Suggested Topics within your search.
Suggested Topics within your search.
- Health 8
- Constitutional court 7
- Court of Appeal 6
- Supreme court 6
- Judgement and orders 5
- Law reports, digests, etc 5
- Physical fitness 5
- Research 5
- methods 5
- Consumers 4
- Conversation analysis 4
- High court 4
- Judgements and orders 4
- Court of appeal 3
- Economic aspects 3
- History and criticism 3
- Mathematics 3
- Agriculture 2
- Anesthesia 2
- Anesthetics 2
- Biochemistry 2
- Chemistry 2
- Chemistry, Clinical 2
- Commercial law 2
- Court Bulletin 2
- Drug Dosage Calculations 2
- English language 2
- French language 2
- Health and Fitness 2
- Information technology 2
-
11701
The Optimal Bandwidth Parameter Selection in GPH Estimation
Published 2021-01-01“…Furthermore, we give the calculation accuracy of the GPH algorithm on existence, persistence or antipersistence of long memory, and long memory parameter d when a = 0.6.…”
Get full text
Article -
11702
Abnormal network traffic detection approach based on alive entropy
Published 2013-09-01“…A novel alive entropy-based detection approach was proposed,which detects the abnormal network traffic based on the values of alive entropies.The alive entropies calculated based on the NetFlow data coming from the network traffic of input and output of a whole system,which is essentially a monitored network.In order to decrease false positive rate of abnormal network traffic,different scales are selected to compute the values of alive entropies in different sizes of network traffic.With the low false positive rate of abnormal network traffic,the abnormal network traffic can be effectively detected.Experiments carried out on a real campus network were used to evaluate the effectiveness of the proposed approach.A comparative study illustrates that the proposed approach may easily detect the abnormal network traffic with random characteristics in comparison with some “conventional” approaches reported in the literatures.…”
Get full text
Article -
11703
Evidence of $\phi_0$-Josephson junction from skewed diffraction patterns in Sn-InSb nanowires
Published 2025-01-01“…We develop a phenomenological model and perform tight-binding calculations, both methods reproducing the essential features of the experiment. …”
Get full text
Article -
11704
Experimental investigation of the mechanical properties of Alfas stone
Published 2017-04-01“…Also, the size effect was investigated with respect to the calculated intact rock modulus and Poisson’s ratio. …”
Get full text
Article -
11705
Thermodynamic modeling of the Fe-Mg-Si system
Published 2007-01-01“…Comparisons between the calculated and measured phase diagrams show that the measured isothermal six-lions at 1600°, 1454°, 727° and 710°C, the observed regions of primary phases are satisfactorily accounted for by the thermodynamic description. …”
Get full text
Article -
11706
Effects of the Wine Cooperative System on Socio-economic Factors and Landscapes in Mountain Areas
Published 2015-05-01“…The wine cooperative system in vineyards in mountain regions, such as in Banyuls-sur-Mer, France and the Val di Cembra, Italy, offers a privileged context for studying the opportunities for individual action that affect precarious socio-economic balances. …”
Get full text
Article -
11707
Economic Feasibility of Anaerobic Digestion To Produce Electricity on Florida Dairy Farms
Published 2019-05-01“…The consultants visited three dairy farms located in Florida in the winter of 2005, calculated wastewater flows (including flushed manure, milking parlor wastewater, and recycled flush water), and determined the size and other necessary aspects of the potential systems specific to each dairy farm. …”
Get full text
Article -
11708
Design and Analysis of a New Type of Metal Belt Continuously Variable Transmission
Published 2015-01-01“…Through the comparative analysis the constraint condition of two kinds of CVT metal belt ring and wire rope in six degrees freedom,the result shows that the WR- CVT has a stable working state of MB- CVT. The formula of calculating lateral pressure of WR- CVT wire rope and metal block arc groove contact is obtained,the analysis of WR- CVT wire rope and metal block arc groove longitudinal contact and non- contact the relationship of force are carried out,the foundation for the further study of WR- CVT is provided.…”
Get full text
Article -
11709
An investigation of the psychometric properties of the strong brand questionnaire in sport
Published 2016-08-01“…Reliability (859/0) was satisfactory. According to calculated psychometric indices, this questionnaire could be appropriate to assess the most strong sports brands.…”
Get full text
Article -
11710
Internal Gripping Device of the Manipulator based on Worm and Worm Gear and Crank Connecting Rod Drive
Published 2016-01-01“…Its mechanical properties and calculation formula are also given out. After the device being driven by gear motor,output torque rotates the worm first and transmits the driving force to the worm. …”
Get full text
Article -
11711
SDN security prediction method based on bayesian attack graph
Published 2021-11-01“…Existing researchers use threat modeling and security analysis system to evaluate and predict SDN (software defined network) security threats, but this method does not consider the vulnerability utilization of SDN controller and the location of devices in the network, so the security evaluation is not accurate.In order to solve the above problems, according to the probability of device vulnerability utilization and device criticality, combined with PageRank algorithm, a algorithm to calculate the importance of each device in SDN was designed; according to SDN attack graph and Bayesian theory, a method to measure the success probability of device being attacked was designed.On this basis, a SDN security prediction method based on Bayesian attack graph was proposed to predict the attacker's attack path.Experimental results show that this method can accurately predict the attacker's attack path and provide more accurate basis for security defense.…”
Get full text
Article -
11712
NONLINEAR OVERVOLTAGE LIMITER APPLICATION FOR INTERNAL OVER-VOLTAGE PROTECTION IN AVERAGE VOLTAGE NETWORKS
Published 2005-12-01“…The main peculiar feature of the model is an account of m-lag time constant.A mathematical modeling of transitional processes in distribution networks with NOL has been made.Over-voltages in the calculative experiment at arcing ground for load diagram have accounted for 3.2 Uf, that corresponds to the results of field tests.…”
Get full text
Article -
11713
ASPECTS REGARDING THE STUDY OF HYDRAULIC AND MECHANICAL PARAMETERS OF A ”SPIDER CRANE” SYSTEM
Published 2024-01-01“…Thus, an analysis of the hydraulic lifting system was carried out, based on the calculation of hydraulic fluid flows for the drive pumps. …”
Get full text
Article -
11714
A study on the Useful of Zoom Technology in Iraqi EFL Classroom
Published 2024-09-01“…The learners' questionnaire was analyzed, and the learners' response was calculated as a percentage. The research results provided insight into English learners’ approach to using technological means such as Zoom. …”
Get full text
Article -
11715
Suppression model of energy sink-hole attack in WSN based on the unequal cluster radius and mobile cluster head
Published 2017-11-01“…To overcome the problem that partial cluster heads were drastically exhausted by the energy sink-hole attack in wireless sensor network,a novel suppression model based on the optimal path of mobile cluster heads was proposed,which was shown to balance the energy consumption in each cluster head.With the adoption of unequal cluster radius and data traffic monitoring explicitly,the inhibition mechanism was modeled as multivariate linear equations.Furthermore,toroidal projection was adopted to calculate the Euclidean distance,based on which the initial energy of mobile cluster head was configured correspondingly.On this basis,an algorithm based on the minimum cluster lifetime and throughput threshold was provided to achieve the detection and suppression of energy sink-hole attack.The experimental results show that the developed algorithm can suppress energy sink-hole attack evidently and efficiently and is suitable to the resource constrained WSN.…”
Get full text
Article -
11716
Research on the Digital Design of Gear Transmission Scheme
Published 2021-11-01“…From the state space theory of mechanical motion scheme design,the motion and dynamic attributes of the knowledge units are transformed into feature vectors,so that the solution of gear transmission scheme is converted into a matrix calculation. The relationship between dynamic attributes of knowledge units and 3D parametric model is established to realize the visualization of transmission scheme. …”
Get full text
Article -
11717
Kinetics of Phenol Removal from Aqueous Solution by Adsorption onto Peanut Shell Acid-Activated Carbon
Published 2005-05-01“…The rate constant and the equilibrium adsorption capacity were calculated. From these parameters, empirical correlations for predicting the equilibrium adsorption capacity as a function of the C 0 /D ratio, and for estimating the rate constant as a function of the relation D/(C 0 d p ) 0.5 , were derived. …”
Get full text
Article -
11718
Functional composition in software-defined network based on atomic capacity
Published 2015-05-01“…Software-defined network (SDN) enables frequent network functional innovation and evolution,making the control function modularity one of the most hot research fields on SDN.Aiming at network-wide functional composition based on unified module definition and function division,firstly,atomic capacity (AC) is introduced as atomic elements of module function division and an AC-based resource description method is proposed; secondly,functional composition module based on two-level mapping is put forward and a heuristic algorithm to calculate the composition is proposed; fi-nally,an AC-orchestrating layer as extended structure of SDN application layer is devised and then a NetFPGA-10G pro-totype implementation is given.Experimental results show that the method can combine functional instances more effec-tively with better resource utilization.…”
Get full text
Article -
11719
Research of 3D Comprehensive Modification of Transmission Gear
Published 2018-01-01“…Then,the optimal three-dimensional modification parameters are obtained with the help of the neural network and genetic algorithm. The simulating calculation results indicated that the three-dimensional modification of the gear can greatly reduce the gear contact stress,optimize the gear contact spots and reduce the meshing transmission error.The comparison of the results before and after optimization also proved the effectiveness of this method and it can be used as a reference for optimum design of transmission gears.…”
Get full text
Article -
11720
Modeling and Simulation of Alternating Multiphase Walking with Two Legs on Human-machine Carrying Exoskeleton
Published 2022-07-01“…In order to study the variation law of kinematic parameters in the process of multi intersection and replacement in the process of human-machine carrying exoskeleton walking,a kinematic model of exoskeleton is established based on D-H coordinate system,and the kinematic expression in the process of walking is calculated by Newton Euler recursive formula. In order to realize the carrying movement between exoskeleton and human body,the parameters of joints in the process of human walking are measured and analyzed by displacement attitude sensor. …”
Get full text
Article