Suggested Topics within your search.
Suggested Topics within your search.
- Health 8
- Constitutional court 7
- Court of Appeal 6
- Supreme court 6
- Judgement and orders 5
- Law reports, digests, etc 5
- Physical fitness 5
- Research 5
- methods 5
- Consumers 4
- Conversation analysis 4
- High court 4
- Judgements and orders 4
- Court of appeal 3
- Economic aspects 3
- History and criticism 3
- Mathematics 3
- Agriculture 2
- Anesthesia 2
- Anesthetics 2
- Biochemistry 2
- Chemistry 2
- Chemistry, Clinical 2
- Commercial law 2
- Court Bulletin 2
- Drug Dosage Calculations 2
- English language 2
- French language 2
- Health and Fitness 2
- Information technology 2
-
11521
Role of Microfinance in Entrepreneurial Development in Low-Income Areas
Published 2024-12-01“…Furthermore, the microfinance gap is calculated by taking feedback from entrepreneurs before and after getting the financing facility. …”
Get full text
Article -
11522
Research on a lightweight framework of industrial Internet-oriented manufacturing service collaboration level agreement
Published 2021-09-01“…The industrial Internet platform for service-oriented manufacturing has been developing rapidly and put into use.Its advantages of deep perception of industrial data, real-time transmission, rapid calculation and analysis, and high feedback response are gradually highlighted.It also provides platform support for the implementation of manufacturing service reliable collaboration.A lightweight framework for manufacturing service reliable collaboration was proposed based on service level agreement (SLA), including collaboration service communication and interface modules, service level agreement data management module, service collaboration quality of service (QoS) negotiation module, "failure-distrust-trustworthiness" evaluation module, incentive and punishment mechanism module.The SLA-based manufacturing service collaboration process was also given.The reliability of manufacturing service collaboration was guaranteed from three aspects: reliable service release, effective execution of collaboration, and task trustworthy completion.…”
Get full text
Article -
11523
Application of Pneumatic Ventilated Disc Brake in Mine Electric Locomotive
Published 2018-01-01“…Referring to the formula and theory of train traction braking,the braking performance is verified by calculation. At the same time,the braking process is simulated and analyzed by the finite element software Abaqus,the temperature field distribution nephogram and the temperature variation curve of the corresponding node are obtained. …”
Get full text
Article -
11524
Modeling and Invulnerability Analysis of Multilayer Air Traffic Network considering Altitude Layer
Published 2023-01-01“…Then, the line graph theory is used to redefine the nodes and edges, and the network is reconstructed to obtain a new single-layer one which is easy to calculate. Finally, a case study is carried out in Chengdu control area. …”
Get full text
Article -
11525
The Reliability and Validity of Adolescent Health Promotion Scale in Turkish Community Original Article
Published 2011-04-01“…The Cronbach’s alpha reliability coefficient for the total scale was calculated 0.86, and ranged from 0.50 to 0.74 for the subscales. …”
Get full text
Article -
11526
Solutions without Space-Time Separation for ADS Experiments: Overview on Developments and Applications
Published 2012-01-01“…For this investigation the very special configuration of YALINA-Booster is analyzed based on HELIOS calculations. The results for the time dependent diffusion and the time dependent P1 equation are compared with the experimental results for the SC3A configuration. …”
Get full text
Article -
11527
Application of adsorption potential theory in prediction of CO and CH adsorption on carbon molecular sieves
Published 2018-12-01“…The methods to obtain the adsorption density in the adsorbed phase, including Ozawa’s method and the empirical method, and the methods to calculate the virtual saturation vapor pressure, including Dubinin’s method and Amankwah’s method, were discussed. …”
Get full text
Article -
11528
Detection and Characterization of β-Lactam Resistance in Bacillus cereus PTCC 1015
Published 2004-01-01“…At the above conditions, maximum enzymatic activity was calculated as 0.89 ± 0.014 and 0.037 ± 0.001 units against ampicillin and cephalexin.…”
Get full text
Article -
11529
Blockchain and credibility function based chain storage method of electronic encrypted information
Published 2023-07-01“…To optimize the proportion of encrypted information storage space in the blockchain and improve the speed of online storage, a design method for electronic encrypted information online storage based on blockchain and credibility function was proposed.An information encryption classification model based on blockchain and credibility function was established, and a traceability voucher judgment function was obtained.Proxy re-encryption was performed on electronic information.The storage capacity of the cluster was calculated, and encrypted ciphertext was used to directly match the access structure tree.Subject credibility and object credibility were distinguished, electronic encrypted information was classified based on the credibility function, and an electronic encrypted information uplink storage method was designed.The experimental results show that after applying the proposed method, when the number of files is between 1 000 and 10 000, the data storage speed is the fastest, and the storage space proportion and storage speed are greatly optimized.…”
Get full text
Article -
11530
AdaBoost algorithm based on target perturbation
Published 2023-02-01“…Aiming at the problem that the multi-round iteration process in the AdaBoost algorithm will amplify the noise added to achieve differential privacy protection, which leads to slow model convergence and greatly reduced data availability, an AdaBoost algorithm based on target perturbation—DPAda was proposed.Target perturbation was used to add noise to sample weights, accurately calculated their sensitivity, and a dynamic privacy budget was given.In order to solve the problem of excessive noise superposition, three noise injection algorithms based on swing sequence, random response and improved random response were proposed.The experimental results show that compared with DPAda_Random and DPAda_Swing, DPAda_Improved achieves the privacy protection of data, has higher classification accuracy, as well as better than other differential privacy AdaBoost algorithm, and can also solve the problem of excessive noise caused by continuous noise addition.…”
Get full text
Article -
11531
La maîtrise du temps d’irrigation au sein des oasis alimentées par des aflâj
Published 2013-12-01“…Sundials were traditionally used to calculate these shares. This is still the case in the oasis of Adam. …”
Get full text
Article -
11532
STATIC ВЕHAVIOR ANALYSIS OF COMPOSITE STRUCTURES WITH PIEZOELECTRIC LAYERS
Published 2024-04-01“…Then, based on the generalized H-R variational principle, a linear equations method for calculating the generalized stress of composite structures with piezoelectric layers is proposed. …”
Get full text
Article -
11533
Study on the Analyzing and Simulating Method of Workspace of Force Reflecting Main Manipulator
Published 2016-01-01“…The functional relationships between robotic end- effector space position and variables for robotic joints are obtained through the main manipulator forward kinematics solution calculation,a simulation of main manipulator workspace is conducted by adopting numerical,graphical method and analytic method in the Matlab. …”
Get full text
Article -
11534
Sugar Alcohols, Caries Incidence, and Remineralization of Caries Lesions: A Literature Review
Published 2010-01-01“…Habitual use of xylitol, a sugar alcohol of the pentitol type, can be associated with significant reduction in caries incidence and with tooth remineralization. Other dietary polyols that can remarkably lower the incidence of caries include erythritol which is a tetritol-type alditol. …”
Get full text
Article -
11535
Research of dynamic gesture recognition based on multi-instance learning of kinematics features
Published 2017-11-01“…Compared to static gestures,dynamic gestures had some new characteristics.The problems of dynamic gestures recognition was spewed by using kinematics mode,such as divergence modes,curl modes,symmetric and ant-symmetric modes,the second and third principal invariant modes of the gradient tensor,the second and third principal invariant modes of the strain tensor and the third principal invariant modes of spin tensor; Further,a framework based on multi-instance learning was proposed,organize all these principle modes for each gesture were organized to a dynamic gestures bag-of-words,and the similarity between the mode of unknown type dynamic gestures and the all bag-of-words were calculated.Then,the nearest neighbor method was used to recognize the dynamic gestures.The experimental results show that the dynamic gestures recognition based on multi-instance kinematics features principal mode learning methods can obtain a higher recognition rate.…”
Get full text
Article -
11536
Design of Flexible Constant Force Manipulator based on Metamorphic Mechanism Transform
Published 2019-12-01“…Finally, the theoretical output force is calculated according to the principle of virtual work, and the constant force range is found by particle swarm optimization. …”
Get full text
Article -
11537
Adsorption Thermodynamics of Methyl Orange from Aqueous Solution onto a Hyper-Cross-Linked Polystyrene Resin Modified with Phenolic Hydroxy Groups
Published 2010-06-01“…The adsorption isotherms of Methyl Orange from aqueous solution onto HJ-P01 resin were subsequently measured and the corresponding thermodynamic parameters calculated. The results indicated that HJ-P01 resin possessed a micro-/meso-porous structure, with its surface being chemically modified by phenolic hydroxy groups. …”
Get full text
Article -
11538
Block-based fair payment scheme under delegation computation
Published 2020-03-01“…In the traditional delegation computation,due to the self-interested behavior of both participants,there were some problems such as the denial of the principal and the dishonest calculation by the computing party.In the payment phase,a third party was required to ensure the fairness of the payment,which led to extra costs and risks of disclosure of participants' privacy.Game theory was used to analyze the Nash equilibrium solution between the two parties in the payment process,and a fair payment protocol based on time commitment of bitcoin was proposed.Firstly,the bitcoin time commitment technology was used to ensure the fairness of payment.Secondly,the decentralized feature of block chain was used to replace the third-party service to protect the privacy of all parties and realize the source of responsibility.Finally,the scheme was analyzed from the perspective of security and correctness,which proved that the participants choose behavioral strategies honestly in the payment process.The scheme proposed in this paper not only solved the problem of fair payment in traditional delegation computation,but also protected the privacy of participants.…”
Get full text
Article -
11539
Optimization strategy on coverage control in wireless sensor network based on Voronoi
Published 2013-09-01“…Coverage holes directly reduce network performance and become a key problem of wireless sensor network.A detect-repair scheme for area coverage in wireless sensor network with Voronoi was proposed.The strategy achieves the network coverage rate optimization balance with a prerequisite of an acceptable coverage quality of network area.It uses the geometry theories and vector algebra to analyse the sensing range of nodes and the position feature of Voronoi polygon.It can calculate the accurate area of holes and ensure the connectivity of networks with the least number of odes.Simulation results show that the strategy can effectively reduce number of the nodes and the overlapped sensing regions and control redundant nodes.Meanwhile,the strategy has fast convergence speed.It not only realizes the control and optimization of the network coverage,but also outperforms existing algorithms with respect to the coverage of the target region.…”
Get full text
Article -
11540
Modeling and Analysis of Inverse Kinematics for Three Degrees of Freedom Ankle Joint Auxiliary Rehabilitation Device based on Ball Pair
Published 2017-01-01“…Arming at the multiple kind of movement patterns of system,an inverse kinematic modeling and analysis are completed respectively. The related calculation formulas are deduced and relation charts of motion angle between working platform and motor are plotted by using the Matlab. …”
Get full text
Article