Suggested Topics within your search.
Suggested Topics within your search.
- ART / Digital 1
- Academic writing 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Computer animation 1
- Digital cinematography 1
- Early Childhood and Elementary Literacy 1
- Early childhood and elementary literacy 1
- East African literature 1
- East African literature (English) 1
- Economic Policy 1
- Economic policy 1
- Electric circuit analysis 1
- Electric network analysis 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Environmental Economics 1
- Environmental economics 1
- History and criticism 1
- Industrial Organization 1
- Industrial organization 1
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 1
- Literature 1
- Public relations 1
- REFERENCE / Writing Skills 1
- Social media 1
-
7921
A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things
Published 2025-01-01“…The findings of this study suggest that most Secure-Protocol can detect and mitigate routing attacks utilizing distributed placement, ML-based can detect most attacks but lack mitigation mechanisms, and conventional IDS technique utilizes a hybrid approach in detection and placement strategies. …”
Get full text
Article -
7922
Workers’ context description and unsafe behavior recognition in Internet of things for mines
Published 2018-12-01“…The mine is a complicated environment.The intelligent recognition of such behavior requires not only the data-driven activity recognition method,but also the machine-readable domain knowledge based approach.However,the data of IoT for mines lacks the semantic information.Besides,there is no standard way of describing the worker’s context and representing the knowledge of worker’s unsafe behavior.In order to solve the above problems,a semantic ontology based approach to describing the worker’s context and a hybrid method based framework for worker’s unsafe behavior recognition were presented.This method combines the data-driven approach and the knowledge-driven approach.Firstly,an introduction to the semantic ontology in the Internet of things was given.Then,the importance and necessity of worker’s unsafe behavior recognition was introduced.After that,the research background on human activity recognition,context-awareness and semantic ontology was presented.This was followed by the semantic ontology based approach to the worker’s context description.Based on the context modeling,the framework that combined the data-driven method and the knowledge-driven method for the worker’s unsafe behavior recognition was proposed.The application of the framework was illustrated with the recognition of a kind of worker’s unsafe behavior who don’t wear the protective and safety equipment.Finally,the conclusions were drawn and the prospect of using the artificial intelligence method in the application layer of mine IoT was presented.…”
Get full text
Article -
7923
Myoepithelial Cell-Rich Pleormorphic Adenoma of Minor Salivary Gland of Parapharyngeal Space
Published 2012-01-01“…Histopathological examination was inconclusive, suggesting possibility of extraskeletal myxoid chondrosarcoma, solitary fibrous tumor, neurogenic tumor. …”
Get full text
Article -
7924
System Analysis Theory Applied for Development of Microalgae Processes and Photobioreactors in the Frame of Integral Biorefinery Concept
Published 2024-12-01“…Special attention was paid to the development of hybrid, innovative PBRs with the aim of fully revealing the potential of microalgae strains not only for the complete absorption of CO2 from flue gases but also for the synthesis of high-value products (HVP) with antimicrobial, antiviral and anticancer activity.…”
Get full text
Article -
7925
Valle de Ordesa (Pirineo central de Huesca, Aragón, noviembre de 2021)
Published 2022-09-01Get full text
Article -
7926
A New Multiphase Soft Segmentation with Adaptive Variants
Published 2013-01-01“…Second, we develop a bidirection projected primal dual hybrid gradient (PDHG) algorithm for iterations of membership functions. …”
Get full text
Article -
7927
-
7928
-
7929
Atypical Chest Pain: An Unusual Presentation of Spinal Metastasis due to Penile Carcinoma
Published 2016-01-01“…Spinal metastases may present in a myriad of ways, most commonly back pain with or without neurology. …”
Get full text
Article -
7930
Arquitectos proyectistas y transición democrática
Published 2011-11-01“…Así, en un contexto de transición democrática y crisis económica, se analiza el concurso “20 ideas para Buenos Aires” (1986), organizado entre la Municipalidad de la Ciudad de Buenos Aires y la Comunidad de Madrid. Esta iniciativa es abordada en tanto indica la expansión de arquitectos proyectistas que cuentan con trayectorias y un saber hacer vinculado a la práctica profesional privada y a la enseñanza de la arquitectura. …”
Get full text
Article -
7931
Edge Computing in an IoT Base Station System: Reprogramming and Real-Time Tasks
Published 2019-01-01“…To overcome these drawbacks, we propose a hybrid edge-cloud IoT base station system, called BSIS. …”
Get full text
Article -
7932
Prediction of the Loss of Feed Water Fault Signatures Using Machine Learning Techniques
Published 2021-01-01“…The inherent limitations of the current fault diagnosis methods make machine learning techniques and their hybrid methodologies possible solutions to remedy this challenge. …”
Get full text
Article -
7933
The third space professional: cultivating authentic learning experiences through collaborative practice
Published 2025-01-01“…Discussion is considered as a vital way for third space professionals to gain trust and credibility amongst academics, as well as the positive impact the introduction of hybrid working had in strengthening these alliances. …”
Get full text
Article -
7934
Do losses trigger deliberative reasoning?
Published 2025-01-01“…To complement these findings, we provide robustness tests of our results using aggregated data, the imposition of a constraint to hinder the activation of System 2, and an analysis of incorrect, but unintuitive, answers to inform hybrid models of choice.…”
Get full text
Article -
7935
Preparation and Characterisation of LiFePO4/CNT Material for Li-Ion Batteries
Published 2011-01-01“…The research is of potential interest for the application of carbon nanotubes as a new conducting additive in cathode preparation and for the development of high-power Li-ion batteries for hybrid electric vehicles.…”
Get full text
Article -
7936
Restoration Model for Cascading Overload Failure in Syncretic Railway Network
Published 2024-01-01“…Specifically, three different restoration strategies—spontaneous restoration strategy (SRS), active restoration strategy (ARS), and hybrid restoration strategy (HRS)—are proposed, and the varying effects of restoration time, restoration probability, restoration objective, and restoration priority for SRN with ARS are compared. …”
Get full text
Article -
7937
Experimental Investigation of the Continuous Transition of Flame-Spreading near the Blow-Off Limit
Published 2020-01-01“…The stabilized combustion is a diffusion flame that appears in the Axial-Injection End-Burning Hybrid Rocket. The boundary between flame-spreading and stabilized combustion has not been investigated in detail. …”
Get full text
Article -
7938
Resource allocation in cognitive radio network with energy harvesting
Published 2018-09-01“…Considering the diversity of energy harvesting capability and spectrum sensing accuracy of SU,as well as dynamic channel quality,under the constraint of energy causality,the secondary network throughput maximization problem in single-hop cognitive radio networks with energy harvesting was studied.The transmission channel selection,transmission power control and transmission time allocation of SU were jointly optimized.Since the optimization problem was non-convex,by converting it into a series of convex optimization sub-problems,the optimize transmission power and transmission time algorithm (OPTA) was obtained.Compared with the existing resource allocation algorithms,such as,hybrid differential evolution algorithm (HDEA),optimized transmission algorithm (OTA),and random assignment channel algorithm (RA),the simulation results verify the correctness and effectiveness of the proposed algorithm.For example,under the same maximum transmission power constraint,the throughput of the proposed OPTA scheme could increase by around 6%,37% and 50% than that of HDEA,OTA and RA schemes respectively.Under the same channel gain diversity,the throughput of the proposed OPTA scheme could increase by around 30%,60% and 94% than that of HDEA,OTA and RA schemes respectively.Under the same energy harvesting efficiency diversity,the throughput of the proposed OPTA scheme could increase by around 27%,50% and 92% than that of HDEA,OTA and RA schemes respectively.…”
Get full text
Article -
7939
NLO QCD predictions for t t ¯ γ $$ t\overline{t}\gamma $$ with realistic photon isolation
Published 2025-01-01“…We provide the results for the pp → e + ν e μ − ν ¯ b b ¯ γ $$ {e}^{+}{\nu}_e\ {\mu}^{-}\ \overline{\nu}\ b\overline{b}\ \gamma $$ + X process using the fixed-cone, smooth-cone and hybrid-photon isolation criteria. The fixed-cone isolation criterion allows contributions from collinear photon radiation off QCD partons, which requires the inclusion of parton-to-photon fragmention processes. …”
Get full text
Article -
7940
Deep learning for multi-modal data fusion in IoT applications
Published 2025-01-01“…This research proposes a robust solution by fusing the multimodal data and employing a deep learning-based hybrid architecture that incorporates a generative model with a deep convolutional network. …”
Get full text
Article