Suggested Topics within your search.
Suggested Topics within your search.
- History 25
- Politics and government 11
- History and criticism 10
- Law reports, digests, etc 9
- Social conditions 9
- Civilization 6
- Economic conditions 6
- Law 6
- Philosophy 6
- Economic policy 5
- Mass media 5
- Moral and ethical aspects 5
- Photography 5
- Psychology 5
- Women 5
- methods 5
- English language 4
- Methodology 4
- Constitutional law 3
- Criminal law 3
- Digital techniques 3
- Education, Elementary 3
- Educational technology 3
- Information technology 3
- Interpretation and construction 3
- Language 3
- Leadership 3
- Personnel management 3
- Research 3
- Social aspects 3
-
6821
Differential Measurement for Cavity Ring-Down Spectroscopy with Dynamic Allan Variance
Published 2020-01-01“…The method of dynamic Allan variance (DAVAR) is used to analyze the time-varying characteristics of a nonstationary signal and is thus incorporated to evaluate the random error in the cavity ring-down spectroscopy (CRDS) experiments. …”
Get full text
Article -
6822
Beetle Swarm Optimization Algorithm-Based Load Control with Electricity Storage
Published 2020-01-01“…Based on the intelligent bidirectional interactive technology, this paper studies the flexible working mode and optimal power consumption strategy of several typical power consumption loads including energy storage equipment. Based on the real-time price scheme, the objective function and constraints are obtained, and the adaptive algorithm for beetle swarm optimization with variable whisker length is used to optimize so that the electric equipment can automatically change its power load through the intelligent terminal and even work in the way of reverse power transmission. …”
Get full text
Article -
6823
Cost-effectiveness analysis of pembrolizumab plus chemotherapy versus chemotherapy in untreated advanced pleural mesothelioma in the Chinese healthcare system
Published 2025-01-01“…To manage the uncertainty in the model, both probabilistic sensitivity analysis (PSA) and one-way sensitivity analysis (OWSA) were used.ResultsIn the base-case analysis, pembrolizumab plus chemotherapy resulted in an incremental gain of 0.23 QALYs at an additional cost of $18,199.63, resulting in an ICER of $80,557.23/QALY. …”
Get full text
Article -
6824
STATIC ANALYSIS AND FREE VIBRATION ANALYSIS OF THE PYRAMIDAL LATTICE SANDWICH STRUCTURE BASED ON LAYERWISE/SOLID-ELEMENTS METHOD
Published 2019-01-01“…The layerwise/solid element method( LW/SE) was used to study the static and free vibration problems of lattice sandwich structure under different boundary conditions. …”
Get full text
Article -
6825
Tag dynamic ownership transfer protocol for multi-owner with weights
Published 2017-04-01“…A dynamic ownership transfer protocol of RFID tag based on Lagrange algorithm was proposed to achieve the transfer for multi-owner with different weights.When the ownership of a tag changed,the agreement could recover the original secret key to verify the legitimacy of the owners,and use secret sharing algorithm to redistribute sub-key according to the new weights of the owners to make the security and flexibility of the ownership transfer improved.The simulation is carried out to show that it adapts to a low-cost RFID tag because the calculation and time consuming are low in the protocol.…”
Get full text
Article -
6826
Virtual network embedding algorithm based on consultant guided search
Published 2020-06-01“…Considering at the problem of virtual network embedding,a virtual network embedding algorithm based on consultant guided search was proposed.The CPU of node,node degree and adjacent bandwidth were considered comprehensively,and the virtual network embedding was carried out with the meta-heuristic consultant guidance search.Experimental results show that compared with EAJTA-VNE algorithm and ANT-VNE algorithm,the proposed CGS-VNE algorithm has a higher request acceptance rate and revenue-cost ratio,and the embedding time in the context of low,medium and high resource demand of virtual network requests is shorten.…”
Get full text
Article -
6827
Deep learning for compressed sensing based sparse channel estimation in FDD massive MIMO systems
Published 2021-08-01“…For FDD massive multi-input multi-output (MIMO) downlink system, a novel deep learning method for compressed sensing based sparse channel estimation was proposed, which was called convolutional compressed sensing network (ConCSNet).In the ConCSNet, the convolutional neural network was utilized to solve the inverse transformation process from measurement vector y to signal h and solve the underdetermined optimization problem through data-driven method without sparsity.Simulation results show that the algorithm can recover the channel state information in massive MIMO Systems with unknown sparsity more quickly and accurately.…”
Get full text
Article -
6828
Access control security model based on behavior in cloud computing environment
Published 2012-03-01“…In view of the current popular cloud computing technology,some security problems were analyzed.Based on BLP(Bell-LaPadula) model and Biba model,using the access control technology based on behavior to dynamic adjusting scope of subject's visit,it put forward the CCACSM ( cloud omputing access control security model).The model not only guarantees the cloud computing environment information privacy and integrity,and makes cloud computing environment with considerable flexibility and practical.At last,it gives the model's part,safety justice and realization process.…”
Get full text
Article -
6829
The Numerical Analysis for Parametric Resonance of Multicable System considering Interaction between Adjacent Beam Portions
Published 2021-01-01“…The consequences show that the cable will resonate at the fundamental frequency under the support excitation. In particular, when resonance occurs, most of the energy in the subsystem is transferred to the cable, resulting in the resonance amplitude of the beam portion being weakened to some certain extent. …”
Get full text
Article -
6830
Ethical leadership and nurses’ job performance: the mediating role of self-compassion
Published 2025-01-01“…Data analysis was performed using descriptive statistics, the Mann–Whitney U test, the Kruskal-Wallis H rank sum test, Spearman correlation analysis, and the PROCESS tool within SPSS.ResultsThe analysis revealed a significant positive correlation between ethical leadership and self-compassion (r = 0.631, p < 0.01), as well as between ethical leadership and job performance (r = 0.688, p < 0.01). …”
Get full text
Article -
6831
Temporal-Spatial Traffic Flow Prediction Model Based on Prompt Learning
Published 2024-12-01“…Traffic flow prediction is one of the most important and attractive topics in geographical information science (GIS), traffic management, and logistics. …”
Get full text
Article -
6832
-
6833
A method of building alarm causality graph for anomaly events in network services
Published 2024-05-01“…In order to reduce the number of alarms that operators needed to handle, as well as automatically extracted the root alarms in the alarm storm, a method for generating an alarm causality graph based on the analysis of the propagation mode of network service alarms was proposed , and applied to extract key information of the alarm storm when anomaly events occurred. Real datasets of an operator's online network management system were used in experiments to verify the effect of building the alarm causal graph in extracting the alarm storm abstract. …”
Get full text
Article -
6834
Frost Heaving Properties of Gravelly Soils in Alpine Seasonally Frozen Regions
Published 2022-01-01“…First, particle analysis and compaction tests were used to assess the basic characteristics of gravelly soil. …”
Get full text
Article -
6835
Optimizing glycerosome formulations via an orthogonal experimental design to enhance transdermal triptolide delivery
Published 2022-03-01“…With entrapment efficiency and drug loading as dependent variables, the glycerosome formulation was optimized using an orthogonal experimental design. Phospholipid-to-cholesterol and phospholipid-to-triptolide mass ratios of 30:1 and 5:1, respectively and a glycerol concentration of 20 % (V/V) were used in the optimization. …”
Get full text
Article -
6836
Effects of silkworm pupa protein on apoptosis and energy metabolism in human colon cancer DLD-1 cells
Published 2022-09-01“…Objective: To investigate the effects of silkworm pupa (Bombyx mori) protein (SPP) on cell proliferation, apoptosis and energy metabolism in human colon cancer cells DLD-1. Methods: CCK-8 was used to detect cell proliferation rate after 72 h of cell culture for the control group (normal cultured DLD-1 cells) and SPP dose groups; Annexin-V/PI was applied to observe cell apoptosis; XFe24 Extracellular Flux Analyzer was used to detect cell mitochondrial respiratory function and glycolytic function. …”
Get full text
Article -
6837
Application Strategies of Super-Enhancer RNA in Cardiovascular Diseases
Published 2025-01-01Subjects: Get full text
Article -
6838
Audio2DiffuGesture: Generating a diverse co-speech gesture based on a diffusion model
Published 2024-09-01“…Specifically, we employed cascaded 1D convolutions to extract features from the audio waveform and a two-stage attention mechanism to capture features from the Mel-spectrogram. …”
Get full text
Article -
6839
Survey on IPv6 address scanning technology based on seed sources
Published 2019-12-01“…Nowadays,the state-of-the-art technologies can spend a very short time to scan the whole IPv4 space,but these methods cannot be applied to the huge IPv6 space easily.Therefore,many researchers propose different heuristic algorithms for the sake of IPv6 scanning.The common way of these algorithms is to input collected IPv6 seed addresses and output new most likely active IPv6 addresses as candidates for later scanning.These methods greatly reduce the scanning range of the active address area.These technologies based on seed addresses were classified,analyzed and summarized,and detailed analysis of the advantages and disadvantages of each method was given.And the several challenges faced by the methods were discussed.73M seed addresses were collected in total from two sources,including published IPv6 datasets in papers and Beijing Node of China Education and Research Network.Through the proposed experiments,time performance and hit rate of four IPv6 address scanning technologies based on seed addresses was compared.Finally,the own thoughts on this field and some future research directions were proposed.…”
Get full text
Article -
6840
Mechanism of Action of Icariin in Bone Marrow Mesenchymal Stem Cells
Published 2019-01-01“…Icariin (ICA) is the active ingredient of Herba epimedii, a common herb used in traditional Chinese medicine (TCM) formulations, and can effectively enhance BMSC proliferation and osteogenesis. …”
Get full text
Article