Suggested Topics within your search.
Suggested Topics within your search.
- Entrepreneurship 5
- Management 5
- English language 4
- Business enterprises 3
- Economic development 3
- Industrial management 3
- Information technology 3
- Methodology 3
- Research 3
- Study and teaching 3
- Classroom environment 2
- Communication in education 2
- Effective teaching 2
- Elementary school teaching 2
- Hospitality industry 2
- Inquiry-based learning 2
- Interaction analysis in education 2
- Intercultural communication 2
- Internet in public administration 2
- Internet marketing 2
- Marketing 2
- Moral and ethical aspects 2
- Psychological aspects 2
- Psychology 2
- Public administration 2
- Public relations 2
- Rhetoric 2
- Social networks 2
- Sustainable development 2
- Technical writing 2
-
5941
Model split-based data privacy protection method for federated learning
Published 2024-09-01“…In addition, the leakage-restriction training strategy was proposed to further reduce data leaks. …”
Get full text
Article -
5942
PCPIR-V:parallel privacy protected algorithms for nearest neighbor query based on Spark
Published 2016-05-01“…To address the low-efficiency problem for query privacy protection on big data,parallel CPIR-V (PCPIR-V),which had a high level of privacy protection for nearest neighbor query,was presented and implemented based on spark.Two parallel strategies for PCPIR-V,Row strategy and Bit strategy,were proposed.To avoid redundant multiplications,the repeated products were cached based on a clustering technique while computing CPIR on Spark.According to the evaluation results of PCPIR-V on three datasets,the scalablity of PCPIR-V is good until the number of core is larger than 40.The cost of PCPIR-V with the method of caching partial multiplication results is reduced by 20% averagely.…”
Get full text
Article -
5943
Bacon et la méthode : la libération de l’invention
Published 2014-10-01“…I take such a claim to be mainly a rhetorical strategy aiming at preventing men from being satisfied with their present knowledge. …”
Get full text
Article -
5944
THE COMPETENCE-BASED FOCUSED FORMS OF ESTIMATION OF PROFESSIONAL FOREIGN-LANGUAGE COMMUNICATIVE COMPETENCE (CRITERIA ESTIMATION)
Published 2013-10-01“…It also contains a pedagogical strategy of developing criteria-referenced descriptors of performance assessment which serve as guidelines for teachers as well as a strategy of developing checking lists for students. …”
Get full text
Article -
5945
Study on the Composite Driving System of Dexterous Hand
Published 2017-01-01“…Aiming at the problems which perform in the traditional driving mode,for example,the complex structure of motor drive system,the large volume of hydraulic drive system,the difficult control of air pressure drive system,a composite driving system actuated by micro- motor and shape memory alloy( SMA) spring is proposed,then this system is applied to a humanoid multi- finger dexterous hand,the overall structure of the dexterous hand is simplified,and the control strategy gets optimized. The relation of the restoring force and displacement of the SMA spring is researched,then the relationships among knuckles movement and the influence factor on the contact force of grasping object are analyzed,by using the sliding mode PID intelligent control strategy,the movement of the finger is controlled,the control efficiency of dexterous hand is improved. …”
Get full text
Article -
5946
Robust Fractional-Order PID Controller Tuning Based on Bode’s Optimal Loop Shaping
Published 2018-01-01“…This paper presents a novel fractional-order PID controller tuning strategy based on Bode’s optimal loop shaping which is commonly used for LTI feedback systems. …”
Get full text
Article -
5947
Alberto Fujimori : le populisme de l’efficacité
Published 2005-09-01“…Throughout his successive terms of office, he developed a political strategy aimed at establishing his legitimacy. This strategy was based on the following measures: the setting up of a direct and almost emotional relationship with the most underprivileged classes through clientelist practices; the disintegration of the social fabric in order to prevent any opposition and strengthen the power of the Head of State; the instrumentalisation of certain groups, in particular via social programmes; lastly, the constant and ever-increasing control over information by keeping a close watch on the media and political opponents. …”
Get full text
Article -
5948
Defectology and inclusion
Published 2018-09-01“…In our opinion, the educational strategy as a “negative education” is a paradox to the overarching aim of inclusive education. …”
Get full text
Article -
5949
Proactive caching and personalized delivery mechanism of heterogeneous content for MAR applications in the Metaverse
Published 2024-10-01“…Specially, by introducing the personalized recommendation mechanism of foreground content, a differentiated delivery strategy of foreground content was designed. Simulation results show that the proposed mechanism outperforms NCPCR, CCS-AGP, and AIEC-RSC strategy in terms of cache hit rate, average response latency for foreground content and heterogeneous content.…”
Get full text
Article -
5950
Cost Analysis of Monitoring Asthma Treatment using Sputum Cell Counts
Published 2008-01-01“…BACKGROUND: In a four-centre trial, the use of sputum cell counts (sputum strategy [SS]) to guide treatment had resulted in fewer and less severe exacerbations without the need for a higher corticosteroid dose, compared with the use of symptoms and spirometry (clinical strategy [CS]).…”
Get full text
Article -
5951
Speech enhancement method based on multi-domain fusion and neural architecture search
Published 2024-02-01“…In order to further improve the self-learning and noise reduction ability of speech enhancement model, a speech enhancement method based on multi-domain fusion and neural architecture search was proposed.The multi-spatial domain mapping and fusion mechanism of speech signals were designed to realize the mining of real complex number correlation.Based on the characteristics of convolution pooling of the model, a complex neural architecture search mechanism was proposed, and the speech enhancement model was constructed efficiently and automatically through the designed search space, search strategy and evaluation strategy.In the comparison and generalization experiment between the optimal speech enhancement model and the baseline model, the two indexes of PESQ and STOI increase by 5.6% compared with the optimal baseline model, and the number of model parameters is the lowest.…”
Get full text
Article -
5952
Routing optimization based on topology control in satellite network
Published 2018-02-01“…A new double-layer satellite network model for space networking was established and a routing algorithm based on topology control (TCRA) was proposed considering the advantages of low earth orbit and stationary earth orbit satellite networks.This model used virtual node strategy and satellite grouping idea,which regarded the coverage area of each low earth orbit satellite as a virtual node.The network took into account the influence of the polar area on the division of the satellite footprints,such that the upper management satellites can accurately acquire the topology of the lower satellites.Using the improved virtual node strategy,the time slices were superior to other network models in quantity,length and other aspects.Based on the network topology,stationary earth orbit satellites calculate routing for low earth orbit satellites,while low earth orbit satellites were responsible for forwarding data.The simulation results show that the routing algorithm is superior to other algorithms in average end-to-end delay and packet loss rate.…”
Get full text
Article -
5953
CATHARE Assessment of Natural Circulation in the PKL Test Facility during Asymmetric Cooldown Transients
Published 2012-01-01“…The calculation results emphasize, mainly, the effect of the cooldown strategy, and the conditions that could lead to the occurrence of the NCI phenomenon.…”
Get full text
Article -
5954
A institucionalização da participação comunitária no SUS e a função imunitária do direito
Published 2016-01-01“…In its approximation to law, the focus of the community experience as a political strategy for struggle and institutionalization in the State has taken the path of negative immunization of the right to health by the State. …”
Get full text
Article -
5955
Optimum response scheme of intrusion detection based on information theory
Published 2020-07-01“…Intrusion detection system (IDS) often inevitably presents major security risks caused by FPs and FNs.However,at present,an effective solution has not been found.In order to solve this problem,an optimal response model of intrusion detection based on information theory was proposed.Firstly,the intruder and IDS in the process of intrusion detection were abstracted into random variables,and the attack and defense model of intruder and IDS was constructed according to the results of the confrontation.Secondly,the defense channel of IDS was designed according to the attack and defense model,then the correct detection of IDS was transformed into the problem of successful transmission of 1 bit information in defensive channel.Finally,the defensive capability of the system was measured by analyzing the channel capacity of the defensive channel,the maximum mutual information of the defensive channel was the defensive limit capability of the IDS,and the corresponding strategy distribution was the optimal response strategy of the defensive capability of the system.The experimental results show that the scheme can effectively reduce the loss caused by FPs and FNs.…”
Get full text
Article -
5956
Physical layer security performance of SWIPT system in the presence of randomly located eavesdroppers
Published 2020-05-01“…The locations of the eavesdroppers have serious impact on the physical layer security performance of simultaneous wireless information and power transfer (SWIPT) systems with transmit antenna selection (TAS) and power split (PS) strategy,which can be considered to be modeled as Poisson point process (PPP).The closed-form expressions for secrecy outage probability (SOP) of SWIPT system with TAS and PS strategy under non-colluding and colluding eavesdropping scenarios were derived by using probability generation function of PPP,respectively.Numerical and simulation results show that,the larger the number of transmit antennas,the smaller the distance between the transmitter and the information receiver,and the smaller the PS factor,the smaller SOP of SWIPT system under non-colluding and colluding eavesdropping scenarios.Colluding eavesdropping will further deteriorate the physical layer security performance of SWIPT systems.…”
Get full text
Article -
5957
CATALYSTS AND INHIBITORS OF POLITICAL CAREER IN RUSSIA
Published 2020-02-01“…Studying the basic principles of the political elite formation in Russia is the cornerstone for understanding the country’s future strategy and its development vector, since the development strategy will depend on those people who will be at the helm of the country’s governance. …”
Get full text
Article -
5958
Research on the multiuser MIMO linear cooperative spectrum sensing in cognitive radio networks
Published 2012-02-01“…The multiuser MIMO based linear cooperative spectrum sensing problem was investigated in cognitive radio system to improve the reliability of spectrum sensing.Both the local spectrum detecting strategy and global spectrum detecting strategy for multiuser MIMO based linear cooperative spectrum sensing system were derived.Then the optimization model that the different weights assigned on the receive signals of each user at the fusion center for global decision were optimized to maximize the detection probability given a targeted probability of false alarm is established.Furthermore,genetic algorithm (GA) was introduced to find the optimal weight vector of the above-mentioned cooperative spectrum sensing problem,with the purpose of reducing the sensing time in the spectrum sensing process.The simulation results show that,the reliability of spectrum sensing in cooperative spectrum sensing system can be efficiently enhanced with multiple antennas.Besides,the proposed GA method is efficient and stable,and achieves better detection performance when compared with the existing methods.…”
Get full text
Article -
5959
La séduction et l’idéologie : sémantique, syntaxe, argumentation
Published 2017-12-01“…In this instance, seduction is a rhetorical battle between logos and pathos.Studying the vocabulary of wine tasting, then other fields with more of an ideological stake, such as antisemitism, the article will show how political activism enlists seductive values as a strategy to win the audience over.The article will stress the role of incantatory importance of ‘word ethos’ and will develop the concept of hypostello, to mean a rhetorical strategy of hiding one’s intentions. …”
Get full text
Article -
5960
Energy Sharing and Performance Bounds in MIMO DFRC Systems: A Trade-Off Analysis
Published 2024-01-01“…We analyze the properties of the performance bound and the corresponding waveform design strategy to achieve the bound. When the downlink user and the radar target meet certain conditions, we obtain analytical expressions for the bound and the corresponding waveform design strategy. …”
Get full text
Article