Suggested Topics within your search.
Suggested Topics within your search.
- Academic writing 1
- Agriculture 1
- Autonomy and independence movements 1
- Calculus 1
- Curricula 1
- Curriculum planning 1
- Decolonization 1
- Dissertations, Academic 1
- Economic policy 1
- Education 1
- Electric circuit analysis 1
- Electric network analysis 1
- Electronic Health Records 1
- English language 1
- Entrepreneurship 1
- Film adaptations 1
- Foreign economic relations 1
- Grammar, Comparative and general 1
- History 1
- History and criticism 1
- International business enterprises 1
- LANGUAGE ARTS & DISCIPLINES / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Syntax 1
- Literary style 1
- MATHEMATICS / Mathematical Analysis 1
- Manufacturing processes 1
- Medical Informatics Applications 1
- Medical informatics 1
- Medical technology 1
-
18241
Learning from collaborative ‘conversations’ on the Students as Producer Pedagogic model: students’ views
Published 2020-06-01“…Beyond this, the paper addresses wider literature in relation to the Students as Partners (Healey, Flint and Harrington, 2014), and Students as Change agents as pedagogic approaches (Dunne & Zandstra, 2011). Finally, the paper considers whether a common pedagogic ethos can be identified. …”
Get full text
Article -
18242
STUDY ON ENERGY ABSORPTION CHARACTERISTICS OF CIRCULAR TUBE WITH RECTANGULAR GROOVE BASED ON REGRESSION ANALYSIS
Published 2024-04-01“…By comparing the calculated value of the empirical formula with the finite element numerical value, the empiricalformula has higher accuracy within the research range, and the error is within 8%. Finally, the energy absorption performance index was introduced and the structure of the circular tube was optimized by genetic algorithm. …”
Get full text
Article -
18243
Dark Margins: Invisibility and Obscenity in Thomas Pynchon’s V., The Crying of Lot 49, and Gravity’s Rainbow
Published 2010-10-01“…., The Crying of Lot 49, and Gravity’s Rainbow, as they reveal a gradated movement from the struggle between the “animate” and the “inanimate,” to the resistance against the inanimateness of the system through strategies of invisibility, to, finally, the ultimate, obscene challenge posed by the inanimate to humanity as it takes the shape of what is known as the “new technologies.” …”
Get full text
Article -
18244
RSS Tracking Control for AVs Under Bayesian-Network-Based Intelligent Learning Scheme
Published 2025-01-01“…Additionally, a critic learning optimal control algorithm is developed to determine the control law. Finally, the proposed tracking control scheme is validated through simulations, demonstrating its reliability and effectiveness.…”
Get full text
Article -
18245
Research on Safety Management Application of Dangerous Sources in Engineering Construction Based on BIM Technology
Published 2019-01-01“…At the same time, the Navisworks software is used to simulate the emergency rescue of construction safety accidents and formulate the corresponding emergency management plan. Finally, an engineering example is used to verify the performance of the development management module. …”
Get full text
Article -
18246
Analysis of communication data of mobile terminal based on protocol reversal
Published 2018-12-01“…The most problem in analysis of communication protocols and communication data for mobile terminals is that many mobile applications do not have the relevant public technical documents,and it is difficult to know the type of communication protocol it adopts.The instruction execution sequence analysis technique takes the instruction sequence executed by the program as a research object,and inversely infers the message format and the state machine to obtain the communication protocol.However,due to the incomplete collection of sequence information,the state machine infers that the inference is incomplete and cannot be effective.A novel protocol reverse scheme based on state machine comparison is proposed,which can be used for the forensics of mobile terminal communication data.The scheme first uses PIN for dynamical identification of the taint,and track it and analyzes the trajectory to obtain the message format.Secondly,the message clustering is performed on the basis of the message format to infer the protocol state machine.Finally,the LCS algorithm is used to compare the state machines to get a complete protocol state machine.This article tests and evaluates the scheme based on two types of application design experiments on the Android platform.The experimental results show that the results are both complete and real-time,and have practical value.…”
Get full text
Article -
18247
Reidentification of Persons Using Clothing Features in Real-Life Video
Published 2017-01-01“…We also used the spatial pyramid matching (SPM) model to improve the image spatial information in color histograms. Finally, we used the Gaussian mixture model (GMM) to show features for person reidentification, because the main color feature of GMM is more adaptable for scene changes, and improve the stability of the retrieved results for different color spaces in various scenes. …”
Get full text
Article -
18248
Multi-tenant virtual domain isolation construction method based on L-DHT
Published 2020-06-01“…Aiming at the problem of security isolation of multi-tenant data in cloud environment,a tenant virtual domain isolation construction method based on L-DHT was proposed.Firstly,through the design of multi-tenant isolation mapping algorithm based on label-hash mapping,the balanced mapping mechanism of tenant resources was constructed to realize the distributed management of tenant resources.Secondly,for the security isolation and access between tenant data mapped to the same storage node,based on the predicate encryption mechanism,through the effective binding of security labels and tenant data,a tenant data isolation storage algorithm based on label predicate encryption was designed.Finally,by the design of multi-dimensional tenant data isolation control rules and using the analysis and authentication of security labels,independent,logical and secure virtual domains between tenants were built hierarchically.The security analysis shows that the method constructs tenant virtual domains which are secure and non-interference with each other.The simulation results show that the mapping algorithm can achieve a better dynamic load balance.The efficiency and security of data access are verified by the comparative analysis of tenant data retrieval efficiency and authentication access security.…”
Get full text
Article -
18249
Genomic landscape and comparative analysis of tissue and liquid-based NGS in Taiwanese anaplastic thyroid carcinoma
Published 2025-01-01“…Genetic alterations showed highly heterogeneity, including mutations in RAS/RAF/MEK/ERK, PI3K/AKT/mTOR, cell cycle regulation, other receptor tyrosine kinases, DNA damage response, mismatch repair, and chromatin remodeling. …”
Get full text
Article -
18250
Fertility in Rostock and Rural Mecklenburg-Schwerin in the 19th Century
Published 2018-01-01“…We analyse the urban-rural difference, the influence of occupational groups in the city of Rostock and its rural surroundings, and finally the influence of migration on fertility in the city of Rostock. …”
Get full text
Article -
18251
A Novel Approach for Objective Assessment of White Blood Cells Using Computational Vision Algorithms
Published 2018-01-01“…The purpose of the research was to develop a system to identify and classify blood cells, by the implementation of the networks of Gaussian radial base functions (RBFN) for the extraction of its nucleus and subsequently their classification through the morphological characteristics, its color, and the distance between objects. Finally, the results obtained with the validation through the coefficient of determination showed an overall accuracy of 97.9% in the classification of the white blood cells per individual, while the precision in the classification by type of cell evidenced results in 93.4% for lymphocytes, 97.37% for monocytes, 79.5% for neutrophils, 73.07% for eosinophils, and a 100% in basophils with respect to the professional. …”
Get full text
Article -
18252
A Cycle Slip Detection and Repair Method Using BDS Triple-Frequency Optimization Combination with Wavelet Denoising
Published 2022-01-01“…Moreover, the multivalue problem of the dual-frequency PIR method is solved by triple-frequency GFPMP combination; finally, the BeiDou navigation satellite system (BDS) triple-frequency measurement data is used for experimental verification. …”
Get full text
Article -
18253
3D WSN clustering routing algorithm based on IHBA optimized fuzzy C-means
Published 2023-12-01“…Aiming at the problem that clustering routing algorithm in a three-dimensional (3D) scene has high energy consumption and short network lifetime, a clustering routing algorithm IFCRA for 3D wireless sensor networks based on improved honey badger algorithm optimized fuzzy C-means was proposed.The network clustering, cluster head election, and data transmission stages were optimized respectively.Firstly, the improved honey badger algorithm was used to optimize the fuzzy C-means algorithm, solving the problem of fuzzy C-means easily falling into local optima, and the topological structure was divided based on the distance and energy characteristics of nodes.Secondly, the optimal cluster head function was constructed by combining the energy and relative distance of nodes within the cluster to balance the cluster head load.Finally, an adaptive transmission mechanism was used to search for relay nodes, and the optimal transmission path function was constructed by combining node distance and energy.The improved honey badger algorithm was used to optimize the data transmission energy consumption.Simulation results show that IFCRA has reasonable clustering, balanced energy consumption, and long lifespan in a 3D heterogeneous scene.…”
Get full text
Article -
18254
A New Coupled CFD/Neutron Kinetics System for High Fidelity Simulations of LWR Core Phenomena: Proof of Concept
Published 2014-01-01“…The prediction capability of NHESDYN is demonstrated by a code-to-code comparison with the DYNSUB code. Finally, the future developments and validation efforts are highlighted.…”
Get full text
Article -
18255
Research on the Lightweight Gear Surface Defect Detection Algorithm Based on BN-YOLOv5
Published 2024-05-01“…Secondly, a compact focus mechanism module, normalization-based attention module (NAM) is presented to its weighted bidirectional feature pyramid network structure which can more rapidly and efficiently fuse the feature information of higher and lower layers. Finally, the depth separable convolution module is used to replace every convolutional layer in the network structure, thereby lightening the network model. …”
Get full text
Article -
18256
Evaluating the stability and efficacy of fractal-fractional models in reproductive cancer apoptosis with ABT-737
Published 2025-01-01“…We generate simulated graphical representations of these models for a variety of fractional-order values. Finally, we present the simulation results to confirm the effectiveness and practicality of the theoretical findings.…”
Get full text
Article -
18257
Large-scale Cosmic-ray Anisotropies with 19 yr of Data from the Pierre Auger Observatory
Published 2024-01-01“…The results for the equatorial dipole component down to 0.03 EeV are presented, using for the first time a data set obtained with a trigger that has been optimized for lower energies. Finally, model predictions are discussed and compared with observations, based on two source emission scenarios obtained in the combined fit of spectrum and composition above 0.6 EeV.…”
Get full text
Article -
18258
Heavy-Duty Vehicle Braking Stability Control and HIL Verification for Improving Traffic Safety
Published 2022-01-01“…Secondly, the fuzzy PID and sliding mode controller based on yaw and centroid error are designed to find the optimal control strategy from the two kinds of control strategies for HIL experiments. Finally, the actual control effect and feasibility of these control algorithms for heavy vehicle braking under special road conditions are verified by HIL experiments. …”
Get full text
Article -
18259
Evaluation of combat effectiveness of unmanned aerial vehicle group in uncertain situations
Published 2025-02-01“…Then, based on the available simulation data of the combat process, construct core effectiveness indicators and auxiliary effectiveness indicators, and provide a calculation and coupling method for each indicator. Finally, a scenario is set up to simulate the combat process of unmanned aerial vehicle swarms using different deployment schemes, evaluate and analyze the combat effectiveness, verify the feasibility of the proposed method, and achieve effective evaluation of the combat effectiveness of unmanned aerial vehicle swarms under uncertain situations.…”
Get full text
Article -
18260
Dynamic Performance Evaluation of Concrete Building Using Low-Yield Point Steel Shear Panels
Published 2021-01-01“…In this paper, preliminary explanations of the steel shear wall are presented for more familiarity, and in the following sections, the study of reinforcement and repair of concrete structures will be studied and its difference with the low-yield point will be considered. Finally, the test results will be reviewed. The results of this study show that LYP steel shear panels cause a lot of energy loss and absorption, which is very useful in the safety of buildings exposed to severe earthquakes.…”
Get full text
Article