Suggested Topics within your search.
Suggested Topics within your search.
- Philosophy 11
- History 9
- Moral and ethical aspects 8
- Economic development 7
- Social service 7
- Research 6
- Economic policy 5
- History and criticism 5
- Management 5
- Mass media 5
- Social aspects 5
- Study and teaching 5
- Economic conditions 4
- Education 4
- Quantum theory 4
- methods 4
- Chemistry, Physical and theoretical 3
- Communication 3
- Criticism 3
- Culture 3
- Economic aspects 3
- Economics 3
- Educational leadership 3
- Globalization 3
- Information theory 3
- Jurisprudence 3
- Law 3
- Literature 3
- MATHEMATICS / Mathematical Analysis 3
- Number theory 3
-
24641
Wireless May Benefit Blockchain
Published 2024-12-01“…The paper then proceeds to present extensive simulation results as a means to confirm the underpinning theoretical findings. Overall, we emphasize that the framework’s holisticity will allow it to be applied to diverse consensus mechanisms.…”
Get full text
Article -
24642
Kinematics Simulation Analysis of the Non-coaxial Style Two-output Impulse Generating Mechanism based on ADAMS
Published 2015-01-01“…In order to reduce the pulsation of output angler velocity of the non-coaxial style of two-output impulse generating mechanism,by using rigid body dynamics software ADAMS for parametric modeling,and combining the MATLAB for data analysis,the variation law of the double output rod angular speed and acceleration and the institutional average,pulsation coefficient and abrupt change of angular acceleration with crank length change are obtained.Through the simulation analysis of example,the consistency of output motion and the crank speed adjustability are verified,and the variation law of the mechanism pulsation will be decrease with the increase of crank length.Finally,the impact of long-rod OE and EF change on the double output motion law of mechanism is analyzed,it is shows that,after increasing the length of the rod OE and EF,the mechanism pulsation decreased,a theoretical basis of the dimension synthesis and optimization of the impulse generating mechanism is provided.…”
Get full text
Article -
24643
IMPACT STABILITY ANALYSIS OF JACKING MACHINE WITH AUTOMATIC FOLLOWING SAFETY DEVICE
Published 2020-01-01“…The maximum distance that can exist between the load-bearing roof and the weight during the jacking process is obtained. It provides a theoretical basis for the design of the jacking machine following control.…”
Get full text
Article -
24644
The Economic Pyramid of Unequal Exchange within the European Union
Published 2024-10-01“…On the basis of the theoretical framework of the study, an empirical investigation of unequal exchange within the 27 countries of the European Union (EU27) is developed. …”
Get full text
Article -
24645
Long-range CCΦ gates via radio-frequency-induced Förster resonances
Published 2025-01-01“…Taking into account finite Rydberg states lifetimes, we achieve an average theoretical gate fidelity of 99.27% under room-temperature conditions (improved up to 99.65% in a cryogenic environment), thus showing the protocol compatibility with modern quantum error correction techniques.…”
Get full text
Article -
24646
Vers la ville de l’âge IV ?
Published 2019-06-01“…While drawing on the results of an urban project workshop, we will endeavour to develop a theoretical hypothesis in line with the considerations made by Christian de Portzamparc on the three ages of the city. …”
Get full text
Article -
24647
TRANSIENT MOTION SIMULATION AND STRESS ANALYSIS OF RECIPROCATING COMPRESSOR VALVE
Published 2016-01-01“…The results of the analysis have important theoretical significance for valve design optimization and the improvement of valve life.…”
Get full text
Article -
24648
The effect of thickness on out-of-plane constraint in terms of the T-stress
Published 2014-10-01“…The plastic zone is theoretically and numerically analyzed for various combinations of the nonsingular terms xx T to zz T ratios in connection with specimen thickness under mode I loading. …”
Get full text
Article -
24649
Entrepreneurial Intention: Categorization, Classification of Constructs and Proposition of a Model
Published 2019-01-01“…There is an over-standardization in studies on EI, and a focus on potential dogmatism in the area – that is, theoretical and methodological inflexibility with replication based on alteration only in substantive domain of EI. …”
Get full text
Article -
24650
A New Type of Space-position Full-balanced Mechanical Crane and Analysis of Its Comprehensive Performance
Published 2018-01-01“…The device provides a theoretical basis for the design of smart handling machinery.…”
Get full text
Article -
24651
Why Do People Come to See Mount Everest? Collective Representations and Tourism Practices in the Khumbu Region
Published 2018-01-01“…The popularity and increasing openness of the Everest region and its inhabitants to globalisation, which could theoretically call into question the meaning and very principles of this heterotopia, do not seem to affect the experience of trekkers, despite the fact that their practices are based on a complete break with the places and time frames of their everyday life.…”
Get full text
Article -
24652
Le paysage et l’artifice en géographie
Published 2015-07-01“…He does not develop a substantial theoretical foundation on this topic nor does he build truly landscape-based analyses in view of a synthetic approach.…”
Get full text
Article -
24653
Academic connotation and research trends of privacy computing
Published 2022-12-01“…The authors of this paper first proposed the concept, definition and academic connotation of privacy computing, and formed a relatively mature theoretical and technical system accordingly.In order to continuously promote the academic research and industrial application of privacy computing, the academic connotation of privacy computing was elaborated, including how to understand the full-life cycle, extended control, privacy quantification and mapping, desensitization effect evaluation.Besides, the necessity of iterative on-demand desensitization and the motivation to study the language of privacy computing were presented.The role of audit log self-storage in ubiquitous sharing was explained and some distorted academic concepts were also clarified.Moreover, 37 research points in 9 aspects of privacy computing and 40 research points in 8 aspects of data security were given.It helps to better understand the research scope of privacy computing and correctly distinguish between privacy computing and data security.…”
Get full text
Article -
24654
A Large Goaf Group Treatment by means of Mine Backfill Technology
Published 2021-01-01“…The volume of each goaf to be backfilled was quantitatively analyzed in the combination of theoretical analysis and three-dimensional laser scanning technology. …”
Get full text
Article -
24655
Study on Design and Experiment for Internal Gear Transmission with High Contact Ratio
Published 2018-01-01“…At the same time,a theoretical and technical support for engineering application is provided.…”
Get full text
Article -
24656
Semantic representation and interval roughness analysis of IoT CapBAC rules
Published 2021-09-01“…To break the bottleneck of interval roughness analysis, a rule semantic model IoTACS was proposed, and IoTRA algorithm was given.In IoTACS, a conceptual structure of the IoT CapBAC rule domain was proposed, the quantitative data properties of the basic concepts were given, then the semantic tree model of rule semantics was proposed, the time relations of the time ontology were extended and its quantitative logical representation was given.As the theoretical basis, it was proved that the root cause of interval inconsistency was roughness, and its logical formalization of the roughness was given.The case study shows that IoTRA can help to improve the accuracy of the authorized interval, and the IoTACS model have higher readability than the formal model.The comparison experiments with the IoTC<sup>2</sup> algorithm on the inconsistency analysis show that the response time of the IoTRA algorithm is more significantly reduced.…”
Get full text
Article -
24657
Spectrum access scheme of MAC layer for real-time traffic in cognitive radio network
Published 2014-04-01“…In channel access contention phase, the effect of channel conflict problem and deaf terminal problem in multichannel coordination can be reduced by designing channel access frame. The theoretical and experimental results were presented to demonstrate the effectiveness of our proposed protocol. …”
Get full text
Article -
24658
RESEARCH ON NUMERICAL SIMULATION METHOD OF THREAD CONNECTION BASED ON FINITE ELEMENT METHOD
Published 2019-01-01“…The error between the results and the experimental results is within 8%, which is within the range of theoretical calculation. The validity of this method is proved.…”
Get full text
Article -
24659
Quantum Radiation Properties of Dirac Particles in General Nonstationary Black Holes
Published 2014-01-01Get full text
Article -
24660
Approximate Analytical Solution to Nonlinear Delay Differential Equations by Using Sumudu Iterative Method
Published 2022-01-01“…Some basic properties and theorems which help us to solve the governing problem using the suggested approach are revised. …”
Get full text
Article