Suggested Topics within your search.
Suggested Topics within your search.
- Academic writing 1
- Agriculture 1
- Autonomy and independence movements 1
- Calculus 1
- Curricula 1
- Curriculum planning 1
- Decolonization 1
- Dissertations, Academic 1
- Economic policy 1
- Education 1
- Electric circuit analysis 1
- Electric network analysis 1
- Electronic Health Records 1
- English language 1
- Entrepreneurship 1
- Film adaptations 1
- Foreign economic relations 1
- Grammar, Comparative and general 1
- History 1
- History and criticism 1
- International business enterprises 1
- LANGUAGE ARTS & DISCIPLINES / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Syntax 1
- Literary style 1
- MATHEMATICS / Mathematical Analysis 1
- Manufacturing processes 1
- Medical Informatics Applications 1
- Medical informatics 1
- Medical technology 1
-
17261
A Unique Finite Element Modeling of the Periodic Wave Transformation over Sloping and Barred Beaches by Beji and Nadaoka's Extended Boussinesq Equations
Published 2013-01-01“…Outputs are compared with other existing numerical and experimental data. Finally, it is concluded that the current model can be further developed to model any morphological development of coastal profiles.…”
Get full text
Article -
17262
Design and Implementation of a Compiled Declarative Language for Game AI Control
Published 2024-12-01“…To test and evaluate the language, a video game was created using the Godot game engine, which allowed us to demonstrate the correct functionality of our scripting language to program the AIs participating in the video game. Finally, an analytics platform was also developed to evaluate the correct behavior of the programmed agents.…”
Get full text
Article -
17263
Evaluation of Improved Contribution Function Method in the Compression of CINDER90 Depletion Library
Published 2024-01-01“…In addition, the absorber nuclides of the compressed system are identified by analyzing the depletion process of the poison with a large absorption cross section separately. Finally, a compressed depletion library consisting of 489 nuclides is generated. …”
Get full text
Article -
17264
Research and prospect of intelligent internet of vehicles based on 5G technology
Published 2020-05-01“…With the rapid development of 5G communication technology,in the future,V2X will take 5G communication technology as the starting point,integrate 5G vehicle unit,5G base station,5G mobile terminal,5G cloud server and other advanced equipment,to provide comprehensive and high-quality services for multi-type users.Firstly,the key technologies of V2X and its evolution to 5G era were outlined.5G is deeply integrated with the internet of vehicles,which has the technical advantages of relatively low deployment cost and clear evolution route.Then,the application and research status of 5G emerging key technologies such as mobile edge computing (MEC) and network slicing in typical application scenarios of the Internet of vehicles was focused on.Finally,the problems of 5G internet of vehicles in communication interference,network security and privacy protection,communication interference were put forward,and the research direction was pointed out.…”
Get full text
Article -
17265
À propos de l’article de S. Lecouteux, « Une reconstitution hypothétique du cheminement des Annales… ». À propos de la version révisée et continuée des Annales de Flodoard, introdu...
Published 2004-02-01“…As for Canon Dudo of Saint-Quentin, he was undoubtedly in the best position to be able to introduce this revised and continued version of Flodoard’s Annals in Normandy. Finally, various observations invite us to work on a critical re-edition of the Annals, since Philippe Lauer’s edition deserves to be updated on many points: decisive works have indeed been carried out on the study of this work over the past century.…”
Get full text
Article -
17266
Application of blockchain in urban rail traffic edge computing network
Published 2021-10-01“…Multi-access edge computing (MEC) can provide high-quality service capabilities for computing-intensive services and delay-sensitive services in urban rail traffic.However, many edge facilities in rail traffic edge computing network are exposed to an open environment, and their privacy protection and transmission security are facing great challenges.Blockchain has functional characteristics such as distributed ledger, consensus mechanism, smart contract, and decentralized application.Therefore, the use of blockchain can build a systematic security protection mechanism for the distributed rail traffic edge computing network to ensure network security and data security and realize high-quality urban rail traffic services.Firstly, the basic concept of the blockchain and the urban rail traffic edge computing network architecture were introduced.Then, the structure and application content of the rail traffic edge computing network security protection mechanism integrated with the blockchain was discussed in detail.Finally, the open research issues and challenges of the security protection mechanism were analyzed.…”
Get full text
Article -
17267
An Integrated Cumulative Transformation and Feature Fusion Approach for Bearing Degradation Prognostics
Published 2018-01-01“…Then, a new degradation index system is constructed, which fuses multidimensional cumulative features by kernel principal component analysis (KPCA). Finally, an extreme learning machine model based on phase space reconstruction is proposed to predict the degradation trend. …”
Get full text
Article -
17268
Adversarial training driven malicious code detection enhancement method
Published 2022-09-01“…To solve the deficiency of the malicious code detector’s ability to detect adversarial input, an adversarial training driven malicious code detection enhancement method was proposed.Firstly, the applications were preprocessed by a decompiler tool to extract API call features and map them into binary feature vectors.Secondly, the Wasserstein generative adversarial network was introduced to build a benign sample library to provide a richer combination of perturbations for malicious sample evasion detectors.Then, a perturbation reduction algorithm based on logarithmic backtracking was proposed.The benign samples were added to the malicious code in the form of perturbations, and the added benign perturbations were culled dichotomously to reduce the number of perturbations with fewer queries.Finally, the adversarial malicious code samples were marked as malicious and the detector was retrained to improve its accuracy and robustness of the detector.The experimental results show that the generated malicious code adversarial samples can evade the detector well.Additionally, the adversarial training increases the target detector’s accuracy and robustness.…”
Get full text
Article -
17269
Ship Velocity Estimation in Airborne Along-Track Interferometric SAR Imagery Based on the Fractional Fourier Transform
Published 2020-01-01“…Then, we construct an equation to estimate the ship velocity using the chirp rate estimation, peak response time, and ATI phase. Finally, the simulation experiments are used to validate the effectiveness of the proposed method.…”
Get full text
Article -
17270
L’enseignement de l’architecture à l’Académie royale de peinture, sculpture et architecture de Toulouse
Published 2010-05-01“…This school, founded in 1726, became the Society of Fine Arts in 1746 and was finally established as a Royal Academy of Painting, Sculpture and Architecture in 1751, on the model of the Royal Academy of Painting and Sculpture in Paris. …”
Get full text
Article -
17271
A Multiobjective Route Robust Optimization Model and Algorithm for Hazmat Transportation
Published 2018-01-01“…In addition the PSO algorithm with the adaptive archives grid is used to calculate the robust optimization route of hazmat transportation. Finally, the computational results show the multiobjective route robust optimization model with 3 centers and 20 demand points’ sample studied and FCMC-PSO algorithm for hazmat transportation can obtain different robustness Pareto solution sets. …”
Get full text
Article -
17272
Differential Impacts of Soybean and Fish Oils on Hepatocyte Lipid Droplet Accumulation and Endoplasmic Reticulum Stress in Primary Rabbit Hepatocytes
Published 2016-01-01“…These data indicate that SOLE, but not FOLE, damage the ER and mitochondria, resulting in lipid droplets accumulation and ER stress and, finally, hepatocyte injury. This likely contributes to the differential impacts of SOLE and FOLE on PNALD development and progression.…”
Get full text
Article -
17273
Compound Fault Diagnosis for Gearbox based on Variational ModeDecomposition and Correlated Kurtosis
Published 2019-01-01“…Then,according to the characteristics that correlated kurtosis can identify the impact signals with different periods, the intrinsic mode functions containing different faults are extracted by using the maximum correlated kurtosis principle. Finally, the envelop analysis of these intrinsic mode function is carried out to achieve the purpose of compound fault diagnosis. …”
Get full text
Article -
17274
Design and Fabrication of a Novel T-Shaped Piezoelectric ZnO Cantilever Sensor
Published 2012-01-01“…The key step of the process is protecting the ZnO film from KOH etching by a novel and effective method, which has rarely appeared in the literature. Finally, this cantilever sensor is measured by a network analyzer, and it has a fundamental resonant frequency of 24.60 kHz. …”
Get full text
Article -
17275
An Emerging Theory of School-Based Participatory Science
Published 2025-01-01“…Next, we describe the emerging theory and illustrate it with vignettes constructed from our data. Finally, we discuss recommendations for participatory science projects that wish to gain a foothold in K–12 classrooms and for research that can further test the theory of SBPS.…”
Get full text
Article -
17276
Numerical Analysis of the End-Suspended Pile and the Rock-Socketed Pile Bearing Capacity of a Soil-Rock Composite Foundation Pit
Published 2022-01-01“…Subsequently, the stress deformation and bearing capacity were obtained in the numerical simulation analysis. Finally, the effects of the different support structures, rock-socketed depth, diameter, spacing, and rock shoulder width on piles were analyzed. …”
Get full text
Article -
17277
Performance analysis of dual-hop mixed RF-FSO systems combined with NOMA.
Published 2024-01-01“…In addition, the system's performance is dependent on the parameters of the FSO channel. Finally, Monte Carlo simulations are presented to further validate our framework and findings.…”
Get full text
Article -
17278
Energy efficiency comparison between data rate control and transmission power control algorithms for wireless body sensor networks
Published 2018-01-01“…Besides, energy efficiency comparison analysis of battery-driven or video transmission rate control algorithm and transmission power control–driven or power control algorithm is presented. Finally, proposed algorithms are analyzed and categorized as energy-efficient and battery-friendly for medical applications in wireless body sensor networks.…”
Get full text
Article -
17279
Lukács és a forradalmi reálpolitika
Published 2023-10-01“…Ebben a tanulmányban azt a kérdést vizsgálom, hogy milyen válaszokat kínál Lukács politikafilozófiája a realizmus központi kérdéseire, mindenekelőtt a politikai normativitás természetére vonatkozóan. …”
Get full text
Article -
17280
Dissemination of Rejected Hadith among The Malaysian Society: Causes and Solutions
Published 2023-05-01“…In addition, this study also suggests taking advantage of the enhancement of technology, like television programs and mobile applications, to educate society on hadith knowledge and the difference between accepted and rejected hadith. Finally, it is also suggested that all parties and bodies in Malaysia related to this matter should be gathered to address this issue with their best foot forward to achieve the best solutions.…”
Get full text
Article