Suggested Topics within your search.
Suggested Topics within your search.
- Design and construction 10
- Law 6
- Interpretation and construction 5
- Building 4
- Construction industry 4
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 4
- Estimates 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Reinforced concrete construction 3
- Sociolinguistics 3
- Architecture 2
- Common law 2
- Computer-aided design 2
- Data processing 2
- Equity 2
- Grammar, Comparative and general 2
- Handbooks, Manuals, etc 2
- Law--Interpretation and construction 2
- MATHEMATICS / Mathematical Analysis 2
- Management 2
- Mathematical analysis 2
- Methodology 2
- Moral and ethical aspects 2
- Philosophy 2
- Syntax 2
- Trusts and trustees 2
- foundations 2
- roof 2
-
17621
Evaluation of Water Resource Carrying Capacity Based on TOPSIS Model with Combination Weighting and Diagnosis of Obstacle Factors in Suzhou City
Published 2024-06-01“…In view of issues such as water resource shortage and water environment pollution in the northern Anhui Plain, an evaluation index system was constructed based on the main body frame method with Suzhou City as an example. …”
Get full text
Article -
17622
Pilgrims Speaking Angry Words: Change and Anger in Chaucer’s Canterbury Tales
Published 2024-10-01“…Medieval literature presents emotions such as anger as negative and destructive for the development of the medieval subject and society and defines anger not as a positive constructive affect but as an emotive reaction that should be suppressed, controlled or avoided. …”
Get full text
Article -
17623
Device-independent uncloneable encryption
Published 2025-01-01“…., without trusting the quantum states and measurements used in the scheme, and that this variant works just as well as the original definition in constructing quantum money. Moreover, we show that a simple modification of our scheme yields a single-decryptor encryption scheme, which was a related notion introduced by Georgiou and Zhandry. …”
Get full text
Article -
17624
Home in Han Suyin’s 'Till Morning Comes' from the Perspective of New Cultural Geography
Published 2024-10-01“…In the process of searching for a home, Stephanie constructs her identity as a Chinese and eventually as a world citizen. …”
Get full text
Article -
17625
Wave dissipation performance of breakwater
Published 2025-01-01“…Over time, breakwaters have undergone significant evolution, and modern ones are constructed using advanced materials to enhance the efficiency of wave energy dissipation. …”
Get full text
Article -
17626
Reorienting information searching research by applying a situated abilities perspective
Published 2024-03-01“…Eight personas are constructed and used in a discussion of how a change of perspective on human abilities can provide a valuable contribution to research. …”
Get full text
Article -
17627
Resilience of Interbank Market Networks to Shocks
Published 2011-01-01“…This paper first constructs a tiered network model of the interbank market. …”
Get full text
Article -
17628
Chinese Universities’ Image Repair after Network Public Opinion Events: Strategy Choice and Effect Evaluation
Published 2022-01-01“…Accordingly, the sentiment index is constructed to evaluate the effect of Chinese universities’ image repair strategies. …”
Get full text
Article -
17629
Topology prediction for opportunistic network based on spatiotemporal convolution
Published 2023-03-01“…The high dynamics of opportunistic network topology leads to the challenges of topology prediction.The existing research mainly focuses on the long-term spatiotemporal dependence of networks, ignoring the short-term spatiotemporal features.A topology prediction method for opportunistic network based on dynamic time warping algorithm and spatiotemporal convolution (DTW-STC) was proposed, which integrated long-short term spatiotemporal dependence in opportunistic network.The time slot was determined based on dynamic time warping algorithm, so that the opportunistic network was sliced into snapshots which topology was presented by link state matrix.Temporal convolution was employed to extract short-term temporal features.The spatiotemporal graph, representing the short-term spatiotemporal relationship, was constructed by temporal features and network changes.The short-term spatiotemporal features were captured by graph convolution.After stacks of spatiotemporal convolution, the long-short term spatiotemporal features of network were achieved.Based on the autoencoder structure, vector space transformation was realized, so that the future network topology was predicted.The results on three real opportunistic network datasets, ITC, MIT, and Asturias-er, show that the proposed DTW-STC has better prediction performance than ones of other baseline methods.…”
Get full text
Article -
17630
Elastic crack-tip stress field in a semi-strip
Published 2018-04-01“…Depending on the conditions given on the short edge of the semi-strip, the constructed singular integral equation can have one, or two fixed singularities. …”
Get full text
Article -
17631
CRISIS OF DEMOCRACY, POLITICAL DISTRUST AND AFRO-PESSIMISM IN NIGERIA POLITICS; THE FOURTH REPUBLIC IN FOCUS
Published 2023-09-01“…The research applies the quantitative research methodology. Further, the constructive theory of idea was employed to show the relationship between the crisis of democracy, distrust and afro-pessimism. …”
Get full text
Article -
17632
New extension method of trusted certificate chain in virtual platform environment
Published 2018-06-01“…When using trusted computing technology to build a trusted virtual platform environment,it is a hot problem that how to reasonably extend the underlying physical TPM certificate chain to the virtual machine environment.At present,the certificate trust expansion schemes are not perfect,either there is a violation of the TCG specifications,or TPM and vTPM certificate results inconsistent,either the presence of key redundancy,or privacy CA performance burden,some project cannot even extend the certificate trust.Based on this,a new extension method of trusted certificate chain was proposed.Firstly,a new class of certificate called VMEK (virtual machine extension key) was added in TPM,and the management mechanism of certificate VMEK was constructed,the main feature of which was that its key was not transferable and could be used to sign and encrypt the data inside and outside of TPM.Secondly,it used certificate VMEK to sign vTPM’s vEK to build the trust relationship between the underlying TPM and virtual machine,and realized extension of trusted certificate chain in virtual machine.Finally,in Xen,VMEK certificate and its management mechanism,and certificate trust extension based on VMEK were realized.The experiment results show that the proposed scheme can effectively realize the remote attestation function of virtual platform.…”
Get full text
Article -
17633
Deep learning-enhanced detection of road culverts in high-resolution digital elevation models: Improving stream network accuracy in Sweden
Published 2025-02-01“…Study focus: Maps have traditionally been constructed from aerial photos, but dense forest canopies often obscure these streams from view. …”
Get full text
Article -
17634
Robust beamforming algorithm for RIS-MIMO system based on train prior information
Published 2024-05-01“…In response to the difficulty in obtaining perfect channel state information (CSI) in high mobility scenarios leaded to the deterioration of the performance of reconfigurable intelligent surface multiple-input multiple-output (RIS-MIMO) system’s active and passive beamforming algorithms issue, a communication model for millimeter-wave MIMO relay in high-speed railways assisted by RIS was constructed. Firstly, with incomplete train position information, the statistical characteristics of the line of sight (LOS) angle estimation error between RIS and mobile relay node (MRN) were estimated and derived. …”
Get full text
Article -
17635
Efficient Solution Algorithms for Resource Planning and Scheduling in Seasonal Reservation Systems
Published 2025-01-01“…Methodology: The optimization problem studied involves concurrent decisions of scheduling and dynamic capacity determination, with an objective of maximizing the net return gained from the served appointments. A randomized constructive heuristic exploiting problem’s structural characteristics is proposed together with effective improvement procedures. …”
Get full text
Article -
17636
Unraveling the metabolic landscape of Exophiala spinifera strain FM: Model reconstruction, insights into biodesulfurization and beyond.
Published 2025-01-01“…In this study, we sequenced the complete genome of E. spinifera FM to construct the first genome-scale metabolic model (GSMM) for this organism. …”
Get full text
Article -
17637
DropBlock based bimodal hybrid neural network for wireless communication modulation recognition
Published 2022-05-01“…As an intermediate step of signal detection and demodulation, automatic modulation recognition played a momentous role in wireless communication system.Aiming at the low recognition accuracy of existing automatic modulation recognition methods, a bimodal hybrid neural network (BHNN) was proposed, which utilized complementary gain information contained in multiple modes to enrich feature dimensions.The improved residual network was connected in parallel with the bidirectional gated loop unit to construct a bimodal hybrid neural network model, and the spatial and temporal features of the signal were extracted respectively.The DropBlock regularization algorithm was introduced to effectively suppress the influence of over fitting, gradient disappearance and gradient explosion on the recognition accuracy in the process of network training.Using bimodal data input, the spatial and temporal characteristics of signals were fully utilized, and the network depth was reduced through parallel connection.The model convergence was accelerated, and the recognition accuracy of modulated signals was improved.In order to verify the effectiveness of the model, two public datasets were used to simulate the model.The results show that BHNN has high recognition accuracy and strong stability on the two datasets, and the recognition accuracy can reach 89% and 93.63% respectively under high signal-to-noise ratio.…”
Get full text
Article -
17638
Day-ahead Clearing Method for High-proportion Hydropower Electricity Market
Published 2023-01-01“…How to handle the complex characteristics of cascade hydropower and solve the competitive spillage and power shortage problem is one of the key issues in the clearing of the high-proportion hydropower day-ahead spot electricity market.Therefore,combined with the project in Yunnan,this paper proposes a day-ahead clearing method for the high-proportion hydropower electricity market.In this method,the hydraulic constraints in the clearing model are replaced by the post-hydraulic check.Combined with the essential causes of competitive spillage and power shortage problems,the paper constructs a conditional constraint set including cascaded hydropower linkage constraints and spillage control constraints,and corresponding trigger conditions respectively.Moreover,the constraint boundaries are dynamically updated to gradually reduce competitive spillage and power shortage in the iterative solution procedure.A settlement compensation strategy is finally designed to provide corresponding benefits for plants involved in solving the spillage.The proposed method is validated by a real-world hydropower-dominated provincial system ranking second in China.The results show that competitive spillage and power shortage can be avoided or reduced substantially.It is demonstrated that this method meets the requirements of practicability and timeliness for day-ahead spot clearing of hydropower-dominated provincial power systems.…”
Get full text
Article -
17639
Robust Semiparametric Optimal Testing Procedure for Multiple Normal Means
Published 2012-01-01“…Optimal testing procedures with high average power while controlling false discovery rate are preferred. Many methods were constructed to achieve high power through borrowing information across genes. …”
Get full text
Article -
17640
Stabilization to Exponential Input-to-State Stability of a Class of Neural Networks with Delay by Observer-Based Aperiodic Intermittent Control
Published 2021-01-01“…Correspondingly, an observer-based APIC is constructed, and moreover, neither the observer nor the controller requires the information of time delay. …”
Get full text
Article