Showing 6,541 - 6,560 results of 20,519 for search '"standardization"', query time: 0.36s Refine Results
  1. 6541

    A Hybrid Model of Extreme Learning Machine Based on Bat and Cuckoo Search Algorithm for Regression and Multiclass Classification by Qinwei Fan, Tongke Fan

    Published 2021-01-01
    “…Extreme learning machine (ELM), as a new simple feedforward neural network learning algorithm, has been extensively used in practical applications because of its good generalization performance and fast learning speed. However, the standard ELM requires more hidden nodes in the application due to the random assignment of hidden layer parameters, which in turn has disadvantages such as poorly hidden layer sparsity, low adjustment ability, and complex network structure. …”
    Get full text
    Article
  2. 6542

    Banco de dados geoespaciais: padronização e avaliação como suporte à Inteligência Territorial by Silvio Braz de Sousa, Daniel Carlos Alves Santos

    Published 2023-10-01
    “…The approach to different thematic areas in the context of territorial planning and management requires not only the synergy of actions but also the availability of access to organized and standardized data through databases, thus constituting an essential tool for the promotion and effective response to demands. …”
    Get full text
    Article
  3. 6543

    Research on SSB 1+X beam technology of 5G network by Bei LI, Yuhua HU, Xinyan WANG, Guoping XU, Guanghai LIU, Tian XIAO, Chen CHENG, Yi LI

    Published 2022-01-01
    “…Beam scanning and spatial dimensions in 5G was introduced in the 3GPP standard.When UE connects gNodeB, gNodeB uses SSB beam rotation to detect the optimal beam of UE.After UE was connected, the CSI-RS configuration information could be obtained and the CSI could be normal feedback,gNodeB adopted the optimal beam transmitted by the CSI-RS beam in turn.5G antennas flexibly configure the number of beams and take into account coverage in both horizontal and vertical dimensions.The development of broadcast beams and the horizontal 7 beams facing challenges were presented, the horizontal 7 beam and 1+X beam schemes were analyzed.Finally, efficiency was presented.…”
    Get full text
    Article
  4. 6544

    Provably secure secret sharing scheme based on bilinear maps by LI Hui-xian1, PANG Liao-jun2

    Published 2008-01-01
    “…A method to construct provable secure secret sharing scheme using bilinear pairing was recommended.Firstly,the semantic security definition for secret sharing scheme is given,which is developed from the standard definition of semantic security for the public key cryptosystems.Then,a new secret sharing scheme based on the bilinear maps is pro-posed,with its correctness,security and performance analyzed and proven subsequently.Compared with the existing schemes,the proposed scheme is provably secure.At the same time,the proposed scheme departs the private key compu-tation of participants from the secret distribution process and the dealer does not have to securely save each participant’s private key,which makes this scheme more secure and more efficient.Therefore,the proposed scheme is more applicable than the existing ones.…”
    Get full text
    Article
  5. 6545

    THE COMPETENCY BASED APPROACH IN PROFESSIONAL EDUCATION, OR IN CONTRADICTION WITH LABOR SCIENCE by V. Serov

    Published 2019-11-01
    “…In light of this and in the light of the ongoing work on the development of professional standards in all sectors of production and the economy, the competency-based approach implemented by the Ministry of Science and Higher Education of the Russian Federation in higher professional education has been analyzed. …”
    Get full text
    Article
  6. 6546

    Volunteer Training Series: Recognizing Young People by Georgene Bender, Tracy Tesdall, Judith Levings

    Published 2016-02-01
    “…This 5-page fact sheet discusses recognition of participation, progress toward goals, standards of excellence, peer competition, and cooperation in the context of 4-H Clubs. …”
    Get full text
    Article
  7. 6547

    Enhancing analog Unruh effect via superradiance in a cylindrical cavity by Hong-Tao Zheng, Xiang-Fa Zhou, Guang-Can Guo, Zheng-Wei Zhou

    Published 2025-01-01
    “…Our analysis demonstrates that the integration of a cylindrical cavity, coherent light excitation, and multiatom superradiation significantly enhances the signal strength, as the radiation rate associated with the standard rotating-wave coupling can be greatly suppressed within the cavity. …”
    Get full text
    Article
  8. 6548

    IMPROVE AUDIT REPORTING BY ANALYZING THE LIQUIDITY OF THE AUDITED ENTITY by S. Ponomareva

    Published 2018-05-01
    “…Focusing on the prospects of applying the international standard of audit 520 «Analytical procedures», in the framework of assessing the financial situation, the author determines that the organization’s audit planning system should be based on personal observations of the auditor, audit data of previous years, budget data, planning and actual calculations. …”
    Get full text
    Article
  9. 6549

    First-Aid System for Marathon Athletes Based on Telemedicine Technology by Caixia Chen, Shuai Liu

    Published 2022-01-01
    “…With the emphasis on sports in the region and the improvement of people’s living standards, more and more people participate in various sports and activities including marathon, so that more and more cities are hosting or even vying for it. …”
    Get full text
    Article
  10. 6550

    RESEARCH ON MEASUREMENT TECHNOLOGY OF CAPTO SHANK’S KEY DIMENSIONS USED IN HIGH SPEED MACHINING by ZHANG Jin, WANG ShuLin, SHI XiangYun, ZHOU YiJun

    Published 2019-01-01
    “…In order to accomplish accurate measurement for Capto shank’s key dimensions, based on analyzing Standard ISO detailedly measurement parameters were determined and measurement system for Capto shank was designed. …”
    Get full text
    Article
  11. 6551

    Field Production of Palms by Timothy K. Broschat, Alan W. Meerow, Jack Miller

    Published 2013-05-01
    “…When dug and tied properly, many more palms can be loaded into a standard shipping container than could similarly sized trees. …”
    Get full text
    Article
  12. 6552

    An investigation on perceived constraints of teachers in relation to leisure activities by Adnan Ersoy, Halil Bisgin, Umit Dogan Ustun

    Published 2017-08-01
    “…To analyze the data in addition to descriptive statistics such as mean and standard deviation, Mann Whitney U was used. According to findings of the study while "time" was found to be the most important factor, "lack of interest" was found to be the least important factor as leisure constraints for all participants jointly. …”
    Get full text
    Article
  13. 6553

    Abuso e repressão: fibras do mesmo fio na infância das meninas de Helena Parente Cunha by Lílian Almeida de Oliveira Lima

    Published 2015-01-01
    “…The narrative production of Brazilian writer Helena Parente Cunha is marked by the presence of female characters and the questioning of this universe, shaking structures and hegemonic standards. Young and adult women are the main characters of her plots, but the girls also take part in the complaint about the pain and the oppression imposed by culturally - established patterns. …”
    Get full text
    Article
  14. 6554

    Optimal configuration algorithm for static segment of FlexRay by Yong XIE, Ren-fa LI, Hua-bin RUAN, Xin PENG

    Published 2012-11-01
    “…FlexRay,which could provide high data bandwidth,time determinism and reliability,was recognized as the standard of the next generation automotive buses,but the complexity of the configuration hindered its wide application in automotive electronics systems.Slot ID assignment of static segment was the key part of its configuration.Started from the system-level point of view,a new system-level scheduling unit model was defined.Based on confining the iable slot IDs and analyzing delay for each scheduling unit,a branch and bound-based searching was carried on to search the optimal slot ID assignment plan that realized the minimization of system’s end-to-end delay.Both theoretical proving and experimental results show that the slot ID assignment method is optimal in optimizing system’s end-to-end delay.…”
    Get full text
    Article
  15. 6555

    Development and Validation of a Complete GATE Model of the Siemens Inveon Trimodal Imaging Platform by Sanghyeb Lee, Jens Gregor, Dustin Osborne

    Published 2013-10-01
    “…The PET modality was validated using the NEMA NU-4 standard. Validations of SPECT and CT modalities were based on assessment of model accuracy compared to published and empirical data on the platform. …”
    Get full text
    Article
  16. 6556

    Influence of Long-Distance Transportation on Concrete Temperature in Hot Regions and Corresponding Prevention and Control Measures by XIE Ji'an, SHI Chengxiang

    Published 2023-01-01
    “…The temperature increment during long-distance transportation of concrete in a high-temperature environment is the key difficulty in mass concrete construction and one of the key factors affecting whether the pouring temperature reaches the standard.Against the background of the right bank project of Datangxia Gorge as well as the problem of over temperature in long-distance horizontal transportation during on-site concrete construction,this study makes transformations such as vehicle insulation and stratification.The statistical analysis of the outlet temperature and warehousing temperature tests shows that the temperature increment of concrete during long-distance transportation can be minimized with these transformations,and the average temperature increment is lower than 2 ℃ during high-temperature transportation.The relevant transformation technologies can provide a basis and technical support for concrete construction in a high-temperature environment.…”
    Get full text
    Article
  17. 6557

    Topology of black hole phase transition in JT gravity by Hemant Rathi, Dibakar Roychowdhury

    Published 2025-02-01
    “…We identify these black hole solutions as “topological defects” in the thermodynamic phase space and calculate the associated topological numbers following the standard procedure. We confirm the robustness of our model by estimating perturbative corrections to the bulk free energy at an arbitrary order in the Yang-Mills coupling. …”
    Get full text
    Article
  18. 6558

    Anisotropic cosmology in q-deformed entropic gravity by Salih Kibaroğlu, Mustafa Senay

    Published 2025-03-01
    “…The q-deformed theory, rooted in quantum group structures, provides a natural generalization of classical particle dynamics and offers a useful framework for exploring deviations in standard cosmological models. By incorporating the principles of entropic gravity, which conceptualize gravity as an emergent entropic force, we derive the dynamical equations governing the Bianchi type-I anisotropic model influenced by q-deformation. …”
    Get full text
    Article
  19. 6559

    The antimicrobial susceptibility of ornithobacterium rhinotracheale isolates by Osman Erganiş, H. Hüseyin Hadimli, Kürşat Kav, Zafer Sayın

    “…<p> <b>Materials and Methods:</b> The total of 28 isolates (2 layer pullets, 5 broilers, 21 turkeys and 2 standard strains) of O. rhinotracheale were tested. …”
    Get full text
    Article
  20. 6560

    Design of campus comprehensive access management platform by Cai-e XU, Feng XU, Xiao-hua LI, Dong-ming LU, Yan-qi CHENG

    Published 2013-09-01
    “…Considering access control with more card,scattered access flow data and poor scalabiliby in current unirersity building multi-system,the campus integrated access management platform triple frame design with the core of perception layer,transport layer and application layer was proposed.Campus card access control applications based on a unified data processing were realized,by method of Media and unified campus card authorization,implementing hierarchical managementand access networking,comprehensively regulate access standards and centralized storage of data water.The design not only facilitates the management of school access control applications,but also carries out data mining based access control and lay the foundation for leadership decision-making support.…”
    Get full text
    Article