Suggested Topics within your search.
Suggested Topics within your search.
- Academic writing 1
- Agriculture 1
- Autonomy and independence movements 1
- Calculus 1
- Curricula 1
- Curriculum planning 1
- Decolonization 1
- Dissertations, Academic 1
- Economic policy 1
- Education 1
- Electric circuit analysis 1
- Electric network analysis 1
- Electronic Health Records 1
- English language 1
- Entrepreneurship 1
- Film adaptations 1
- Foreign economic relations 1
- Grammar, Comparative and general 1
- History 1
- History and criticism 1
- International business enterprises 1
- LANGUAGE ARTS & DISCIPLINES / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Syntax 1
- Literary style 1
- MATHEMATICS / Mathematical Analysis 1
- Manufacturing processes 1
- Medical Informatics Applications 1
- Medical informatics 1
- Medical technology 1
-
17221
基于层次分析—模糊评价的云计算安全评估与对策
Published 2016-10-01“…With the rapid development of information technology,cloud computing has become a hot topic.More and more companies and individuals will be their computing needs and storage needs to be delivered to the cloud,so the security problem of cloud computing can not be ignored.First,the security requirements of the four key technologies,such as multi tenant,node communication,remote storage and virtualization in the cloud computing environment were analyzed,the necessity of the construction of cloud computing security was expounded.Then,according to the security requirements of cloud computing,fuzzy comprehensive evaluation model based on ana-lytic hierarchy process was established,and taking a cloud service platform as an example to evaluate its security,get the security level of the service platform is "good".Finally,according to the security requirements of cloud computing environment and the results of model evaluation,some suggestions in in virtualization security,applica-tion security and data security was put forward,in order to strengthen the cloud computing security,some direction was provided.…”
Get full text
Article -
17222
Design and Construction of Sewage Structures Under High-Level Underground Water Conditions Using theTop-Down Method: A Case Study of Sewage Pumping Station PS2 in Dorood City
Published 2024-08-01“…Architectural and structural details for the construction of such structures applying the Top-Down method were then presented in the research. Finally, the efficiency and robustness of the proposed approach in the design and construction of concrete sewage structures exposed to high-level underground water, are demonstrated from the technical and economic perspectives, construction time, costs and safety level.…”
Get full text
Article -
17223
MIMO-Based Forward-Looking SAR Imaging Algorithm and Simulation
Published 2014-01-01“…This imaging method can implement range compression, secondary range compression (SRC), and range cell migration correction (RCMC) effectively. Finally, some simulations of point targets and comparison results confirm the efficiency of our proposed algorithm.…”
Get full text
Article -
17224
PREDICTION OF AIRCRAFT NORMAL OVERLOAD EXTREME VALUE BASED ON PEARSON-Ⅲ DISTRIBUTION
Published 2018-01-01“…In consideration that there was not uniform quantitative judge standard on optional curving fitting when fitting real data by P-Ⅲ distribution on the curve-fitting method,Using the maximum membership principle judged curving fitting level according to fuzziness of flight data,and membership function was deduced in detail. Finally through calculation and analysis the conclusions were obtained: it’s scientific and rational that Nzextreme value was conformed with P-Ⅲ distribution from the aspects of mean relative error,maximum error and degree of membership between fitted values and real values,and that membership function seen as optimized objective function was more advantageous than curve-fitting method.…”
Get full text
Article -
17225
Study on Internal Gear Honing Stone Dressing and Gear Honing Technology based on Variable Axis Cross Angle
Published 2018-01-01“…It can be described that the axis cross angle is a function of center distance when honing stone dressing and gear honing. Finally,the simulation shows that the technology can obtain constant contact and cutting parameters between workpiece and honing stone during its life,and the surface structure of the gear will not change. …”
Get full text
Article -
17226
Approximately optimum power allocation based on ergodic capacity for cooperative communication systems
Published 2009-01-01“…Conventional half-duplex amplify-and-forward(AF) method always adopted cooperative communications model regardless the fading state of the channel,which made insufficient use of the degrees of freedom of the system in a way.So,the problem about "when to cooperate" and the optimum allocation of transmitted power were discussed.An exact ergodic capacity formulation and corresponding upper bound were first derived for a two-user AF cooperative communications system.And then an approximately optimum power allocation scheme(AOPA) was proposed by making use of the upper bound as cost function.Whether the AOPA scheme adopting the cooperative model or not based on the comparison about the channel gains of source-to-destination with that of relay-to-destination.Finally,the system per-formances were analyzed with AOPA scheme when the relay moved in terms of the random direction model.Theoretical analysis and simulation results show that the AOPA outperforms the EPA scheme both in ergodic capacity and symbol-error-rate(SER) performance.…”
Get full text
Article -
17227
Research on Forecasting of the Compressor Geometric Variable System Based on the MAE Model
Published 2023-01-01“…We also test the generalizability of our method across different types of aeroengines. Finally, to make our theories more reasonable and convincing, experiments on different aeroengine states, including the transition state and the steady state, are carried out.…”
Get full text
Article -
17228
A Geometry-Inclusive Analysis for Single-Relay Systems
Published 2009-01-01“…A capacity contour for DF, the more popular mode of the two, is provided to facilitate the derivation of engineering rules. Finally, a selective single-relay system, which selects the best relay node among a host of candidates according to their locations, is analyzed. …”
Get full text
Article -
17229
Diverse Effects of Phytoestrogens on the Reproductive Performance: Cow as a Model
Published 2013-01-01“…Phytoestrogens have recently come into considerable interest due to the increasing information on their adverse effects in human and animal reproduction, increasing the number of people substituting animal proteins with plant-derived proteins. Finally, the soybean becomes the main source of protein in animal fodder because of an absolute prohibition of bone meal use for animal feeding in 1995 in Europe. …”
Get full text
Article -
17230
Evaluation and Estimation of Outputs and Inputs in Inverse Data Envelopment Analysis with Interval Data
Published 2020-11-01“…The study aims to describe the methodology and findings of a survey to assess the effectiveness of DEA models in estimating input/output levels, incorporating managerial preferences, and improving efficiency over time.Methodology: This paper reviews DEA models for estimating input/output levels, applying manager or decision-maker preferences, and improving inefficient units over a while. Finally, we have implemented the models obtained in 24 supervisory branches with four input indicators and four indicators in one of the banks, and the results have been presented and interpreted. …”
Get full text
Article -
17231
Comment penser le triangle : savoirs, valeurs émancipatrices et normes sociales ? Le difficile équilibre de la formation de soi et de la socialisation
Published 2018-06-01“…5. What emancipation, finally, can be specifically supported by school?…”
Get full text
Article -
17232
Sex hormones and immune regulation in ovarian cancer
Published 2024-12-01“…Personalized medicine approaches, leveraging biomarkers for predicting treatment response, are considered essential for optimizing patient outcomes. Finally, we address current research gaps and future directions, emphasizing the need for advanced research technologies and novel therapeutic strategies to improve the treatment of ovarian cancer through a better understanding of hormone-immune interactions.…”
Get full text
Article -
17233
Key technologies of symbiotic transmission for 6G Internet of things
Published 2020-03-01“…mMTC (massive machine-type communication) is one of the three major application scenarios of 5G network,but it is highly likely that the truly mature Internet of everything may not be realized until the future 6G network.In order to realize the deep immersive ubiquitous connection network,6G IoT will simultaneously provide all-round services such as high data rate,low latency,high reliability and massive connections.Firstly,the 6G was prospected and the technical challenges of 6G IoT were summarized.Then the existing physical layer transmission technologies of IoT were reviewed.Next,the promising symbiotic transmission technologies for 6G IoT were introduced and discussed,which enable the possibility that active transmission and passive transmission facilitates each other and provide a new solution for 6G IoT transmission.Finally,some possible future research directions were presented for symbiotic transmission in 6G IoT.…”
Get full text
Article -
17234
Geology of Tolstoj quadrangle (H08), Mercury
Published 2024-12-01“…Lineaments include crater and pit rims, and structures. Finally, surface features are subdivided into crater chains or clusters, hollows, faculae, bright and dark material. …”
Get full text
Article -
17235
A Novel Vibration Suppression Method for Welding Robots Based on Welding Pool Instability Evaluation and Trajectory Optimization
Published 2024-12-01“…To enhance the performance of the method, the Particle Swarm Optimization (PSO) algorithm is applied to optimize the joint angular velocity and angular acceleration. Finally, robot welding experiments are designed and conducted. …”
Get full text
Article -
17236
Studies on the RC Beam Strengthened by Using the Exterior-Wrapping U-Shaped Steel Plate and Its Application
Published 2019-01-01“…At the same time, through comparing and analysing the U-shaped steel plate strengthening method and the “angle steel + batten plate” strengthening method, the result that the RC beam strengthened by using the exterior-wrapping U-shaped steel plate has better mechanical performance is drawn. Finally, the application of the exterior-wrapping U-shaped steel plate strengthening method is rationally suggested.…”
Get full text
Article -
17237
The Damage Constitutive Model of Sandstone under Water-Rock Coupling
Published 2022-01-01“…Based on the energy theory method, the strength criterion of sandstone under the interaction of water and rock is obtained, which is introduced into the statistical damage constitutive model of sandstone considering the interaction of water and rock; thus, a relatively perfect damage constitutive model of sandstone considering the interaction of water and rock is established. Finally, the influence of the number of cycles on the model parameters was further analyzed by analyzing the model parameters and the water-rock coupling test. …”
Get full text
Article -
17238
Efficient and safe auditable mixed-coin service scheme based on blind signature
Published 2020-08-01“…The mixed-coin service can provide solutions for the privacy problem of blockchain,but it still faces efficiency bottlenecks and security risks.To further improve the efficiency and security protection of the mixed-coin service,an efficient and safe auditable mixed-coin service scheme based on blind signature was proposed.Firstly,this scheme added audit measures.It added an audit blockchain to the traditional mix-coin model to record the behavior of users and mixers,achieving traceability and accountability.Then,this method used elliptic curves algorithm to construct blind signatures instead of blind signature schemes based on bilinear pairs or RSA.Finally,this scheme proposed an auditable blind mix-coin service agreement based on the auditable mix-coin model and the blind signature algorithm based on elliptic curve.Simulation analysis shows that the proposed scheme has six security features,such as auditability and anti-theft attack,while providing privacy protection.Under the same security intensity,the proposed scheme can effectively reduce the computational overhead and storage overhead.…”
Get full text
Article -
17239
Electromagnetic Analysis and Experimental Validation of the LOFAR Radiation Patterns
Published 2019-01-01“…A simplistic array factor approach has been implemented as well to determine the accuracy in the antenna pattern evaluation with respect to the full-wave approach. Finally, results from an experimental campaign conducted by means of a micro hexacopter system show the reliability of the developed array numerical model.…”
Get full text
Article -
17240
Novel video anomaly detection method based on global-local self-attention network
Published 2023-08-01“…In order to improve the accuracy of video anomaly detection, a novel video anomaly detection method based on global-local self-attention network was proposed.Firstly, the video sequence and the corresponding RGB sequence were fused to highlight the motion change of the object.Secondly, the temporal correlation of the video sequence in the local area was captured by the expansion convolution layer, along with the self-attention network was utilized to compute the global temporal dependencies of the video sequence.Meanwhile, by deepening the basic network U-Net and combining the relevant motion and representation constraints, the network model was trained end-to-end to improve the detection accuracy and robustness of the model.Finally, experiments were carried out on the public data sets UCSD Ped2, CUHK Avenue and ShanghaiTech, as well as the test results were visually analyzed.The experimental results show that the detection accuracy AUC of the proposed method reaches 97.4%, 86.8% and 73.2% respectively, which is obviously better than that of the compared methods.…”
Get full text
Article