Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
6341
WAVELET CONSTRUCTION BASED ON DATA FITTING AND BEARING FAULT DIAGNOSIS
Published 2019-01-01Subjects: Get full text
Article -
6342
INVESTIGATION ON DYNAMIC CHARACTERISTIC OF CYLINDER GEARS AND SIMULATION BASED ON ADAMS
Published 2016-01-01“…The multi-body contact dynamics model of the gear transmission system was built based on ADAMS,and dynamic mesh forces and vibration displacement and vibration velocity were obtained by the simulation. …”
Get full text
Article -
6343
Logical derivation and integrating legal knowledge bases: basic algorithms
Published 1998-12-01“…We formalize and store legal documents as knowledge bases, so our task turns to integrating knowledge bases. …”
Get full text
Article -
6344
An access scheme based on the random access occasion dynamic allocation
Published 2022-06-01“…With the rapid development of the internet of things (IoT), the application of machine type communication (MTC) in life has grown substantially, and the deployment of machine type devices (MTD) has become more and more intensive.In this case, if there is an unexpected situation such as a power outage and a network failure, a large-scale MTD will initiate access to the base station at the same time when the device is powered on.When the device accesses the base station, it needs to complete the downlink synchronization, system message receiving, random access (RA) and other processes.However, the preamble resources that can be allocated by the base station are limited and cannot meet such a huge access demand, which causes network congestion and affects the access probability and access delay of the device.In order to alleviate the access conflict of RA, a dynamic random access occasion (RO) adjustment scheme was proposed based on the uplink and downlink subframes and physical random access channel (PRACH) configuration, and time-based part of the MTD with high delay requirements allocates specific preamble resources.The simulation results show that this scheme can effectively improve the throughput of the system and reduce the access delay of the device.…”
Get full text
Article -
6345
Training of Competitive Graduates Based on the Educational Standard of the ITMO University
Published 2019-06-01“…The paper presents the concept, structure and features ofITMOUniversity’s independently established educational standard of a new generation. The standard has been developed on the basis of Federal State Educational Standard of Higher Education 3++, professional and international standards of engineering education, foresight forecasts of world scientific and technological development. …”
Get full text
Article -
6346
Using Enstrophy-Based Diagnostics in an Ensemble for Two Blocking Events
Published 2013-01-01“…Recent research has used enstrophy-based diagnostics to identify the development and dissipation stages of blocking events. …”
Get full text
Article -
6347
Discovery and research of network security vulnerabilities based on Web application
Published 2016-06-01Get full text
Article -
6348
IMPROVING THE EFFICIENCY OF URBAN TRANSPORT INFRASTRUCTURE BASED ON DIGITAL TECHNOLOGIES
Published 2020-09-01“…Transport infrastructure development in Russia has been analysed. It has been proved that in the conditions of the formation of the digital economy, artificial intelligence systems are an effective tool for decision-making. …”
Get full text
Article -
6349
Adaptive weighted progressive iterative approximation based on coordinate decomposition.
Published 2025-01-01“…During the iteration, the weight coefficients are flexibly adjusted based on the error of the current iteration step, demonstrating the flexibility and precision of the geometric iterative method in addressing geometric approximation problems. …”
Get full text
Article -
6350
Improved identity based multi-receiver anonymous signcryption scheme
Published 2015-09-01Subjects: Get full text
Article -
6351
Metal‐based nanomaterials and nanocomposites as promising frontier in cancer chemotherapy
Published 2023-04-01“…Abstract Cancer is a disease associated with complex pathology and one of the most prevalent and leading reasons for mortality in the world. Current chemotherapy has challenges with cytotoxicity, selectivity, multidrug resistance, and the formation of stemlike cells. …”
Get full text
Article -
6352
Translation Invariance-Based Deep Learning for Rotating Machinery Diagnosis
Published 2020-01-01“…This paper develops a multiscale information fusion-based stacked sparse autoencoder fault diagnosis method. …”
Get full text
Article -
6353
Spectrum sensing algorithm based on the eigenvalue of Wishart random matrix
Published 2017-09-01“…In order to improve the spectrum sensing performance and overcome the shortcomings of the classical algorithm,a new cooperative spectrum sensing algorithm based on Wishart random matrix theory was proposed.According to the logarithmic distribution characteristics of the sampled covariance matrix eigenvalues and using the ratio of maximum eigenvalue and geometric mean eigenvalue,a simple closed-form threshold expression could be obtained,and the spectrum sensing decision could be performed depend on the threshold.The simulation results show that the proposed algorithm can get better sensing performance even under the conditions of a few number of cooperative users,low signal to noise ratio and a few samples.It is less affected by false-alarm probability and the extreme values,and has better detection performance than similar algorithms.…”
Get full text
Article -
6354
A Decomposition-Based Evolutionary Algorithm with Neighborhood Region Domination
Published 2025-01-01“…The decomposition-based multi-objective optimization algorithm MOEA/D (multi-objective evolutionary algorithm based on decomposition) introduces the concept of neighborhood, where each sub-problem requires optimization through solutions within its neighborhood. …”
Get full text
Article -
6355
Automatic detection and counting of wheat spike based on DMseg-Count
Published 2024-11-01“…In order to solve the above problems and further improve the accuracy of wheat spike counting, an improved wheat spike counting model DMseg-Count was proposed by enhancing local contextual supervision information based on existing target object counting model DM-Count. …”
Get full text
Article -
6356
Research of the Optimization Design and Experimental of Gear Modification based on ROMAX
Published 2015-01-01“…Taking a tractor gearbox transmission system as the research object,the deformation of transmission shaft and the dislocation of gear are analyzed based on ROMAX software. The transmission error curve and the meshing characteristic of modification gear are studied,and the optimal modification quantity is determined,and the mechanism and influencing factors of the gear vibration and noise are analyzed. …”
Get full text
Article -
6357
Clustering-based dynamic privacy preserving method for social networks
Published 2015-11-01“…Due to the dynamic characteristics of the social network graph structure,an effective dynamic privacy preserving method was needed.To solve the problems of the existing dynamic privacy preservation methods,such as attacker’s too little background knowledge and the low adaptability to the dynamic characteristics of graph structure,a clustering-based dynamic privacy preservation method was provided.The analysis shows that the proposed method can resist many kinds of background knowledge attacks and has good adaptability to the dynamic characteristics of the social network graph structure.…”
Get full text
Article -
6358
An End-to-End Rumor Detection Model Based on Feature Aggregation
Published 2021-01-01“…The social network has become the primary medium of rumor propagation. …”
Get full text
Article -
6359
Initialization scheme of the trusted execution environment based on the user card
Published 2017-02-01“…Smartphones with a trusted execution environment (TEE) has an authority issue of the certificate with the loading stage.Based on the analysis of the initialization architecture and initializing scheme of the trusted execution environment,by using trust chain technology,a scheme was proposed to initialize the trusted terminal of the operator's card as the trusted root,and ideas were provided for the telecom operators to use the user card resources to participate in the construction of the industrial chain of the trusted execution environment.…”
Get full text
Article -
6360
Domain name generation algorithm based on improved Markov chain
Published 2024-11-01Subjects: Get full text
Article