Suggested Topics within your search.
Suggested Topics within your search.
-
9541
PLAY AND RITUAL – ONTOLOGICAL ASPECTS OF PHOTOGRAPHY
Published 2017-12-01“…My claim is that the apparently objective picture depicts, in fact, a constructed image that implies a creative process in which the photographer, the model and the spectator are involved. …”
Get full text
Article -
9542
Understanding the Interplay of Religion and Social Policy: Challenges and Opportunities
Published 2023-12-01“…Research Problem: This research explores the complex dynamics between religion and social policy, highlighting the challenges and opportunities that arise from these interactions. …”
Get full text
Article -
9543
Research on axle-box bearing fault feature extraction algorithm based on simulation test and BOA-VMD
Published 2022-03-01“…Aiming at the problem that axle-box bearing faults are difficult to find during the operation of urban rail trains, a bearing fault feature extraction based on variational mode decomposition (VMD) parameter optimization using butterfly optimization algorithm (BOA) was proposed. …”
Get full text
Article -
9544
Junction Temperature Estimation Model of Power MOSFET Device Based on Photovoltaic Power Enhancer
Published 2025-03-01“…A coupling impedance matrix is constructed through step power response extraction to describe the significant thermal coupling effects among devices. …”
Get full text
Article -
9545
Precision Marketing Method of E-Commerce Platform Based on Clustering Algorithm
Published 2021-01-01“…This method solves the problem that the MDF cannot be effectively processed in the traditional model and demonstrates its theoretical correctness. …”
Get full text
Article -
9546
Research on privacy preservation of member inference attacks in online inference process for vertical federated learning linear model
Published 2022-09-01“…With the development of big data and the introduction of data security regulations, the awareness of privacy protection has gradually increased, and the phenomenon of data isolation has become more and more serious.Federated learning technology as one of the effective methods to solve this problem has become a hot spot of concern.In the online inference process of vertical federated learning, the current mainstream methods do not consider the protection of data identity, which is easy to leak user privacy.A privacy protection method for member inference attacks was proposed in the online inference process of the vertical federated linear model.A filter with a false positive rate was constructed to avoid the accurate positioning of data identity to ensure the security of data.Homomorphic encryption was used to realize the full encrypted state of the online inference process and protect the intermediate calculation results.According to the ciphertext multiplication property of homomorphic encryption, the random number multiplication method was used to mask data, which ensured the security of the final inference result.This scheme further improved the security of user privacy in the online inference process of vertical federated learning and had lower computation overhead and communication costs.…”
Get full text
Article -
9547
Indoor Air Pollution Source Localization Based on Small-Sample Training Convolutional Neural Networks
Published 2025-04-01“…In addressing the problem of indoor air pollution source localization, traditional methods have limitations such as strong sample dependence and low computational efficiency. …”
Get full text
Article -
9548
Task Offloading Scheme Based on Proximal Policy Optimization Algorithm
Published 2025-04-01“…The task unloading process of mobile edge computing has the problem that it is impossible to balance delay and energy consumption for task unloading under the condition of fluctuating network bandwidth. …”
Get full text
Article -
9549
PERFORMANCE DEGRADATION ASSESSMENT OF ROLLING BEARING BASED ON SINGLE RING THEOREM IN RANDOM MATRIX THEORY
Published 2022-01-01“…A rolling bearing performance degradation assessment algorithm based on single ring theorem in the random matrix theory is proposed to solve the problem that the traditional feature extraction algorithm is not sufficient to extract the useful information of the bearing under the industrial big data environment, and the constructed index is difficult to effectively characterize the bearing degradation process. …”
Get full text
Article -
9550
FAULT DIAGNOSIS BASED ON SEMI-SUPERVISED LLTSA FOR DIMENSION REDUCTION
Published 2017-01-01“…Linear local tangent space alignment( LLTSA) is an unsupervised dimension reduction method,which will lends to remaining overlaps between faults when it is used to high-dimension fault feature for dimension reduction due to its incapacity of using part sample class label information. Aiming at this problem,semi-supervised linear local tangent space alignment( SSLLTSA) dimension reduction method is proposed in this paper. …”
Get full text
Article -
9551
Building end to end service guarantee system of IoT covering“terminal pipe and cloud” based on signaling big data
Published 2018-06-01“…With the evolution of wireless communication service types to massive,large connections,small traffic scenarios,mobile Internet has marched into the Internet of things.Carrying on business networking wireless network deployment in communication operators,which provides a wealth of industry applications also enable operators facing huge end-to-end backward challenges to business.An end to end service guarantee system based on the signaling big data and covering the “terminal pipe and cloud” was proposed and constructed,and the six network dimensions in the user,terminal,wireless,transmission,core network and digital network was solved,as well as the four stages of network access,service access,network switching,and service quality of six dimensions and four stages facing the Internet of things.In order to solve the problem of inter professional collaboration and demarcation,the assistant operator completes the transformation from the traditional KPI (key performance indicator) index mode to the service aware KQI (key quality indicator) end to end full process business guarantee mechanism,and provides the end to end full process one key positioning ability guarantee for the Internet of things applications.…”
Get full text
Article -
9552
REVEALING THE NOCTILUCENT CLOUD FIELDS STRUCTURE BY SOFTWARE PROCESSING OF SATELLITE IMAGES
Published 2025-06-01“…A significant part of the work is devoted to the describing of the algorithm for constructing the program, choosing a programming language and implementing the task. …”
Get full text
Article -
9553
Analyzing the Parameters of the Coal—Gas System Using a Low-Cost Device Based on a Flowmeter
Published 2015-11-01“…Their biggest drawback is the problem pertaining to a sudden pressure change, which initiates the processes of gas adsorption and transportation. …”
Get full text
Article -
9554
State and Dynamics of Development of the Russian Leasing Market (Brief Statistical Analysis)
Published 2021-02-01“…Thereby, the study of leasing as a unique tool for investing in assets (including labor force) in various spheres of human activity is a relevant scientific and the applied problem. Within the framework of this paper, being used statistical methods for analyzing the structure and dynamics of the phenomena of public life, the features and trends that are emerging in thebRussian market of leasing services are investigated, a forecast for 2020 is being constructed. and expert agencies and summarizes the results of the comprehensive statistical analysis of one of the segments of the financial intermediation services market. …”
Get full text
Article -
9555
A Novel Robust Test to Compare Covariance Matrices in High-Dimensional Data
Published 2025-05-01“…Additionally, we have constructed an R function and added it to the “MVTests” package. …”
Get full text
Article -
9556
Kabbalistic Metaphors in Modeling the Environments of Life
Published 2025-07-01“…The article explores the role of mystical metaphors in the ways of constructing modern living environments. This research perspective is conditioned by the relevance of the problem of alienation in the urban environment, as well as the need to overcome this alienation in order to transform the city into a comfortable environment. …”
Get full text
Article -
9557
Lanterne nel buio digitale: Riconquistare l’autorità e gli archivi di dissenso di Amitav Ghosh contro la cultura degli influencer
Published 2025-07-01“…This article responds to two primary objectives: first, delving into the problem of cultural authority in the digital age, second, intellectuals’ and writers’ responses to authority crisis as they embrace and make their way through the digital environment. …”
Get full text
Article -
9558
Apply Block Ciphers Using Tiny Encryption Algorithm (TEA)
Published 2010-06-01“…The paper presents how a block cipher could be constructed in general, it includes an observation of the history, inventors, and algorithms of the TEA block ciphers. …”
Get full text
Article -
9559
On the Analytical Treatment for the Fractional-Order Coupled Partial Differential Equations via Fixed Point Formulation and Generalized Fractional Derivative Operators
Published 2022-01-01“…By considering a hybrid transform, semianalytical techniques are constructed for the Caputo and Atangana-Baleanu fractional derivative operators. …”
Get full text
Article -
9560
Reach-Avoid Games with a Time Limit and Detection Range: A Geometric Approach
Published 2022-01-01“…In this article, we extend the problem by requiring the defender to detect the attacker and adding maximum operation time constraints to the attacker. …”
Get full text
Article