Showing 5,981 - 6,000 results of 67,915 for search 'DASB~', query time: 2.52s Refine Results
  1. 5981
  2. 5982

    Mamdani-Type Fuzzy-Based Adaptive Nonhomogeneous Synchronization by J. R. Pulido–Luna, J. A. López–Rentería, N. R. Cazarez–Castro

    Published 2021-01-01
    “…The aim of this work is the design of an adaptive controller based on Mamdani-type fuzzy inference systems. The input control is constructed with saturation functions’ fuzzy-equivalents, which works as the adaptive scheme of the controller. …”
    Get full text
    Article
  3. 5983
  4. 5984

    QUALITY ASSESSMENT OF STUDENT COURSEWORKS: COMPETENCY-BASED APPROACH by T. M. Shamsutdinova

    Published 2018-03-01
    “…The content analysis of the Federal State Educational Standard of the Highest Education (FSES HE), the data mining technology and statistical methods of data processing were applied in the course of the present research. …”
    Get full text
    Article
  5. 5985

    Host security assessment method based on attack graph by Hongyu YANG, Haihang YUAN, Liang ZHANG

    Published 2022-02-01
    “…In order to solve the problems of inaccurate calculation of host security value and ignoring host correlation in attack graph, a host security assessment method based on attack graph was proposed.First, the host attack graph was generated to quantify the atomic attack probability and the attack probability of the host was calculated from four perspectives, such as vulnerability itself, time, environment and operational system availability.Then, the host assets importance was calculated according to expert transcendental evaluation and correlation weighting method, and the topology importance of host was calculated according to the association relationship between hosts in attack graph.Finally, the host security value was calculated according to the impact value of host vulnerability, host importance and host attack probability.The experimental results show that the importance and security value of the proposed method accord with the real network situation and can reflect the security condition of the host more completely and accurately.The standard deviation of host safety value obtained by the proposed method is 0.078, which is larger than that obtained by other methods, indicating that the safety value obtained by the proposed method is more discrete and easier to distinguish the safety level from the subsequent risk disposal priority.…”
    Get full text
    Article
  6. 5986

    Learning-Based Spectrum Sensing for Cognitive Radio Systems by Yasmin Hassan, Mohamed El-Tarhuni, Khaled Assaleh

    Published 2012-01-01
    “…It is concluded that cyclostationary-based schemes are the most reliable in terms of detecting primary users in the spectrum, however, at the expense of a longer sensing time compared to coherent based schemes. …”
    Get full text
    Article
  7. 5987
  8. 5988

    SCMA codebook design based on resource block constellation by Xiaotao SHAO, Mingkun GUO, Wei YANG

    Published 2018-09-01
    “…Aiming at the problems of typical sparse code multiple access codebook design scheme based on multidimensional mother constellation that the complexity is high and the minimum Euclidean distance between constellation points on resource blocks is difficult to determine,a SCMA codebook design scheme based on resource block constellation was proposed.By converting the design of multidimensional mother constellation into the design of two-dimensional resource block constellation,the design complexity of constellation was reduced.And the codebook design scheme starting from resource block constellation could maximize the minimum Euclidean distance between constellation points on resource blocks,which was better than the design method in which user codebooks were obtained from multi-dimensional mother constellation.Simulation results show that the proposed SCMA codebook design scheme based on resource block constellation can significantly improve the BER performance of system compared with the typical codebook design scheme based on multidimensional mother constellation.…”
    Get full text
    Article
  9. 5989

    Research of survivability enhancement algorithm based on autonomous configuration by ZHANG Le-jun1, ZHOU Yuan2, GUO Lin1, WANG Wei1, YANG Yong-tian1

    Published 2007-01-01
    “…Based on redundancy and diversity,the method of enhancing system survivability was proposed by dynami-cally configuring atomic modules.According to the history average response time,survivability curves were drawn.The autonomous configuration algorithm was designed based on the survivability of atomic modules,system efficiency and quality of service.The contrast experiment validated the algorithm’s correctness and validity in the condition of atomic modules have different failure rate.The simulation confirmed that this algorithm can enhance the service survivability when atomic module under attack or be ageing…”
    Get full text
    Article
  10. 5990

    REMAINING USEFUL LIFE OF ROLLING BEARING BASED ON t⁃SNE by ZHONG JianHua, HUANG Cong, ZHONG ShunCong, XIAO ShunGen

    Published 2024-08-01
    “…Due to the limited bearing degradation data under actual working conditions,it is impossible to obtain enough degradation data to train the neural network,it is difficult to obtain good prediction results in the deep learning network,so a new fusion method was proposed.Firstly,the features of the original vibration signal was extracted,dozens of dimensional features were obtained through the ensemble empirical mode decomposition(EEMD)and the singular value decomposition(SVD),and the effective features such as kurtosis and mean value commonly used in remaining useful life prediction were added,then the decision tree to filter out 15⁃dimensional features was used the data was obtained by double exponential model fitting and the degraded signal was reduced to a linear trend through t⁃SNE.The linear degradation trend has better generalization in prediction than the exponential trend,and the prediction accuracy is superior to support veotor regression(SVR)and deep belief network(DBN)model.…”
    Get full text
    Article
  11. 5991
  12. 5992
  13. 5993
  14. 5994
  15. 5995

    La formación económica de la familia en textos de Europa central y Colombia en los siglos XV a XX: amas de casa, gobierno, cálculo y moral by Javier Sáenz-Obregón

    Published 2025-01-01
    “… Desde un abordaje de la familia como dispositivo privilegiado de formación y gobierno en la modernidad occidental, se examinan diferencias y regularidades en las prescripciones acerca de la formación de sujetos económicos en textos dirigidos a la familia en Europa y Colombia del siglo xv a la segunda década del xix. …”
    Get full text
    Article
  16. 5996

    Clasificación de estudiantes de nuevo ingreso a una universidad pública, con base en variables de desempeño académico, uso de tecnología digital y escolaridad de los padres by Javier Organista Sandoval, Lewis McAnally Salas, Patricio Henríquez Ritchie

    Published 2012-05-01
    “…Se aplicaron dos técnicas clasificatorias: CHAID y análisis de conglomerados para explorar la conformación de patrones con base en las variables antes mencionadas. …”
    Get full text
    Article
  17. 5997
  18. 5998

    Assessment of Two School-Based Programs to Prevent Universal Eating Disorders: Media Literacy and Theatre-Based Methodology in Spanish Adolescent Boys and Girls by Marisol Mora, Eva Penelo, Teresa Gutiérrez, Paola Espinoza, Marcela L. González, Rosa M. Raich

    Published 2015-01-01
    “…To evaluate the long-term effects of two school-based prevention programs administered to a universal mixed-sex sample of school-going adolescents on disturbed eating attitudes, aesthetic ideal internalization, and other eating disorder risk factors, when compared to a control group. …”
    Get full text
    Article
  19. 5999

    Estimating the Prevalence of Schizophrenia in the General Population of Japan Using an Artificial Neural Network–Based Schizophrenia Classifier: Web-Based Cross-Sectional Survey by Pichsinee Choomung, Yupeng He, Masaaki Matsunaga, Kenji Sakuma, Taro Kishi, Yuanying Li, Shinichi Tanihara, Nakao Iwata, Atsuhiko Ota

    Published 2025-01-01
    “…To address these issues, we previously developed an artificial neural network (ANN)–based schizophrenia classification model (SZ classifier) using data from a large-scale Japanese web-based survey to enhance the comprehensiveness of schizophrenia case identification in the general population. …”
    Get full text
    Article
  20. 6000

    Investigating the Structural Relationships of the Tendency to Addiction to Mobile Phone-Based Social Networks in Students, Based on Early Maladaptive Schemas Mediated by Alexithymia in Students by Pouria Moghimy, Forough Esrafilian, Hojjatollah Farahani

    Published 2024-12-01
    “…The aim of current research was to investigating structural relationships of addiction to mobile phone-based social networks in students, as influenced by early maladaptive schemas mediated by alexithymia. …”
    Get full text
    Article