Showing 17,621 - 17,640 results of 23,138 for search '"construction"', query time: 0.13s Refine Results
  1. 17621

    Evaluation of Water Resource Carrying Capacity Based on TOPSIS Model with Combination Weighting and Diagnosis of Obstacle Factors in Suzhou City by LIU Jiankui, ZHANG Zhen, LIU Xianghong, WEI Lu

    Published 2024-06-01
    “…In view of issues such as water resource shortage and water environment pollution in the northern Anhui Plain, an evaluation index system was constructed based on the main body frame method with Suzhou City as an example. …”
    Get full text
    Article
  2. 17622

    Pilgrims Speaking Angry Words: Change and Anger in Chaucer’s Canterbury Tales by Huriye Reis

    Published 2024-10-01
    “…Medieval literature presents emotions such as anger as negative and destructive for the development of the medieval subject and society and defines anger not as a positive constructive affect but as an emotive reaction that should be suppressed, controlled or avoided. …”
    Get full text
    Article
  3. 17623

    Device-independent uncloneable encryption by Srijita Kundu, Ernest Y.-Z. Tan

    Published 2025-01-01
    “…., without trusting the quantum states and measurements used in the scheme, and that this variant works just as well as the original definition in constructing quantum money. Moreover, we show that a simple modification of our scheme yields a single-decryptor encryption scheme, which was a related notion introduced by Georgiou and Zhandry. …”
    Get full text
    Article
  4. 17624

    Home in Han Suyin’s 'Till Morning Comes' from the Perspective of New Cultural Geography by Xiaoling Hu, Arbaayah Ali Termizi

    Published 2024-10-01
    “…In the process of searching for a home, Stephanie constructs her identity as a Chinese and eventually as a world citizen. …”
    Get full text
    Article
  5. 17625

    Wave dissipation performance of breakwater by Hu Yufan

    Published 2025-01-01
    “…Over time, breakwaters have undergone significant evolution, and modern ones are constructed using advanced materials to enhance the efficiency of wave energy dissipation. …”
    Get full text
    Article
  6. 17626

    Reorienting information searching research by applying a situated abilities perspective by Gerd Berget

    Published 2024-03-01
    “…Eight personas are constructed and used in a discussion of how a change of perspective on human abilities can provide a valuable contribution to research. …”
    Get full text
    Article
  7. 17627

    Resilience of Interbank Market Networks to Shocks by Shouwei Li, Jianmin He

    Published 2011-01-01
    “…This paper first constructs a tiered network model of the interbank market. …”
    Get full text
    Article
  8. 17628

    Chinese Universities’ Image Repair after Network Public Opinion Events: Strategy Choice and Effect Evaluation by Jing Jiang, Juanjuan Ren

    Published 2022-01-01
    “…Accordingly, the sentiment index is constructed to evaluate the effect of Chinese universities’ image repair strategies. …”
    Get full text
    Article
  9. 17629

    Topology prediction for opportunistic network based on spatiotemporal convolution by Jian SHU, Jiawei SHI, Linlan LIU, Al-Kali Manar

    Published 2023-03-01
    “…The high dynamics of opportunistic network topology leads to the challenges of topology prediction.The existing research mainly focuses on the long-term spatiotemporal dependence of networks, ignoring the short-term spatiotemporal features.A topology prediction method for opportunistic network based on dynamic time warping algorithm and spatiotemporal convolution (DTW-STC) was proposed, which integrated long-short term spatiotemporal dependence in opportunistic network.The time slot was determined based on dynamic time warping algorithm, so that the opportunistic network was sliced into snapshots which topology was presented by link state matrix.Temporal convolution was employed to extract short-term temporal features.The spatiotemporal graph, representing the short-term spatiotemporal relationship, was constructed by temporal features and network changes.The short-term spatiotemporal features were captured by graph convolution.After stacks of spatiotemporal convolution, the long-short term spatiotemporal features of network were achieved.Based on the autoencoder structure, vector space transformation was realized, so that the future network topology was predicted.The results on three real opportunistic network datasets, ITC, MIT, and Asturias-er, show that the proposed DTW-STC has better prediction performance than ones of other baseline methods.…”
    Get full text
    Article
  10. 17630

    Elastic crack-tip stress field in a semi-strip by Victor Reut, Natalya Vaysfeld, Zinaida Zhuravlova

    Published 2018-04-01
    “…Depending on the conditions given on the short edge of the semi-strip, the constructed singular integral equation can have one, or two fixed singularities. …”
    Get full text
    Article
  11. 17631

    CRISIS OF DEMOCRACY, POLITICAL DISTRUST AND AFRO-PESSIMISM IN NIGERIA POLITICS; THE FOURTH REPUBLIC IN FOCUS by Lambe Emmanuel Oyewole

    Published 2023-09-01
    “…The research applies the quantitative research methodology. Further, the constructive theory of idea was employed to show the relationship between the crisis of democracy, distrust and afro-pessimism. …”
    Get full text
    Article
  12. 17632

    New extension method of trusted certificate chain in virtual platform environment by Liang TAN, Neng QI, Lingbi HU

    Published 2018-06-01
    “…When using trusted computing technology to build a trusted virtual platform environment,it is a hot problem that how to reasonably extend the underlying physical TPM certificate chain to the virtual machine environment.At present,the certificate trust expansion schemes are not perfect,either there is a violation of the TCG specifications,or TPM and vTPM certificate results inconsistent,either the presence of key redundancy,or privacy CA performance burden,some project cannot even extend the certificate trust.Based on this,a new extension method of trusted certificate chain was proposed.Firstly,a new class of certificate called VMEK (virtual machine extension key) was added in TPM,and the management mechanism of certificate VMEK was constructed,the main feature of which was that its key was not transferable and could be used to sign and encrypt the data inside and outside of TPM.Secondly,it used certificate VMEK to sign vTPM’s vEK to build the trust relationship between the underlying TPM and virtual machine,and realized extension of trusted certificate chain in virtual machine.Finally,in Xen,VMEK certificate and its management mechanism,and certificate trust extension based on VMEK were realized.The experiment results show that the proposed scheme can effectively realize the remote attestation function of virtual platform.…”
    Get full text
    Article
  13. 17633

    Deep learning-enhanced detection of road culverts in high-resolution digital elevation models: Improving stream network accuracy in Sweden by William Lidberg

    Published 2025-02-01
    “…Study focus: Maps have traditionally been constructed from aerial photos, but dense forest canopies often obscure these streams from view. …”
    Get full text
    Article
  14. 17634

    Robust beamforming algorithm for RIS-MIMO system based on train prior information by ZHANG Zepeng, LI Cuiran, WU Hao, XIE Jianli, XU Qiong

    Published 2024-05-01
    “…In response to the difficulty in obtaining perfect channel state information (CSI) in high mobility scenarios leaded to the deterioration of the performance of reconfigurable intelligent surface multiple-input multiple-output (RIS-MIMO) system’s active and passive beamforming algorithms issue, a communication model for millimeter-wave MIMO relay in high-speed railways assisted by RIS was constructed. Firstly, with incomplete train position information, the statistical characteristics of the line of sight (LOS) angle estimation error between RIS and mobile relay node (MRN) were estimated and derived. …”
    Get full text
    Article
  15. 17635

    Efficient Solution Algorithms for Resource Planning and Scheduling in Seasonal Reservation Systems by Uğur Eliiyi

    Published 2025-01-01
    “…Methodology: The optimization problem studied involves concurrent decisions of scheduling and dynamic capacity determination, with an objective of maximizing the net return gained from the served appointments. A randomized constructive heuristic exploiting problem’s structural characteristics is proposed together with effective improvement procedures. …”
    Get full text
    Article
  16. 17636

    Unraveling the metabolic landscape of Exophiala spinifera strain FM: Model reconstruction, insights into biodesulfurization and beyond. by Hamta Babaei Naeij, Zahra Etemadifar, John Kilbane, Mohammad Hossein Karimi-Jafari, Sepideh Mofidifar

    Published 2025-01-01
    “…In this study, we sequenced the complete genome of E. spinifera FM to construct the first genome-scale metabolic model (GSMM) for this organism. …”
    Get full text
    Article
  17. 17637

    DropBlock based bimodal hybrid neural network for wireless communication modulation recognition by Yan GAO, Jian SHI, Shengyu MA, Bolin MA, Guangxue YUE

    Published 2022-05-01
    “…As an intermediate step of signal detection and demodulation, automatic modulation recognition played a momentous role in wireless communication system.Aiming at the low recognition accuracy of existing automatic modulation recognition methods, a bimodal hybrid neural network (BHNN) was proposed, which utilized complementary gain information contained in multiple modes to enrich feature dimensions.The improved residual network was connected in parallel with the bidirectional gated loop unit to construct a bimodal hybrid neural network model, and the spatial and temporal features of the signal were extracted respectively.The DropBlock regularization algorithm was introduced to effectively suppress the influence of over fitting, gradient disappearance and gradient explosion on the recognition accuracy in the process of network training.Using bimodal data input, the spatial and temporal characteristics of signals were fully utilized, and the network depth was reduced through parallel connection.The model convergence was accelerated, and the recognition accuracy of modulated signals was improved.In order to verify the effectiveness of the model, two public datasets were used to simulate the model.The results show that BHNN has high recognition accuracy and strong stability on the two datasets, and the recognition accuracy can reach 89% and 93.63% respectively under high signal-to-noise ratio.…”
    Get full text
    Article
  18. 17638

    Day-ahead Clearing Method for High-proportion Hydropower Electricity Market by ZHANG Yang, SHEN Jianjian, ZHAO Qihao, XIE Mengfei, JIA Zebin

    Published 2023-01-01
    “…How to handle the complex characteristics of cascade hydropower and solve the competitive spillage and power shortage problem is one of the key issues in the clearing of the high-proportion hydropower day-ahead spot electricity market.Therefore,combined with the project in Yunnan,this paper proposes a day-ahead clearing method for the high-proportion hydropower electricity market.In this method,the hydraulic constraints in the clearing model are replaced by the post-hydraulic check.Combined with the essential causes of competitive spillage and power shortage problems,the paper constructs a conditional constraint set including cascaded hydropower linkage constraints and spillage control constraints,and corresponding trigger conditions respectively.Moreover,the constraint boundaries are dynamically updated to gradually reduce competitive spillage and power shortage in the iterative solution procedure.A settlement compensation strategy is finally designed to provide corresponding benefits for plants involved in solving the spillage.The proposed method is validated by a real-world hydropower-dominated provincial system ranking second in China.The results show that competitive spillage and power shortage can be avoided or reduced substantially.It is demonstrated that this method meets the requirements of practicability and timeliness for day-ahead spot clearing of hydropower-dominated provincial power systems.…”
    Get full text
    Article
  19. 17639

    Robust Semiparametric Optimal Testing Procedure for Multiple Normal Means by Peng Liu, Chong Wang

    Published 2012-01-01
    “…Optimal testing procedures with high average power while controlling false discovery rate are preferred. Many methods were constructed to achieve high power through borrowing information across genes. …”
    Get full text
    Article
  20. 17640

    Stabilization to Exponential Input-to-State Stability of a Class of Neural Networks with Delay by Observer-Based Aperiodic Intermittent Control by Mengyue Li, Biwen Li, Yuan Wan

    Published 2021-01-01
    “…Correspondingly, an observer-based APIC is constructed, and moreover, neither the observer nor the controller requires the information of time delay. …”
    Get full text
    Article