Suggested Topics within your search.
Suggested Topics within your search.
- Health 8
- Constitutional court 7
- Court of Appeal 6
- Supreme court 6
- Judgement and orders 5
- Law reports, digests, etc 5
- Physical fitness 5
- Research 5
- methods 5
- Consumers 4
- Conversation analysis 4
- High court 4
- Judgements and orders 4
- Court of appeal 3
- Economic aspects 3
- History and criticism 3
- Mathematics 3
- Agriculture 2
- Anesthesia 2
- Anesthetics 2
- Biochemistry 2
- Chemistry 2
- Chemistry, Clinical 2
- Commercial law 2
- Court Bulletin 2
- Drug Dosage Calculations 2
- English language 2
- French language 2
- Health and Fitness 2
- Information technology 2
-
11481
Coverage scheduling algorithm of mobile sensor nodes for optimizing network lifetime
Published 2018-05-01“…In order to solve the coverage blind problem caused by deployment and failure of heterogeneous static sensor nodes,a coverage scheduling algorithm of mobile sensor nodes for optimizing network lifetime (CSA) was proposed.CSA considerd heterogeneous perceived radius of static sensor nodes and calculates the location of mobile sensor nodes based on the information of neighbor static sensor nodes.According to the location reported by static sensor nodes,coverage scheduling model was established.Heuristic solution method was proposed,to solve the scheduling model,and optimal location of mobile sensor nodes was obtained.The simulation results show that CSA can improve regional coverage and the number of survival static sensor nodes,improve network lifetime and reduce energy consumption of average static sensor nodes.Under certain conditions,CSA is better than Mno,MNode and MGrid algorithms.…”
Get full text
Article -
11482
Dynamic adaptive trust evaluation model based on interaction-aware
Published 2012-10-01“…A dynamic adaptive trust evaluation model was established based on interaction-aware.The historical interaction window and trustworthy recommendation number was introduced in overall trust evaluation method,which overcomes the shortage of traditional models that lack the capacity to interaction-aware.The direct trust accumulation method based on interaction satisfaction degree iterative calculation was proposed,which achieved the incentive and penalty iterative strategy based on entity stability factor,and effectively inhibits malicious entities with camouflage.A synthetical recommendation trust aggregating method based on combination of direct and indirect recommendation trust was given,which solved the accuracy low and unreliable problems of traditional recommendation methods by introducing entity familiarity factor and scoring similarity factor.Simulation results show that,compared to the existing trust model,the model can effectively improve the accuracy of trust evaluation,and can provide a better capacity of resisting collusive entities.…”
Get full text
Article -
11483
Characteristics of a New Plastic Explosive Named EPX-1
Published 2015-01-01“…The detonation velocity was measured experimentally and the detonation characteristics were calculated by EXPLO5 thermodynamic code. For comparison, Semtex 1A, Semtex 10, Formex P1, and Sprängdeg m/46 were studied. …”
Get full text
Article -
11484
Flow Field Analysis of Spur Gear Meshing Period Under the State of Oil-immersion Lubrication
Published 2018-01-01“…The variation of oil splash and pressure on meshing point are analyzed under different speeds and directions of gear rotation,the gear resistance moment and the oil churning loss are calculated. The final results show that,under medium and low speed transmission condition,the change of gear rotating direction has greater influence on oil-pumping volume on the meshing area,oil-throwing volume of the outer circle of the gear,pressure on meshing points,and oil churning loss. …”
Get full text
Article -
11485
Financial Risk Avoidance Based on the Sensor Network and Edge Computing
Published 2022-01-01“…Moreover, this paper divides the sensor data into several sliding windows according to the time series, analyzes the offset between the data object and other data in the sliding window by calculating the offset distance, and uses the abnormal level to indicate the possibility of data abnormality. …”
Get full text
Article -
11486
MANAGEMENT PERSONNEL – EFFIENCY AND EVALUATION
Published 2019-12-01“…For this purpose, it is necessary to develop methods for calculating the effectiveness of decisions and, accordingly, the system of financial incentives. …”
Get full text
Article -
11487
Study on Vibration Reduction Method by Gear Staggering Phase Tuning
Published 2023-08-01“…In this study, a novel method of staggered tooth phase of gears is proposed, the meshing principle of staggered phase tuning gears is studied, the calculation formula of time-varying meshing stiffness of staggered phase tuning gears is derived, and the mapping relationship between staggered phase and vibration response is studied. …”
Get full text
Article -
11488
Network Selection Algorithm Based on Stable Matching Game in Vehicular Heterogeneous Network
Published 2015-09-01“…Firstly, the corresponding weights were calculated by using AHP to obtain the satisfaction function, then, one-to-many two-sided matching problem was converted into one-to-one two-sided matching problem, and optimal matching results could be obtained by constructing the multi-objective optimization model under the condition of stable matching. …”
Get full text
Article -
11489
Estimation of Concentrations Parameters in the Model of Mixture with Varying Concentrations
Published 2025-01-01“…A fast algorithm for the LS estimator calculation is presented. EML and LS estimators are compared via simulations. …”
Get full text
Article -
11490
A hierarchical colored Petri net–based cyberattacks response strategy making approach for critical infrastructures
Published 2020-01-01“…In this approach, the relationships among cyberattacks, security measures, devices, functions, and station capacity are analyzed and described in a hierarchical way, and the system loss is calculated with the input of abnormal station capacities. …”
Get full text
Article -
11491
Design and Selection of Power Coupling Device for Electric Tractor
Published 2021-05-01“…Then,the transmission characteristics of each scheme are compared and analyzed, and two better schemes are selected for power matching and parameter calculation. Based on Simulation X,the simulation model of the dual motor dynamic coupling device is built,the kinematics simulation analysis is carried out,and the final transmission scheme is optimized. …”
Get full text
Article -
11492
Three-dimensional spherical model based XML communication protocols security evaluation method
Published 2013-03-01“…Thirdly, security components values of XML communication protocol were calculated in the aspects of XML's content, communication load and security vulne-rability. …”
Get full text
Article -
11493
Solution Method of Common Constraint of the Mechanism in the Modified G-K's Formula
Published 2023-04-01“…In the calculation of mobility of the mechanism using the modified Grübler-Kutzbach's formula of mechanism mobility, the common constraint of the mechanism has to be solved. …”
Get full text
Article -
11494
A bidirectional authentication protocol for RFID based on Syn
Published 2018-12-01“…The RFID system is made up of three parts:tags,readers and databases.The information between tags and readers are transmitted through wireless channel,which is easy to be intercepted by attackers.A two-way authentication protocol based on word Synthesis operation was proposed.The two remainder theorem was used to encrypt communication messages by the proposed protocol,the difficulty of cracking was increased; In the process of each round of communication encryption,a random number was added to make the communication messages inconsistent,so that the tracking attacks could not be initiated by attackers.In the communication message encryption,the word synthesis algorithms was adopted at the same time,the total calculation of the system could be effectively reduced.A random checking mechanism was introduced at the database,enabling a synchronous attack and other attacks to be effectively resisted by the system.Security analysis shows that the protocol has high security,and performance analysis shows that the protocol has the standard of lightweight computation.…”
Get full text
Article -
11495
Real-time image matching for navigation system based on genetic algorithm
Published 2008-01-01“…Moreover, the weighted Hausdorff distance algorithm based on bifurcations extraction and the corresponding weight formula was proposed. The calculation of matching search can be reduced and the accuracy of matching results can be improved by using the weighted Hausdorff distance as the fitness function of genetic algorithm. …”
Get full text
Article -
11496
Recovering and Improvement of the Ancient Chinese South-pointing Chariot
Published 2018-01-01“…To align error on the plane,a three dimensional checking calculation method is put forward. By monitoring the axle’s movement angle,south-pointing on the plane can be realized. …”
Get full text
Article -
11497
Methods of Forage Moisture Testing
Published 2019-07-01“… Determining forage moisture is an essential procedure for estimating forage mass in pastures, determining harvesting or baling point for preserved forages, and calculating dry matter of feedstuff for total mixed rations. …”
Get full text
Article -
11498
STUDY OF THE DIGITAL ECONOMY DEVELOPMENT: REGIONAL ASPECT
Published 2020-06-01“…A comparative assessment of the composition and content of international and national indicators for assessing the development of the information society has been given. The calculation on the components of the information and communication technologies Development Index for each subject of the Russian Federation and the Federal districts has been made, as well as the analysis of variations in this Development Index for the constituent entities of the Russian Federation for 2014–2018 has been carried out.…”
Get full text
Article -
11499
RESEARCH ON THE THICK COMPOSITE LAMINATE BOLT JOINT STRENGTH
Published 2017-01-01“…With this method,the failure process and the linking strength of single-lap,single-bolt joints were calculated. The results shows that the load-displacement curve by using global degradation model doesn’t degrade enough and the computing results are more accurate by using the partition degradation model. …”
Get full text
Article -
11500
Composite Fault Feature Extraction of Gearbox based on CPFs
Published 2018-01-01“…Then,the definition of multi-point kurtosis is introduced,and the fault feature period is extracted by calculating the multi-point kurtosis spectrum of each layer of PF,and the PF without periodic impact is eliminated. …”
Get full text
Article