greatly increases spatial data coverage because it provides multiple unique signal paths through the ionosphere at different frequencies. …”
Get full text
Article -
5489
Theoretical and methodological approaches to the study of bases of formation of social activity of youth
Published 2020-12-01“…The article reveals the concepts of activity, youth, social activity. The paper notes great attention to young people, especially to the problems of young people, because youth is the most active age group, that can realize itself in all spheres of life: cultural, social, political etc. …”
Get full text
Article -
5490
Effect of Ferronickel Slag Powder on Strength of Soil in Marine Environment
Published 2020-01-01“…Results showed that the marine environment had great influences on the strength of soil-cement, and the addition of compound nickel-iron slag powder can enhance the strength of soil-cement, and the deterioration of the strength of soil-cement is reduced. …”
Get full text
Article -
5491
ESTABLISHMENT AND SIMULATION OF OFHC COPPER CONSTITUTIVE MODEL IN MESOSCALE CUTTING PROCESS
Published 2019-01-01“…The rake angle of the tool also has a great influence on the formation of the chip,and the smaller tool rake angle is more conducive to accumulating material and thus forming chips. …”
Get full text
Article -
5492
Vibe++ background segmentation method combining MeanShift clustering analysis and convolutional neural network
Published 2021-03-01“…To solve problems of noise points and high segmentation error for image shadow brought by traditional Vibe+ algorithm, a novel background segmentation method (Vibe++) based on the improved Vibe+ was proposed.Firstly, binarization image was acquired by using traditional Vibe+ algorithm from surveillance video.The connected regions were marked based on the region-growing domain marker method.The area threshold was obtained with difference characteristics of boundary area, the connected regions below threshold were treated as disturbing points.Secondly, five different kernel functions were introduced to improve the traditional MeanShift clustering algorithm.After improving, this algorithm was fused effectively with partitioned convolutional neural network.Finally, program of classification of trailing area, non-trailing area and trailing edge area in the resulting image was performed.Position coordinates of the trailing area were calculated and confirmed, and the trailing area was quickly deleted to obtain the final segmentation result.This segmentation accuracy was greatly improved by using the proposed method.The experimental results show that the proposed algorithm can achieve segmentation accuracy of more than 98% and has good application effect and high practical value.…”
Get full text
Article -
5493
An Overview of Application of Machine Learning Models in Urban Flood Simulation and Forecasting
Published 2025-01-01“…The rapidly developed artificial intelligence technology gradually shows great potential and value in urban flood simulation and forecasting. …”
Get full text
Article -
5494
Analysis of Bismuth (III) Iodide and Dendrimers in Drug Applications
Published 2022-01-01“…The reaction between bismuth and iodine produces this gray-black solid, which was of great interest in qualitative inorganic analysis. …”
Get full text
Article -
5495
Passive biometric electronic lock via UHF RFID
Published 2021-04-01“…A biometric lock design method was proposed based on the internal features of human body, namely PBLock.It used the backscattered RF signals to collect the impedance characteristics of human fingertips through the contact between human fingers and tags.The advantage of such authentication method is that the human impedance was not easy to be stolen, and it was fully integrated with the hardware characteristics of the device (RFID tags), which greatly increased the difficulty for the attacker to copy and clone.To ensure the availability and efficiency of the system, an optimization authentication mechanism was proposed by cutting tag antenna, which effectively improved the impedance sensitivity.Moreover, the feasibility of passive drive was discussed by using the electromagnetic energy advantage of RFID system.Through a large number of experimental evaluations, the authentication accuracy of PBLock can reach 96%, and the average time cost of a single authentication is 1.4 seconds.Some attack models were presented based on practical environment.The results show that PBLock can effectively prevent counterfeiting attack, impersonation attack and replay attack, which provides an opportunity for the secure application of new biometric electronic locks.…”
Get full text
Article -
5496
Simulation Analysis of Big Data Discriminatory Pricing Behavior from the Perspective of Game Theory
Published 2025-01-01“…With the increasing popularity of big data technology, some enterprises use the massive amount of consumer data collected for the analysis of consumers’ purchasing power and preferences to implement discriminatory pricing and increase profits, with consumer rights infringed upon. Therefore, it is of great significance to study how consumers respond to big data discriminatory pricing (BDDP) behavior by enterprises. …”
Get full text
Article -
5497
Optimization and research on RFID anti-collision algorithm based on adaptive multi-dimension division code
Published 2013-09-01“…Under the circumstance of many tags and many collisions,when multi-dimension division code algorithm is applied,the average number of times the reader calls each tag C(n) approximated to a limit 4/3,and the data conveyed by calling each tag tends to be a relatively small constant.However,under the circumstance of few collisions,the average number of times the reader calls each tag and the average data conveyed were relatively large.The adaptive multi-dimension division code algorithm,and the optimization of adaptive multi-dimension division code algorithm were proposed.The adaptive multi-dimension division code algorithm could adaptively decrease the MDDC dimensions according to the numbers of tags,and encode the tags again,hence greatly decrease the average number of times the reader calls each tag even under the circumstance of few tags.Therefore,in RFID system,adaptive multi-dimension division code algorithm can significantly improve the efficiency of searching for tags no matter in many collisions or in few collisions.…”
Get full text
Article -
5498
An Overview of Application of Machine Learning Models in Urban Flood Simulation and Forecasting
Published 2024-01-01“…The rapidly developed artificial intelligence technology gradually shows great potential and value in urban flood simulation and forecasting. …”
Get full text
Article -
5499
Text coverless information hiding method based on synonyms expansion and label delivery mechanism
Published 2021-09-01“…To solve the problems of low hiding capacity and weak detection resistance, a method of coverless information hiding based on synonyms expansion and label delivery mechanism was proposed.To begin the proposed method, the secret information were divided into several keywords, then those keywords were embedded in different carrier texts respectively.Considering the interchangeability of synonyms in Chinese, using the word similarity calculation method based on HowNet,it was possible to filter synonyms which met the contextual semantics.For the purpose of increasing hiding capacity, various keywords or their synonyms were embedded in the same carrier text as much as possible.At the same moment, when recording the positional parameters of the secret information in each carrier text, those parameters were converted into a binary sequence in a fixed format, which was used to generate carrier text.Finally, the carrier texts and generated text were sent to the receiver.Comparison of the results with those of other studies confirm that the proposed method not only makes great improvement in hiding capacity and detection resistance, but also reduces the overhead of establishing and maintaining databases by using small text database.…”
Get full text
Article -
5500
Method based on contrastive incremental learning for fine-grained malicious traffic classification
Published 2023-03-01“…In order to protect against continuously emerging unknown threats, a new method based on contrastive incremental learning for fine-grained malicious traffic classification was proposed.The proposed method was based on variational auto-encoder (VAE) and extreme value theory (EVT), and the high accuracy could be achieved in known, few-shot and unknown malicious classes and new classes were also identified without using a large number of old task samples, which met the demand of storage and time cost in incremental learning scenarios.Specifically, the contrastive learning was integrated into the encoder of VAE, and the A-Softmax was used for known and few-shot malicious traffic classification, EVT and the decoder of VAE were used for unknown malicious traffic recognition, all classes could be recognized without a lot of old samples when learning new tasks by using VAE reconstruction and knowledge distillation methods.Experimental results indicate that the proposed method is efficient in known, few-shot and unknown malicious classes, and has greatly reduced the forgetting speed of old knowledge in incremental learning scenarios.…”
Get full text
Article