Showing 17,641 - 17,660 results of 23,138 for search '"construction"', query time: 0.13s Refine Results
  1. 17641

    International tourism and (linguistic) accommodation: Convergence towards and through English in tourist information interactions by Adam Wilson

    Published 2018-06-01
    “…The analyses presented here show that converging towards and accommodating through English allow speakers to establish, protect and recover “common ground” (Stalnaker 2002), overcome communicative problems and co-construct understanding. Finally, language ideology is shown to be a key factor in the dynamics underlying processes of accommodation in this particular context.…”
    Get full text
    Article
  2. 17642

    Design of Nonfragile State Estimator for Discrete-Time Genetic Regulatory Networks Subject to Randomly Occurring Uncertainties and Time-Varying Delays by Yanfeng Zhao, Jihong Shen, Dongyan Chen

    Published 2017-01-01
    “…The focus of the paper is on developing a new nonfragile state estimation method to estimate the concentrations of the mRNA and the protein for considered uncertain delayed GRNs, where the randomly occurring estimator gain perturbations are allowed. By constructing a Lyapunov-Krasovskii functional, a delay-dependent criterion is obtained in terms of linear matrix inequalities (LMIs) by properly using the discrete-time Wirtinger-based inequality and reciprocally convex combination approach as well as the free-weighting matrix method. …”
    Get full text
    Article
  3. 17643

    Fresh and Hardened Properties of Self-Leveling Mortars with Porcelain and Red Ceramic Wastes by Valdir M. Pereira, Gladis Camarini

    Published 2018-01-01
    “…Few builders are using it in constructions. In the same way, the sustainable reuse of wastes in building materials is not so great, but it has grown, becoming increasingly important. …”
    Get full text
    Article
  4. 17644

    Effectiveness of the Spatial Domain Techniques in Digital Image Steganography by Rosshini Selvamani, Yusliza Yusoff

    Published 2024-03-01
    “…In addition to using statistics as a foundation, convolution neural networks (CNN), generative adversarial networks (GAN), coverless approaches, and machine learning are all used to construct steganographic methods. Robustness is becoming a crucial component of many innovative techniques. …”
    Get full text
    Article
  5. 17645

    The digital age students: Exploring leadership, freedom, and ethical online behavior: A quantitative study by Mohamed Mekheimer, Walid Mohamed Abdelhalim

    Published 2025-01-01
    “…Employing validated questionnaires and a quantitative, cross-sectional design, we examined the predictive relationships among these constructs. Findings revealed significant positive correlations between leadership skills and digital responsibility, underscoring that developing strategic vision, communication, motivation, and ethical decision-making significantly enhances responsible online conduct. …”
    Get full text
    Article
  6. 17646

    ACTIVE-LEARNING METHOD BASED ON ALK MODEL AND SUBSET SIMULATION by LIU ZeQing, CHENG Xin, YANG XuFeng

    Published 2024-02-01
    “…Firstly, based on the constructed surrogate model in the first stage, the method uses a small number of SS last layer samples as candidate samples to complete the rough approximation of the limit state surface, and then in the second stage, it selects the SS last layer samples witha larger sample size to refine the surrogate model in the first stage, so as to obtain higher accuracy. …”
    Get full text
    Article
  7. 17647

    Palimpsestes ou l’image au second degré : Gail Albert Halaban, Hopper Redux, et Laetitia Molenaar, Here comes the Sun [it is all right] by Helena LAMOULIATTE-SCHMITT

    Published 2015-12-01
    “…Laetitia Molenaar, for her part, constructed an even more elaborate framework in the Here comes the Sun [it is all right] series, in which she staged some of Hopper’s most famous paintings before photographing them in cardboard miniature settings. …”
    Get full text
    Article
  8. 17648

    Fuzzy Set-Valued Information Systems and the Algorithm of Filling Missing Values for Incomplete Information Systems by Zhaohao Wang, Xiaoping Zhang

    Published 2019-01-01
    “…Furthermore, we also construct an algorithm to fill the missing values in IISs with set values (or real values). …”
    Get full text
    Article
  9. 17649

    Sport sponsorship from perspective of great industrial companies’ managers by İman Mırzaeı, Abdolrahman Mehdıpour, Tahereh Azmsha

    Published 2016-12-01
    “…The questionnaire of this study was a scholar-made questionnaire which its Content validity was confirmed by professors and sport management experts and its reliability and construct validity were also examined. In order to analyze the data of this research, exploratory factor analysis and path analysis methods were used by SPSS and Smart-PLS software. …”
    Get full text
    Article
  10. 17650

    Application of the Big Data Analysis Model in Higher Education Talent Training Quality Evaluation by Lijun Li, Wentao Wang, Fei Bian

    Published 2021-01-01
    “…In this paper, the quality index system for higher education background is designed and constructed and the weight relationship of different educational indicators is analyzed through big data, and four main indicators are obtained; then, the weight relationship of secondary indicators is analyzed, and finally, the weight relationship of all indicators is formed. …”
    Get full text
    Article
  11. 17651

    Characteristics Analysis and Equilibrium Optimization of Mixed Traffic Flow considering Connected Automated and Human-Driven Vehicles by Zhaoming Zhou, Jianbo Yuan, Shengmin Zhou, Qiong Long, Jianrong Cai, Lei Zhang

    Published 2022-01-01
    “…Taking the road network reserve capacity maximization model under the condition of road capacity constraint as the upper-level programming and the traffic assignment model under heterogeneous flow environment as the lower level programming, then a bilevel programming model is constructed. Among them, the nonuniform demand growth multiplier is adopted for each OD pair to reflect the inconsistency of traffic demand structure growth, and the calculation of link capacity is related to the market penetration of CAVs. …”
    Get full text
    Article
  12. 17652

    Vibration Characteristics and Power Flow Analyses of a Ship Propulsion Shafting System with General Support and Thrust Loading by Deshui Xu, Jingtao Du, Chuan Tian

    Published 2020-01-01
    “…In this paper, flexural vibration and power flow transmission of a ship propulsion shafting structure are analyzed via energy principle description in conjunction with Rayleigh–Ritz procedure, in which the shafting vibration displacement is constructed as a superposition of Fourier series and boundary-smoothing supplementary functions. …”
    Get full text
    Article
  13. 17653

    Robot Calibration for Cooperative Process under Typical Installation by Yahui Gan, Xianzhong Dai, Donghui Dong

    Published 2014-01-01
    “…It is carried out through constructing a series of handclasp configurations and recording coordinates of the contact points, respectively, in base frame of each robot. …”
    Get full text
    Article
  14. 17654

    Collapse risk assessment based on linear programming variable weight-cloud model. by Xiaoyi Zhou, Ke Hu, Tingqiang Zhou

    Published 2024-01-01
    “…Finally, a comprehensive evaluation model of cloud model is constructed to determine the risk level of collapse. …”
    Get full text
    Article
  15. 17655

    MUBEM & SAC: STEM Based Science and Nature Camp by Hasan Zuhtu Okulu, Ayse Oguz-Unver, Sertac Arabacioglu

    Published 2019-07-01
    “…The participants found the opportunity to use telescopes, experience an extensive archaeological excavation, observe the near-nano size object with electron microscopes, construct a bridge like an engineer, and design artifacts like rockets and holograms during the camp. …”
    Get full text
    Article
  16. 17656

    Supply chain risk transmission monitoring based on graphic evaluation and review technique by Jianlan Zhong, Fu Jia

    Published 2025-01-01
    “…We use the graphic evaluation and review technique (GERT) to characterize the topology of the risk transmission network in the supply chain and construct a supply chain risk transmission model. We then use the change-point control chart to monitor risk factors, specifically delayed lead time. …”
    Get full text
    Article
  17. 17657

    Retour au terrain ! by Bernard Davasse, Dominique Henry, Jean-François Rodriguez

    Published 2016-12-01
    “…As conceived of by the authors, the observation/interpretation of the landscape is a part of a collective construct involving the knowledge, expertise, representations and practices of all the stakeholders involved, whether they are researchers, elected representatives, members of social and professional organisations, or inhabitants. …”
    Get full text
    Article
  18. 17658

    Economic Impact of Changes in Neonatal Intensive Care Unit Ventilation Strategies with the Advent of New Noninvasive Ventilation Techniques: A Review and Proposed Assessment Framew... by Jan B. Pietzsch, Abigail M. Garner, Michael McQueen

    Published 2015-08-01
    “…Parameter uncertainty was tested in sensitivity analyses. **Results:** The constructed model projected expected cost savings of $2,317 for the HFT strategy for the base case. …”
    Get full text
    Article
  19. 17659

    Method for Establishing New Cycloidal Tooth Profile based on Rolling-sliding Effect by Yanhua Wang, Chaoyang Li, Ye Zhang, Bingkui Chen

    Published 2020-12-01
    “…A new cycloid tooth profile,based on hypothetical sliding function which parameters are selected with experience,is constructed. The tooth profile,comprehensive curvature radius and contact stress of the new tooth profile and that of the standard cycloidal tooth profile are compared. …”
    Get full text
    Article
  20. 17660

    Handover algorithm for space-air-ground integrated network based on location prediction model by XIE Jianli, CHEN Long, ZHANG Zepeng, LI Cuiran

    Published 2024-12-01
    “…To address the issues of frequent handovers and network load imbalance caused by dynamic changes in the network environment and enhanced mobility of user terminals in the 6G space-air-ground integrated network (SAGIN), a handover algorithm for SAGIN based on a terminal location prediction model was proposed. The algorithm constructed a long short-term memory (LSTM) network terminal location prediction model optimized based on the sparrow search strategy, improving the accuracy of terminal location prediction and resolving the issue of unreasonable handover timing. …”
    Get full text
    Article