Suggested Topics within your search.
Suggested Topics within your search.
- Algorithms 2
- Computer animation 2
- Cost Savings 2
- Diagnosis 2
- Handbooks, manuals, etc 2
- Medical protocols 2
- ART / Digital 1
- Brothers and sisters 1
- Capitalists and financiers 1
- Cardiovascular - life support 1
- Digital cinematography 1
- Economic policy 1
- Economics 1
- Elias (Fictitious character) 1
- Fantasy 1
- Financial institutions 1
- Fugitives from justice 1
- Industrial policy 1
- Laia (Fictitious character) 1
- Microfinance 1
- Prisons 1
- Romance fiction 1
- Saving and investment 1
-
721
Compression strategies selection method based on classification of HBase data
Published 2016-04-01“…Simulation experiments and results demonstrate that the proposed compression strategies selection method based on classification of HBase data can not only save storage space but also greatly improve the query performance of HBase data.…”
Get full text
Article -
722
Optimization and Simulation of a Reasonable Scheduling Model under Multiple Tasks in Company Management
Published 2020-01-01“…Through the analysis of relevant simulation experiments, it can be concluded that the task scheduling algorithm proposed in this paper can not only allocate the corresponding resources for high-priority tasks effectively, but also can save the cost, so as to show better execution efficiency.…”
Get full text
Article -
723
Study on Differentiated Security Service Based on Cloud Computing
Published 2013-03-01“…Dep1oyment and app1ication of c1oud computing can significant1y save computing resource, and promote business innovation and deve1opment.However, if users' data is stored and processed in pub1ic c1oud computing which is provided by an independent third party, more security threat wi11 be faced than that of the traditiona1 way.Security has become one of the most important obstac1es for the deve1opment of c1oud computing.Differentiated security architecture was proposed, according to the diversity of security requirements from different users.The consumption of computing resource from security service cou1d be reduced and thus the deve1opment of c1oud computing is benefited.…”
Get full text
Article -
724
A contract-based cooperative spectrum sharing model in cognitive radio network
Published 2016-05-01“…A contract-based cooperative spectrum sharing model in cognitive radio network was proposed.In this model,secondary user offers relay service for primary user when primary user's channel is poor.In return,when primary user's channel is good,secondary user can use spectrum with the underlay mode under the condition that the interference is limited.Contract theory in economics was introduced to this framework,the problem of collaboration between the primary and secondary users was modeled as a contract design problem,and the effectiveness function of evaluate primary and secondary users on contract revenue was set up.And the differential evolution algorithm was used to solve the problem.Finally,in different circumstances,primary user collaboration and un-collaboration were contrasted.The results showed that the main users under the condition of no additional input spectrum,not only save the sending power,but also effectively improve the data transfer rate,and improve the energy efficiency and spectrum efficiency.…”
Get full text
Article -
725
Analysis and survey of resource management on modern data center networks
Published 2014-02-01“…Since network resource is critical resource in data center thorough study and analysis of its management, which can help to improve data center's performance, save costs and expenses, and is of great significance. …”
Get full text
Article -
726
The economics of Public Issues /
Published 2018Table of Contents: “…-- Keeping the competition out -- Political economy -- Health insurance for all . . . or maybe not -- The deception of green energy -- The fight over genetically modified foods -- Student loans -- The graying of america -- For whom the roads are tolled -- Property rights and the environment -- What to do about the climate? -- Save that species -- Ethanol madness -- The death of recycling -- Globalization and economic prosperity -- The economics of the big mac -- Globalization and the wealth of america -- The $750,000 steelworker -- Glossary -- Selected references -- Index.…”
View in OPAC
Book -
727
Design and Simulation Optimization of the Double Cam Clamping Mechanism in Marking Production Line
Published 2024-04-01“…The double-cam clamping mechanism can effectively save cost and improve work efficiency, and has certain theoretical value and high application value for practical production line.…”
Get full text
Article -
728
The influences of the number of concrete dowels to shear resistance based on push out tests
Published 2022-01-01“…To reduce the depth of floor-beam structures and to save the cost of headed-shear studs, many types of shallow composite beam have been developed during the last few years. …”
Get full text
Article -
729
Women’s mountaineering and dissonances within the mountain guide profession
Published 2013-10-01“…It shows why and how guides, essentially by means of discursive artifice, save face in front of their peers.…”
Get full text
Article -
730
Wideband DBF phased array antenna on LEO satellite
Published 2010-01-01“…Generalized DFT filter bank,multiplex DBF computer and RF calibration in close-loop mode were adopted to design the DBF network,which can reduce the calculation by 95.5% and save the multiplier resource up to 80%. Ultimately a 61-channel phased array transmitter antenna with 16 simultaneous beams was designed. …”
Get full text
Article -
731
Joint scheduling algorithm for correlative tasks in multi-access edge computing
Published 2023-04-01“…Multi-access edge computing (MEC) has emerged as a promising computing paradigm for resource-intensive applications.However, most of the previous research work has not considered correlative tasks, which may lead to infeasible scheduling decisions.Considering that some tasks on the application must be completed locally and another non-negligible energy consumption problem in the multi-access edge computing offloading scenario, the joint scheduling algorithm of correlative tasks on the local and edge sides was studied.The problem was formalized as minimizing the energy consumption in the system while satisfying the application’s completion deadline constraints, and the joint scheduling (JS) algorithm was proposed to solve the problem.Finally, the performance of the JS algorithm in the application completion rate and system energy consumption were analyzed through simulation experiments.The simulation results show that the JS algorithm is superior to other comparison algorithms in the application completion rate and can save at least 43% of the system energy consumption.…”
Get full text
Article -
732
Communication framework for directed transmission of informative semantic
Published 2023-05-01“…As the traditional communication development model focusing on enhancing bandwidth and spectrum efficiency is getting bottlenecked, more and more research is shifting the goal of intelligent communication from the syntactic level to the semantic level to save bandwidth resources by sensing and transmitting semantics rather than the complete signal.For the receiver agent, it is enough to receive only the information part of the understandable semantics.If the informative parts from the semantics can be filtered for transmission, it will further reduce the bandwidth resources and the time and power consumption of semantic information processing at the sender-side.To this end, firstly, the process of semantic information processing and comprehension of an intelligent body was explored.Secondly, the semantics perceived by the receiver from the message were classified into redundant semantics, unintelligible semantics, and informative semantic.Then, a communication paradigm oriented to transmitting the informative part of the semantics, called informative communication, was proposed, and the communication paradigm was extended to include four layers: syntax, semantic, informative, and pragmatic.Finally, the feasibility and effectiveness of informative communication were verified through simulation.This provides new ideas and technical traction for the development of next-generation communication models.…”
Get full text
Article -
733
Hosea 2:4-15 teen die agtergrond van Israelitiese regsgebruike
Published 1996-06-01“…Hosea 2:4-10 is translated in the pluperfect since it refers to the prophet's expectations in the past and the attempts made by him to save his marriage (2:4b-7, 8-9a, as well as his wife's reaction to htese efforts (2:7b-c, 10). …”
Get full text
Article -
734
A Novel Low-Overhead Recovery Approach for Distributed Systems
Published 2009-01-01“…It also means that a process needs to save only its recent local checkpoint. In this regard, we have introduced two new ideas. …”
Get full text
Article -
735
Investigating the Typology of Causative Constructions in the Semnani Language
Published 2021-05-01“…Therefore, the speakers of this language must study and record it to save it and prevent its extinction. Investigating the causative constructions of Semnani language, the present research tries to study the typology of causative constructions in this Language and to find the similarities and differences between Persian and Semnani causative constructions. …”
Get full text
Article -
736
Decentralized Kalman Filtering with Multilevel Quantized Innovation in Wireless Sensor Networks
Published 2015-07-01“…Because of low power consumption and limited power supply significance in wireless sensor networks (WSNs), this paper studies the multilevel quantized innovation Kalman filtering (MQI-KF) for decentralized state estimation in WSNs since the MQI-KF can help to save power. In the first place, the common features of the practical low energy consumption WSNs are explored. …”
Get full text
Article -
737
Potential of condensate as a water source from air conditioning systems: A thermodynamic analysis
Published 2024-10-01“…This energy can instead be utilized to increase the efficiency of air conditioning systems and refrigeration systems in cold storage facilities, save energy consumption, reduce the carbon footprint, and also meet some of the water consumption needs. …”
Get full text
Article -
738
Research progress on secure data deduplication in cloud
Published 2016-11-01“…In order to improve the efficiency of cloud storage and save the communication bandwidth, a deduplication mechanism for multi-duplicate of the same data in cloud environment was needed. …”
Get full text
Article -
739
Myth-making and Uchronia: The Advent of a Fascist America in Nathanael West’s A Cool Million (1934)
Published 2017-01-01“…As young Pitkin gets dismantled and eventually assassinated, the retrained politician sets out to create his own Revolutionary Party to save his country from decay. This paper will re-articulate the two trajectories and show how they actually inform an American fascist myth. …”
Get full text
Article -
740
Sauver la face. Les causes de mariage de Luisa de Cárdenas et Antonia de Portocarrero devant la Rote romaine (v. 1580-1610)
Published 2021-09-01“…These case studies show how the protagonists tried to save face and mitigate the humiliation which accompanied a divorce trial for the losing party – a humiliation proportional to the reputation and heritage issues linked to marriages in Castilian aristocracy.…”
Get full text
Article