Showing 9,541 - 9,560 results of 10,747 for search 'construction problems', query time: 0.18s Refine Results
  1. 9541

    PLAY AND RITUAL – ONTOLOGICAL ASPECTS OF PHOTOGRAPHY by Andra MAVROPOL

    Published 2017-12-01
    “…My claim is that the apparently objective picture depicts, in fact, a constructed image that implies a creative process in which the photographer, the model and the spectator are involved. …”
    Get full text
    Article
  2. 9542

    Understanding the Interplay of Religion and Social Policy: Challenges and Opportunities by Mohamad Ichsana Nur

    Published 2023-12-01
    “…Research Problem: This research explores the complex dynamics between religion and social policy, highlighting the challenges and opportunities that arise from these interactions. …”
    Get full text
    Article
  3. 9543

    Research on axle-box bearing fault feature extraction algorithm based on simulation test and BOA-VMD by ZHANG Dongxing, YANG Gang, ZHOU Ao, QIN Limu, WEI Yuqian, YAN Lei

    Published 2022-03-01
    “…Aiming at the problem that axle-box bearing faults are difficult to find during the operation of urban rail trains, a bearing fault feature extraction based on variational mode decomposition (VMD) parameter optimization using butterfly optimization algorithm (BOA) was proposed. …”
    Get full text
    Article
  4. 9544

    Junction Temperature Estimation Model of Power MOSFET Device Based on Photovoltaic Power Enhancer by Ning Li, Shubin Zhang, Yanfeng Jiang

    Published 2025-03-01
    “…A coupling impedance matrix is constructed through step power response extraction to describe the significant thermal coupling effects among devices. …”
    Get full text
    Article
  5. 9545

    Precision Marketing Method of E-Commerce Platform Based on Clustering Algorithm by Bei Zhang, Luquan Wang, Yuanyuan Li

    Published 2021-01-01
    “…This method solves the problem that the MDF cannot be effectively processed in the traditional model and demonstrates its theoretical correctness. …”
    Get full text
    Article
  6. 9546

    Research on privacy preservation of member inference attacks in online inference process for vertical federated learning linear model by Hongshu YIN, Xuhua ZHOU, Wenjun ZHOU

    Published 2022-09-01
    “…With the development of big data and the introduction of data security regulations, the awareness of privacy protection has gradually increased, and the phenomenon of data isolation has become more and more serious.Federated learning technology as one of the effective methods to solve this problem has become a hot spot of concern.In the online inference process of vertical federated learning, the current mainstream methods do not consider the protection of data identity, which is easy to leak user privacy.A privacy protection method for member inference attacks was proposed in the online inference process of the vertical federated linear model.A filter with a false positive rate was constructed to avoid the accurate positioning of data identity to ensure the security of data.Homomorphic encryption was used to realize the full encrypted state of the online inference process and protect the intermediate calculation results.According to the ciphertext multiplication property of homomorphic encryption, the random number multiplication method was used to mask data, which ensured the security of the final inference result.This scheme further improved the security of user privacy in the online inference process of vertical federated learning and had lower computation overhead and communication costs.…”
    Get full text
    Article
  7. 9547

    Indoor Air Pollution Source Localization Based on Small-Sample Training Convolutional Neural Networks by Tiancheng Ye, Mengtao Han

    Published 2025-04-01
    “…In addressing the problem of indoor air pollution source localization, traditional methods have limitations such as strong sample dependence and low computational efficiency. …”
    Get full text
    Article
  8. 9548

    Task Offloading Scheme Based on Proximal Policy Optimization Algorithm by Yutong Ma, Junfeng Tian

    Published 2025-04-01
    “…The task unloading process of mobile edge computing has the problem that it is impossible to balance delay and energy consumption for task unloading under the condition of fluctuating network bandwidth. …”
    Get full text
    Article
  9. 9549

    PERFORMANCE DEGRADATION ASSESSMENT OF ROLLING BEARING BASED ON SINGLE RING THEOREM IN RANDOM MATRIX THEORY by SHAN Qiang, NI GuangXian, WANG Heng

    Published 2022-01-01
    “…A rolling bearing performance degradation assessment algorithm based on single ring theorem in the random matrix theory is proposed to solve the problem that the traditional feature extraction algorithm is not sufficient to extract the useful information of the bearing under the industrial big data environment, and the constructed index is difficult to effectively characterize the bearing degradation process. …”
    Get full text
    Article
  10. 9550

    FAULT DIAGNOSIS BASED ON SEMI-SUPERVISED LLTSA FOR DIMENSION REDUCTION by LI Lei, PANG Hai, ZHANG QianTu

    Published 2017-01-01
    “…Linear local tangent space alignment( LLTSA) is an unsupervised dimension reduction method,which will lends to remaining overlaps between faults when it is used to high-dimension fault feature for dimension reduction due to its incapacity of using part sample class label information. Aiming at this problem,semi-supervised linear local tangent space alignment( SSLLTSA) dimension reduction method is proposed in this paper. …”
    Get full text
    Article
  11. 9551

    Building end to end service guarantee system of IoT covering“terminal pipe and cloud” based on signaling big data by Xuli YE, Qiang ZENG, Liyu LIU, Yu SU, Meng KANG

    Published 2018-06-01
    “…With the evolution of wireless communication service types to massive,large connections,small traffic scenarios,mobile Internet has marched into the Internet of things.Carrying on business networking wireless network deployment in communication operators,which provides a wealth of industry applications also enable operators facing huge end-to-end backward challenges to business.An end to end service guarantee system based on the signaling big data and covering the “terminal pipe and cloud” was proposed and constructed,and the six network dimensions in the user,terminal,wireless,transmission,core network and digital network was solved,as well as the four stages of network access,service access,network switching,and service quality of six dimensions and four stages facing the Internet of things.In order to solve the problem of inter professional collaboration and demarcation,the assistant operator completes the transformation from the traditional KPI (key performance indicator) index mode to the service aware KQI (key quality indicator) end to end full process business guarantee mechanism,and provides the end to end full process one key positioning ability guarantee for the Internet of things applications.…”
    Get full text
    Article
  12. 9552

    REVEALING THE NOCTILUCENT CLOUD FIELDS STRUCTURE BY SOFTWARE PROCESSING OF SATELLITE IMAGES by beibut useinov, Andrei Solodovnik, Roman . Kleksin1, Pavel Leontyev, Beibut Useinov, Agniya Markova, Svetlana Kassimova

    Published 2025-06-01
    “…A significant part of the work is devoted to the describing of the algorithm for constructing the program, choosing a programming language and implementing the task. …”
    Get full text
    Article
  13. 9553

    Analyzing the Parameters of the Coal—Gas System Using a Low-Cost Device Based on a Flowmeter by Norbert Skoczylas

    Published 2015-11-01
    “…Their biggest drawback is the problem pertaining to a sudden pressure change, which initiates the processes of gas adsorption and transportation. …”
    Get full text
    Article
  14. 9554

    State and Dynamics of Development of the Russian Leasing Market (Brief Statistical Analysis) by L. Yu. Arkhangel’skaya

    Published 2021-02-01
    “…Thereby, the study of leasing as a unique tool for investing in assets (including labor force) in various spheres of human activity is a relevant scientific and the applied problem. Within the framework of this paper, being used statistical methods for analyzing the structure and dynamics of the phenomena of public life, the features and trends that are emerging in thebRussian market of leasing services are investigated, a forecast for 2020 is being constructed. and expert agencies and summarizes the results of the comprehensive statistical analysis of one of the segments of the financial intermediation services market. …”
    Get full text
    Article
  15. 9555

    A Novel Robust Test to Compare Covariance Matrices in High-Dimensional Data by Hasan Bulut

    Published 2025-05-01
    “…Additionally, we have constructed an R function and added it to the “MVTests” package. …”
    Get full text
    Article
  16. 9556

    Kabbalistic Metaphors in Modeling the Environments of Life by Elena A. Korol

    Published 2025-07-01
    “…The article explores the role of mystical metaphors in the ways of constructing modern living environments. This research perspective is conditioned by the relevance of the problem of alienation in the urban environment, as well as the need to overcome this alienation in order to transform the city into a comfortable environment. …”
    Get full text
    Article
  17. 9557

    Lanterne nel buio digitale: Riconquistare l’autorità e gli archivi di dissenso di Amitav Ghosh contro la cultura degli influencer by Harjot Banga

    Published 2025-07-01
    “…This article responds to two primary objectives: first, delving into the problem of cultural authority in the digital age, second, intellectuals’ and writers’ responses to authority crisis as they embrace and make their way through the digital environment. …”
    Get full text
    Article
  18. 9558

    Apply Block Ciphers Using Tiny Encryption Algorithm (TEA) by Hana Rashied Ismaeel

    Published 2010-06-01
    “…The paper presents how a block cipher could be constructed in general, it includes an observation of the history, inventors, and algorithms of the TEA block ciphers. …”
    Get full text
    Article
  19. 9559

    On the Analytical Treatment for the Fractional-Order Coupled Partial Differential Equations via Fixed Point Formulation and Generalized Fractional Derivative Operators by Saima Rashid, Sobia Sultana, Nazeran Idrees, Ebenezer Bonyah

    Published 2022-01-01
    “…By considering a hybrid transform, semianalytical techniques are constructed for the Caputo and Atangana-Baleanu fractional derivative operators. …”
    Get full text
    Article
  20. 9560

    Reach-Avoid Games with a Time Limit and Detection Range: A Geometric Approach by Xi Chen, Jianqiao Yu, Kang Niu, Di Yang, Jiaxun Li

    Published 2022-01-01
    “…In this article, we extend the problem by requiring the defender to detect the attacker and adding maximum operation time constraints to the attacker. …”
    Get full text
    Article