Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
6361
Research on Parameter Sensitivity of Reasoning Formula Based on Error Principle
Published 2020-01-01Get full text
Article -
6362
Session topic mining for interactive text based on conversational content
Published 2016-09-01“…Traditional theme mining model generally digs out the document theme from the interactive text only.In order to explore the session topic and improve the universality of mining model,a kind of interactive text session topic generation model based on the content of the dialogue was put forward.Firstly,by analyzing the characteristics of interactive text and based on the concept of topic tree,a dialog spanning tree was defined with a five-layer structure.Based on this and LDA,the model of session topic generation(ST-LDA)was built.At last,Gibbs sampling method was adopted to deduce the ST-LDA and obtaining session topic and its distribution probability.The results show that the ST-LDA model can dig out a session topic effectively from the interactive text.Besides,the results can reduce the complexity of the classification algorithm and can be back to the theme—participants association.It also has a good universality.…”
Get full text
Article -
6363
Vanadium dioxide-based tunable broadband metamaterial absorber in the terahertz
Published 2025-01-01“…The as-developed metamaterial exhibited the characteristics of wide-angle incidence and polarization sensitivity and has excellent application prospects in the domains of medicine, military, and communication.…”
Get full text
Article -
6364
THE UNIVERSITY ELECTRONIC SPACE AS THE BASIS FOR IMPLEMENTING NEW EDUCATIONAL TECHNOLOGIES
Published 2016-12-01Get full text
Article -
6365
IP-based high-available mass network storage system
Published 2007-01-01“…An IP-based high-available mass network storage system(MNSS) was introduced,featured by the following advantages: firstly,it integrates multi-NAS and SAN with OSD through a unified multi-protocol file system(UMPFS),with greater capacity and better scalability than each of them;secondly,it simultaneously serves both the file I/O and the block I/O by an iSCSI module,with all the advantages of a NAS and a SAN;thirdly,with an autonomic storage agency(ASA),the MNSS provide two kinds of data channels,i.e.…”
Get full text
Article -
6366
Bridging science and decision-making with a storyline-based approach
Published 2025-01-01Get full text
Article -
6367
Key technologies of smart home network based on G.hn
Published 2017-10-01“…In the future smart home,intelligent network high-speed home networking become the trend.Based on this,firstly the modulation and bandwidth of G.hn protocol and the current frequency coaxial cable usage were analyzed.Then the key technology of the G.hn spread spectrum technology was studied.Finally the key points and direction of spread spectrum technology were put forward.…”
Get full text
Article -
6368
Shadow Separation of Pavement Images Based on Morphological Component Analysis
Published 2021-01-01“…A shadow separation algorithm based on morphological component analysis (MCA) is proposed herein to solve the shadow problem of road imaging. …”
Get full text
Article -
6369
Provably secure secret sharing scheme based on bilinear maps
Published 2008-01-01“…A method to construct provable secure secret sharing scheme using bilinear pairing was recommended.Firstly,the semantic security definition for secret sharing scheme is given,which is developed from the standard definition of semantic security for the public key cryptosystems.Then,a new secret sharing scheme based on the bilinear maps is pro-posed,with its correctness,security and performance analyzed and proven subsequently.Compared with the existing schemes,the proposed scheme is provably secure.At the same time,the proposed scheme departs the private key compu-tation of participants from the secret distribution process and the dealer does not have to securely save each participant’s private key,which makes this scheme more secure and more efficient.Therefore,the proposed scheme is more applicable than the existing ones.…”
Get full text
Article -
6370
Post-Processing Thermal Activation of Thermoelectric Materials Based on Germanium
Published 2024-12-01Get full text
Article -
6371
Cooperative inference analysis based on DNN convolutional kernel partitioning
Published 2022-12-01“…With the popularity of intelligent chip in the application of edge terminal devices, a large number of AI applications will be deployed on the edge of networks closer to data sources in the future.The method based on DNN partition can realize deep learning model training and deployment on resource-constrained terminal devices, and solve the bottleneck problem of edge AI computing ability.Thekernel based partition method (KPM) was proposed as a new scheme on the basis of traditional workload based partition method (WPM).The quantitative analysis of inference performance was carried out from three aspects of computation FLOPS, memory consumption and communication cost respectively, and the qualitative analysis of the above two schemes was carried out from the perspective of flexibility, robustness and privacy of inference process.Finally, a software and hardware experimental platform was built, and AlexNet and VGG11 networks were implemented using PyTorch to further verify the performance advantages of the proposed scheme in terms of delay and energy consumption.It was concluded that, compared with the WPM scheme, the KPM scheme had better DNN reasoning acceleration effect in large-scale computing scenarios.And it has lower memory usage and energy consumption.…”
Get full text
Article -
6372
MODELING OF BEARING MAINTENANCE BASED ON NEURAL NETWORK AND MAINTENANCE WINDOW
Published 2018-01-01“…The model is verified by using the data of the whole life of bearing,it is concluded that the maintenance decision model based on the maintenance window is better than the threshold limit maintenance window is better than the threshold limit maintenance model in a certain time interval by calculate the maintenance cost rate of the two models.…”
Get full text
Article -
6373
THE COMPETENCY BASED APPROACH IN PROFESSIONAL EDUCATION, OR IN CONTRADICTION WITH LABOR SCIENCE
Published 2019-11-01Subjects: Get full text
Article -
6374
Conceptual basis for the search and eco-diagnostics of risk zones in watersheds
Published 2024-11-01“…System analysis, comparative analysis-synthesis and evaluation to form a targeted spatial sampling; extrapolation and adaptive transfer of procedural-analytical approaches for diagnostic network selection; methods of conceptual design and visual representation. Results. Based on a systematic analysis of publications from Google Scholar, Scopus, Web of Science, Springer, as well as domestic sources in the areas of soil and water pollution assessment with the identification of vulnerable (sensitive) territories and hot spots, priority management areas (APMA) and critical areas (CSA), an alternative conceptual basis for an approach to integrated environmental diagnostics of soil, surface and groundwater pollution is presented, which is preceded by an automated program search for hydrologically sensitive risk zones of ecological contact interaction of soil and water, which is important for ecological management and ecosystem restoration. …”
Get full text
Article -
6375
Gelatin-based biomaterials as a delivery strategy for osteosarcoma treatment
Published 2025-01-01“…At present, gelatin-based hydrogels, gelatin scaffolds, and gelatin-based nanoparticles have been reported in preclinical studies. …”
Get full text
Article -
6376
Comparison and Selection of Channel Desilting Schemes Based on Hydrodynamic Models
Published 2025-01-01“…The combination scheme has the strongest ability to reduce the inundated area at different return periods. …”
Get full text
Article -
6377
Radio direction finding system based on spatial spectrum estimation
Published 2017-07-01“…The direction finding technology based on spatial spectrum estimation is widely used due to its’ ultra-high resolution,high sensitivity,high accuracy and plays a leading role in radio management.Based on the theoretical study of spatial spectrum estimation,the algorithm was put forward and the algorithm was simulated.Finally,the practicability and superiority of the spatial spectrum estimation system were demonstrated.…”
Get full text
Article -
6378
Toolkit for Implementing a Community-Based “IMBY” Safety Event
Published 2003-07-01“…In this publication, putting the IMBY event together is broken out into a series of specific tasks. In addition to guidelines for each task, this publication includes forms — the toolkit, which organizers can use as given or customize for specific communities, audiences, or events. …”
Get full text
Article -
6379
Analysis of Gear Abnormal Wear based on Transmission Vibration Characteristic
Published 2019-05-01“…Considering the excitation source of the transmission and the mode of internal parts and external shift control can effectively improve the vibration problem of the transmission in the early design and development stage. Through a case analysis of mechanical transmission gear early abnormal wear and tear caused by the shifting handle jitter, it is deduced that the shaft assembly and balance block are resonant due to the excitation of the main reduction gear based on the vibration characteristics. …”
Get full text
Article -
6380
Thermal Spin Transport Properties in Diarylethene-Based Molecule Devices
Published 2022-01-01Get full text
Article