Showing 17,001 - 17,020 results of 23,138 for search '"construction"', query time: 0.11s Refine Results
  1. 17001

    Single-Valued Neutro Hyper BCK-Subalgebras by M. Hamidi, F. Smarandache

    Published 2021-01-01
    “…In order to realize the article’s goals, we construct single-valued neutrosophic hyper BCK-subalgebras and neutro hyper BCK-algebras on a given nonempty set. …”
    Get full text
    Article
  2. 17002

    Far from equilibrium field theory for strongly coupled light and matter: Dynamics of frustrated multimode cavity QED by Hossein Hosseinabadi, Darrick E. Chang, Jamir Marino

    Published 2024-12-01
    “…Our approach is grounded in constructing “two-particle irreducible” (2PI) effective actions, which provide a nonperturbative and conserving framework for describing quantum evolution at a polynomial cost in time. …”
    Get full text
    Article
  3. 17003

    The Points of Concurrence Theory in Guidobaldo del Monte’s Scenography by Leonardo Baglioni, Marta Salvatore

    Published 2018-12-01
    “…The treatise elaborates a scientific method of universal validity to construct scenes, based on the theory of the points of concurrence explained in the first book of this work, a theory that deeply influenced the history of perspective and descriptive geometry. …”
    Get full text
    Article
  4. 17004

    Comparison of Effects of Using Geosynthetics and Lime Stabilization to Increase Bearing Capacity of Unpaved Road Subgrade by Erhan Burak Pancar, Muhammet Vefa Akpınar

    Published 2016-01-01
    “…So many soil improvement methods have been developed in order to increase bearing capacity of superstructure of the road to be constructed on the soft clayey road base soils, decrease settlements, and increase other strength specifications (CBR, k, MR values, etc.). …”
    Get full text
    Article
  5. 17005

    On Metric Dimension of Subdivided Honeycomb Network and Aztec Diamond Network by Xiujun Zhang, Hafiz Muhammad Bilal, Atiq ur Rehman, Muhammad Hussain, Zhiqiang Zhang

    Published 2023-01-01
    “…For instance, hexagons help us in many models to construct honeycomb network, where n is the number of hexagons from a central point to the borderline of the network. …”
    Get full text
    Article
  6. 17006

    Low-Vacuum Quadrupole Mass Filter Using a Drift Gas by Peihe Jiang, Zhanfeng Zhao

    Published 2020-01-01
    “…A simulation model was constructed in COMSOL Multiphysics, and a simple experimental device was built to validate the proposed method. …”
    Get full text
    Article
  7. 17007

    Volatility Risk Premium, Return Predictability, and ESG Sentiment: Evidence from China’s Spots and Options’ Markets by Zhaohua Liu, Susheng Wang, Siyi Liu, Haixu Yu, He Wang

    Published 2022-01-01
    “…And the volatility risk premium is constructed by subtracting these volatility series. …”
    Get full text
    Article
  8. 17008

    Beyond Verbatim: Embodied Truth and the Limits of Language in House Arrest by Mehmet Ünal

    Published 2024-09-01
    “…In light of media effects theories, including framing, agenda-setting and Marshall McLuhan’s concepts of the ‘global village’ and ‘the medium is the message,’ this article analyses how the play compels a critical examination of media manipulation and the subtle ways language constructs individuals’ understanding of truth. Transcending its historical context, House Arrest emerges as a timely call for heightened media literacy and a discerning approach to information consumption in a world increasingly characterised by political polarisation and misinformation. …”
    Get full text
    Article
  9. 17009

    Recognition algorithm of non punctured polarization codes based on structural characteristics of coding matrix by Yao WANG, Xiang WANG, Guodong YANG, Zhitao HUANG

    Published 2022-02-01
    “…In order to solve the problems of complexity and poor error adaptability in the blind recognition of standard non-punctured polarization codes, the theorems and propositions that could characterize the relationship between the code length and code rate, and distinguish information subchannel and frozen subchannel were proved.Based on the theorem and proposition, an efficient blind recognition algorithm was proposed.The proposed algorithm only needed to set the possible maximum code length, and the corresponding soft decision codewords matrixes and Kronecker matrixes were constructed.Based on the theorem and proposition proved, the check relationship between the two matrices was judged and the code rate and frozen bit position were estimated.The average likelihood difference was introduced as the test quantity, and the decision threshold was determined based on its theoretical probability distribution and minimax criterion.The simulation results show that the deduced theorem and propositions are consistent with the simulation results.Under the signal-to-noise ratio of 6 dB and code length of 1 024, the parameter recognition rate is still close to 100%.The recognition performance and computational complexity are better than the existing soft decision algorithms.…”
    Get full text
    Article
  10. 17010

    Forecast and Evaluation of Educational Economic Contribution Based on Fuzzy Neural Network by RuiFeng Liu, Min Wu

    Published 2021-01-01
    “…This article combines fuzzy theory and neural network theory to construct an empirical model for the analysis of the contribution of education economy and conduct an empirical analysis of statistical data from 2010 to 2020. …”
    Get full text
    Article
  11. 17011

    The Impact of Service and Channel Integration on the Stability and Complexity of the Supply Chain by Jianheng Zhou, Xingli Chen

    Published 2020-01-01
    “…This paper constructs a supply chain consisting of a manufacturer and a retailer. …”
    Get full text
    Article
  12. 17012

    Application of Optimized Support Vector Machine Model in Tax Forecasting System by Yu Xin

    Published 2022-01-01
    “…Based on the simple analysis of the research situation of tax prediction and the research status of data mining algorithm in tax data classification and prediction, this paper constructs a tax prediction model. Aiming at the problem of too many influencing factors of tax prediction, this paper puts forward the use of principal component analysis to extract the main factors, reduce the dimension of tax data, and reduce the difficulty of analysis. …”
    Get full text
    Article
  13. 17013

    Culture, connaissance et réduction des risques de catastrophe : liens critiques pour une transformation sociétale durable by Juergen Weichselgartner, John Norton, Guillaume Chantry, Emilie Brévière, Patrick Pigeon, Bernard Guézo

    Published 2016-12-01
    “…Shifting the research focus towards issues of culture and social knowledge would lead to a better apprehension and capture of the structural processes causing disaster vulnerability, as well as the social-cultural processes constructing our understanding of disaster risks.…”
    Get full text
    Article
  14. 17014

    Estimating the Ultimate Bearing Capacity for Strip Footing Near and within Slopes Using AI (GP, ANN, and EPR) Techniques by Ahmed M. Ebid, Kennedy C. Onyelowe, Emmanuel E. Arinze

    Published 2021-01-01
    “…Numerical and computational analyses surrounding the behavior of the bearing capacity of soils near or adjacent to slopes have been of great importance in earthwork constructions around the globe due to its unique nature. …”
    Get full text
    Article
  15. 17015

    Research on Dual Security Control for a Non-Linear CPS with Multi-Objective Constraints under DoS Attack and Actuator Fault: An Active-Passive Attack-Tolerant Approach by Li Zhao, Wei Li, Yajie Li

    Published 2022-01-01
    “…Second, a non-linear CPS dual security control framework that integrates active-passive attack tolerance for DoS attack and active fault tolerance for actuator fault is constructed. Third, the low-energy DoS attack is regarded as a special kind of time delay, and a robust observer for the estimation of system states and actuator fault is designed, and a codesign method of passive attack tolerance, active fault tolerance, and communication is proposed. …”
    Get full text
    Article
  16. 17016

    Distributed trust management scheme based on blockchain in Internet of vehicles by Haibo ZHANG, Yukun CAO, Kaijian LIU, Ruyan WANG

    Published 2023-05-01
    “…Aiming at the security problems caused by the low efficiency and accuracy of malicious vehicle identification in Internet of vehicles, a distributed trust management scheme based on blockchain in Internet of vehicles was proposed.A false information identification strategy was designed by aggregating the scoring information of vehicles, combined with Bayesian inference model.A reputation value updating algorithm was designed by combining the historical interaction information of vehicles and traffic information, malicious vehicles were identified by the reputation threshold.A blockchain was constructed roadside units to realize the distributed storage of traffic data and vehicle reputation values.The traditional proof of work consensus mechanism was improved to dynamically change the difficulty of miner node generating a block through the event level and the number of vehicles involved in scoring, and the waiting mechanism was used to temporarily stop the nodes that had recently blocked from participating in the election process of miner nodes, thus reducing the resource consumption caused by repeated calculations.The simulation results show that the proposed scheme can effectively identify false information, resist the deceptive behavior of malicious vehicles, improve the identification efficiency of malicious vehicles, reduce resource consumption, and is effective and feasible in distributed trust management for Internet of vehicles.…”
    Get full text
    Article
  17. 17017

    Study on optimization strategy for hybrid underlay/overlay spectrum sharing based on queuing model by Jian-ping LIU, Shun-fu JIN, Bao-shuai WANG

    Published 2017-09-01
    “…In order to improve the licensed spectrum utilization in cognitive radio networks,and provide higher experience quality to system users,the optimizing strategies of the hybrid underlay/overlay spectrum sharing mode was studied.For secondary users,a queuing model with service time following two phase order exponential distribution was constructed,and a method to obtain the steady state distribution was presented for the system model.Based on reward-cost structure,individual optimization strategy with observable case and the Nash equilibrium strategy with unobservable case were discussed.With purpose of optimal social benefit and maximal spectrum incomes,the pricing policies for secondary users to use licensed spectrum were formulated.Using the system experiment,the relations among the different optimal strategies were investigated,and the rationality of the price mechanism was verified.By contrasting the optimal social benefits gained by hybrid underlay/overlay spectrum sharing mode,overlay spectrum sharing mode and underlay spectrum sharing mode,it is further shown that the social optimization strategy of hybrid overlay/underlay sharing mode is more effective and stable to fully use the spectrum resource.…”
    Get full text
    Article
  18. 17018

    Analyzing information sharing behaviors during stance formation on COVID-19 vaccination among Japanese Twitter users. by Sho Cho, Shohei Hisamitsu, Hongshan Jin, Masashi Toyoda, Naoki Yoshinaga

    Published 2024-01-01
    “…To gain a deeper understanding of Japan's sharp increase in COVID-19 vaccination coverage, we performed an analysis on the posts of Twitter users to investigate the formation of users' stances toward COVID-19 vaccines and information-sharing actions through the formation. We constructed a dataset of all Japanese posts mentioning vaccines for five months since the beginning of the vaccination campaign in Japan and carried out a stance detection task for all the users who wrote the posts by training an original deep neural network. …”
    Get full text
    Article
  19. 17019

    Fire Safety Evaluation for Scenic Spots: An Evidential Best-Worst Method by Dongjun Chen, Hongbin Xie

    Published 2021-01-01
    “…First, a fire safety evaluation index system is constructed using the domino model. Domain experts can evaluate different factors with linguistic assessments. …”
    Get full text
    Article
  20. 17020

    Path Planning for a Space-Based Manipulator System Based on Quantum Genetic Algorithm by Zhengcang Chen, Weijia Zhou

    Published 2017-01-01
    “…In this study, by considering a space-based, n-joint manipulator system as research object, a kinematic and a dynamic model are constructed and the system’s nonholonomic property is discussed. …”
    Get full text
    Article