Suggested Topics within your search.
Suggested Topics within your search.
- Academic writing 1
- Agriculture 1
- Autonomy and independence movements 1
- Calculus 1
- Curricula 1
- Curriculum planning 1
- Decolonization 1
- Dissertations, Academic 1
- Economic policy 1
- Education 1
- Electric circuit analysis 1
- Electric network analysis 1
- Electronic Health Records 1
- English language 1
- Entrepreneurship 1
- Film adaptations 1
- Foreign economic relations 1
- Grammar, Comparative and general 1
- History 1
- History and criticism 1
- International business enterprises 1
- LANGUAGE ARTS & DISCIPLINES / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Syntax 1
- Literary style 1
- MATHEMATICS / Mathematical Analysis 1
- Manufacturing processes 1
- Medical Informatics Applications 1
- Medical informatics 1
- Medical technology 1
-
17101
Survey on backscatter communication for zero-power IoT
Published 2022-11-01“…Although Internet of things (IoT) can enhance the quality of people’s life, but it also brings the problems of energy consumption and network transmission congestion.To solve the above problems, backscatter communication technology for zero-power IoT has been proposed.Thus, it is of great significance to survey the state-of-the-art technologies and study the relevant challenges.Firstly, the basic definition and technical characteristics of zero-power IoT and backscatter communications were presented.Secondly, several typical application scenarios for zero-power backscatter communications in 6G were introduced.Thirdly, the system structure of zero-power backscatter communications was given and the potential key technologies of zero-power backscatter communications for 6G applications were also discussed.Finally, the technical challenges and potential research directions for zero-power backscatter communications were analyzed.Additionally, the proposed overview was of important theoretical significance and practical values for promoting the development of IoT toward full scenes, full spectrum, and many types of services.…”
Get full text
Article -
17102
Research on Modal Analysis of the Spiral Bevel Gear System
Published 2023-05-01“…And the result is compared with the experimental data to verify the accuracy and effectiveness of the method. Finally, according to the engineering practice, the influence of different contact surfaces and loads on the system mode is analyzed. …”
Get full text
Article -
17103
Robust Tracking Control of a Quadrotor UAV Based on Adaptive Sliding Mode Controller
Published 2019-01-01“…It is proven that the control laws can eliminate the altitude and attitude tracking errors, which are guaranteed to converge to zero asymptotically, even under a strong external disturbance. Finally, numerical simulation and experimental tests are performed, respectively, to verify the effectiveness and robustness of the proposed controller, where its superiority to linear quadratic control and active disturbance rejection control has been demonstrated clearly.…”
Get full text
Article -
17104
RELIABILITY ANALYSIS OF FAILURE RELATED MECHANICAL PARTS BASED ON VINE COPULA MODEL
Published 2019-01-01“…The feasibility of the improved parameter Bootstrap method is verified by Matlab simulation,then the reliability of the multi-failure mode related mechanical parts is solved by using the Vine Copula model.Finally,through the comparison between the calculation example of drive shaft and other methods,the method is rationality and validity.…”
Get full text
Article -
17105
Passive forensic based on spatio-temporal localization of video object removal tampering
Published 2020-07-01“…To address the problem of identification of authenticity and integrity of video content and the location of video tampering area,a deep learning detection algorithm based on video noise flow was proposed.Firstly,based on SRM (spatial rich model) and C3D (3D convolution) neural network,a feature extractor,a frame discriminator and a RPN (region proposal network) based spatial locator were constructed.Secondly,the feature extractor was combined with the frame discriminator and the spatial locator respectively,and then two neural networks were built.Finally,two kinds of deep learning models were trained by the enhanced data,which were used to locate the tampered area in temporal domain and spatial domain respectively.The test results show that the accuracy of temporal-domain location is increased to 98.5%,and the average intersection over union of spatial localization and tamper area labeling is 49%,which can effectively locate the tamper area in temporal domain and spatial domain.…”
Get full text
Article -
17106
Research on architecture design and core strategy of intelligent recommendation system for electronic literature resources in colleges and universities
Published 2024-11-01“…On these problems, a university electronic literature resource intelligent recommendation system was designed, which includes a data collection layer, a data mining layer, a recommendation brain layer, an application service layer, an information standardization system, and a security and operation maintenance system. Finally, the core strategies and algorithms of the system were introduced. …”
Get full text
Article -
17107
Simulation and Experimental Analysis of Stiffness and Damping of the Waist Type Diaphragm Coupling
Published 2024-04-01“…Based on Ansys finite element simulation software, considering contact nonlinearity and large deformation effects, this study simulates and analyzes the torsional, axial, angular and radial static stiffness characteristics and torsional and axial dynamic characteristics of the diaphragm coupling, and analyzes the influence of the diaphragm structure parameters such as the diameter of the bolt hole distribution circle, the diameter of the bolt hole, the minimum width of the diaphragm and the thickness of the diaphragm on the static stiffness. Finally, static, dynamic torsion and axial tension tests are carried out to verify the correctness of the simulation results. …”
Get full text
Article -
17108
Supply chain risk assessment and mitigation under the global pandemic COVID-19
Published 2023-12-01“…Then, it identifies risks associated with supply chains (SCs) during the pandemic using the Failure Mode Effect Analysis. Finally, it suggests improvements to have a fully resilient supply chain. …”
Get full text
Article -
17109
Endpoint carbon content and temperature prediction model in BOF steelmaking based on posterior probability and intra-cluster feature weight online dynamic feature selection
Published 2025-01-01“…Second, the posterior probability of samples and intra-cluster feature weights are used to weigh and calculate the feature importance of the current sample, obtaining the optimal features that align with the current operating conditions. Finally, the dynamically selected features are used in a regression model to predict the carbon content and temperature of the BOF steelmaking process data. …”
Get full text
Article -
17110
A Novel Energy-Efficient -Coverage Algorithm Based on Probability Driven Mechanism of Wireless Sensor Networks
Published 2016-04-01“…As for power consumption, the paper presents an energy shifting function between working nodes and neighboring nodes, by use of which the scheduling for low-energy node is completed, balancing the energy consumption over the entire network and optimizing network resources. Finally, simulation results suggest that the proposed algorithm not only can improve the coverage quality of network but also can prevent the rapid depletion of node energy, thus achieving the goal of extending network lifetime.…”
Get full text
Article -
17111
Application Review of Comprehensive Multi-index Evaluation Methods in River Health Evaluation
Published 2024-01-01“…To understand the current research progress and direction of comprehensive multi-index evaluation methods,and supplement the principle and method of evaluation index screening,this paper summarizes the research progress of the comprehensive multi-index evaluation method in river health evaluation at home and abroad.Firstly,the concept and evaluation principle of comprehensive multi-index evaluation are summarized from the perspective of river health evaluation objects and evaluation methods by tracing the domestic and foreign literature.Meanwhile,the three hierarchies of river health evaluation are illustrated by taking the target-criterion-index structure of river health evaluation in Yunnan Province as an example.Secondly,the current research progress of comprehensive multi-index evaluation methods and the index selection rationality are emphasized.Finally,the problems existing in the comprehensive multi-index evaluation methods are analyzed and the corresponding solutions are put forward.As a result,this paper provides references for river health management in China,and also scientific and technological support for the smooth promotion of river chief systems in various places.…”
Get full text
Article -
17112
Sequential image deep learning-based Wi-Fi human activity recognition method
Published 2020-08-01“…For the problems existing in most of the researches,such as weak anti-noise ability,incompatible signal size and insufficient feature extraction of deep-learning-based Wi-Fi human activity recognition,a kind of sequential image deep learning-based recognition method was proposed.Based on the idea of sequential image deep learning,a series of image frames were reconstructed from time-varied Wi-Fi signal to ensure the consistency of input size.In addition,a low-rank decomposition method was innovatively designed to separate low-rank activity information merged in noises.Finally,a deep model combining temporal stream and spatial stream was proposed to automatically capture the spatiotemporal features from length-varied image sequences.The proposed method was extensively tested in WiAR dataset and self collected dataset.The experimental results show the proposed method could achieve the accuracy of 0.94 and 0.96,which indicate its high-accuracy performance and robustness in pervasive environments.…”
Get full text
Article -
17113
A New Method to Measure Crack Extension in Nuclear Graphite Based on Digital Image Correlation
Published 2017-01-01“…Furthermore, a sensitivity analysis of the threshold value employed for the cross-correlation parameter in the crack identification process was conducted. Finally, the results were verified using the finite element method.…”
Get full text
Article -
17114
Comprehensive genome annotation of Trilocha varians, a new model species of Lepidopteran insects
Published 2025-01-01“…ATAC-seq was also conducted to determine chromatin accessibility across the genome. Finally, piRNA-targeted small RNA-seq revealed T. varians genome harbours 517 piRNA clusters (piCs). …”
Get full text
Article -
17115
The Cooperation Partner Selection of Private Sector under Public-Private-Partnership Projects: An Improved Approach under Group Decision-Making Based on FRS, SAW, and Integrated Ob...
Published 2018-01-01“…Thirdly, we establish fuzzy value matrix based on fuzzy evaluation and get the total fuzzy vector by multiplying respective weighted vectors and fuzzy evaluation matrix, then calculate the defuzzification value of each total score, and choose the alternative with the maximum score. Finally, an example is given to demonstrate the rationality of the algorithm.…”
Get full text
Article -
17116
Method for Determining Longitudinal Stiffness of Combined Double Thin-Walled Pier Based on Train-Track-Bridge Interaction
Published 2020-01-01“…Primarily, the relationship between longitudinal stiffness of the pier and rail stress is underlined, based on which the proposed methodology is described in detail. Finally, a case study is conducted to validate the effectiveness of the proposed method. …”
Get full text
Article -
17117
Reconstruction of LDPC code sparse check matrix based on modified LBP decoding
Published 2024-05-01“…Secondly, by determining whether the pairwise space vectors were sparse or not, it improved the efficiency of the subsequent suspected check vectors determination. Finally, in the case of insufficient received codes, the known check vectors were combined with the modified LBP decoding method to correct the wrong codes, so as to speed up the reconstruction of the sparse check matrix of LDPC code and improve the reconstruction performance. …”
Get full text
Article -
17118
Quand l’album de jeunesse innove pour mettre en scène la guerre
Published 2017-07-01“…Davide Cali and Serge Bloch or Didier Lévy and Katrin Stangl exploit the iconotextual potential of the children’s picture book to denounce war whilstendorsing the winning forces of intelligence and imagination at the same time. …”
Get full text
Article -
17119
Research on the Influence of Volatility of International Energy Commodity Futures Market on CPI in China
Published 2021-01-01“…However, when exceptional circumstances occur, the prediction results will show a specific deviation, and the prediction accuracy will also be reduced. Finally, some feasible suggestions are put forward according to the research results.…”
Get full text
Article -
17120
Performance, Hybridity and Convergence in the Poetry of Alice Oswald and Kae Tempest
Published 2022-11-01“…It considers the poems in the light of Henry Jenkins’s concept of “convergence culture,” before suggesting that cette convergence is related to the emergence of a poetic community – i.e. a community produced by the oral poem and its plural versions, which is mirrored by the poem itself. Finally, it suggests that such interest in the community may provide a fruitful way of grouping together and comparing works in the diverse field of contemporary British poetry.…”
Get full text
Article