Showing 16,761 - 16,780 results of 29,723 for search 'Winaq~', query time: 1.71s Refine Results
  1. 16761

    Dynamic privacy measurement model and evaluation system for mobile edge crowdsensing by Mingfeng ZHAO, Chen LEI, Yang ZHONG, Jinbo XIONG

    Published 2021-02-01
    “…To tackle the problems of users not having intuitive cognition of the dynamic privacy changes contained in their sensing data in mobile edge crowdsensing (MECS) and lack of personalized privacy risk warning values in the data uploading stage, a dynamic privacy measurement (DPM) model was proposed.A structured representation of data obtained by a user participating in a sensing task was introduced and was transformed it into a numerical matrix.Then privacy attribute preference and timeliness were presented to quantify the dynamic privacy changes of data.With this, personalized privacy thresholds of users based on the numerical matrix were reasonably calculated.Finally, differential privacy processing was performed on the numerical matrix, and a model evaluation system was designed for the proposed model.The simulation results show that the DPM model was effective and practical.According to the given example, a data utility of approximately 0.7 can be achieved, and the degree of privacy protection can be significantly improved as the noise level increases, adapting to the MECS of IoT.…”
    Get full text
    Article
  2. 16762

    A Review on the Effect of Crumb Rubber Addition to the Rheology of Crumb Rubber Modified Bitumen by Mohd Rasdan Ibrahim, Herda Yati Katman, Mohamed Rehan Karim, Suhana Koting, Nuha S. Mashaan

    Published 2013-01-01
    “…The effect of crumb rubber to aging properties of CRMB is also discussed. Finally several techniques of chemical modification to terminal blends of CRMB and the subsequent improvement to the settling property of CRMB are explained.…”
    Get full text
    Article
  3. 16763

    Research on space-air-ground integrated deterministic networking by Guoyu PENG, Shuo WANG, Guizhen LI, Yuhan WEN, Tao HUANG

    Published 2023-11-01
    “…As the Internet evolves from a consumer network to a productive network, emerging industry applications necessitate differentiated and deterministic service quality assurance and communication capabilities that span all dimensions of time and space.How to realize the heterogeneous compatibility of ubiquitous multi-domain networks and support deterministic transmission between nodes in space-air-ground integrated network (SAGIN) has become a significant research problem.Firstly, the emerging full-domain 6G scenarios along with their requirements for deterministic services were analyzed.Then, the hierarchical space-air-ground integrated deterministic networking architecture, including global cooperative network management and control layer, multi-domain dynamic deterministic fusion layer, and ubiquitous heterogeneous deterministic networking layer, was proposed, and key technologies for fixed-mobile-satellite fusion networks in relevant scenarios were studied.Finally, the challenges and development trend of the space-air-ground integrated deterministic networking were presented.…”
    Get full text
    Article
  4. 16764

    Hopf bifurcation induced by fear: A Leslie-Gower reaction-diffusion predator-prey model by Jiani Jin, Haokun Qi, Bing Liu

    Published 2024-12-01
    “…Then, we demonstrated the existence of Hopf bifurcations and discussed the direction and stability of spatially homogeneous and inhomogeneous periodic solutions. Finally, the impact of fear and spatial diffusion on the dynamics of populations were probed by numerical simulations. …”
    Get full text
    Article
  5. 16765

    Encoding Cryptic Crossword Clues with TEI by Martin Holmes

    Published 2019-08-01
    “…Many cryptic clues depend for their effect on confusing the solver through the use of overlapping syntactic and semantic hierarchies, so they serve as evidence that overlapping hierarchies are not merely an unfortunate limitation afflicting XML languages but are psychologically and linguistically real. Finally, I present a TEI schema and an approach to encoding the components of cryptic crossword clues in a way that enables algorithmic analysis of trends, features, and clue types, with a view to creating a historical corpus of encoded clues which will illuminate the evolution of the tradition.…”
    Get full text
    Article
  6. 16766

    A Novel Structure of High Voltage Gain DC‐DC Converters for Photovoltaic (PV) Applications by Farzad Karimian, Ali Nahavandi, Pouria Pakbaz

    Published 2025-01-01
    “…After analysis and calculations, the proposed converter is simulated using Matlab/Simulink. Finally, a laboratory prototype of the proposed converter is presented to verify its performance.…”
    Get full text
    Article
  7. 16767

    Performance Analysis of Reheat Steam Temperature Control System of Thermal Power Unit Based on Constrained Predictive Control by Xiaoli Li, Jian Liu, Kang Wang, Fuqiang Wang, Yang Li

    Published 2019-01-01
    “…Then the principle of constrained predictive control algorithm is analyzed. Finally, the steady-state values of control quantities of reheat steam temperature control system under different conditions are given by MATLAB simulation, and, by analyzing the steady-state values and steady-state time of the input and output of the system, the reference values and the regulating law of the control quantities and the specific constraint range of the control quantities of the system are given, which can provide reference data and theoretical basis for the field adjustment of the reheat steam temperature control system in power plant and improve the safety and effectiveness of the system.…”
    Get full text
    Article
  8. 16768

    Relationship between Green Financing and Investment Logic and Effectiveness Evaluation of Financing Decisions by Lei Kong, Yu Lei, Qian Zhang, Jing Zhang, Xingzhi Guo, Daoyuan Shi

    Published 2022-01-01
    “…Next, the effectiveness of green financing decisions was discussed under dynamic operation risks. Finally, the proposed approach was demonstrated through simulation and empirical analysis.…”
    Get full text
    Article
  9. 16769

    Web services QoS prediction via matrix completion with structural noise by Lei CHEN, Geng YANG, Zheng-yu CHEN, Fu XIAO, Jian XU

    Published 2015-06-01
    “…The proposed approach can not only exactly detect the position where the data is contaminated, but also effectively predict the missing QoS values. Finally, experimental results performed on a real public dataset demonstrate the feasibility of our proposed approach.…”
    Get full text
    Article
  10. 16770

    Identification and Prioritization of “Black Spots” without Using Accident Information by Mahmoudreza Keymanesh, Hasan Ziari, Samira Roudini, Ali Nasrollahtabar Ahangar

    Published 2017-01-01
    “…In each section, potentially hazardous locations were identified and some questionnaires were prepared, which were filled by 5 road traffic experts familiar with the route; then the collected data were analyzed by Analytical Hierarchy Process (AHP) using Expert Choice Software and the black spots were identified and prioritized. Finally, these black spots were compared with the black spots that had been obtained by traffic police based on accident data.…”
    Get full text
    Article
  11. 16771

    The Quick Measure of a Nurbs Surface Curvature for Accurate Triangular Meshing by Kniat Aleksander

    Published 2014-04-01
    “…When a model for FEM calculation is prepared with a CAD program it is inevitable to mesh it finally. There are many algorithms for meshing planar regions. …”
    Get full text
    Article
  12. 16772

    Effects of shading and water availability on Kalanchoe pinnata (Lam.) Pers. (Crassulaceae) metabolite profile via a LC-MS-based untargeted metabolomics approach by Guilherme Perez Pinheiro, Álex Aparecido Rosini Silva, Andréia de Melo Porcari, Alexandra Christine Helena Frankland Sawaya

    Published 2025-12-01
    “…From all metabolites, we annotated flavonoids, organic acids, and fatty acids, while the unidentified compounds were also reported for future investigation on this species’ metabolome. Finally, we provided new perspectives on the metabolism and cultivation conditions of K. pinnata.…”
    Get full text
    Article
  13. 16773

    Fault Feature Extraction of Gearbox based on Adaptive VMD by Wenyao Li, Wengang Yang

    Published 2019-04-01
    “…The composite fault characteristics such as gear spalling and bearing balls are finally determined.…”
    Get full text
    Article
  14. 16774

    Guépard-gazelle : entre prédation et care, construction de l’ethos discursif de femmes chasseresses by Guillonne Balaguer

    Published 2024-12-01
    “…I then look at their assumption of feminine assignments to care, between concern for animals and the activation of stereotypes of the feminine, particularly around motherhood. Finally, I analyse examples of anthropomorphisation and animalisation, which highlight a disturbance at the inter-species boundary. …”
    Get full text
    Article
  15. 16775

    Experimental Investigation on the Fracture Behaviour of Natural Stones Exposed to Monotonic and Cyclic Loading by Andrea Spagnoli, David Cendon Franco, Antonio D’Angelo

    Published 2018-12-01
    “…Moreover, cyclic three-point bending tests are conducted to determine the propagation rate of nominally Mode-I fatigue cracks. Finally, the fatigue behaviour of the marble is studied through a cohesive crack model, in which the direct tensile strength of the material is determined by a Brazilian test, and the behaviour is calibrated by means of a suitable FE model. …”
    Get full text
    Article
  16. 16776

    Comment comprendre les « communs » : Elinor Ostrom, la propriété et la nouvelle économie institutionnelle by Olivier Weinstein

    Published 2014-02-01
    “…To do this, we first consider her original and important analysis of rules and norms, and its conception of economic behavior, then we explore her theory of property rights and of the conditions of selection of forms of property and institutions, with the prospect of a confrontation with the idea of a “generalized Coase theorem”. This leads us, finally, to questioning Elinor Ostrom’s views on institutions and the commons, and possible ways to go beyond these conceptions.…”
    Get full text
    Article
  17. 16777

    Community Based Tourism: A Global South Perspective by Claudio Milano, Jordi Gascón

    Published 2024-07-01
    “…The paper identifies three key variables contributing to this dual perspective: a) the Context Variable, which displays how the outcomes of CBT projects m can vary based on the specific circumstances in which they are implemented; b) the Methodological Variable, which underlines the importance of developing long-term and longitudinal fieldwork to avoid a biased analysis based on the short-term observations; c) the Paradigm Variable which takes into account that the researcher's theoretical framework inevitably shapes their focus, potentially emphasising certain outcomes over others. Finally, the paper draws on empirical evidence based on a 30-year longitudinal ethnographic study conducted on Amantaní island (Lake Titicaca, Peruvian Andes).…”
    Get full text
    Article
  18. 16778

    Differential privacy protection scheme based on edge betweenness model by Haiping HUANG, Kai WANG, Xiong TANG, Dongjun ZHANG

    Published 2019-05-01
    “…With the continuous development of social network application,user’s personal social data is so sensitive that the problem of privacy protection needs to be solved urgently.In order to reduce the network data sensitivity,a differential privacy protection scheme BCPA based on edge betweenness model was proposed.The 2K sequence corresponding to the graph structure based on the dK model was captured,and 2K sequences based on the edge betweenness centrality were reordered.According to the result of reordering,the 2K sequence was grouped into several sub-sequences,and each sub-sequence was respectively added with noise by a dK perturbation algorithm.Finally,a social network graph satisfying differential privacy was generated according to the new 2K sequences after integration.Based on the real datasets,the scheme was compared with the classical schemes through simulation experiments.The results demonstrate that it improves the accuracy and usability of data while ensuring desired privacy protection level.…”
    Get full text
    Article
  19. 16779

    Combined simulation of fatigue crack nucleation and propagation based on a damage indicator by M. Springer, M. Nelhiebel, H. E. Pettermann

    Published 2016-10-01
    “…By recourse to the Fatigue Damage Indicator a correlation between the number of applied load cycles and the changing structural behavior is established. Finally, the proposed approach is exemplified by cyclic bending experiments in the Low Cycle Fatigue regime…”
    Get full text
    Article
  20. 16780

    Supramolecular Biopolymers for Tissue Engineering by Rosario Pérez-Pedroza, Alan Ávila-Ramírez, Zainab Khan, Manola Moretti, Charlotte A. E. Hauser

    Published 2021-01-01
    “…Then, we will discuss the role that SBPs will be playing in TE as dynamic scaffolds, therapeutic scaffolds, and bioinks. Finally, we will describe possible outlooks of SBPs for TE.…”
    Get full text
    Article