Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
5981
ON NECESSITY OF DEVELOPMENT OF ECOLOGICAL BINDING MATERIALS AND BLENDS ON THEIR BASIS
Published 2013-11-01Get full text
Article -
5982
Mamdani-Type Fuzzy-Based Adaptive Nonhomogeneous Synchronization
Published 2021-01-01“…The aim of this work is the design of an adaptive controller based on Mamdani-type fuzzy inference systems. The input control is constructed with saturation functions’ fuzzy-equivalents, which works as the adaptive scheme of the controller. …”
Get full text
Article -
5983
Anonymization algorithm based on time density for data stream
Published 2014-11-01Subjects: Get full text
Article -
5984
QUALITY ASSESSMENT OF STUDENT COURSEWORKS: COMPETENCY-BASED APPROACH
Published 2018-03-01“…The content analysis of the Federal State Educational Standard of the Highest Education (FSES HE), the data mining technology and statistical methods of data processing were applied in the course of the present research. …”
Get full text
Article -
5985
Host security assessment method based on attack graph
Published 2022-02-01“…In order to solve the problems of inaccurate calculation of host security value and ignoring host correlation in attack graph, a host security assessment method based on attack graph was proposed.First, the host attack graph was generated to quantify the atomic attack probability and the attack probability of the host was calculated from four perspectives, such as vulnerability itself, time, environment and operational system availability.Then, the host assets importance was calculated according to expert transcendental evaluation and correlation weighting method, and the topology importance of host was calculated according to the association relationship between hosts in attack graph.Finally, the host security value was calculated according to the impact value of host vulnerability, host importance and host attack probability.The experimental results show that the importance and security value of the proposed method accord with the real network situation and can reflect the security condition of the host more completely and accurately.The standard deviation of host safety value obtained by the proposed method is 0.078, which is larger than that obtained by other methods, indicating that the safety value obtained by the proposed method is more discrete and easier to distinguish the safety level from the subsequent risk disposal priority.…”
Get full text
Article -
5986
Learning-Based Spectrum Sensing for Cognitive Radio Systems
Published 2012-01-01“…It is concluded that cyclostationary-based schemes are the most reliable in terms of detecting primary users in the spectrum, however, at the expense of a longer sensing time compared to coherent based schemes. …”
Get full text
Article -
5987
ECONOMIC SECURITY OF A TECHNICAL UNIVERSITY: CONCEPTUAL BASES
Published 2016-12-01Get full text
Article -
5988
SCMA codebook design based on resource block constellation
Published 2018-09-01“…Aiming at the problems of typical sparse code multiple access codebook design scheme based on multidimensional mother constellation that the complexity is high and the minimum Euclidean distance between constellation points on resource blocks is difficult to determine,a SCMA codebook design scheme based on resource block constellation was proposed.By converting the design of multidimensional mother constellation into the design of two-dimensional resource block constellation,the design complexity of constellation was reduced.And the codebook design scheme starting from resource block constellation could maximize the minimum Euclidean distance between constellation points on resource blocks,which was better than the design method in which user codebooks were obtained from multi-dimensional mother constellation.Simulation results show that the proposed SCMA codebook design scheme based on resource block constellation can significantly improve the BER performance of system compared with the typical codebook design scheme based on multidimensional mother constellation.…”
Get full text
Article -
5989
Research of survivability enhancement algorithm based on autonomous configuration
Published 2007-01-01“…Based on redundancy and diversity,the method of enhancing system survivability was proposed by dynami-cally configuring atomic modules.According to the history average response time,survivability curves were drawn.The autonomous configuration algorithm was designed based on the survivability of atomic modules,system efficiency and quality of service.The contrast experiment validated the algorithm’s correctness and validity in the condition of atomic modules have different failure rate.The simulation confirmed that this algorithm can enhance the service survivability when atomic module under attack or be ageing…”
Get full text
Article -
5990
REMAINING USEFUL LIFE OF ROLLING BEARING BASED ON t⁃SNE
Published 2024-08-01“…Due to the limited bearing degradation data under actual working conditions,it is impossible to obtain enough degradation data to train the neural network,it is difficult to obtain good prediction results in the deep learning network,so a new fusion method was proposed.Firstly,the features of the original vibration signal was extracted,dozens of dimensional features were obtained through the ensemble empirical mode decomposition(EEMD)and the singular value decomposition(SVD),and the effective features such as kurtosis and mean value commonly used in remaining useful life prediction were added,then the decision tree to filter out 15⁃dimensional features was used the data was obtained by double exponential model fitting and the degraded signal was reduced to a linear trend through t⁃SNE.The linear degradation trend has better generalization in prediction than the exponential trend,and the prediction accuracy is superior to support veotor regression(SVR)and deep belief network(DBN)model.…”
Get full text
Article -
5991
Insights into prescribing patterns for antidepressants: an evidence-based analysis
Published 2025-01-01Subjects: Get full text
Article -
5992
-
5993
-
5994
-
5995
La formación económica de la familia en textos de Europa central y Colombia en los siglos XV a XX: amas de casa, gobierno, cálculo y moral
Published 2025-01-01“… Desde un abordaje de la familia como dispositivo privilegiado de formación y gobierno en la modernidad occidental, se examinan diferencias y regularidades en las prescripciones acerca de la formación de sujetos económicos en textos dirigidos a la familia en Europa y Colombia del siglo xv a la segunda década del xix. …”
Get full text
Article -
5996
Clasificación de estudiantes de nuevo ingreso a una universidad pública, con base en variables de desempeño académico, uso de tecnología digital y escolaridad de los padres
Published 2012-05-01“…Se aplicaron dos técnicas clasificatorias: CHAID y análisis de conglomerados para explorar la conformación de patrones con base en las variables antes mencionadas. …”
Get full text
Article -
5997
Fusion protein-based COVID-19 vaccines exemplified by a chimeric vaccine based on a single fusion protein (W-PreS-O)
Published 2025-01-01Subjects: Get full text
Article -
5998
Assessment of Two School-Based Programs to Prevent Universal Eating Disorders: Media Literacy and Theatre-Based Methodology in Spanish Adolescent Boys and Girls
Published 2015-01-01“…To evaluate the long-term effects of two school-based prevention programs administered to a universal mixed-sex sample of school-going adolescents on disturbed eating attitudes, aesthetic ideal internalization, and other eating disorder risk factors, when compared to a control group. …”
Get full text
Article -
5999
Estimating the Prevalence of Schizophrenia in the General Population of Japan Using an Artificial Neural Network–Based Schizophrenia Classifier: Web-Based Cross-Sectional Survey
Published 2025-01-01“…To address these issues, we previously developed an artificial neural network (ANN)–based schizophrenia classification model (SZ classifier) using data from a large-scale Japanese web-based survey to enhance the comprehensiveness of schizophrenia case identification in the general population. …”
Get full text
Article -
6000
Investigating the Structural Relationships of the Tendency to Addiction to Mobile Phone-Based Social Networks in Students, Based on Early Maladaptive Schemas Mediated by Alexithymia in Students
Published 2024-12-01“…The aim of current research was to investigating structural relationships of addiction to mobile phone-based social networks in students, as influenced by early maladaptive schemas mediated by alexithymia. …”
Get full text
Article