Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
6261
RESEARCH ON TRANSMISSION CHARACTERISTIC OF AUTOMOTIVE SYNCHRONOUS BELT BASED ON RECURDYN
Published 2017-01-01“…The virtual prototype model of transmission system of automotive trapezoidal toothed synchronous belt is built and the simulation analysis of movement process is carried out by using multibody dynamics software Recurdyn. Based on the characteristics of synchronous belt transmission,the effects of different initial tension,speed and transmission load on the equivalent stress of the synchronous belt is studied in the transmission process,a feasible method to study the design and optimization of automobile synchronous belt structure of trapezoidal toothed is provided.…”
Get full text
Article -
6262
Cloud removal from satellite imagery based on SUSAN algorithm
Published 2006-01-01“…A new image fusion scheme that could automate remove the cloud covers in the main image was proposed based on SUSAN algorithm.First,the corners were found both in the main image and the reference image based on SUSAN algorithm,and then the matched corners were found using probabilistic relaxation algorithm to register the ref-erence image to the main image.Finally,a cloud-removed image was obtained by fusion.The performance of the pro-posed scheme is demonstrated experimentally.…”
Get full text
Article -
6263
Attribute-based proxy re-encryption scheme with multiple features
Published 2019-06-01Subjects: “…attribute-based encryption…”
Get full text
Article -
6264
FATIGUE LIFE PREDICTION OF METAL MATERIALS BASED ON STRENGTH DEGRADATION
Published 2021-01-01“…In order to study the law of residual strength degradation of metal materials in the process of fatigue,a residual strength degradation model is established based on the definition of fatigue damage. The correctness of this model is verified by the previous experimental data. …”
Get full text
Article -
6265
Unknown attack detection model based on network behavior analysis
Published 2016-06-01“…As for the intranet security threats of the increasing number of unknown attacks,an unknown attack detection model based on network behavior analysis was proposed.With the help of the information resources within the intranet,firstly,the information resources of the intranet were collected,then the risk factors of abnormal behav-ior of the internet information node were analyzed,finally,the information node and the information resources ac-quisition path as the key element were used to construct the detection model of the directed graph.By verifying,the model can achieve the desired detection results.…”
Get full text
Article -
6266
Network security situational awareness model based on threat intelligence
Published 2021-06-01Subjects: Get full text
Article -
6267
Smart contract-based secure cooperative spectrum sensing algorithm
Published 2021-12-01“…By solving the Nash equilibrium, the SU determines whether it uploads sensing data. …”
Get full text
Article -
6268
Abnormal link detection algorithm based on semi-local structure
Published 2022-02-01Subjects: Get full text
Article -
6269
Interference Coordination Based on POMDP in Multi-Cell OFDMA System
Published 2013-04-01“…The inter-cell interference coordination(ICIC)of OFDMA system was studied,and a dynamic ICIC algorithm based on the theory of partially observable Markov decision process(POMDP)was proposed.The statistic model of interference and SINR of channel was combined to allocate channels for cell-edge user in this algorithm.Simulation results show that the proposed scheme can efficiently avoid interference for the cell-edge user.Since this algorithm avoids the coordination between cells,the system overhead is saved.Furthermore,a likelihood relation between SINR and interference was established by using particle filter,so there was no necessary for system to measure the interference.…”
Get full text
Article -
6270
Design and application of electrocardiograph diagnosis system based on multifractal theory
Published 2017-10-01“…An automatic segmentation algorithm for ECG data using differential threshold method was designed,which could identify the various ECG cycles of continuous ECG data.And it could obtain the multifractal features of multiple fractal and generalize hurst index feature of ECG data,these features were used to train artificial neural network in order to classify ECG data,the accuracy of the classifier could reach 97%.An ECG diagnosis system was implemented,which can automatically identify ECG sequences that contain multiple ECG cycles,and can automatically ignore the incomplete ECG cycle data,and could annotate every cycle of ECG data.…”
Get full text
Article -
6271
Construction of DPI Intelligent Network System Based on SDN/NFV
Published 2015-06-01“…It is the first step to complete the traffic identification and processing,and has been widely deployed in the network. With the development of DPI technology,the rise of administrative cost and capital cost brought by massive embedded DPI devices is also increasingly prominent. …”
Get full text
Article -
6272
Robot welding trajectory optimization based on intersecting line welds
Published 2024-01-01“…To this end, a trajectory planning method based on the improved particle swarm algorithm was proposed.MethodsFirstly, an acceleration continuity constraint method based on smooth paths was proposed so that the velocity, acceleration and jerk of each joint of the robot were bounded and continuous. …”
Get full text
Article -
6273
Research of university data statistical platform based on data warehouse
Published 2013-09-01Subjects: Get full text
Article -
6274
Advanced visual sensing and control in CMT-based WAAM processes
Published 2025-01-01“…Wire Arc Additive Manufacturing (WAAM) can flexibly produce high-performance parts that meet the requirements of deep-sea environments, but it has problems with insufficient molding accuracy and surface smoothness, which require improved precision and quality. …”
Get full text
Article -
6275
STRUCTURAL RELIABILITY ANALYSIS BASED ON AN IMPROVEMENT OF THE RESPONSE SURFACE METHOD
Published 2018-01-01Get full text
Article -
6276
Investigation Decision Strategies in JCPOA based on Game Theory Mechanism
Published 2023-02-01“…Purpose: In this study, the strategies of internal and external decision-makers in Borjam are examined using game theory.Methodology: The decisions made by three related personalities in JCPOA, including the leadership of Iran, the Government of Iran, and the group (1 + 5), were simulated using game theory and analyzed based on the game theory mechanism. In the problem statement section, principles are accepted, and the game is designed based on them. …”
Get full text
Article -
6277
Proton exchange membrane‐based electrocatalytic systems for hydrogen production
Published 2025-01-01“…Increasing the temperature of PEM‐based electrocatalytic systems can cause an increase in current density, accelerate reaction kinetics and gas transport and reduce the ohmic value, activation losses, ΔGH*, and power consumption. …”
Get full text
Article -
6278
Transcatheter Arterial Chemoembolization Based on Hepatic Hemodynamics for Hepatocellular Carcinoma
Published 2013-01-01“…The Barcelona Clinic Liver Cancer (BCLC) classification has recently emerged as the standard classification system for clinical management of patients with HCC. …”
Get full text
Article -
6279
THE RELIABILITY ANALYSIS OF WELDING ROBOTS BASED ON T-S FUZZY FAULT TREE
Published 2017-01-01“…According to the less effectiveness and difficulty in fault diagnosis of welding robots for its lots of uncertain faults phenomena and faults causes,this paper proposes the Fuzzy Fault Tree Analysis apply to welding robots fault diagnosis. Based on the analysis of welding machine structure and the T-S fuzzy fault tree analysis method,taking the torch’s gesture and suspension height setting of welding machine as an example,the fuzzy fault tree based on T-S model is established,and the reliability analysis for welding robots is discussed. …”
Get full text
Article -
6280
Predictive Control for Steel Rib Bending Based on Deep Learning
Published 2024-12-01“…In the shipbuilding industry, the inefficiency of the successive approximation control method in CNC cold-bending machines has hindered productivity in steel bending manufacturing, particularly for rib profiles. …”
Get full text
Article