Suggested Topics within your search.
Suggested Topics within your search.
- Academic writing 1
- Agriculture 1
- Autonomy and independence movements 1
- Calculus 1
- Curricula 1
- Curriculum planning 1
- Decolonization 1
- Dissertations, Academic 1
- Economic policy 1
- Education 1
- Electric circuit analysis 1
- Electric network analysis 1
- Electronic Health Records 1
- English language 1
- Entrepreneurship 1
- Film adaptations 1
- Foreign economic relations 1
- Grammar, Comparative and general 1
- History 1
- History and criticism 1
- International business enterprises 1
- LANGUAGE ARTS & DISCIPLINES / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Syntax 1
- Literary style 1
- MATHEMATICS / Mathematical Analysis 1
- Manufacturing processes 1
- Medical Informatics Applications 1
- Medical informatics 1
- Medical technology 1
-
17301
Dynamic Behaviors of a Two-Degree-of-Freedom Impact Oscillator with Two-Sided Constraints
Published 2021-01-01“…According to the deduced theoretical result, the grazing curve and the codimension-two grazing bifurcation points are validated by numerical simulation. Finally, various types of periodic-impact motions near the codimension-two grazing bifurcation point are illustrated through the unfolding diagram and phase diagrams.…”
Get full text
Article -
17302
Research on security of mobile payment for commercial bank
Published 2014-11-01“…There is no doubt that mobile payment is the spotlight in Internet finance now.Although users can enjoy quick and convenient services,they have to face with more severe security problems at the same time:the attack incidents,such as cellphone Trojan and privacy leaks emerge endlessly.Lots of viruses which are designed for attacking financial payments can steal users’ personal information including account,password and verification code in the proceedings of remote payment and near field communication.Security issues have already seriously impeded the further development of the mobile payment market.To solve the above problems,discusses the security issues in mobile terminals,payments,network and interactive logic of banking business from financial institutions’ perspective was discussed systematically.In addition,current status of relevant security key technologies are summarized from academic research community and industry fields.Finally,based on related research achievements,the design of system architecture and suggestions for mobile payment security are proposed,which can guide the future development of commercial bank.…”
Get full text
Article -
17303
Shipwreck Architecture
Published 2025-02-01“…This trajectory of ideas is then projected into a creative project: a speculative history of shipwreck architecture where the cutting edge of biological research is projected into a technological future when the distant aims of today’s technology are ancient history: when the first generations of grown buildings are preserved as ruins, when giant decommissioned carbon-capture factories drift like ghost ships across lakes of their inky waste, when people remember when shipwrecks caused by the hazards of rising sea levels were later exposed by sinking sea levels and converted into hotels and theatres, and finally, when these theatrical memories provoke such nostalgia that shipwreck architecture would be replicated and fabricated. …”
Get full text
Article -
17304
The electronic transport properties of parabolic topological edge states
Published 2025-01-01“…In contrast, for the linear dispersion edges states, δ is a constant. Finally, the transport properties of parabolic topological edge states under Anderson disorder are studied. …”
Get full text
Article -
17305
Infrastructured Timescapes of the Anthropocene and Climate Change
Published 2025-02-01“…Second, these timescapes are infrastructured, with infrastructure serving both as a key site for producing, organizing and extracting time and as an analytical category to look at temporal work. Finally, because the Anthropocene and Climate Change are temporally infrastructured, efforts at adaptation and mitigation are subject to time leaks, glitches, delays, accelerations, invisibility and performativity that affect time horizons. …”
Get full text
Article -
17306
Experimental and Analytical Study on Deformation Behavior in Hogging Moment Regions of Composite Beams
Published 2020-01-01“…The calculation values of the proposed models showed good agreement with the test results. Finally, the design recommendations of fatigue deformation were proposed according to the experimental and analytical study on steel-concrete composite beams subjected to hogging moment.…”
Get full text
Article -
17307
Extrajudicial proceedings in establishing the existence of a civil partnership
Published 2024-01-01“…In this paper, the author will present an overview of the characteristics of such a procedure and point out the kinds of evidence that are suitable for establishing the existence of a civil partnership. Finally, the author will argue for legal regulation of the extrajudicial procedure for establishing the existence of a civil partnership and propose some characteristics of the elements of such regulations in the Law on Extrajudicial Proceedings.…”
Get full text
Article -
17308
A Methodical Approach to Design and Valuation of Weather Derivatives in Agriculture
Published 2013-01-01“…The results show that the spatial and production basis risks reduce the efficiency of the weather derivatives. Finally, the potential for expansion of weather derivatives remains in the low income countries of Africa and Asia with systemic weather risk.…”
Get full text
Article -
17309
Le ‘Gouffre du Colorado’ de Thomas Moran : Carrefour d’influences ou centre de diffusion ?
Published 2013-04-01“…The painting is one of the interconnected inscriptions that together create the Grand Canyon for the American public; among these are the heroic canyon, the pictorial canyon, and the strategic canyon. Finally the painting is not so much a singular object as a hybrid assemblage traversed by the various trajectories that bring it into existence and perpetuate it.…”
Get full text
Article -
17310
Data Gathering in Opportunistic Wireless Sensor Networks
Published 2012-11-01“…The algorithm first collects the network metadata such as history of node encounters and contact durations; then it creates a node contact graph, based on which predictive optimal data gathering locations are dynamically calculated and updated. Finally, the sink is controlled to move to these locations to collect sensing data, avoiding lots of unnecessary data exchanges and message transmissions. …”
Get full text
Article -
17311
Hybrid Robust H2/H∞ Fault-Tolerant Control with Random Delay NCS
Published 2020-01-01“…Secondly, when the fault is estimated online, the corresponding interval fault-tolerant controller is called through the scheduling mechanism to achieve rapid fault tolerance of prior faults within the interval and mitigate the impact of other faults within the interval, which provides a guarantee for subsequent safe reconstruction control. Finally, the effectiveness of the proposed method is verified by Matlab simulation.…”
Get full text
Article -
17312
Multicooperation of Turtle-inspired amphibious spherical robots
Published 2025-01-01“…Then, the ASRs use a camera acquisition compartment to realize underwater target recognition and tracking by adjusting their motion trajectory. Finally, multirobot cooperation and three-dimensional (3-D) movement experiments using ASRs verifies the effectiveness of the proposed cooperation mode and 3-D underwater movement according to the control strategy implemented. …”
Get full text
Article -
17313
Micro-Doppler-Based Space Target Recognition with a One-Dimensional Parallel Network
Published 2020-01-01“…Then, we utilize this DL model to recognize time-frequency distribution (TFD) of different targets. Finally, simulations are performed to validate the effectiveness of the proposed method.…”
Get full text
Article -
17314
EFFECTS OF FLEXIBLE SUPPORTING STRUCTURE AND WIND LOADS ON YAW BEARING’S LOAD DISTRIBUTION
Published 2018-01-01Subjects: Get full text
Article -
17315
Justin Martyr – between Philosophy and the Second Sophistic
Published 2025-01-01“…The author of the article also analyzes Justin Martyr’s self-representation techniques and participation in rhetorical and philosophical disputes, conflicts with contemporaries, and strategies for presenting Christian teachings. Finally, it is concluded that although Justin can be seen as one of the representatives of the Second Sophistic, his main goal was to proclaim the Christian message, which only further strengthens his role as an apologist. …”
Get full text
Article -
17316
Structurer, affirmer son identité : stratégies identitaires des fans LGBT de l’Eurovision au cours de la pandémie de Covid-19
Published 2023-02-01“…Secondly, I analyze the ways in which this counterpublic organized itself online and developed new communal strategies during the pandemic. Finally, I emphasize that this new organization tends to maintain and even strengthen inequalities amongst the ESC LGBT fan community.…”
Get full text
Article -
17317
Real-Time Localization Algorithm for Maritime Search and Rescue Wireless Sensor Network
Published 2013-03-01“…To make WSN localization suitable for the MSR, an improved microelectromechanical systems MEMS aided algorithm on the basis of triangle and centroid algorithm is proposed to locate and track the search targets in real time and more precisely. Finally, the simulation results show that the proposed method and algorithm are feasible and efficient.…”
Get full text
Article -
17318
El net.art feminista como herramienta identitaria, política y emancipadora del sujeto femenino
Published 2025-01-01“… El movimiento artístico net.art, situado en la etapa de la internet temprana, de finales del s. XX y principios del s. XXI, desafía la supuesta neutralidad del ciberespacio que, en aquel momento, se consideraba libre de sesgos patriarcales. …”
Get full text
Article -
17319
Short-term urban traffic forecasting in smart cities: a dynamic diffusion spatial-temporal graph convolutional network
Published 2025-01-01“…It first combines the dynamic generation matrix and the static distance matrix to grasp real-time traffic conditions, and then introduces the diffusion random walk strategy to capture the correlation of spatial nodes. Finally, the convolutional LSTM module is used to mine the spatiotemporal dependence of traffic data to improve the accuracy of traffic prediction. …”
Get full text
Article -
17320
Federated edge learning with reconfigurable intelligent surface and its application in Internet of vehicles
Published 2023-10-01“…Aiming at the problem that it is difficult to achieve an optimal trade-off between wireless communication and model accuracy in FEEL training caused by the heterogeneity of wireless links and data distribution, a reconfigurable intelligent surface (RIS) enabled federated edge learning system was proposed, which exploited the channel reconfigurability of RIS to adaptively manipulate the signal propagation environment, and utilized the over-the-air computation (Aircomp) to achieve fast model aggregation.Specifically, the convergence behavior of the FEEL algorithm under the influence of wireless channels and data heterogeneity was rigorously derived, and accordingly, an unified wireless resources optimization problem was constructed with the goal of minimizing the learning loss by jointly designing the transceiver design and the RIS phase shift.Simulation results demonstrate that the proposed scheme achieves substantial performance improvement compared against several baselines, and prove that RIS can play an important role in improving the accuracy of Aircomp enabled FEEL systems under data heterogeneity.Finally, the probability of applying it into Internet of vehicles is discussed.…”
Get full text
Article