Suggested Topics within your search.
Suggested Topics within your search.
- Philosophy 11
- History 9
- Moral and ethical aspects 8
- Economic development 7
- Social service 7
- Research 6
- Economic policy 5
- History and criticism 5
- Management 5
- Mass media 5
- Social aspects 5
- Study and teaching 5
- Economic conditions 4
- Education 4
- Quantum theory 4
- methods 4
- Chemistry, Physical and theoretical 3
- Communication 3
- Criticism 3
- Culture 3
- Economic aspects 3
- Economics 3
- Educational leadership 3
- Globalization 3
- Information theory 3
- Jurisprudence 3
- Law 3
- Literature 3
- MATHEMATICS / Mathematical Analysis 3
- Number theory 3
-
23621
Analysis of Meshing Performance for Equal Base Circle Bevel Gear
Published 2019-01-01“…By machining and rolling a pair of modified equal base bevel gears,the correctness of TCA modification program is verified. The theoretical and experimental basis for the meshing performance analysis of gear is provided.…”
Get full text
Article -
23622
The Dirichlet Problem for the 2D Laplace Equation in a Domain with Cracks without Compatibility Conditions at Tips of the Cracks
Published 2012-01-01“…The well-posed formulation of the problem is given, theorems on existence and uniqueness of a classical solution are proved, and the integral representation for a solution is obtained. …”
Get full text
Article -
23623
Ce que nous appelions « l’histoire des médias » : l’exercice de l’archéologie médiatique
Published 2015-04-01“…Wolfgang Ernst is one of the leading voices of media archeology, a research field that has garnered a growing interest since the 2000s for its fresh theoretical and methodological approaches to the study of media. …”
Get full text
Article -
23624
Near-field microwave imaging and quantitative characterization of defects in PE pipeline
Published 2023-09-01“…In order to effectively detect internal defects in polyethylene (PE) pipeline, microwave non-destructive testing technology was used to detect and quantify defects in PE pipelines.A clutter suppression imaging enhancement method based on principal component analysis (PCA) was proposed for extracting defect images from PE pipelines.Threshold segmentation techniques were used to extract defect features from the enhanced images.Experimental results demonstrate that the proposed method can effectively image PE pipelines and highlight defects.The imaging quality is superior to that of images without clutter suppression.Compared to theoretical values, the average relative error in defect localization is 2.38 mm, and the relative error in area quantification is 13.25%.…”
Get full text
Article -
23625
THE MECHANICAL ANALYSIS OF PIPELINE LIFTING DURING THE HORIZONTAL DIRECTIONAL CROSSING
Published 2016-01-01“…And then compared with the calculated value of mathematical model and the value of test measurement,the relative error of theoretical calculation value and experimental value that is about 5. 8% was discovered.Therefore,the mathematical model can be used to guide the actual construction.…”
Get full text
Article -
23626
NEW TRENDS IN CONSUMPTION ON THE COFFEE MARKET
Published 2019-12-01“…The article is written in the form of theoretical considerations supported by an analysis of source materials. …”
Get full text
Article -
23627
Research on fractional repetition codes based on group divisible designs
Published 2015-02-01“…A novel design of FR (fractional repetition) codes was proposed which aims at providing efficient repair at the minimum bandwidth regenerating point.The design consisted of an outer MDS (maximum distance separable) code and an inner repetition code,called GDDBFR (group divisible design based FR) codes.The proposed codes can achieve the system storage capacity under the random access model and are available for a wide range of parameters.Despite of the table-based repair,theoretical analysis identifies that GDDBFR codes generally have large node repair alternatives.Furthermore,experimental results show that GDDBFR codes can significantly reduce the failure repair time when compared with legacy RS (Reed-Solomon) codes and regenerating codes in the domain.…”
Get full text
Article -
23628
Sorption of Radiocaesium onto Powdered and Compacted Rectorite Studied by Batch and Capillary Methods
Published 2007-06-01“…The distribution coefficients calculated from theoretical calculations, experimental measurements and the diffusion coefficients of Cs + ions were compared and discussed in detail. …”
Get full text
Article -
23629
A POWERFUL ENCOUNTER: THE RELATION BETWEEN DIACONIA AND SPIRITUALITY
Published 2020-12-01“…Based on the reviewed literature, the different ways in which spirituality and diaconia are related, as well as the influence of spirituality on diaconia and of diaconia on spirituality are discussed. On the basis of theoretical and empirical research literature, the article explores concepts such as calling, effectivity of diaconia through spiritual strategies, humbleness, perseverance and coping that influence diaconia. …”
Get full text
Article -
23630
COMPARATIVE ANALYSIS OF INVESTMENT EXPENDITURES IN BUDGETS: REGIONAL ASPECT
Published 2020-06-01“…The materials of the article can be used as an information base for further theoretical and applied research on the expenditures of regional budgets in general and the problem of budget investment in particular.…”
Get full text
Article -
23631
Extended access control mechanism for cross-domain data exchange
Published 2019-07-01“…Aiming at the controlled sharing for cross-domain data exchange for complicated application systems,an extended access control mechanism was proposed.The control process was divided into two steps:constraint control and propagation control.The constraint control was used to ensure that access to data was authorized before access request,and the propagation control was used for further extension control after obtaining data access right.In addition,by considering data self and data provenance,the direct and indirect access control were realized.Theoretically,the security and effectiveness of the proposed mechanism were proved.Finally,taking the control of electronic invoice as an example,the implementation approach was proposed.The example shows that the proposed mechanism can perform the fine-grained extended control before and after data in the cross-domain and cross-system are exchanged.…”
Get full text
Article -
23632
Architecture, the guardian of nature. The project of the ground within the transformation of urban highways, 1962-2018
Published 2023-06-01“…With this purpose, it reconstructs the hermeneutic reference frame by progressively discussing the theoretical arguments, deepening approaches, and design cases, among which the applicative one elaborated for the transformation of Palermo’s ring road. …”
Get full text
Article -
23633
Application of Differential Evolution Algorithm in the Construction and Simulation of Interactive English Translation Teaching Mode
Published 2022-01-01“…Additionally, by studying whether the key initial round number can reach the theoretical value under the actual linear layer, the effect of differential evolution algorithm processing teaching information is evaluated. …”
Get full text
Article -
23634
Educational practices in prostitution: experiences in the Associação Sergipana de Prostitutas
Published 2023-12-01“…Then, we employed documental research with the marks of ASP experiences. As a theoretical referential we used Walsh's (2008) understandings of Decolonial Pedagogy. …”
Get full text
Article -
23635
Kinematics Simulation Analysis of Six-legged Upright Walking Robot based on Adams
Published 2020-08-01“…The results show that, walking leg mechanism can meet to working requirements of six-legged walking mechanism, design scheme is feasible. The theoretical basis for the next dynamics analysis and optimization design is provided.…”
Get full text
Article -
23636
Performance analysis of multi-relay DF cooperative communication system based on directional antenna
Published 2016-06-01“…In order to achieve reliable communication in multi-relay cooperative communication,the directional antenna combining multi-relay cooperative communication system and optimal relay selection decode-and-forward cooperative strategy was presented.Firstly,the theoretical closed form of outage probability of the communication system using directional antenna operating in the three modes of DT-DR,DT-OR and OT-OR were presented.Then for three kinds mode,the collaboration communication system interrupt probability and signal-to-noise ratio,the number of relay nodes,the antenna gain channel fading efficiency and relationship between the channel capacity were analyzed in numerical simulation.These findings reveal that excellent performance of cooperative communication system with directional antennas could be achieved such as smaller outage probability and improved by best relay nodes and optimal power allocation coefficient.…”
Get full text
Article -
23637
A Note on the Properties of Generalised Separable Spatial Autoregressive Process
Published 2009-01-01“…The spectral density function (SDF), the autocovariance function (ACVF), and the autocorrelation function (ACF) are derived. The theoretical ACF and SDF plots are presented as three-dimensional figures.…”
Get full text
Article -
23638
Label flipping adversarial attack on graph neural network
Published 2021-09-01“…To expand the adversarial attack types of graph neural networks and fill the relevant research gaps, label flipping attack methods were proposed to evaluate the robustness of graph neural network aimed at label noise.The effectiveness mechanisms of adversarial attacks were summarized as three basic hypotheses, contradictory data hypothesis, parameter discrepancy hypothesis and identically distributed hypothesis.Based on the three hypotheses, label flipping attack models were established.Using the gradient oriented attack methods, it was theoretically proved that attack gradients based on the parameter discrepancy hypothesis were the same as gradients of identically distributed hypothesis, and the equivalence between two attack methods was established.Advantages and disadvantages of proposed models based on different hypotheses were compared and analyzed by experiments.Extensive experimental results verify the effectiveness of the proposed attack models.…”
Get full text
Article -
23639
Structural Design and Experiment Analysis of a Morphing Wing Structure
Published 2020-03-01“…The optimization algorithm is used to optimize the morphing wing structure. On the basis of theoretical research, the experimental prototype is processed and the related experimental tests are carried out.…”
Get full text
Article -
23640
Between Excess and Subtraction: Scenographic Violence in Howard Barker’s Found in the Ground
Published 2017-03-01“…It contextualises the play through Barker’s theoretical writings, Lingis’ notion of catastrophic time (2000) and Aronson’s proposition of the stage as an abyss (2005).…”
Get full text
Article