Suggested Topics within your search.
Suggested Topics within your search.
- Philosophy 11
- History 9
- Moral and ethical aspects 8
- Economic development 7
- Social service 7
- Research 6
- Economic policy 5
- History and criticism 5
- Management 5
- Mass media 5
- Social aspects 5
- Study and teaching 5
- Economic conditions 4
- Education 4
- Quantum theory 4
- methods 4
- Chemistry, Physical and theoretical 3
- Communication 3
- Criticism 3
- Culture 3
- Economic aspects 3
- Economics 3
- Educational leadership 3
- Globalization 3
- Information theory 3
- Jurisprudence 3
- Law 3
- Literature 3
- MATHEMATICS / Mathematical Analysis 3
- Number theory 3
-
25461
Multicast communication protocol based on quantum key distribution against trojan horse attacking
Published 2014-07-01“…The communication protocols of throughput, channel utilization, security proof were analyzed theoretically. By analyzing, the protocol can effectively counter Trojan horse attacking, guarantee the multicast communication information safely.…”
Get full text
Article -
25462
Dynamic Analysis of Internal Flow Field of Double-rectangular Cavity Hydrostatic Thrust Bearing
Published 2018-01-01“…Taking the Q1-205 type double-rectangular cavity hydrostatic thrust bearing as study object,the method combining theoretical analysis,dynamic simulation and experimental testing is used,aiming at the variation of oil film thickness under six inlet velocity and three working speed conditions,the velocity field,vorticity and pressure field are analyzed. …”
Get full text
Article -
25463
An exploration of the use of technology by congregations
Published 2015-12-01“…The aim is to provide an empirical and theoretical description of the situation in this regard. …”
Get full text
Article -
25464
Authoritarian practices on the rise? Reflections from a Médecins Sans Frontières research programme on the engagement between international humanitarian non-governmental organisati...
Published 2025-02-01“…The research was grounded in a theoretical framework which integrates the concepts of authoritarian practices (Glasius), regulatory practices, the differentiation between strategic and tactical levels of engagement, and conceptions of legitimacy.…”
Get full text
Article -
25465
Evaluation du risque de déstabilisation des infrastructures de haute montagne engendré par le réchauffement climatique dans les Alpes françaises
Published 2015-09-01“…An index of destabilisation risk was constructed to identify and rank infrastructures at risk. This theoretical risk index includes a characterisation of hazards and a diagnosis of vulnerability. 10 % of the infrastructures were characterised by a high risk of destabilisation.…”
Get full text
Article -
25466
Intelligent System of Somatosensory Music Therapy Information Feedback in Deep Learning Environment
Published 2021-01-01“…There is an inaccuracy problem in electrogram judgment, and deep learning has great advantages in signal feature extraction and classification. Based on the theoretical basis of Deep Belief Network (DBN) in deep learning, this paper proposes a method that combines the optimized Restricted Boltzmann machine (RBM) feature extraction model with the softmax classification algorithm. …”
Get full text
Article -
25467
RESEARCH ON DEFORMATION ZONE THICKNESS IN METAL SHEET SINGLE POINT INCREMENTAL FORMING PROCESS
Published 2016-01-01“…This paper mainly research on deformation zone of conical parts from theoretical calculation and finite element simulation and experiment of these three kinds of aspects. …”
Get full text
Article -
25468
Fast and accurate deep learning scans for signatures of natural selection in genomes using FASTER-NN
Published 2025-01-01“…Furthermore, FASTER-NN can accurately identify selective sweeps in recombination hotspots, which is a highly challenging detection problem with very limited theoretical treatment to date.…”
Get full text
Article -
25469
Performance of Multimodel Schemes for Seasonal Precipitation over Indian Region
Published 2018-01-01“…A well-known statistical estimation theoretic approach, namely, Best Linear Unbiased Estimator (BLUE), is examined on 16 member models. …”
Get full text
Article -
25470
Design Approach of Tooth Profile Parameter for Harmonic Drive with Nice Meshing Performance
Published 2018-01-01“…Analysis of fitting error and backlash demonstrates that the designed tooth profile of the rigid spline is very close to the theoretical conjugate curve,the backlash distribution is ideal,the contact ratio and maximum engaging depth are guaranteed,which proves that the tooth profile parameter design method is effective and can guarantee the meshing performance.…”
Get full text
Article -
25471
The circular economy for food in future cities. Good practices that define Smart Food
Published 2020-12-01“…This essay makes its scientific contribution to define both the theoretical-practical framework where the Circular Economy for food is developing and, in particular, its application to the urban context. …”
Get full text
Article -
25472
Index modulation aided frequency hopping anti-jamming and encryption method based on rotation scrambling
Published 2021-12-01“…In order to improve the anti-jamming ability and security of the wireless communication system, an index frequency-hopping anti-interference encryption method based on rotation scrambling was designed, which could be simply called encrypted index modulation frequency hopping spread spectrum (EIM-FHSS).Firstly, the wireless secret key was used to control multiple orthogonal frequency hopping patterns to determine the available frequencies at the current moment.The index of the active frequency (the frequency point with the modulation symbol) was used to transmit the bit information.Secondly, the secret key was used to employ scrambling encryption on the mapping table between information bits and the indexes, to ensure the security of the index bits.Finally, constellation rotation encryption was used on the symbols transmitted on the active frequency in the scheme, which ensured the security of symbol bits.Theoretical analysis and simulation results show that the proposed EIM-FHSS method has stronger security and anti-jamming abilities than the traditional IM-FHSS methods.…”
Get full text
Article -
25473
Multi-objective Optimization Design of Wet Friction Clutches
Published 2023-05-01“…The results show that the optimization method used in this study is effective and can provide theoretical reference for the design of the friction plate structure and the optimization of clutch parameters.…”
Get full text
Article -
25474
-
25475
Fictionality in “Fog on the Barrow-downs”: Myth and Reference
Published 2024-10-01“… Exploring fictionality as the link between imagined and referential reality, the paper draws on the theoretic al framework of cognitive narratology in examining the mechanisms on which the creation of myth relies in the narratives introduced at the beginning of J. …”
Get full text
Article -
25476
Calculation Method of the Meshing Force of Cycloid Pinwheel with Considering Position and Radius Combined Random Error of Pin
Published 2019-01-01“…It is difficult to accurately process the position and the radius of pins as theoretical values when cycloidal wheels and pin wheels are machined and assembled. …”
Get full text
Article -
25477
New Area Studies as an Epistemological Framework: Some Reflections of Knowledge Production and Positionality
Published 2025-01-01“…To present New Area Studies as an epistemological framework, in this theoretical intervention, I first engage with its origins in the field of Area Studies and the critiques aimed at it. …”
Get full text
Article -
25478
MOLECULAR MARKERS: IMPLEMENTATION IN CROP PLANT BREEDING FOR IDENTIFICATION, INTROGRESSION, AND GENE PYRAMIDING
Published 2014-12-01“…Over the past decades, wide theoretical and practical experience has been obtained in application of DNA markers for investigation of plant genetic diversity, construction of molecular genetic maps, mapping of genes and quantitative trait loci, and employment of molecular marker technologies in the development of commercial cultivars and breeding of crop lines. …”
Get full text
Article -
25479
Practical realization of chiral nonlinearity for strong topological protection
Published 2025-01-01“…Based on an acoustic prototype design with non-local nonlinearities, we theoretically, numerically, and experimentally implement the nonlinear topological edge states that persist in all nonlinear degrees and directions without any frequency shift. …”
Get full text
Article -
25480
Warpage in wafer-level packaging: a review of causes, modelling, and mitigation strategies
Published 2025-02-01“…Warpage characterization techniques and modeling approaches, including theoretical, numerical, and emerging artificial intelligence and machine learning (AI/ML) methods, have been analyzed. …”
Get full text
Article