Showing 41 - 60 results of 64 for search '"second base"', query time: 0.08s Refine Results
  1. 41

    Cultural fit in emotion versus language: a study of Dutch-speaking Belgians and Turkish migrants in Belgium by Rüya Su Şencan, Batja Mesquita, Katie Hoemann, Katie Hoemann

    Published 2025-01-01
    “…We examined cultural fit in meaning-making in emotional contexts in two complementary ways: first, based on patterns of emotion endorsement (emotional fit), second, based on patterns of word use describing emotional situations (language fit). …”
    Get full text
    Article
  2. 42

    Unprotected and Unparticipation Mental Health in Regulation Worker by I Wayan Gde Wiryawan, Gede Agung Wirawan Nusantara, I Wayan Eka Artajaya, Rizozoda Tura Rabbim

    Published 2024-12-01
    “…The results of the research show that, first, mental health problems in Indonesia are very complex, starting from the negative stigma that is still embedded in society regarding mental health diagnoses to regulations and law enforcement that do not support workers with mental health to recover from their illnesses. Second, based on Singapore, Singapore has a program and legal framework that supports public health and workers who experience mental health disorders monitoring that has been integrated with the system. …”
    Get full text
    Article
  3. 43

    Chaos-Based Engineering Applications with a 6D Memristive Multistable Hyperchaotic System and a 2D SF-SIMM Hyperchaotic Map by Fei Yu, Shuai Qian, Xi Chen, Yuanyuan Huang, Shuo Cai, Jie Jin, Sichun Du

    Published 2021-01-01
    “…The double entropy source structure can realize a new PRNG that meets the security requirements, which can pass the NIST statistical test when the XOR postprocessing method is used. Secondly, based on the double entropy source structure, a new image encryption algorithm is proposed. …”
    Get full text
    Article
  4. 44

    Vehicle speed measurement method using monocular cameras by Hao Lian, Meian Li, Ting Li, Yongan Zhang, Yanyu Shi, Yikun Fan, Wenqian Yang, Huilin Jiang, Peng Zhou, Haibo Wu

    Published 2025-01-01
    “…Firstly, by establishing a new camera imaging model, the calibration method for variable focal lengths is optimized, simplifying the transformation process between the four coordinate systems in traditional camera imaging models, and the method does not need to restore the pixel coordinates to dedistortion. Secondly, based on the camera imaging model, a two-dimensional positioning algorithm is proposed. …”
    Get full text
    Article
  5. 45

    Optimization of Jamming Type Selection for Countering Multifunction Radar Based on Generative Adversarial Imitation Learning by Tianjian Yang, You Chen, Siyi Cheng, Xing Wang, Xi Zhang

    Published 2025-01-01
    “…Firstly, the agent learns from expert strategies to achieve high reward returns, avoiding wasted time from unguided exploration, thereby ensuring that the agent maintains a good jamming effect throughout its application process. Secondly, based on generative adversarial theory, the discriminator measures the difference between the generated and expert strategies. …”
    Get full text
    Article
  6. 46

    Power Improved Generalized Heronian Mean Operators Utilizing Hamacher Operations with Picture Fuzzy Information by Baolin Li, Lihua Yang

    Published 2021-01-01
    “…First, we introduce the Hamacher operations, the normalized hamming distance, and similarity measure of picture fuzzy numbers (PHNs). Second, based on these, two new picture fuzzy aggregating operators (AOs), the picture fuzzy Hamacher weighted power improved generalized Heronian mean (PFHWPIGHM) operator and the picture fuzzy Hamacher weighted geometric power improved generalized Heronian mean (PFHWGPIGHM) operator, are put forward, and some properties and special instances of proposed AOs are also investigated. …”
    Get full text
    Article
  7. 47

    Disease Identification of Lentinus Edodes Sticks Based on Deep Learning Model by Dawei Zu, Feng Zhang, Qiulan Wu, Wenyan Wang, Zimeng Yang, Zhengpeng Hu

    Published 2022-01-01
    “…First, a dataset of Lentinus edodes stick diseases was constructed. Second, based on the ResNeXt-50(32 × 4d) model and the pretraining weight of the ImageNet dataset, the influence of pretraining weight parameters on recognition accuracy was studied. …”
    Get full text
    Article
  8. 48

    Dynamic Modelling and Continuous Trajectory Tracking Control of Space Robots Based on Lie Group SE(3) by Yong Wang, Kejie Gong, Yurui Duan, Boyong He, Hong Ma

    Published 2023-01-01
    “…Firstly, the dynamics equations for a space robot in the joint space and workspace are established separately in the framework of Lie group SE(3) and screw theory based on the Lagrange principle. Secondly, based on the proposed feedback form, a PD (proportional derivative) control law of output force on the end-effector is designed, and a closed-loop continuous tracking control strategy is proposed using the force Jacobian matrix and the kinematic model. …”
    Get full text
    Article
  9. 49

    Elastodynamic modeling and analysis of a 4SRRR overconstrained parallel robot by B. Wang, Y. Zhao, C. Yang, X. Hu, Y. Zhao

    Published 2025-02-01
    “…The Lagrangian equation is then used to derive the dynamic control equations for the rods. Second, based on the theory of multipoint constraint elements and linear algebra, a set of independent displacement coordinates is established for the connection points between rods and the moving platform, rods and rods, and rods and the fixed platform. …”
    Get full text
    Article
  10. 50

    C-Arm Image-Based Surgical Path Planning Method for Distal Locking of Intramedullary Nails by Wei-En Hsu, Ching-Hsiao Yu, Chih-Ju Chang, Hung-Kang Wu, Tsong-Han Yu, Ching-Shiow Tseng

    Published 2018-01-01
    “…The last ten drilling test sets were completed successfully (with an average duration of 48 seconds). Based on the experimental results, the proposed algorithm was feasible for clinic applications.…”
    Get full text
    Article
  11. 51

    Leveraging Social Engineering Techniques for Ethical Purposes:  An Approach to Develop Fake Android App for Collecting Valuable Data Discreetly by Hussein Abdulkhaleq Saleh alsharya

    Published 2024-09-01
    “…The total estimated time to complete the fake UI process (cumulative user engagement time) is 57-60 seconds, where each activity takes 8 seconds based on the adopted development approach. …”
    Get full text
    Article
  12. 52

    Application of Gabor Image Recognition Technology in Intelligent Clothing Design by Sujuan Qiao

    Published 2021-01-01
    “…The calculation results are then combined to achieve the purpose of multicore parallel acceleration of the entire calculation process. Secondly, based on the consideration of improving the real-time performance of the intelligent clothing design system, combined with the existing multicore environment, this paper uses the intelligent model to design and implement the image parallel Gabor feature extraction algorithm and uses image processing and analysis technology to analyze the visual elements of traditional clothing and identify and quantify to form a relatively complete clothing visual element evaluation system, which provides a basis for large-scale collection and automated evaluation of clothing visual effects, as well as clothing trend tracking and prediction. …”
    Get full text
    Article
  13. 53

    Improved differential protection for two-terminal weak feed AC system considering negative sequence control coordination strategy by Junjie Hou, Qiangqiang Gao, Yanfang Fan, Guobing Song, Xiaofang Wu, Wentao Yang, Runbin Cao, Faxi Peng

    Published 2025-03-01
    “…On this basis, the adaptability of differential protection under TCS is analyzed, and the quantization function that can quantify the operation performance of differential protection is given. Secondly, based on the problem of the traditional negative sequence control strategy, an improved control strategy is introduced and the operation performance of differential protection under the improved control strategy is studied. …”
    Get full text
    Article
  14. 54

    A risk prediction score to identify patients at low risk for COVID-19 infection by Wui Mei Chew, Chee Hong Loh, Aditi Jalali, Grace Shi En Fong, Loshini Senthil Kumar, Rachel Hui Zhen Sim, Russell Pinxue Tan, Sunil Ravinder Gill, Trilene Ruiting Liang, Jansen Meng Kwang Koh, Tunn Ren Tay

    Published 2022-08-01
    “…Two prediction models were derived, the first based on age, presence of sore throat, dormitory residence, blood haemoglobin level (Hb), and total white blood cell counts (TW), and the second based on presence of headache, contact with infective patients, Hb and TW. …”
    Get full text
    Article
  15. 55

    Transient Characteristics and Operation Regulation of Grid‐Connected Variable Speed Pumped Storage‐Wind‐Solar Hybrid Power System by Yanhao Li, Fanchao Song, Wencheng Guo

    Published 2025-01-01
    “…Firstly, the model of grid‐connected VSPS‐wind‐solar HPS is established. Secondly, based on a calculating example, the transient characteristics of grid‐connected VSPS‐wind‐solar HPS are analyzed by using numerical simulation. …”
    Get full text
    Article
  16. 56

    Fire Retardancy Properties and Thermal Degradation of Three Timber Species Overlayed by Sengon Wood Charcoal by Joko Sulistyo, Sri Nugroho Marsoem, Tomy Listyanto, Yus Andhini Bhekti Pertiwi Bhekti Pertiwi

    Published 2020-07-01
    “…Teak, red meranti and pine timbers overlayed by CFR sheet from sengon charcoal were tested through feeding on fire for 1500 seconds based on ASTM E 6-02 method with a modification. …”
    Get full text
    Article
  17. 57

    Analisis Perbandingan Algoritma Djikstra, A-Star, dan Floyd Warshall dalam Pencarian Rute Terdekat pada Objek Wisata Kabupaten Dompu by Rusydi Umar, Anton Yudhana, Andi Prayudi

    Published 2021-03-01
    “…Dijkstra algorithm processing time is 0.0060 seconds, A* algorithm is 0.0067 and Floyd Warshall algorithm is 0.0433 seconds. Based on these results, Dijkstra is superior in the route search process. …”
    Get full text
    Article
  18. 58

    Equivalent method for DFIG wind farms based on modified LightGBM considering voltage deep drop faults by Xuecheng Liu, Peixiao Fan, Jun Yang, Song Ke, Binyu Ma, Yangzhou Pei, Jian Xu

    Published 2025-03-01
    “…The factors influencing the Crowbar action state and trip-off state of wind turbines are identified, and a feature vector for wind turbine operating states is constructed. Second, based on simulations to obtain sample data of wind turbine operating states under different operating scenarios in wind farms, a classification model based on mLightGBM is established. …”
    Get full text
    Article
  19. 59

    Coordinated frequency modulation strategy considering source–load uncertainty by Xiaohong Dong, Shuo Wang, Dengxin Ai, Yang Ma, Xiaodan Yu

    Published 2025-02-01
    “…The adjustable capacity of WTGs is determined based on the wind speed prediction error and the operation strategy of load reduction; Secondly, based on the controllable domain model of an EV considering the off-grid time uncertainty, the adjustable capacity of EV clusters is determined by state grouping of the state of charge (SOC) according to its charging urgency. …”
    Get full text
    Article
  20. 60

    Investigation on Influences of  Two Discrete Methods on Galloping Characteristics of Iced Quad Bundle Conductors by Xiaohui Liu, Guangyun Min, Chuan Wu, Mengqi Cai

    Published 2020-01-01
    “…One is to use a direct method to transform partial differential galloping equation into an ordinary differential galloping equation, while the other is to use an indirect method to transform partial differential galloping equation into an ordinary differential galloping equation. Secondly, based on the wind tunnel test, the three-component aerodynamic coefficients of each subconductor of the iced quad conductor are obtained, and the equivalent aerodynamic coefficients at the central axis of the quad bundle conductor are obtained by using a reasonable method. …”
    Get full text
    Article