Suggested Topics within your search.
Suggested Topics within your search.
- Academic writing 1
- Agriculture 1
- Autonomy and independence movements 1
- Calculus 1
- Curricula 1
- Curriculum planning 1
- Decolonization 1
- Dissertations, Academic 1
- Economic policy 1
- Education 1
- Electric circuit analysis 1
- Electric network analysis 1
- Electronic Health Records 1
- English language 1
- Entrepreneurship 1
- Film adaptations 1
- Foreign economic relations 1
- Grammar, Comparative and general 1
- History 1
- History and criticism 1
- International business enterprises 1
- LANGUAGE ARTS & DISCIPLINES / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Syntax 1
- Literary style 1
- MATHEMATICS / Mathematical Analysis 1
- Manufacturing processes 1
- Medical Informatics Applications 1
- Medical informatics 1
- Medical technology 1
-
16121
Influence of Internal Quality of Gear on Strength and Life of Gear
Published 2021-09-01“…The influence of some items of internal quality of carburizing quenching gear (surface decarburization, internal oxidation, coarse martensite, carbide structure, non-martensite structure, black structure, retained austenite, grain size, etc.) on gear strength and life are mainly discussed, the degree of influence is mostly expressed by the data of experimental results. Finally, the <italic>R-S-N</italic> curve test data(gear decarburization layer depth 0.2~0.3 mm, the bending endurance limit stress <italic>σ<sub>F</sub></italic><sub> lim</sub> at tooth root is reduced by 23%~50%) of carburizing and quenching gears with 5 materials show that the great influence of gear surface decarburization on gear bending fatigue strength.…”
Get full text
Article -
16122
Reconstructed Target Range Profile via Unitary ESPRIT Superresolution Algorithm
Published 2017-01-01“…Moreover, we employ the central moments to provide translation invariant and scale invariant feature vectors. Finally, the proposed unitary ESPRIT (U-ESPRIT) based range profile reconstruction method is applied to the simulated annealing resilient backpropagation (SARPROP) classification algorithm to evaluate the recognition performances. …”
Get full text
Article -
16123
A joint optimization algorithm based on energy efficiency maximization for massive MIMO systems
Published 2017-12-01“…For the massive multi-cell multi-input multiple-output (MIMO) communication uplink system with unknown channel status information,a resource allocation algorithm which jointly optimizes the pilot sequence length,pilot symbol power and data symbol power was proposed.With the maximum ratio combining (MRC) receiver,the influence of circuit power was considered,pilot contamination and the constraint of maximum transmission power,and a nonconvex function modeled with the goal of maximizing energy efficiency (EE) was established.Firstly,the fractional form was transformed into an equivalent subtractive form by using the properties of fractional programming and then decomposed into a series of DC problems,finally,by using an iterative optimization algorithm,the three variables were alternately adjusted with maximizing the energy efficiency.Simulation results show that with the increasing of the maximum symbol transmission power,the proposed scheme can still have the great EE performance for the massive MIMO systems.…”
Get full text
Article -
16124
Obstacle Capability of an Air-Ground Amphibious Reconnaissance Robot with a Planetary Wheel-Leg Type Structure
Published 2021-01-01“…The kinematic characteristic curves of each component and the whole prototype are obtained, which provides a theoretical basis for the design and numerical calculation of the robot structure. Finally, the climbing ability tests of the reconnaissance robot prototype verify the reliability and practicability of the body structure of the reconnaissance robot.…”
Get full text
Article -
16125
Du paysage de l’écologie à celui du développement
Published 2017-12-01“…The challenge at the regional level is to limit urbanisation and the intensification of agriculture. Finally, with the deployment of the ecological consistency plan the landscape becomes a development landscape experienced by the inhabitants in their daily lives as a support for and product of economic and agricultural activities.…”
Get full text
Article -
16126
Micropore Size Analysis of Activated Carbons Using Nitrogen, Carbon Dioxide and Methane Adsorption Isotherms: Experimental and Theoretical Studies
Published 2012-04-01“…According to the results, despite the different characteristics of CO 2 and CH 4 , a quite good consistency between the MPSDs from these two gases was obtained for the three carbon samples. Finally, it was shown that the adsorption isotherms of CO 2 and CH 4 at the higher temperatures should be considered as a complement to N 2 adsorption at 77 K for the characterization of porous texture (micropore volume and MPSDs) of activated carbon samples.…”
Get full text
Article -
16127
Antiseizure medications and their differing effects on cardiovascular risk
Published 2025-03-01“…Long term risks of enzyme inducing antiseizure medications and valproic acid are apparent when studies examine medications individually. Finally, effects of antiseizure medications on cardiac rhythm and possibly autonomic control are discussed with respect to their clinical relevance to the practicing clinician.…”
Get full text
Article -
16128
Research of Kinematics and Workspace of 2-SPR/(U+UPR)P(vA) Reconfigurable Parallel Mechanism
Published 2021-06-01“…Secondly,the closed-loop vector method is used to solve the two sets of inverse kinematic solutions of the mechanism and verification,and the particle swarm optimization algorithm is used to study and establish the positive solution model of the mechanism under the R phase and verify. Finally,software to solve the mechanism's reachable workspace under the R phase and the translational workspace under the U phase are solved using SolidWorks combing with Matlab. …”
Get full text
Article -
16129
Certificate-based cross-domain authentication scheme with anonymity
Published 2018-05-01“…Considered the cross-domain authentication of mobile devices in the Internet of things,a certificate based anonymous cross-domain authentication scheme was proposed.First,combined with the characteristics of PKI and IBS,a certificate based signature (CBS) algorithm was proposed,and the security of the proposed CBS scheme was proved.The verification result of the signature in the algorithm was constant,which ensured the anonymity of the authentication entities in the cross-domain process.The algorithm does not contain pairing,and avoids complex certificate management in traditional PKI and the key escrow and distribution of IBS.Then a cross-domain authentication scheme for mobile devices was constructed by combining the proposed signature algorithm.The scheme ensures the anonymity of authentication at the same time.Finally,compared with other schemes,the scheme proposed is more secure and has less computation cost and communication cost.Moreover,the scheme is simple and efficient,and could be applied to the cross-domain authentication of mobile devices.…”
Get full text
Article -
16130
Fractional Soliton Dynamics and Spectral Transform of Time-Fractional Nonlinear Systems: A Concrete Example
Published 2019-01-01“…As a result, a formula of exact solution with Mittag-Leffler functions is obtained. Finally, in the case of reflectionless potential the obtained exact solution is reduced to fractional n-soliton solution. …”
Get full text
Article -
16131
Micro-pouvoirs en action au doctorat : la perception des étudiants
Published 2022-12-01“…The main results of this study lead us to a compromise between the sacrifices imposed in exchange for the social approval of the different actors of the academic institution. Finally, avenues for future research are proposed as well as the pedagogical implications arising from it are discussed.…”
Get full text
Article -
16132
Behavior of Reinforced Concrete Beams with Openings: A Review
Published 2025-02-01“…It is also found that the beam's opening results result in shorter chord distances; therefore, rectangular openings work better horizontally than vertically to maintain a balance between compression and tension zones in the beam. Finally, the size of the openings inversely affects the strength and behavior of the RC beams. …”
Get full text
Article -
16133
Joint design of tuple space and bitmap for two-dimensional packet classification
Published 2011-01-01“…Based on dimension decomposition idea,a high-performance two-dimensional packet classification algorithm by jointing tuple space and bitmap technology,called TB,was designed and implemented.Firstly,TB processes one-dimension matching for SIP and DIP respectively,then it forms tuple space access route by applying the cross-combination method to the matching results in the first step,finally,to reduce the number of required accessing tuple space,TB obtains the multi-dimensional matched rule by adapting bitmap filtering technique to filter tuple space.Compared to traditional tuple space algorithm,the structure of TB is clearer,more concise and easier to update and implement,TB also has better time and space performance.The experimental results show that TB algorithm saves 35.1% of the space requirement than RSFR algorithm and the number of average memory accesses lower than RSFR 26.6%.…”
Get full text
Article -
16134
Experimental and simulation investigation of ultrasonic elliptical vibration cutting of tungsten alloys in ultra-precision machining
Published 2025-01-01“…Finite element modeling (FEM) reveals that ultrasonic vibration can decrease the cutting force to varying degrees and increase the strain rate in the tungsten alloys cutting zone up to 1.8E5 s−1, with the effect of elliptical locus being the most prominent. Finally, an examination of the surface microstructures and chip formation of UVC on tungsten alloys reveals that it facilitates plastic material removal and increases material plasticity, which advances the understanding of the machining techniques utilized to achieve the ultra-smooth surface of tungsten alloys using UEVC.…”
Get full text
Article -
16135
Enhanced-throughput multipath routing algorithm based on network coding in IoVs
Published 2013-08-01“…Secondly, network linear coding was adopted to encode the transmitted data of source vehicle nodes and intermediate vehicle nodes. Finally, destination nodes decode the received data. …”
Get full text
Article -
16136
Communicating the protection of information privacy
Published 2022-10-01“…First at micro level, addressing the value perception of information among consumers and marketers; secondly at macro level, illustrating the role of the government in protecting information privacy; and thirdly at global level, since the flow of information plays a major role in eliminating boundaries between countries. Finally, the managerial implications of information privacy are discussed, concluding that effective customer relations now require businesses to communicate in ways that make their customers feel protected. …”
Get full text
Article -
16137
Practical deployment of an in-field wireless sensor network in date palm orchard
Published 2017-05-01“…The sensors were distributed into the target orchard by combining the tree number with the coefficient variability of growth-determining soil variables in the monitoring zones. Finally, the networking was realized by means of synthesizing the received wireless signal strength distribution, the layout of monitoring zones, and the number of the required sensors. …”
Get full text
Article -
16138
Some properties of Camina and $n$-Baer Lie algebras
Published 2024-12-01“…A Lie algebra $L$ is said to be $2$-Baer if for any one dimensional subalgebra $K$ of $L$, there exists an ideal $I$ of $L$ such that $K$ is an ideal of $I$. Finally, we study three classes of Lie algebras with $2$-subideal subalgebras and give some relations among them.…”
Get full text
Article -
16139
Vulnerable Narcissism and Internet Addiction: Exploring Mediating Pathway through Vengeance
Published 2023-10-01“…The possible potential therapeutic power of vulnerable narcissism, which may lead to a direct increase in vengeance and an indirect increase in internet addiction through vengeance, appeared in line with this perspective. Finally, the results provided beneficial outcomes for clinical experts. …”
Get full text
Article -
16140
A Survey of Bioinspired Jumping Robot: Takeoff, Air Posture Adjustment, and Landing Buffer
Published 2017-01-01“…Then, the limitation of the research on bioinspired jumping robots is discussed, such as the research on the mechanism of biological motion is not thorough enough, the research method about structural design, material applications, and control are still traditional, and energy utilization is low, which make the robots far from practical applications. Finally, the development trend is summarized. This review provides a reference for further research of bioinspired jumping robots.…”
Get full text
Article