Suggested Topics within your search.
Suggested Topics within your search.
- Law reports, digests, etc 4
- Electric wiring, Interior 3
- MATHEMATICS / Mathematical Analysis 3
- Study and teaching 3
- Electric wiring 2
- Insurance requirements 2
- Law 2
- Mathematical analysis 2
- Methodology 2
- Moral and ethical aspects 2
- Research 2
- Tourism 2
- Analysis 1
- Buildings 1
- Children 1
- Communication 1
- Communication in rehabilitation 1
- Corporations 1
- Curricula 1
- Curriculum evaluation 1
- Curriculum planning 1
- Data processing 1
- Education 1
- Educational technology 1
- Electric apparatus and appliances 1
- Electric equipment 1
- Electric power systems 1
- Electrical engineering 1
- Emotions 1
- Emotions (Philosophy) 1
-
1841
RESEARCH ON DYNAMICS CHARACTERISTICS OF GEAR-BEARING COUPLING IN FAULTY TRANSMISSION SYSTEM
Published 2020-01-01“…The results show that the established dynamic model can well describe the dynamic characteristics of the fault-containing gear transmission system. In the time domain waveform diagram,a periodic shock signal is generated due to the presence of a crack fault,and a sideband is generated around the meshing frequency in the spectrogram.…”
Get full text
Article -
1842
Dataset on the questionnaire-based survey of the readiness of government accountants to implement international public sector accounting standards (IPSAS)Mendeley Data
Published 2025-04-01“…Section A addresses the demographic attributes of the respondents. Section B contains 2 parts; part (1) measures human resource, part (2) measures information technology. …”
Get full text
Article -
1843
Network threat situation assessment based on unsupervised multi-source data feature analysis
Published 2020-02-01“…Aiming at the limitations of supervised neural network in the network threat testing task relying on data category tagging,a network threat situation evaluation method based on unsupervised multi-source data feature analysis was proposed.Firstly,a variant auto encoder-generative adversarial network (V-G) for security threat assessment was designed.The training data set containing only normal network traffic was input to the network collection layer of V-G to perform the model training,and the reconstruction error of the network output of each layer was calculated.Then,the reconstruction error learning was performed by the three-layer variation automatic encoder of the output layer,and the training abnormal threshold was obtained.The packet threat was tested by using the test data set containing the abnormal network traffic,and the probability of occurrence of the threat of each group of tests was counted.Finally,the severity of the network security threat was determined according to the probability of threat occurrence,and the threat situation value was calculated according to the threat impact to obtain the network threat situation.The simulation results show that the proposed method has strong characterization ability for network threats,and can effectively and intuitively evaluate the overall situation of network threat.…”
Get full text
Article -
1844
Comparative study on the synthesis of magnetic ferrite adsorbent for the removal of Cd(II) from wastewater
Published 2018-10-01“…Based on the cost analysis, the magnetic ferrite was a cost-effective adsorbent for Cd-containing wastewater treatment.…”
Get full text
Article -
1845
Vehicle Detection Based on Multifeature Extraction and Recognition Adopting RBF Neural Network on ADAS System
Published 2020-01-01“…A region of interest (ROI) that may contain vehicles is extracted based on the composite features on vehicle’s bottom shadow and taillights by setting a gray threshold on vehicle shadow region and a series of constraints on taillights. …”
Get full text
Article -
1846
Concretization of Integral Reality Theory with the Video Assistant Referee System: Analysis of The Football Competitions of Metropolitan Municipality Erzurumspor, One of The Sporto...
Published 2020-09-01“…This study aims to contribute to a better understanding of integral reality which contains abstract discourses with video assistant referee system which contains concrete perspectives. …”
Get full text
Article -
1847
Identification of Poison Ivy, Poison Oak, Poison Sumac, and Poisonwood
Published 2012-03-01“…Even the smoke from burning plants contains oil particles that can be inhaled and cause lung irritation. …”
Get full text
Article -
1848
Hiperrealitas dalam Permainan Video Daring: Simulasi, Simulakra, dan Hiperrealitas Garena Free Fire
Published 2022-03-01“…Hyperreality can be seen from the war simulations contained in the course of the game, the weapons used, the selected characters that players can use, to the virtual world that becomes the battle arena. …”
Get full text
Article -
1849
Experimental and Numerical Study of Strength and Failure Behavior of Precracked Marble under True Triaxial Compression
Published 2021-01-01“…The numerical results show that the crack initiation and coalescence are observed and characterized from the inner and outer tips of preexisting cracks in specimens containing single crack and multiple parallel cracks. …”
Get full text
Article -
1850
Sulfurous Gases As Biological Messengers and Toxins: Comparative Genetics of Their Metabolism in Model Organisms
Published 2011-01-01“…In fact, the pathways for the metabolism of sulfur containing gases in lower organisms have not yet been described. …”
Get full text
Article -
1851
Leakage Detection in Water Pipes: An Approach of Smart Water
Published 2023-03-01“…This system is containing basic components like sensors, GSM module, Arduino. …”
Get full text
Article -
1852
Comparisons between Hygroscopic Measurements and UNIFAC Model Predictions for Dicarboxylic Organic Aerosol Mixtures
Published 2013-01-01“…Hygroscopic behavior was measured at 12°C over aqueous bulk solutions containing dicarboxylic acids, using a Baratron pressure transducer. …”
Get full text
Article -
1853
Digital watermarking method based on context word prediction and window compression coding
Published 2024-02-01“…To address the problems of limited number of substitutable words and low watermark extraction efficiency in the existing natural language digital watermarking methods, a creative method based on context word prediction and window compression coding was proposed.Firstly, the contextual semantic features of each word in the original text were automatically learned through a neural network language model, and then the candidate word set for each word was predicted, thus the number of substitutable words that could be utilized for carrying watermark information was expanded.Meanwhile, considering the difference of the semantic impact caused by the substitutions of candidate words at different positions, the watermark information was embedded into each window containing several words, and the selection of candidate words for watermark embedding was optimized by the similarity between sentences before and after performing word substitutions.Finally, a semantic-independent window compression coding method was proposed, which encoded each window as appointed watermark information in terms of the character information of words contained in the window.So that during watermark extraction, the dependence on the original context at the position of word substitution was eliminated.The experimental results show that the proposed method greatly improves the watermark extraction efficiency with high embedding capacity and text quality.…”
Get full text
Article -
1854
Visual Rhetoric of the Jewel with The Infant Jesus in the Setting of Arma Christi
Published 2024-12-01“…Reflections on the jewel aimed to provide information about the functions and meanings attached to it, to recognize the means contained in the peculiar iconographic message, and to consider the potential effects it could have had. …”
Get full text
Article -
1855
Propaganda Politik Hoaks dalam Pemilihan Presiden Tahun 2019
Published 2020-05-01“…The results showed that the purpose of hoaks political propaganda in addition to influencing the public was also done to change the negative image into positive or vice versa, in order to increase the electability and popularity of the candidates supported. material or content that is used as propaganda hoaks is material or content that contains SARA, personal, uses a pattern of nicknames, transfers, lure, popular narrative by using news / information content which is negative in nature and even sometimes contains lies using hoax propaganda patterns that are used in the 2019 presidential election. …”
Get full text
Article -
1856
Use of Hydrophilic Insoluble Polymers in the Restoration of Metal-Contaminated Soils
Published 2009-01-01“…In contaminated soils, hydrophilic insoluble polymers can create microcosms that are rich in water and nutrients (counterions) but only contain small concentrations of toxic elements; the conditions of these microenvironments are favorable to roots and microorganisms. …”
Get full text
Article -
1857
Investigation into effective mechanical properties of porous material produced by the additive manufacturing method
Published 2023-07-01“…Porous materials are defined as materials that contain holes, voids, or spaces in their structures, which can be interconnected or isolated. …”
Get full text
Article -
1858
On ∼n Notion of Conjugacy in Some Classes of Epigroups
Published 2024-01-01“…The challenge to introduce a new notion of conjugacy in semigroups is to choose the suitable set of conjugating elements. A semigroup may contain a zero, and if zero lies in the conjugating set, then the relation reduces to the universal relation as can be seen in the notions ∼l, ∼p, and ∼o. …”
Get full text
Article -
1859
Compound Fault Feature Extraction of Gearbox with Improved Dual-tree Complex Wavelet Transform
Published 2019-09-01“…The obtained sub-bands are subjected to frequency removal, the sub-band FFT is used to determine the main frequency and its notch filtering is performed to ensure that the frequency aliasing is eliminated, so that each sub-band only contains a unique characteristic frequency. Then using the proposed method and the methods such as Variational Mode Decomposition, the noise-containing simulation signals are decomposed and compared to verify the feasibility of the proposed method. …”
Get full text
Article -
1860
A Critique on the Book Descartes to Leibniz: A History of Philosophy
Published 2022-01-01“…The important advantages of the book are having the educative form and containing the main ideas of any one of those philosophers. …”
Get full text
Article