Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
4481
Digital sociology: theoretical and methodological origins and bases
Published 2019-02-01“…The emphasis is made on the presentation of “social information theories” as the basis of digital sociology, while applying an evolutionary approach.…”
Get full text
Article -
4482
Lightweight attention-based SAR ship detector
Published 2024-12-01“…Therefore, a lightweight attention-based ship detector (LASD) was proposed. A novel linear hybrid attention module was designed which extracted potential ship features from deep-level space by using global channel attention and local spatial attention. …”
Get full text
Article -
4483
Evidence-based economic policy at the regional level
Published 2024-01-01“…This article revisits approaches to regional development by exploring both previously proposed and new policy opportunities for regions facing the greatest challenges in adapting to emerging geo-economic conditions. This revision is based on the methodology of comparative analysis of discrete structural (institutional) alternatives – an essential component for ensuring the necessary evidential level in selecting economic policy instruments, complementing other applied research tools. …”
Get full text
Article -
4484
Modal Analysis of Gearbox based on the Method of ERA
Published 2015-01-01“…Based on the method of ERA,a system of modal analysis is built,the model of HW25505 TCL gearbox is set up under the Coinv DASP MAS modal analysis module.The relating modal datum are obtained by hammering test of single-input multi- output analysis method,then the state-space equation is established after the analysis of modal datum.The various modal parameters of the gearbox are obtained by order selection and fitting of the datum which extracted through the method of ERA modal parameter identification,and by using modal correlation matrix,the modal test and verification are carried out.Through the comparison with calculating modal,the validity and reliability are proved.The theoretical basis for the improvement of the gear box structure characteristics and the fault diagnosis of gearbox is provided.…”
Get full text
Article -
4485
The Implementation of Contrastive Analysis-Based Arabic Learning
Published 2018-12-01“…Method of this study covers finding data and sources related to the contrastive analysis in Arabic learning; analyzing the data as well as the sources; and drawing conclusion. …”
Get full text
Article -
4486
Network traffic monitoring based on CNN-SVM
Published 2025-01-01“…This paper uses CNN to extract features from network traffic data. CNN has the ability to recognize intricate patterns in the data and automatically extract valuable characteristics from the raw data. …”
Get full text
Article -
4487
Multifocality in gallbladder cancer: An imaging-based study
Published 2024-09-01Get full text
Article -
4488
Hydrolysis and Hydrazinolysis of Isatin-Based Ald- and Ketazines
Published 2015-01-01Get full text
Article -
4489
Blind signature scheme based on entangled quantum
Published 2016-02-01“…Based on the principle of quantum entanglement swapping, a blind signature scheme based on quantum entanglement was proposed.Through being entangled and exchanged, particles prepared before could transform into entangled state. …”
Get full text
Article -
4490
Structure of campus network based on reconfigurable architecture
Published 2013-09-01“…Because of the petrifaction of the existing network,it is difficult to achieve the controllability,adaptability and expansibility in current structure.Simultaneously,in order to have better campus network services in teaching,researching and studying,a new structure based on reconfigurable architecture for campus network was designed based on service set handling capacity of various kinds of business in reconfigurable network as the central idea.After the evolution from tradition to flat structure,a more condensed structure was proposed by adopting virtualization technology on switches and routers.It has the advantages of high performance,high reliability,manageability and augmentability.…”
Get full text
Article -
4491
Recent Progress in Polymer-Based Building Materials
Published 2020-01-01“…In this paper, polymer-based building materials are introduced with three classes according to the applications, that is, substrates, coatings, and binders, and their recent signs of progress in the preparations and applications are carefully demonstrated.…”
Get full text
Article -
4492
On geometric bases for quantum A-polynomials of knots
Published 2025-01-01“…To avoid overloading of the presentation, only the case of the colored Jones polynomial for the trefoil knot is considered, though various generalizations are straightforward. …”
Get full text
Article -
4493
Botnet detection based on generative adversarial network
Published 2021-07-01“…In order to solve the problems of botnets’ strong concealment and difficulty in identification, and improve the detection accuracy of botnets, a botnet detection method based on generative adversarial networks was proposed.By reorganizing the data packets in the botnet traffic into streams, the traffic statistics characteristics in the time dimension and the traffic image characteristics in the space dimension were extracted respectively.Then with the botnet traffic feature generation algorithm based on generative adversarial network, botnet feature samples were produced in the two dimensions.Finally combined with the application of deep learning in botnet detection scenarios, a botnet detection model based on DCGAN and a botnet detection model based on BiLSTM-GAN were proposed.Experiments show that the proposed model improves the botnet detection ability and generalization ability.…”
Get full text
Article -
4494
Convert communication. A relevance-based approach.
Published 2011-04-01“… El objetivo fundamental de este trabajo es ofrecer un análisis de la noción de comunicación encubierta desde el marco teórico de la Teoría de la Pertinencia. …”
Get full text
Article -
4495
A senses-based model for experiential tourism
Published 2018-10-01“…This paper discusses the case of a multisensory criteria model applied to the tourism destination of Fiesole, Italy. …”
Get full text
Article -
4496
Rule and perception based MAC protocol for UAN
Published 2022-02-01“…Aiming at the problem of low channel utilization and network throughput resulted by RTS/CTS handshakes in the conventional media access control (MAC) protocol for underwater acoustic network (UAN), a rule and perception based (RP-MAC) MAC protocol was proposed to avoid packet collision in underwater acoustic networks.Only when the designated receiving node was neither in sending nor receiving state, and other neighboring nodes were not in receiving state, a sending node could send one or more packets to the receiving node, which avoided the interaction of handshake control packets while reducing collision and retransmission.The status of the neighbor nodes was sensed according to the channel rules and the fields from the packets overheard.Theoretical analysis and simulation experiments show that the performance of RP-MAC protocol outperforms the Slotted FAMA and R-MAC protocol in terms of throughput and energy-consumption.…”
Get full text
Article -
4497
Network slicing architecture based on SDN and NFV
Published 2016-11-01“…The traditional network architecture has some problems such as closed rigid structure,highly restricted data forwarding performance,and low utilization rate of resources,which can't meet the diverse services' requirements.In order to solve these problems,the concept of network slice was introduced.A novel network architecture for future mobile communication was proposed,which is based on network function virtualization(NFV)and software defined networking(SDN).This new network architecture can provide personalized network services to users based on third-party needs,share and isolate of network resources,the cost of a large number of operators was saved in terms of infrastructure.…”
Get full text
Article -
4498
Multichannel Saliency Detection Based on Visual Bionics
Published 2020-01-01“…The proposed method works within a complexity of O(N), and the experimental results show that our algorithm based on visual bionics effectively suppress the interference of similar or complex background and has high accuracy and stability.…”
Get full text
Article -
4499
-
4500
Malware prediction technique based on program gene
Published 2018-08-01“…With the development of Internet technology,malicious programs have risen explosively.In the face of executable files without source,the current mainstream malware detection uses feature detection based on similarity,with lack of analysis of malicious sources.To resolve this status,the definition of program gene was raised,a generic method of extracting program gene was designed,and a malicious program prediction method was proposed based on program gene.Utilizing machine learning and deep-learning algorithms,the forecasting system has good prediction ability,with the accuracy rate of 99.3% in the deep-learning model,which validates the role of program gene theory in the field of malicious program analysis.…”
Get full text
Article