Showing 17,081 - 17,100 results of 23,138 for search '"construction"', query time: 0.11s Refine Results
  1. 17081

    Research on methods of workers’ context description in mines by Shimin FENG, Enjie DING, Zhongyu LIU, Xiao YU, Lei MENG, Zhikai ZHAO

    Published 2019-12-01
    “…The worker’s unsafe behavior is the key cause of mine accidents.The human activity is closely related with the context.Ontology is widely used in computer science in the field of information exchange and knowledge sharing,which contains complex structures and various semantics.Firstly,the research on the description of the miners’ situational information in the mining field was summarized.It introduced the general situation in the field of the Internet of things.The importance and necessity of the description of the state information of mine personnel was presented.It introduced the research background,including semantic web,context description and knowledge representation.After that,the method of information description of mine personnel was described.The ontology model was proposed based on oneM2M international technical specifications.In order to construct this ontology,it was drawed on some of the core concepts of oneM2M Base Ontology.The concept classes,attributes and relationships that are specific to the information description of mine personnel were put forward.The context description of mine personnel proposed was aimed at achieving the purposes of specification information description,data semantic labeling,knowledge sharing and reuse.Finally,the conclusions were drawn and the prospect of using the ontology method for context perception and the miners’ unsafe behavior recognition was presented.…”
    Get full text
    Article
  2. 17082

    Age Discrimination of Chinese Baijiu Based on Midinfrared Spectroscopy and Chemometrics by Shiqi Hu, Le Wang

    Published 2021-01-01
    “…Next, the spectral date pretreatment methods are constructively introduced, and principal component analysis (PCA) and discriminant analysis (DA) are developed for data analyses. …”
    Get full text
    Article
  3. 17083

    Supply Chain Investment in Carbon Emission-Reducing Technology Based on Stochasticity and Low-Carbon Preferences by Shan Yu, Qiang Hou

    Published 2021-01-01
    “…Based on this background, this paper considers the impact of consumer low-carbon preferences on market demand and the impact of uncertainty in carbon emission-reduction behaviour. We construct a stochastic differential game model with upstream and downstream enterprises based on cost-sharing coordination under a cost subsidy. …”
    Get full text
    Article
  4. 17084

    Swarming Computational Procedures for the Coronavirus-Based Mathematical SEIR-NDC Model by Suthep Suantai, Zulqurnain Sabir, Muhammad Asif Zahoor Raja, Watcharaporn Cholamjiak

    Published 2022-01-01
    “…A merit function is constructed by using the nonlinear dynamics of the SEIR-NDC mathematical system based on its 7 classes, and the optimization of the merit function is performed through the PSOSQP. …”
    Get full text
    Article
  5. 17085

    Activation of a child’s subjectivity in the upbringing space of free self-determination on the basis of pedagogy of freedom by Alla Rastrygina

    Published 2020-06-01
    “… The article updates the problem of reconstruction of the modern upbringing process, the leading idea of which is the targeting of its goals, content, forms and methods at self-development of a child and the becoming of a child’s subjectivity as an active, purposeful, initiative, creative and constructive position in his or her own livelihoods on the basis of humanistic values of a democratic society. …”
    Get full text
    Article
  6. 17086

    Design of Multilayer Frequency-Selective Surfaces by Equivalent Circuit Method and Basic Building Blocks by Yuan Xu, Mang He

    Published 2019-01-01
    “…In this method, four types of basic FSS structures are used as the building blocks to construct the multilayer FSSs, and their surface impedances in both the normal- and the oblique-incidence situations are studied in detail in order to achieve more accurate equivalent circuit (EC) representation of the entire FSS. …”
    Get full text
    Article
  7. 17087

    Research on the economic of clean energy heating systems in cold rural regions by MA Tianfeng, ZHANG Yaru, SHANG Tianwen

    Published 2024-12-01
    “…The TRNSYS was used to simulation software to construct three decentralized clean energy heating systems-natural gas boiler heating, air source heat pump heating, and solar-coupled air source heat pump heating. …”
    Get full text
    Article
  8. 17088

    La topographie et les fortifications celtiques de l’oppidum biturige de Châteaumeillant-Mediolanum (Cher) by Sophie Krausz

    Published 2008-04-01
    “…Whilst the murus gallicus, constructed around 100 BC, seems to have been designed as a symbolic limit to the oppidum, the extra-high dump was defensive in intent. …”
    Get full text
    Article
  9. 17089

    ROLLER BEARING FAULT RECOGNITION METHOD BASED ON CYCLIC AUTOCORRELATION AND MULTI-DOMAIN KERNEL LIMIT LEARNING MACHINE by WANG XiaoHui, WANG GuangBing, XIANG JiaWei, HUANG Zhen, SUI GuangZhou

    Published 2020-01-01
    “…According to characteristics of the bearing signal,the second-order cyclic demodulation information was introduced into machine learning,and a multi-domain kernel extreme learning machine(MKELM) based on the combination of cyclic autocorrelation(CAF) frequency domain features and time domain features(TD) was proposed to accurately identify the bearing status.The algorithm constructed a CAF function based on the second-order cyclic characteristics of the bearing signal to extract the cyclic frequency domain features of the samples,then combined them with the time domain feature quantities of the samples.The matching factors of multi-domain feature vectors was designed to fuse TD and CAF feature vectors; finally,the fused CAF-TD sample features was input into the kernel extreme learning machine for cluster regression.The spindle bearing experimental results show that the cyclic frequency domain statistics extracted based on CAF can sensitively reflect the signal characteristics.Compared with the classic classifier,the CAF-TD multi-domain kernel extreme learning machine can extract more feature information from limited samples and obtain more accurate diagnostic result.…”
    Get full text
    Article
  10. 17090

    WDM Network and Multicasting Protocol Strategies by Pinar Kirci, Abdul Halim Zaim

    Published 2014-01-01
    “…However, with wavelength division multiplexing (WDM), it is easier to take the advantage of optical networks and optical burst switching (OBS) and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. …”
    Get full text
    Article
  11. 17091

    Psychogeography as Social Activism in Katerina Cizek’s Digital Documentaries Highrise, The 1000th Tower and Out My Window by Siobhan O’Flynn

    Published 2014-02-01
    “…In positioning traditional documentary subjects as collaborators, Cizek’s work challenges existing social models and dominant or media representations of at-risk and low-income communities, creating platforms for individuals to tell their stories as counters to official constructions of these often underrepresented neighbourhoods. …”
    Get full text
    Article
  12. 17092

    Automated crowdturfing attack in Chinese user reviews by Li’na WANG, Xiaodong GUO, Run WANG

    Published 2019-06-01
    “…The text-oriented automated crowdturfing attack has a series of features such as low attack cost and strong concealment.This kind of attack can automatically generate a large number of fake reviews,with harmful effect on the healthy development of the user review community.In recent years,researchers have found that text-oriented crowdturfing attacks for the English review community,but there was few research work on automated crowdsourcing attacks in the Chinese review community.A Chinese character embedding LSTM model was proposed to automatically generate Chinese reviews with the aim of antomated crowdturfing attacks,which model trained by a combination with Chinese character embedding network,LSTM network and softmax dense network,and a temperature parameter T was designed to construct the attack model.In the experiment,more than 50 000 real user reviews were crawled from Taobao's online review platform to verify the effectiveness of the attack method.Experimental results show that the generated fake reviews can effectively fool linguistics-based classification detection approach and texts plagiarism detection approach.Besides,the massive manually evaluation experiments also demonstrate that the generated reviews with the proposed attack approach perform well in reality and diversity.…”
    Get full text
    Article
  13. 17093

    Theoretical and Legal Aspects of the Reclamation of Property from Unlawfull Possesion by M. V. Tregubov

    Published 2021-01-01
    “…Using formal-logical, retrospective methods, as well as the method of legal constructions, the author first studies the problem of applying a court penalty under the rules of art. 308.3 of the civil code of the Russian Federation (structurally located in the section on binding rights) to a real-law claim-vindicatson claim; secondly, it analyzes the evolution of scientific views on the permissibility of extrapolating real rights to intangible objects, including those that exist in a virtual environment. …”
    Get full text
    Article
  14. 17094

    Culture of Critical Discourse on Education and Science by M. B. Sapunov, Kh. G. Tkhagapsoev

    Published 2018-07-01
    “…Within the framework of this approach critique of education (and the process of its reforming) is indivisible from the constructive analysis of education as a whole system with its immanent dimensions. …”
    Get full text
    Article
  15. 17095

    Digital Storytelling: Boosting Literacy Practices in Students at A1-Level by Pedro Alejandro González Mesa

    Published 2020-01-01
    “…The personal stories and media literacy allowed the participants to combine both narratives and digital elements when writing in English in a collaborative work-group in which they co-constructed their stories. The data collected was analyzed by using ATLAS ti. …”
    Get full text
    Article
  16. 17096

    Interactive Marketing by Peter Schafer

    Published 2022-11-01
    “…Corporations have begun to realise that constructive forms of marketing communication in such markets imply that all business efforts need to be directed at relationship-building with consumers, Le. all communication instruments, including advertising, personal selling, sales promotion and corporate identity as well as conventional direct and database communication need to draw on personalised and targeted methods and media if marketing is to remain cost-effective. …”
    Get full text
    Article
  17. 17097

    Network intrusion detection method based on VAE-CWGAN and fusion of statistical importance of feature by Taotao LIU, Yu FU, Kun WANG, Xueyuan DUAN

    Published 2024-02-01
    “…Considering the problems of traditional intrusion detection methods limited by the class imbalance of datasets and the poor representation of selected features, a detection method based on VAE-CWGAN and fusion of statistical importance of features was proposed.Firstly, data preprocessing was conducted to enhance data quality.Secondly, a VAE-CWGAN model was constructed to generate new samples, addressing the problem of imbalanced datasets, ensuring that the classification model no longer biased towards the majority class.Next, standard deviation, difference of median and mean were used to rank the features and fusion their statistical importance for feature selection, aiming to obtain more representative features, which made the model can better learn data information.Finally, the mixed data set after feature selection was classified through a one-dimensional convolutional neural network.Experimental results show that the proposed method demonstrates good performance advantages on three datasets, namely NSL-KDD, UNSW-NB15, and CIC-IDS-2017.The accuracy rates are 98.95%, 96.24%, and 99.92%, respectively, effectively improving the performance of intrusion detection.…”
    Get full text
    Article
  18. 17098

    V2X offloading and resource allocation under SDN and MEC architecture by Haibo ZHANG, Zixin WANG, Xiaofan HE

    Published 2020-01-01
    “…To address the serious problem of delay and energy consumption increase and service quality degradation caused by complex network status and huge amounts of computing data in the scenario of vehicle-to-everything (V2X),a vehicular network architecture combining mobile edge computing (MEC) and software defined network (SDN) was constructed.MEC sinks cloud serviced to the edge of the wireless network to compensate for the delay fluctuation caused by remote cloud computing.The SDN controller could sense network information from a global perspective,flexibly schedule resources,and control offload traffic.To further reduce the system overhead,a joint task offloading and resource allocation scheme was proposed.By modeling the MEC-based V2X offloading and resource allocation,the optimal offloading decision,communication and computing resource allocation scheme were derived.Considering the NP-hard attribute of the problem,Agglomerative Clustering was used to select the initial offloading node,and Q-learning was used for resource allocation.The offloading decision was modeled as an exact potential game,and the existence of Nash equilibrium was proved by the potential function structure.The simulation results show that,as compared to other mechanisms,the proposed mechanism can effectively reduce the system overhead.…”
    Get full text
    Article
  19. 17099

    Chromosome-scale genome assembly of Korean goosegrass (Eleusine indica) by Solji Lee, Changsoo Kim

    Published 2025-01-01
    “…Considering the high genetic variability among wild E. indica populations, constructing multi-reference genomes from geographically distinct populations is crucial for comprehensive weed management strategies. …”
    Get full text
    Article
  20. 17100

    Sword of heaven by Richard Wilson

    Published 2019-12-01
    “…If Shakespeare editions have been slow to absorb the news from Vienna that the schizophrenia of Measure for Measure is a result not of authorial despair, but of its having been constructed by two dramatists of distinct generations and mentalities, working some sixteen years apart, they have nonetheless always registered resistance in the play to this totalitarian project of putting power on display.…”
    Get full text
    Article