Showing 121,021 - 121,040 results of 124,197 for search '"research"', query time: 0.53s Refine Results
  1. 121021

    Key problems of telecom operators' NFV future network management system evolution by Qiu YUE, Ziyu XIAO, Lihua WU, Lei SHEN

    Published 2017-04-01
    “…Network function virtualization (NFV) is the core technology and architecture of telecom-level business to cloud,which is the inevitable trend of future network evolution.NFV brings new capabilities to the communications network,at the same time,it requires new management and orchestration (MANO) capabilities for existing equipment operations,management,maintenance and configuration models.First of all,the network management system architecture and future evolution planning of the physical network element were summarized,and by the coming of NFV technology,the changes of the existing network equipment management method and the new network management architecture and function were concluded.The coordination of NFV MANO and operation support system (OSS),NFV MANO and other peripheral network was deeply researched.Finally,from the perspective of telecom operators,the deployment and evolution strategy of NFV MANO based on decoupling level was suggested.…”
    Get full text
    Article
  2. 121022

    Stress Analysis of Meshing Gear with Staggering Tooth by Liu Yaqiong, Wang Tie, Wu Zhifei, Zhang Ruiliang, Shi Ruonan, Wu Ping’an

    Published 2015-01-01
    “…The contact stress and bending stress are calculated and comparatively analyzed with the same meshing tooth width by using three methods of the national standard formula based,Romax software(full tooth meshing) and Romax software(staggering tooth meshing),and thus the effects of different meshing tooth width(that is different staggering tooth amount) on the gear bending stress values are researched.While by using Locati rapid fatigue testing methods,the operating gear bending fatigue tests are carried out and the bending stress of each load with three methods are determined,the bending fatigue limit estimated values are obtained.By comparing the bending fatigue limit estimated value,the bending stress credibility of staggering tooth meshing is determined based on Romax software(staggering tooth meshing),the reference method for the gear bending stresses calculated with staggering tooth meshing is provided.…”
    Get full text
    Article
  3. 121023

    REVISITING KEYNES’ INVESTMENT AND SAVING MODEL IN INDONESIA by Cheng-Wen Lee, Andrian Dolfriandra Huruta, Ramdani Putri Setyaningrum, Gatot Sasongko

    Published 2020-11-01
    “… This study aims to analyze the Keynes’ investment and saving model in Indonesia from 1981 to 2018. The researchers use the econometric test from the Granger causality test to find the short-run causal relationship and the Vector Error Correction Model to reveal both the short-run and long-run effects in the model. …”
    Get full text
    Article
  4. 121024

    “EQUINOXES” BY TIBERIU OLAH by Răzvan METEA

    Published 2012-12-01
    “…Not unlike grand personalities, Tiberiu Olah understood music on large areas and ample dimensions of time. He thoroughly researched and applied very well the expressive means of popular and classical instruments, as well as those of the human voice, but he especially explored Romanian folk dances and mainly their rhythm, suggestively expressed by the hidden language of modern percussion. …”
    Get full text
    Article
  5. 121025

    Seismic Behavior of Short Concrete Columns with Prestressing Steel Wires by Deng Zong-Cai, Jumbe R. Daud, Li Hui

    Published 2014-01-01
    “…The formulas for calculating shear capacity of RC short columns strengthened with PSW were proposed which may be useful for future engineering designs and researches.…”
    Get full text
    Article
  6. 121026

    Comparison of the results obtained by Iman transform with Laplace transform by NIHAL OZDOGAN

    Published 2024-12-01
    “…For this reason, many integral transform methods were proposed by researchers. However, integral transform methods can give consistent solutions to many complex problems and have many application areas such as physics, mechanics, engineering, astronomy. …”
    Get full text
    Article
  7. 121027

    L’injonction à participer au monde numérique by Serge Proulx

    Published 2017-09-01
    “…This article questions the discourses of researchers since the decades 2000–2010 who put forward the idea that the Web would be animated by a “participation” of the users to the digital world. …”
    Get full text
    Article
  8. 121028

    Vibration dataset of main journal bearings in internal combustion engines under diverse climatic and varying operating conditionsMendeley Data by Muhammad Noman Riaz, Amir Hamza, Hamid Jabbar, Manzar Abbas, Mohsin Islam Tiwana

    Published 2025-02-01
    “…This dataset provides a valuable and reliable benchmark for researchers and practitioners to validate their diagnostic algorithms and models against real engine conditions, as no such dataset is publicly available.…”
    Get full text
    Article
  9. 121029

    'n Kruiskulturele ondersoek na Christelike moraliteit onder universiteitstudente by A. le Roux

    Published 2003-12-01
    “…As these factors are closely related to human morality, the researcher was interested in investigating the state of Christian morality on a South African campus. …”
    Get full text
    Article
  10. 121030

    An Adaptive Subspace Similarity Search Approach by Jianxin Ren, Huahui Chen

    Published 2015-07-01
    “…In recent years,such database fields as multimedia information retrieval,similarity join and time series matching,where similarity search has attracted much attention.Existing researches mostly compute nearest neighbor to solve problems about search target set,such as kNN and kNNJ,by metric distance functions in the Euclidean space.But some studies showed that high dissimilarity dimensions had got great effect on the accuracy of answer and flexibility and robustness still were lacked in corresponding solutions.Thus centralized dynamic subspace or partial dimensions similarity search problem and algorithms were proposed at first.Furthermore,with the emerge of very large dataset,centralized algorithms can,t extend very well.Finally,the distributed ones under hadoop framework were proposed.Experiments prove that distributed algorithms outperform centralized ones in the performance without accuracy loss.…”
    Get full text
    Article
  11. 121031

    THEORETICAL STUDY ON THE CRASHWORTHINESS OF CORRUGATED TUBE by ZHANG Ping, MA Jian, NA JingXin

    Published 2015-01-01
    “…The energy absorbing property of corrugated tube subjected to axial crushing was researched through theoretical analysis. In view of the energy absorbing mechanism for axisymmetric deformation mode,a calculation formula for the mean crush load was put forward. …”
    Get full text
    Article
  12. 121032

    Design and implementation of buffer memory management in industrial Internet of things by Chao WU, Chengqun WANG, Shenghong ZHU, Weiqiang XU, Yubo JIA

    Published 2019-03-01
    “…Aiming at the problem of how to store traffic jam efficiently in high-speed communication of industrial Internet of things,the method of memory management was introduced.On the basis of researching the storage principle of SDRAM,a SDRAM partition memory management system based on field programmable gate array (FPGA) was designed.FPGA was used as the main controller,SDRAM was divided into two parts:index area and data area.In order to facilitate memory management,SDRAM data was further divided into memory blocks with the same size of 1 kB to achieve the purpose of reading and writing data through index.The simulation and experimental results show that the unreliable problems such as data disorder caused by reading multiple data frames from SDRAM after traffic congestion in high-speed communication can be solved effectively,and the stability of communication system can be improved by the memory management system combined with FIFO.…”
    Get full text
    Article
  13. 121033

    Survey on differential privacy and its progress by Zhi-qiang GAO, Yu-tao WANG

    Published 2017-10-01
    “…With the arrival of the era of big data sharing,data privacy protection issues will be highlighted.Since its introduction in 2006,differential privacy technology has been widely researched in data mining and data publishing.In recent years,Google,Apple and other companies have introduced differential privacy technology into the latest products,and differential privacy technology has become the focus of academia and industry again.Firstly,the traditional centralized model of differential privacy was summarized,from the perspective of analysis of data mining and data released in the differential privacy way.Then the latest local differential privacy regarding data collection and data analysis based on the local model was described,involving crowdsourcing with random response technology,BloomFilter,statistical inference techniques.Finally,the main problems and solutions of differential privacy technology were summarized.…”
    Get full text
    Article
  14. 121034

    Infrared Optical Constants and Computational Studies of Neat Liquid -Butylethylether by K. B. Beć, J. P. Hawranek

    Published 2013-01-01
    “…Aliphatic ethers are of interest to researchers due to their wide application in the fuel, chemical, and pharmaceutical industry. …”
    Get full text
    Article
  15. 121035

    Connective-Lex: A Web-Based Multilingual Lexical Resource for Connectives by Manfred Stede, Tatjana Scheffler, Amália Mendes

    Published 2019-10-01
    “…We discuss how the multilingual integration of several connective lexicons provides added value for linguistic researchers and other users interested in connectives, by allowing crosslinguistic comparison and a direct linking between discourse relational devices in different languages. …”
    Get full text
    Article
  16. 121036

    Selection of Failure Data in Software Reliability Modeling Based on RVM by Xiaoming Yang, Jungang Lou, Zhangguo Shen, Wenjun Hu

    Published 2015-09-01
    “…Compared to traditional models, kernel based models could achieve better prediction accuracy, and had arouse the interesting of many researchers. The RVM learning scheme was applied to model the failure time data so as to capture the inner correlation between software failure time data and the m nearest failure time data. …”
    Get full text
    Article
  17. 121037

    Cognitive Behavioural Therapy for Chronic Fatigue Syndrome in a 15 year-old girl; A case-report by Vahdet GORMEZ

    Published 2015-08-01
    “…Cognitive behaviour therapy (CBT) has been widely researched and reported to be an evidence-based effective treatment approach for CSF. …”
    Get full text
    Article
  18. 121038

    Some Developments in the Field of Homological Algebra by Defining New Class of Modules over Nonassociative Rings by Asima Razzaque, Inayatur Rehman

    Published 2022-01-01
    “…Because of peculiar characteristics of LA-ring and its inception into noncommutative and nonassociative theory, drew the attention of many researchers over the last decade. In this study, the ideas of projective and injective LA-modules, LA-vector space, as well as examples and findings, are discussed. …”
    Get full text
    Article
  19. 121039

    ANALYSIS OF EKE – UNE: AN ECOCRITICISM APPROACH by EZE MABEL NKECHINYERE

    Published 2024-10-01
    “…The literary theory adopted by the researcher as a base for the study is ecocritism theories of Cheryll Glotefelly and Lawrence Bull in 1980 which sees to the relationship and interaction of nature in any given environment especially how they are represented in literary works. …”
    Get full text
    Article
  20. 121040

    Challenges for Novice Developers in Rough Terrain Rescue Robots: A Survey on Motion Control Systems by Branesh M. Pillai, Jackrit Suthakorn

    Published 2019-01-01
    “…Several researchers have revealed the huge potentials of rescue robots in disaster zones. …”
    Get full text
    Article