Suggested Topics within your search.
Suggested Topics within your search.
- Academic writing 1
- Agriculture 1
- Autonomy and independence movements 1
- Calculus 1
- Curricula 1
- Curriculum planning 1
- Decolonization 1
- Dissertations, Academic 1
- Economic policy 1
- Education 1
- Electric circuit analysis 1
- Electric network analysis 1
- Electronic Health Records 1
- English language 1
- Entrepreneurship 1
- Film adaptations 1
- Foreign economic relations 1
- Grammar, Comparative and general 1
- History 1
- History and criticism 1
- International business enterprises 1
- LANGUAGE ARTS & DISCIPLINES / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Syntax 1
- Literary style 1
- MATHEMATICS / Mathematical Analysis 1
- Manufacturing processes 1
- Medical Informatics Applications 1
- Medical informatics 1
- Medical technology 1
-
18141
Chaos Synchronization Based Novel Real-Time Intelligent Fault Diagnosis for Photovoltaic Systems
Published 2014-01-01“…Then, the extension engineering is used to implement the fault diagnosis. Finally, the overall fault diagnosis system only needs to capture the voltage signal of the solar photovoltaic system, and the fault type can be diagnosed instantly.…”
Get full text
Article -
18142
Application in Feature Extraction of AE Signal for Rolling Bearing in EEMD and Cloud Similarity Measurement
Published 2015-01-01“…It uses Cloud Similarity Measurement to select sensitive IMF which can reflect the fault features. Finally, it sets the Multivariate Multiscale Entropy (MME) of sensitive IMF as the eigenvalue of original signal; then it is classified by the SVM to determine the fault types exactly. …”
Get full text
Article -
18143
Fractional order plus-negative sequence decoupling control strategy for dynamic voltage restorer
Published 2025-01-01“…Then, the integer order plus-negative order decoupling control strategy is extended to fractional order, and the frequency domain method is combined with the robustness condition when the gain changes to correct the relevant parameters. Finally, the simulation results verify the feasibility of the fractional order plus-negative sequence decoupling control strategy applied to the DVR system, and the proposed strategy has better dynamic response speed and anti-interference performance than the traditional plus-negative sequence decoupling control startegy.…”
Get full text
Article -
18144
Application Prospect of Big Data Technology in the Informatization of Soil and Water Conservation
Published 2023-01-01“…Soil and water conservation is an important part of China's environmental protection work.The construction and application of big data of China's ecological environment have brought technological innovation to soil and water conservation work.However,the application of big data technology in the informatization of soil and water conservation is still in the exploratory stage,and the technology is only used in the soil and water conservation monitoring and construction project guidelines.This paper briefly discusses the informatization construction of soil and water conservation in China.It prospects for the application of big data technology in the design,scheme preparation,monitoring,supervision and management,acceptance evaluation,treatment informatization of soil and water conservation and soil erosion forecasting combined with the processing systems such as batch data,streaming data,interactive data and graph data and the analysis techniques such as knowledge calculation and in-depth learning. Finally,given the deficiencies and difficulties in soil and water conservation informatization, some suggestions are put forward,such as strengthening informatization construction,building data collection standards, establishing soil and water conservation knowledge base,and cultivating the talents in the field of big data of soil and water conservation,providing a reference for accelerating the informatization of soil and water conservation.…”
Get full text
Article -
18145
Challenges and Shortcomings of “Settlement Patterns Analysis” Studies in the Archaeology of Iran: A Critical Evaluation and Some Suggestions
Published 2021-10-01“…Accordingly, it is suggested here that the data collection and analysis could be done by using the combined method that considers the following items: the study of historical texts, full coverage survey of the region, and attention to off-site archaeology especially in Neolithic studies, regarding absolute chronologies before going through the settlement pattern analysis, analysis of animal and plant remains, soil analysis and geophysical methods, statistical analysis, use of models and analysis of economic relations between settlements, and finally, the spatial analysis of settlements based on up-to-date theories and models.…”
Get full text
Article -
18146
La participation des acteurs locaux à l’élaboration et l’évaluation des politiques publiques de développement durable en Nouvelle-Calédonie
Published 2008-11-01“…These principles are based on the experiences of a research program built around the evaluation of a grassroots development project in the northern province of New Caledonia. Finally, we insist on the constraints in the efficiency of real participatory device and on the difficulties to follow principles of the sustainable development, especially in the context of the Pacific islands.…”
Get full text
Article -
18147
A cooperative control strategy for power quality based on parallel grid-connected converters
Published 2025-01-01“…Through compensation capacity calculation and reactive power allocation, the voltage at the PCC can maintain near the rated voltage. Finally, the feasibility and superiority of the proposed strategy are verified through simulations.…”
Get full text
Article -
18148
Advances in Nanoengineered Terahertz Technology: Generation, Modulation, and Bio-Applications
Published 2025-01-01“…Subsequently, it explores bio-applications such as novel biosensing and biofunction techniques. Finally, it summarizes findings and reflects on future trends and challenges in the field. …”
Get full text
Article -
18149
Theo-anthropocentric Paradigm of Tafsir At-Tanwir by Muhammadiyah and its Application in the Interpretation of Surah Al-Baqarah/2: 286
Published 2024-12-01“…For them, there is a wealth distribution mechanism with worldly and hereafter dimensions, such as through zakat, infaq, and alms. The development of the meaning of surah al-Baqarah/2: 286 is an implication of theo-anthropocentric paradigm.…”
Get full text
Article -
18150
Forest Fire Smoke Video Detection Using Spatiotemporal and Dynamic Texture Features
Published 2015-01-01“…Local Binary Motion Pattern (LBMP) is used to define dynamic texture features of smoke videos. Finally, smoke video is recognized by Adaboost algorithm. …”
Get full text
Article -
18151
AADL architecture model construction based on FACE mode
Published 2024-12-01“…Then, the StringTemplate template is designed based on the mapping rules, and the template engine algorithm for generating AADL model is given. Finally, a total of 12 kinds of FACE models elements in four aspects are taken as experimental objects, 241 FACE model instances are designed as test cases, and the generated AADL models are verified in the OSATE tool. …”
Get full text
Article -
18152
Fluorescent Sensors Based on Organic Polymer-Capped Gold Nanoparticles for the Detection of Cr(VI) in Water
Published 2019-01-01“…It is suggested that the quenching mechanism is based on the combined effects of internal electron transfer and the inner filter effect. Finally, the recovering mechanism is based on the redox reactions between the Cr(VI) and Fe(II) ions.…”
Get full text
Article -
18153
Design and application of system with dual-control of water and electricity based on wireless sensor network and video recognition technology
Published 2018-09-01“…In order to solve the security problem of the user in wireless sensor network, this article proposes a radio frequency identification mutual security authentication protocol based on shared secret hash function. Finally, experiments show that the proposed secure authentication protocol can guarantee the secure transmission of data between the sensor node and the server, and the video recognition technology can recognize some abnormalities well.…”
Get full text
Article -
18154
Ameliorated Chameleon Algorithm-Based Shape Optimization of Disk Wang–Ball Curves
Published 2024-12-01“…Secondly, the shape optimization of CDWB curves is considered as a minimization problem with curve energy as the objective, and an optimization model is developed under the constraints of the splicing conditions. Finally, the meta-heuristic algorithm MCSA is introduced to solve the established optimization model to obtain the minimum energy value, and its performance is verified by comparison with other algorithms. …”
Get full text
Article -
18155
Simeprevir and Sofosbuvir Combination Treatment in a Patient with HCV Cirrhosis and HbS Beta 0-Thalassemia: Efficacy and Safety despite Baseline Hyperbilirubinemia
Published 2016-01-01“…Hyperbilirubinemia was benign and fully reversible and our patient finally achieved sustained virological response 24 weeks after the end of treatment.…”
Get full text
Article -
18156
The Impact of Bullwhip Effect on the Cash Flow in Two-Parallel Supply Chain Systems with the Competition Effect
Published 2022-01-01“…After that, the quantitative equation of the CFBE was deduced from two-product and two-parallel SC systems. Finally, we get the condition that the competition effect and the market share increase or decrease the CFBE, which was in contrast to the situation without the competition effect and the market share. …”
Get full text
Article -
18157
Optimal Control of ISTR Rumor Propagation Model with Social Reinforcement in Heterogeneous Network
Published 2021-01-01“…And through using Pontryagin’s Minimum Principle, the optimal solution of the rumor propagation model is solved. Finally, through theoretical analysis and numerical simulation, some results can be obtained. …”
Get full text
Article -
18158
Wake Detection and Positioning for Autonomous Underwater Vehicles Based on Cilium-Inspired Wake Sensor
Published 2024-12-01“…Then, a flow velocity sensor is used to measure the flow velocities of the “TS MINI” AUV’s wake at different positions, and a velocity field model of the “TS MINI” AUV’s wake is established. Finally, the wake field of the “TS MINI” AUV was measured at various positions using the CIWS. …”
Get full text
Article -
18159
HYEI: A New Hybrid Evolutionary Imperialist Competitive Algorithm for Fuzzy Knowledge Discovery
Published 2014-01-01“…Initially, the best feature subset is selected by using the embedded ICA feature selection, and then these features are used to generate basic fuzzy-classification rules. Finally, all rules are optimized by using an ICA algorithm to reduce their length or to eliminate some of them. …”
Get full text
Article -
18160
Shuffled differential privacy protection method for K-Modes clustering data collection and publication
Published 2024-01-01“…Aiming at the current problem of insufficient security in clustering data collection and publication, in order to protect user privacy and improve data quality in clustering data, a privacy protection method for K-Modes clustering data collection and publication was proposed without trusted third parties based on the shuffled differential privacy model.K-Modes clustering data collection algorithm was used to sample the user data and add noise, and then the initial order of the sampled data was disturbed by filling in the value domain random arrangement publishing algorithm.The malicious attacker couldn’t identify the target user according to the relationship between the user and the data, and then to reduce the interference of noise as much as possible a new centroid was calculated by cyclic iteration to complete the clustering.Finally, the privacy, feasibility and complexity of the above three methods were analyzed from the theoretical level, and the accuracy and entropy of the three real data sets were compared with the authoritative similar algorithms KM, DPLM and LDPKM in recent years to verify the effectiveness of the proposed model.The experimental results show that the privacy protection and data quality of the proposed method are superior to the current similar algorithms.…”
Get full text
Article