Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
12381
Regional consensus of switched positive multi-agent systems with multiple equilibria
Published 2025-01-01“…Subsequently, a Luenberger observer with multiple equilibria is constructed to facilitate the design of an observer-based distributed proportional-integral-derivative control protocol. …”
Get full text
Article -
12382
Contributions of Matrix Metalloproteinases to Neural Plasticity, Habituation, Associative Learning and Drug Addiction
Published 2009-01-01“…., neural plasticity) by degrading cell adhesion molecules (CAMs) designed to provide stability to those extracellular matrix (ECM) proteins that form scaffolding supporting neurons and glia. …”
Get full text
Article -
12383
Évolution du jardin latin moderne », dans Du paradis au jardin latin
Published 2010-07-01“…Little known in France, the work of Nicolás María Rubio y Tudurí is divided between architecture, parks design and writing. He published Del paraiso al jarding latino, vast synthesis of the history of gardens. …”
Get full text
Article -
12384
Construction of advanced persistent threat attack detection model based on provenance graph and attention mechanism
Published 2024-03-01“…In response to the difficulty of existing attack detection methods in dealing with advanced persistent threat (APT) with longer durations, complex and covert attack methods, a model for APT attack detection based on attention mechanisms and provenance graphs was proposed.Firstly, provenance graphs that described system behavior based on system audit logs were constructed.Then, an optimization algorithm was designed to reduce the scale of provenance graphs without sacrificing key semantics.Afterward, a deep neural network (DNN) was utilized to convert the original attack sequence into a semantically enhanced feature vector sequence.Finally, an APT attack detection model named DAGCN was designed.An attention mechanism was applied to the traceback graph sequence.By allocating different weights to different positions in the input sequence and performing weight calculations, sequence feature information of sustained attacks could be extracted over a longer period of time, which effectively identified malicious nodes and reconstructs the attack process.The proposed model outperforms existing models in terms of recognition accuracy and other metrics.Experimental results on public APT attack datasets show that, compared with existing APT attack detection models, the accuracy of the proposed model in APT attack detection reaches 93.18%.…”
Get full text
Article -
12385
Resilient Event Triggered Interval Type-2 Fuzzy Sliding Mode Control for Connected and Autonomous Vehicles Subjected to Multiple Cyber Attacks
Published 2024-01-01“…Thus, there is a growing need to design resilient control strategies to address the issue of cyberattacks. …”
Get full text
Article -
12386
Multi-pulse Fourier codes for bit transmission at the quantum limit
Published 2025-01-01“…We show that multi-pulse codes can approach the rate of OOK closely, providing a simplified design for quantum-enhanced communication in the photon-starved regime; furthermore, multi-level codes can approach generalized-OOK strategies with multiple pulse types, thus they can be employed in the larger photon-number regime.…”
Get full text
Article -
12387
Double adversarial attack against license plate recognition system
Published 2023-06-01“…Recent studies have revealed that deep neural networks (DNN) used in artificial intelligence systems are highly vulnerable to adversarial sample-based attacks.To address this issue, a dual adversarial attack method was proposed for license plate recognition (LPR) systems in a DNN-based scenario.It was demonstrated that an adversarial patch added to the pattern location of the license plate can render the target detection subsystem of the LPR system unable to detect the license plate class.Additionally, the natural rust and stains were simulated by adding irregular single-connected area random points to the license plate image, which results in the misrecognition of the license plate number.or the license plate research, different shapes of adversarial patches and different colors of adversarial patches are designed as a way to generate adversarial license plates and migrate them to the physical world.Experimental results show that the designed adversarial samples are undetectable by the human eye and can deceive the license plate recognition system, such as EasyPR.The success rate of the attack in the physical world can reach 99%.The study sheds light on the vulnerability of deep learning and the adversarial attack of LPR, and offers a positive contribution toward improving the robustness of license plate recognition models.…”
Get full text
Article -
12388
An Empirical Analysis of the Role of Piano Performance in Alleviating Psychological Trauma in People with Psychological Isolation Disorder
Published 2022-01-01“…This paper presents an in-depth analysis and study of the role of piano performance in alleviating psychological trauma in people with psychological isolation disorder. In this paper, we designed a music modulation system based on EEG signals of people with isolation disorder and designed an interface with real-time emotion recognition. …”
Get full text
Article -
12389
First ways to find out breast cancer by Breast Self-Examination (BSE)
Published 2024-12-01“…This type of research uses a quasi-experimental design with a one-group pre-post test design without control. …”
Get full text
Article -
12390
Development of Serious Games as A Programming Learning Platform for Informatics Students
Published 2025-01-01“…This study aims to develop DolananCoding, a programming learning platform based on serious games designed for informatics students. The research employed the waterfall software development methodology, encompassing requirements analysis, system design, implementation, testing, and dissemination. …”
Get full text
Article -
12391
Exploring Online Synthesis for CGRAs with Specialized Operator Sets
Published 2011-01-01“…The design of energy-efficient systems has become a major challenge for engineers over the last decade. …”
Get full text
Article -
12392
-
12393
Research and DSP Implementation of Speech Enhancement Technology Based on Dynamic Mixed Features and Adaptive Mask
Published 2022-01-01“…Finally, the hardware and algorithm software design of the DSP-based speech enhancement system is given. …”
Get full text
Article -
12394
Research of Flow Field of Alkaline/Surfactant/Polymer Solution in the Annular Depressurization Slot by PIV Experiment
Published 2018-01-01“…In order to study the flow field changes of ASP (alkaline/surfactant/polymer) solutions with different molecular weights and flow rates when flowing through the annular depressurization slot in the laboratory, the annulus pipeline model was designed based on the principle of similarity. The particle image velocimetry (PIV) system was used to continuously capture the transient images when the ASP solution flows in the model under different experimental conditions. …”
Get full text
Article -
12395
Research and optimization on the sensing algorithm for 6G integrated sensing and communication network
Published 2023-02-01“…High-precision sensing is one of the basic capabilities of 6G mobile communication system to fulfill the demands of many application scenarios in the future, and the integrated design of sensing and communication (ISAC) is an important direction of 6G research.The works on ISAC mainly focus on improving the sensing performance.However, besides high sensing accuracy, 6G ISAC network still has a high communication rate requirement.Therefore, joint analysis and design of communication and sensing is necessary.First, three classic sensing algorithms were introduced that could achieve multi-target ranging and speed measurement, and the algorithms were analyzed from three aspects: sensing accuracy, communication performance and computational complexity.It is shown that the optimal sensing accuracy, sensing capacity and communication rate could not be achieved at the same time by using either one algorithm.Second, combined with the characteristics of different sensing algorithms, an adaptive sensing algorithm was proposed that the receiver selected the appropriate sensing algorithm according to the measured receive signal-to-interference-plus-noise ratio to realize the joint optimization of sensing and communication performance.Finally, the link-level simulation was carried out to verify that the proposed algorithm can obtain better sensing accuracy and communication capacity than any single algorithm.…”
Get full text
Article -
12396
Blockchain based trusted traceability system scheme for raw milk supply chain
Published 2021-05-01“…Abtract: The development of raw milk is an important direction for the development of China’s dairy industry, and a traceability system for the raw milk industry was proposed for the development of the entire industry crucially.The characteristics of the raw milk industry were analyzed and four major problems were proposed as the timeliness, the problems found after the fact, the difficulty in tracing the victims, the quality control system, such as difficulties in gaining trust, which were the main characteristics that distinguish the raw milk industry from other agricultural industries, and leaded to traceability in traditional agriculture.The mechanism or even the popular blockchain-based traceability mechanism for agricultural products could not meet the traceability requirements of the raw milk industry.Based on this finding, RMChain, a traceability system for raw milk supply chain system scheme, was designed to meet the requirements of the existing blockchain-based traceability mechanisms in the raw milk industry.In addition to the various advantages of the chain traceability mechanism, it was also optimized specifically for the characteristics of raw milk, which made it easy for users to trace the product and facilitate the traceability of the milk.The tracking and location of problem milk and consumer compensation effectively improved the traceability status of the fresh milk industry.For the problem of large files seriously affecting the performance of the blockchain, a multi-party storage model based on the importance of data was also designed.The feasibility of RMChain was verified.…”
Get full text
Article -
12397
Toxicity of mercury (Hg) on survival and growth rate, hemato- and histopathological parameters ofOreochromis niloticus
Published 2013-11-01“…This study was conducted from Mei to June 2009. The experimental design was arranged in completely randomized design with four treatments and three replications. …”
Get full text
Article -
12398
“I know this is good, but I am confused”: English teachers’ self-efficacy in implementing the Independent Curriculum
Published 2024-05-01“…They do not have sufficient understanding or ability to conduct a needs analysis and syllabus design as a prerequisite for implementing the curriculum. …”
Get full text
Article -
12399
Cooperative Intercept Guidance of Multiple Aircraft with a Lure Role Included
Published 2018-01-01“…The simulation results indicate that the proposed method of controller design has the ability to guarantee that the two defenders intercept the pursuer at the preassigned intercept angles. …”
Get full text
Article -
12400
Efficient routing strategy of blockchain-based payment channel network
Published 2021-06-01“…In order to solve the problems of the low transaction success rate and network imbalance of the payment channel network, an efficient routing strategy of blockchain-based payment channel network was proposed.This strategy established a dedicated payment channel for the high-priority services according to the service type and service priority, and divided the conventional business into multiple transaction unit.Furthermore, a channel balanced routing algorithm was designed to route each transaction unit, which could reduce the number of transactions on the blockchain and maintain long-term stable operation of the off-chain payment channel, as well as improve the transaction success rate.In addition, in order to avoid the temporary shortage of funds and unavailability of channels due to a certain link occupied by multiple transactions simultaneously, a transaction queuing mechanism in the payment channel network was designed.This mechanism established the forwarding rules for transactions by calculating the escrow amount between the node that transactions arrived and the next hop node, where the channel balanced routing algorithm was used to calculate the new forwarding path for the nodes that could not carry out capital injection within the queuing threshold.The simulation results show that the proposed strategy could improve the transaction success rate and realize the equilibrium of the payment channel network.…”
Get full text
Article