Suggested Topics within your search.
Suggested Topics within your search.
- History and criticism 7
- Politics and government 7
- Constitutional law 6
- History 6
- Law 6
- Methodology 6
- Economic conditions 5
- Mass media 5
- Swahili language 5
- English language 4
- Management 4
- Philosophy 4
- Research 4
- Study and teaching 4
- Women 4
- kiswahili 4
- kiswahili language 4
- Economic development 3
- Economic policy 3
- Evaluation 3
- Information technology 3
- Interpretation and construction 3
- Moral and ethical aspects 3
- Public administration 3
- Administration 2
- Agriculture 2
- Application software 2
- Appreciation 2
- Automobiles 2
- Children 2
-
1921
Amplitude information based robust tracking method for multiple marine targets
Published 2019-02-01Get full text
Article -
1922
Feature Extraction of Weak Fault for Gear based on MOMEDA and Envelope Spectrum
Published 2018-01-01“…Simulation example of fault signal and transmission shows that this method can effectively realize the feature extraction of gear weak fault.…”
Get full text
Article -
1923
Adding Value to Livestock with Niche Meat Marketing Programs
Published 2008-05-01“… AN197, a 6-page report by Chad Carr, Larry Eubanks, and Ryan Dijkhuis, discusses opportunities to add value to meat animals through existing specialty meat marketing programs and addresses potential challenges to developing a niche meat marketing program. …”
Get full text
Article -
1924
Provable data possession scheme based on public verification and private verification
Published 2019-03-01“…More and more users choose to transfer their applications and data into the cloud.Data security is a key issue for cloud storage systems.To ensure the integrity and validity of the data stored in the cloud,provable data possession (PDP) scheme is particularly important.In order to verify whether the cloud storage service provider had stored the data of the user completely,a scheme on the basis of NRPDP (non-repudiable PDP) was improved and extended,and a data retention scheme based on public authentication and private authentication was proposed.The scheme can verify the trustworthiness of the service provider and the user in the cloud storage at the same time,which satisfies the non-repudiation of the verification.The theory proves the non-repudiation of the proposed scheme.The experiment proves that the efficiency of each stage is better than that of the existing single public verification method or private authentication method.…”
Get full text
Article -
1925
Inverse Projective Synchronization between Two Different Hyperchaotic Systems with Fractional Order
Published 2012-01-01“…This paper mainly investigates a novel inverse projective synchronization between two different fractional-order hyperchaotic systems, that is, the fractional-order hyperchaotic Lorenz system and the fractional-order hyperchaotic Chen system. By using the stability theory of fractional-order differential equations and Lyapunov equations for fractional-order systems, two kinds of suitable controllers for achieving inverse projective synchronization are designed, in which the generalized synchronization, antisynchronization, and projective synchronization of fractional-order hyperchaotic Lorenz system and fractional-order hyperchaotic Chen system are also successfully achieved, respectively. …”
Get full text
Article -
1926
Automatic Identification of Daily Higher High Water Level in High Time-Frequency Tidal Water Level Process
Published 2009-01-01Get full text
Article -
1927
Scanning Reduction Strategy in MEG/EEG Beamformer Source Imaging
Published 2012-01-01“…MEG/EEG beamformer source imaging is a promising approach which can easily address spatiotemporal multi-dipole problems without a priori information on the number of sources and is robust to noise. …”
Get full text
Article -
1928
Successful treatment of etanercept- and adalimumab-resistant pyoderma gangrenosum with spesolimab, moderate-dose corticosteroids, and minocycline
Published 2025-12-01“…Despite the added complexity of the patient’s underlying HBV infection and elevated M-protein, no HBV reactivation or other hematologic complications occurred. …”
Get full text
Article -
1929
An Assessment of the Current Diagnostic Criteria for Infective Endocarditis
Published 1998-01-01Get full text
Article -
1930
-
1931
4-H Livestock Judging: Activity 2, Different Strokes
Published 2012-01-01“…The guide also aims to reassure and support potential leaders, emphasizing that successful programs can be led effectively without requiring advanced subject matter expertise. …”
Get full text
Article -
1932
Micro-Blog Recommendation Based on User Interests and Recommendation Trust Domain
Published 2015-01-01Get full text
Article -
1933
Quantitative Detection of Financial Fraud Based on Deep Learning with Combination of E-Commerce Big Data
Published 2020-01-01“…Experimental results show that this method can effectively learn the essential characteristics of the data, and significantly improve the detection rate of fraud detection algorithms.…”
Get full text
Article -
1934
Low-latency algorithm for improving data persistence in mobile low-duty-cycle wireless sensor network
Published 2018-03-01“…Mobile low-duty-cycle wireless sensor network (MLDC-WSN) are a kind of new ad hoc networks that are appeared in recent years.In MLDC-WSN,the nodes only have limited storage spaces.Moreover,the nodes would move or sleep from time to time.Therefore,these networks have some problems such as connectivity is hard to be maintained and data are hard to be transmitted to their destinations for storage in time.As a result,data persistence (i.e.…”
Get full text
Article -
1935
OUT-OF-PLANE TENSION FAILURE ANALYSIS OF COMPOSITE STRINGER FOR AIRCRAFT
Published 2019-01-01“…A verification test is designed to test the failure load and failure mode of three different stringer configurations.Then the load-displacement curve is drawn to verify the validity of the FEA method.The influence factors of out-of-plane tension failure of composite stringer are studied, which can guide the strength design of aircraft.…”
Get full text
Article -
1936
Calculation of Cross-sectional Shape and Polar Moment of Inertia of a Thread Screw
Published 2016-01-01Get full text
Article -
1937
-
1938
A Support Vector Machine Model with Hyperparameters Optimised by Mind Evolutionary Algorithm for Assessing Permeability of Rock
Published 2020-01-01“…The following conclusions were drawn. MEA can increase the predictive accuracy of the constructed machine learning models remarkably in a few iteration times, which has better optimisation performance than that of GA and PSO. …”
Get full text
Article -
1939
Fault Diagnosis Method of Gear based on VMD and Multi-feature Fusion
Published 2017-01-01“…Finally,the high- dimensional feature vectors composed of PE and energy are transformed as input of least squares support vector machine( LS- SVM) to identify gear fault types.The experimental results indicate that VMD can better separate complex multi- components signal from each other,the PE and energy feature can reveal the gear fault information from different scales,the intelligent fault diagnosis method based on VMD and multi- feature fusion can identify the operating conditions of gear accurately and provide reference for the gear fault warning and severity.…”
Get full text
Article -
1940
Optimization Design of the High-speed Gear Web Structure of Electric Vehicles Based on Numerical Simulation
Published 2024-06-01“…From mode of vibration, tooth root stress, transmission error to manufacturing error sensitivity, five kinds of gear web designs are analyzed, including simple plate, simple plate with weight reduction bore, simple plate with curved oval bore, simple plate with ribs and complex plate. …”
Get full text
Article