Suggested Topics within your search.
Suggested Topics within your search.
- Design and construction 10
- Law 6
- Interpretation and construction 5
- Building 4
- Construction industry 4
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 4
- Estimates 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Reinforced concrete construction 3
- Sociolinguistics 3
- Architecture 2
- Common law 2
- Computer-aided design 2
- Data processing 2
- Equity 2
- Grammar, Comparative and general 2
- Handbooks, Manuals, etc 2
- Law--Interpretation and construction 2
- MATHEMATICS / Mathematical Analysis 2
- Management 2
- Mathematical analysis 2
- Methodology 2
- Moral and ethical aspects 2
- Philosophy 2
- Syntax 2
- Trusts and trustees 2
- foundations 2
- roof 2
-
17541
Effect of International Technology Transfer on the Technical Efficiency of High-Tech Manufacturing in China: A RAGA-PP-SFA Analysis
Published 2021-01-01“…By integrating stochastic frontier analysis (SFA) and projection pursuit (PP) based on the real-coded accelerated genetic algorithm (RAGA), this study constructed a RAGA-PP-SFA model that considers undesirable outputs. …”
Get full text
Article -
17542
Optimization of Microwave-Assisted Extraction Method for Increased Extraction Yield and Total Phenol Content from Moringa Leaves (Moringa oleifera Lam.) var. PKM 1
Published 2022-01-01“…The main aim of this experimental trial is to optimize three independent factors including power (500 W–700 W), temperature (30°C–50°C), and extraction time (20 min–40 min) consisting of two levels of dependent variables such as extraction yield (EY) and total phenol content (TPC) using Response Surface Methodology (RSM) constructed by Central Composite Design (CCD) with 20 trial runs. …”
Get full text
Article -
17543
Doubly-selective channel estimation for generalized frequency division multiplexing systems based on deep learning
Published 2021-10-01“…There exist intrinsic inter-carrier interference and inter-subsymbol interference in generalized frequency division multiplexing (GFDM) systems.Under condition of time-frequency doubly selective channels, severe effects of pilot contamination would occur and lead to significant performance degradation for the pilot-based channel estimations.To this end, a channel estimation framework for GFDM systems based on deep learning was proposed, which took the low-resolution image constructed with the least squares estimated channel gains of the pilot symbols as input.Consequently, a high-resolution image about the channel time-frequency response was recovered through a deep residual network, and the channel estimation was achieved for GFDM systems.A simulation system for the proposed GFDM time-frequency doubly selective channel estimation algorithm based on deep residual network was developed, and the optimal parameters of the deep residual network were determined through an offline training process.Simulation results show that the proposed algorithm can achieve better performance near to minimum mean square error (MMSE) estimation in terms of estimation error and bit error rate (BER), and has robust Doppler frequency shift generalization capability.…”
Get full text
Article -
17544
Effects of Place-Based Socioscientific Issues on Rising Middle School Students’ Evidence-Based Reasoning and Critical Thinking on Hydraulic Fracking
Published 2021-07-01“…The students used their understanding of the science and engineering practices to construct valid arguments on whether or not hydraulic fracturing should be allowed in their state. …”
Get full text
Article -
17545
The Effects of Process Parameters on Evolutions of Thermodynamics and Microstructures for Composite Extrusion of Magnesium Alloy
Published 2013-01-01“…Extrusion experiments have been constructed to validate the FEM models with different process conditions. …”
Get full text
Article -
17546
Study on Preload of Bolted Connections in Pitch Bearing Based on Vibration Modal Analysis
Published 2023-01-01“…Focusing on the 42CrMo4 bolted connection of a pitch bearing, a test platform for bolt preloading assessment is constructed. Hammer modal tests are conducted under various preloading forces. …”
Get full text
Article -
17547
VOLTAIRE’S PHILOSOPHY: HUMAN NATURE AND INTERPRETATION OF RELIGION
Published 2013-12-01“…The achievements of anthropocentric philosophical thought of the XIX century possess great potential in the process of constructive comprehension and theoretical reconstruction of the anthropological intention that accompanies the process of philosophising. …”
Get full text
Article -
17548
An Attempt to Understand Islamic Arts with Deconstruction
Published 2024-06-01“… Deconstruction is not about destroying a whole, but about understanding how it is constructed. It is first taking it apart and then trying to understand the whole. …”
Get full text
Article -
17549
Graph compression algorithm based on a two-level index structure
Published 2018-06-01“…The demand for the analysis and application of graph data in various fields is increasing day by day.The management of large-scale graph data with complicated structure and high degree of coupling faces two challenges:one is querying speed too slow,the other is space consumption too large.Facing the problems of long query time and large space occupation in graph data management,a two-level index compression algorithm named GComIdx for graph data was proposed.GComIdx algorithm used the ordered Key-Value structure to store the associated nodes and edges as closely as possible,and constructed two-level index and hash node index for efficient attribute query and neighbor query.Furthermore,GComIdx algorithm used a graph data compressed technology to compress the graph data before it directly stored in hard disk,which could effectively reduce the storing space consumption.The experimental results show that GComIdx algorithm can effectively reduce the initialization time of the graph data calculation and the disk space occupancy of the graph data storing,meanwhile,the query time is less than common graph databases and other Key-Value storage solutions.…”
Get full text
Article -
17550
Coupling and Coordination of the Regional Economy, Tourism Industry, and Exhibition Industry of China’s Provinces
Published 2022-01-01“…There is a close correlation between regional economy, tourism, and exhibition industry. By constructing a system of evaluation indicators for the regional economy, tourism industry, and exhibition industry, the coupled coordination degree model was used to calculate the degree of synergy of the regional economy, tourism industry, and exhibition industry in China from 2013 to 2019. …”
Get full text
Article -
17551
Comparison of 3D, 2D, and 1D Magnetotelluric Inversion Results on the Example of Data from Fore-Sudetic Monocline
Published 2022-01-01“…There were conducted 51 soundings on five quasiparallel profiles. That allows constructing a quasiregular mesh in the area of the Fore-Sudetic Monocline. …”
Get full text
Article -
17552
Nonlinear Effects of Environmental Regulation on Environmental Pollution
Published 2019-01-01“…This paper classifies environmental regulation into two types and constructs a theoretical framework to explore the influences of fee-based environmental regulation and invest-based environmental regulation on environmental pollution. …”
Get full text
Article -
17553
Damage toughness assessment method of power backbone communication network based on power big data
Published 2023-05-01“…The damage toughness assessment method of power backbone communication network based on power big data was studied, and the damage toughness assessment results were used to formulate protection strategies and improve the network survivability.The power backbone communication network and the attacker were set as the two sides of the game, and the Nash equilibrium strategy of both sides was determined by the minimax method.The damage probability of nodes was obtained by the Nash equilibrium strategy, and the node damage probability was transformed into the network damage form.According to the network damage pattern, the repair conditions contained in the power big data were obtained by cloud computing technology.According to the importance of each node, the repair resources and repair budget were allocated to the nodes in order.The performance time-history response curve of the power backbone communication network was constructed, and the dynamic evaluation results of the network damage toughness were output.The experimental results show that all operations using cloud computing technology to process massive power big data can not exceed 330 ms.When the repair budget and repair resources are the highest, the damage toughness of the power backbone communication network can reach 0.925 at most, indicating that this method can effectively evaluate the damage toughness of the power backbone communication network.…”
Get full text
Article -
17554
Artificial intelligence applied to diabetes complications: a bibliometric analysis
Published 2025-01-01“…Based on bibliometric tools such as CiteSpace, Vosviewer and bibliometix, we construct knowledge maps to visualize literature information, including annual scientific production, authors, countries, institutions, journals, keywords and research hotspots.ResultsA total of 935 articles meeting the criteria were collected and analyzed. …”
Get full text
Article -
17555
Fermion masses, neutrino mixing and Higgs-mediated flavor violation in 3HDM with S 3 permutation symmetry
Published 2024-12-01“…The Yukawa interactions are constructed in an S 3-invariant way, while the scalar potential contains S 3 soft-breaking terms. …”
Get full text
Article -
17556
Inverted Length-Biased Exponential Model: Statistical Inference and Modeling
Published 2021-01-01“…An asymptotic confidence interval (COI) of parameter is constructed at two confidence levels. We perform simulation study to examine the accuracy of estimates depending upon some statistical measures. …”
Get full text
Article -
17557
Working with Missing Data: Imputation of Nonresponse Items in Categorical Survey Data with a Non-Monotone Missing Pattern
Published 2014-01-01“…We develop a method for constructing a monotone missing pattern that allows for imputation of categorical data in data sets with a large number of variables using a model-based MCMC approach. …”
Get full text
Article -
17558
Fully Discrete Local Discontinuous Galerkin Approximation for Time-Space Fractional Subdiffusion/Superdiffusion Equations
Published 2017-01-01“…., backward Euler difference or second-order central difference)/local discontinuous Galerkin finite element mixed method to construct and analyze a kind of efficient, accurate, flexible, numerical schemes for approximately solving time-space fractional subdiffusion/superdiffusion equations. …”
Get full text
Article -
17559
MRR scheduling based cognitive LTE-R eNode B and type of service value priority queue management strategy
Published 2018-06-01“…Cognitive radio technology was used to build cognitive radio networks in long-term evolution railway communication systems,and cognitive base station network architecture and MRR scheduling algorithms were proposed to improve the spectrum utilization of railway dedicated networks.In particular,the FIFO policy for cognitive LTE-R base stations in a single vehicle gateway causes excessive delay in real-time services of secondary users,and a cognitive LTE-R base station queue management strategy based on priority of service types was proposed.This strategy gave priority to sending packets with large service type values to the queue,so as to achieve the purpose of prioritizing real-time services.Simulation results show that under the premise of ensuring the normal communication of vehicles,the constructed cognitive base station can provide passengers with additional internet access links,and at the same time,improve the spectrum utilization rate of the LTE-R communication system.In addition,the cognitive base station queue management strategy based on service type value priority can effectively reduce the delay of passenger real-time services.…”
Get full text
Article -
17560
L-PS-M hierarchical evolution target system framework for telecommunications service support system
Published 2024-03-01“…The framework firstly constructed a three-dimensional cube mapping structure formed by the three dimensional factors of end-to-end business process, system support capability, and hierarchical goal. …”
Get full text
Article