Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
5921
Intersection-based geographical perception routing protocol in VANET
Published 2017-01-01“…In order to solve the problem of the communication performance of degradation,which caused by multi-intersections in city environment and no sensitivity to individual node movements,an intersection-based geographical perception routing protocol in vehicular Ad Hoc network was proposed.The network gateways select road intersections to form the backbone of the route,ensuring a high probability of communication and meeting delay and bit error rate requirements.Mathematical formula of the average delay and the average number of hops were obtained on the basis of a two-way road model.Simulation results show that the transmission delay of IGPR is smaller,the number of hops of IGPR is less,and the communication performance of IGPR is better compared with the FRGR protocols and VRR protocols.…”
Get full text
Article -
5922
New Iterative Method Based on Laplace Decomposition Algorithm
Published 2013-01-01Get full text
Article -
5923
Resource- Based Conflict and Rural Poverty in Benue State
Published 2023-09-01“…Consequently, the struggle over some of these resources in the region especially agricultural land and water resources between Farmers and Pastoralists in the last two decades has led to a sustained violent conflict in the area leading to a large displacement of farmers, damage to infrastructure, institutions, production and brake up of communities and social networks therefore exacerbating poverty in the region. …”
Get full text
Article -
5924
Simultaneous Pose and Correspondence Estimation Based on Genetic Algorithm
Published 2015-11-01“…In this paper, we derive a novel method which estimates the initial value based on genetic algorithm, considering the influences of different initial guesses comprehensively. …”
Get full text
Article -
5925
Vulnerability Analysis of CSP Based on Stochastic Game Theory
Published 2016-01-01“…With the development of industrial informatization, the industrial control network has gradually become much accessible for attackers. …”
Get full text
Article -
5926
Hadoop-Based Distributed Sensor Node Management System
Published 2014-03-01“…It offers various efficient ways for collecting sensor data and managing multiple sensor nodes by launching specific mapreduce applications on sensor nodes which upload data of sensor nodes to DFS and retrieve sensor data periodically from DFS. …”
Get full text
Article -
5927
Exploiting Attitude Sensing in Vision-Based Navigation for an Airship
Published 2009-01-01“…An Attitude Heading Reference System (AHRS) is used to compensate for rotational motion, facilitating vision-based navigation above smooth terrain by generating virtual images to simulate pure translation movement. …”
Get full text
Article -
5928
Reconstruction of BLP model based on secure subject access
Published 2007-01-01Get full text
Article -
5929
Improved rule-based backward fuzzy reasoning algorithm
Published 2008-01-01Subjects: Get full text
Article -
5930
DDCC-Based Quadrature Oscillator with Grounded Capacitors and Resistors
Published 2009-01-01Get full text
Article -
5931
Attribute-based lightweight reconfigurable access control policy
Published 2020-02-01“…Aiming at the severe challenges of access control policy redundancy and conflict detection,the efficiency of access control policy evaluation in complex network environment,an attribute-based lightweight reconfigurable access control policy was proposed.Taking the attribute-based access control policy as an example,the attribute-based access control policy was divided into multiple disjoint atomic access control rules according to the operation type,subject attribute,object attribute,and environment attribute in the access control policy.Complex access control policies were constructed through atomic access control rules and an algebraic expression formed by AND,OR logical relationships.A method for redundancy and collision detection of atomic access control rules was proposed.A method was proposed for decompose a complex access control policy into equivalent atomic access control rules and an algebraic expression.The method for redundancy and collision detection of complex access control policies were proposed through redundancy and collision detection of equivalent atomic access control rules and algebraic expressions.From time complexity and space complexity,the efficiency of the equivalent transformation access control policy was evaluated.It showes that the reconstruction method for access control policy greatly reduces the number,size and complexity of access control policy,improves the efficiency of access control policy redundancy and collision detection,and the efficiency of access control evaluation.…”
Get full text
Article -
5932
Augmented Reality based Gamified Mandarin Learning Application
Published 2024-11-01“…Unfortunately, many children become bored and unwilling to learn Mandarin because Mandarin has a complex language structure, starting from writing, pronunciation, and grammar. …”
Get full text
Article -
5933
Intelligent Fault Diagnosis Based on Vibration Signal Analysis
Published 2017-01-01Get full text
Article -
5934
An IDM-Based Approach for Information Requirement in Prefabricated Construction
Published 2020-01-01“…This paper extends the IFC data model to support prefabricated construction. …”
Get full text
Article -
5935
Retracted: Community Governance Decision Based on Knowledge Map
Published 2023-01-01Get full text
Article -
5936
Stress Analysis of Cup Flexspline based on Different Model
Published 2017-01-01“…In view of the stress of flexspline calculated on the basis of the theory of thin-walled cylinder,there are many assumptions of the theory,which will lead to the difference between the calculated value and the actual value. …”
Get full text
Article -
5937
Network-Based Bag-of-Words Model for Text Classification
Published 2020-01-01“…The rapidly developing internet and other media have produced a tremendous amount of text data, making it a challenging and valuable task to find a more effective way to analyze text data by machine. …”
Get full text
Article -
5938
BASED ON IMPROVED ACO WELDING JOINT OPTIMIZATION ANALYSIS
Published 2016-01-01“…The method to establish the T-type pipe ring joint welding simulation,and analyzes its corresponding welding path respectively,the results show that compared with the traditional ant colony algorithm,based on improved ant colony algorithm of welding path not only saves time resources,and reduce the waste of wire material. …”
Get full text
Article -
5939
Multisensor Based Neutral Function Identification of Solenoid Valve
Published 2014-04-01“…The detection system learns to detect the change of output pressure of multipoints that represent a more complicated task. Linear correlation analysis is introduced for feature extraction, which allows for a significant reduction in the dimension of original data without compromising the change detection performance. …”
Get full text
Article -
5940
Study on the microstructures of SLM IN718 based on solidification model
Published 2024-12-01Subjects: Get full text
Article