Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
5421
Possibility-Based Sizing Method for Hybrid Electric Aircraft
Published 2025-01-01Subjects: Get full text
Article -
5422
Shape description based on axis of least inertia and chain
Published 2009-01-01“…The imaged could be seemed to the approximation of the polygons,so it was important to the image match that researched the polygon match method.It is based the combination of the axis of least inertia and the chain,this method was capable of preserving both contour as well as region information,and it utilized the degree of triangular membership which computed by the feature triangular to compute the similarity between the two objects.This method was invariant to image transformations,and robust to concave polygons.The experimental results show that this method’s performance and retrieval efficiency is well.…”
Get full text
Article -
5423
Smart Irrigation Controllers: Operation of Evapotranspiration-Based Controllers
Published 2009-04-01“…Dukes, Mary L. Shedd, and Stacia L. Davis, is part of the Smart Irrigation Controllers series. …”
Get full text
Article -
5424
Design of T-Shaped Micropump Based on Induced Charge Electroosmotic
Published 2013-01-01“…The fluid-driven efficiency of the micropump based on induced charge electroosmotic was studied by numerical simulation method. …”
Get full text
Article -
5425
Method of network slicing deployment based on performance-aware
Published 2019-08-01“…In order to deal with the performance degradation caused by resource contention due to the sharing of physical resources between VNF in the network slicing,a network slicing deployment method based on performance-awareness was proposed.When deploying network slice instances,first two-phase deployment that mapping virtual nodes was adopted,and then virtual links were mapped.In the virtual nodes mapping phase,the VNF performance influences factor was defined from the perspective of resource supply and demand to quantify the degree of VNF performance impact.Then the sum of the performance influence factors of all VNF on the deployable physical server was found in the network slice instance,the physical server with the smallest sum of performance influence factors was used as the mapping location,and the simulated annealing-discrete particle swarm algorithm was used to find the nodes mapping result.In the virtual links mapping phase,the shortest path algorithm was used to obtain the link mapping result.The simulation results show that the proposed method reduces the impact of other network slices on its own service performance.…”
Get full text
Article -
5426
Reliable Quantum Communications Based on Asymmetry in Distillation and Coding
Published 2024-01-01“…We address the problem through hybrid schemes that combine: indirect transmission based on teleportation and distillation, and direct transmission, based on quantum error correction (QEC). …”
Get full text
Article -
5427
Phishing attacks discovery based on HTML layout similarity
Published 2016-10-01“…Based on the similarity of the layout structure between the phishing sites and real sites,an approach to discover phishing sites was presented.First,the tag with link attribute as a feature was extracted,and then based on the feature,the page tag sequence branch to identify website was extracted,followed by the page layout similarity-HTMLTagAntiPhish,the alignment of page tag sequence tree into the alignment of page tag sequence branches was converted,this converted two-dimention tree structure into one-dimention string structure,and finally through the substitution matrix of bioinfor-matics BLOSUM62 coding,alignment score quickly to improve the phishing sites detection efficiency was computed.A series of simulation experiments show that this approach is feasible and has higher precision and recall rates.…”
Get full text
Article -
5428
Corrigendum to “Content Patterns in Topic-Based Overlapping Communities”
Published 2016-01-01Get full text
Article -
5429
Analyzing Chebyshev polynomial-based geometric circulant matrices
Published 2024-09-01Get full text
Article -
5430
Gear Fault Detection Based on Teager-Huang Transform
Published 2010-01-01“…Gear fault detection based on Empirical Mode Decomposition (EMD) and Teager Kaiser Energy Operator (TKEO) technique is presented. …”
Get full text
Article -
5431
-
5432
An overview of skin cancer classification based on deep learning
Published 2024-12-01“…Finally, some opportunities for skin cancer, such as data imbalance and limitation, generative adversarial network, various data sets, and data augmentation, are summarized.…”
Get full text
Article -
5433
-
5434
HASHING ALGORITHM BASED ON TWO-DIMENSIONAL CHAOTIC MAPPINGS
Published 2017-08-01Subjects: Get full text
Article -
5435
Statics Analysis on Safe Manipulator based on Torque Limiter
Published 2015-01-01“…And the ratio of the maximum isotropic force and the maximum achievable force is proposed as a safety performance index applied in redundant manipulator kinematics to perform tasks effectively. Finally,through the MATLAB algorithm programming,the simplicity and effectiveness of the method steps are verified by numerical examples,which provide a control theoretical basis for manipulator architecture and configuration to calibrate torque limiter.…”
Get full text
Article -
5436
Distributed Power Trading System Based on Blockchain Technology
Published 2021-01-01“…The traditional centralized power trading model has some problems, such as low data security and trust crisis of regulators. …”
Get full text
Article -
5437
-
5438
Transition-Based Techniques for Non-Projective Dependency Parsing
Published 2010-10-01“… We present an empirical evaluation of three methods for the treatment of non-projective structures in transition-based dependency parsing: pseudo-projective parsing, non-adjacent arc transitions, and online reordering. …”
Get full text
Article -
5439
REGULATION AND ROLLING QUALITY CONTROL ON THE BASIS OF STATISTICAL METHODS
Published 2009-05-01Get full text
Article -
5440
Deep Learning-Based Dzongkha Handwritten Digit Classification
Published 2024-03-01Get full text
Article