Suggested Topics within your search.
Suggested Topics within your search.
- Education 1
- Educational evaluation 1
- Evaluation 1
- Research 1
- Schools 1
-
1681
Biomedical Imaging Modality Classification Using Combined Visual Features and Textual Terms
Published 2011-01-01“…This paper is focused on the process of feature extraction from medical images and fuses the different extracted visual features and textual feature for modality classification. …”
Get full text
Article -
1682
MILLING FORCE MODELING BASED ON EQUIVALENT TURNING FORCE AND OBLIQUE CUTTING FORCE MODEL (MT)
Published 2023-01-01“…The accuracy of traditional milling force prediction model is low, and it is difficult to provide effective support for the reasonable selection of process parameters in practical production, by synthetically considering the equivalent turning force model of working angle, cutting edge arc and radius of tool tip arc, in this model, the actual turning tool is equivalent to the ideal turning tool model to identify the material constant, the chip flow angle and the average friction angle in the material constitutive equation, according to the oblique cutting model, the shear stress on the main shear plane and the F<sub>0</sub> vector of the unit cutting force at different cutting speeds are calculated, thus the instantaneous cutting force on the front face of the end mill can be calculated, the three-dimensional cutting force of end mill in X-Y-Z coordinate system is obtained by coordinate transformation. …”
Get full text
Article -
1683
Verifiable access control scheme based on unpaired CP-ABE in fog computing
Published 2021-08-01“…Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality and fine-grained access control.The excessive computational overhead of bilinear pairing restricts its application and development.In response to this, a verifiable access control scheme was proposed based on unpaired CP-ABE in fog computing.In order to make CP-ABE more efficient, simple scalar multiplication in elliptic curve encryption was used to replace bilinear pairing, thereby reducing the overall computational overhead.Decryption operations were outsourced to fog nodes to reduce user computational complexity, and based on the tamper-proof and traceable characteristics of the blockchain, the correctness of the access transaction was verified and the access authorization process was recorded.Security and performance analysis shows that the scheme is safe under the elliptic curve decision-making DBDH (Diffie-Hellman) assumption, and the calculation efficiency is higher.…”
Get full text
Article -
1684
Information, Entanglement, and Emergent Social Norms: Searching for ‘Normal’
Published 2024-11-01“…Here, we further demonstrate that social norms act as the leading edge of individual and collective search and optimization processes. …”
Get full text
Article -
1685
ANALYSIS ON STRESS AND DEFORMATION OF STEEL WIRE ROPE AT WR-CVT DISCONTINUOUS CONTACT WIRE
Published 2018-01-01“…Aiming at the wear problem of the new-type metal belt type continuously variable transmission steel rope ring,the discontinuous contact geometry model and the finite element analysis model of the steel rope ring and the metal block in the WR-CVT transmission process are established,and the metal block and the steel rope ring are analyzed. …”
Get full text
Article -
1686
An Assessment of the Soundscape West of the Svalbard Islands
Published 2025-02-01“…Abstract A climatic shift is driving the Arctic Ocean toward an “Atlantification” process. This phenomenon might turn the future Arctic into an ice‐free Ocean and affect its soundscape. …”
Get full text
Article -
1687
ORGANIC PHOTOCONDUCTOR TTF-TCNQ (TETRATHIAFULVALENETETRACYANOQUINODIMETHANE): A POTENTIAL ROOM TEMPERATURE INFRARED DETECTOR AT 10 ?m H. R. Mohajeri Moghaddam* and N. Peyghamba...
Published 1996-06-01“…The laser power dependency of the photocarriers showed that a single photon absorption process is involved. Slight deviation from linear dependency could be attributed to trapping in the band gap. …”
Get full text
Article -
1688
Modeling of Particle Trajectory and Erosion of Large Rotor Blades
Published 2016-01-01Get full text
Article -
1689
Local structural changes associated with relaxor behavior in Sn-doped BaTiO_{3}
Published 2025-07-01“…In this study, we investigate how PNRs form by using Ti K-edge x-ray absorption fine structure spectroscopy to observe local structural changes of polar sites when Sn is doped in the order-disorder-type ferroelectric BaTiO_{3}. …”
Get full text
Article -
1690
Challenge of Adapting Marketing Concepts and Tools to The Territory
Published 2025-06-01“… This research paper investigates the necessity and process of adapting traditional marketing concepts and tools to the unique context of territories, aiming to enhance their attractiveness for targeted groups at both national and international levels. …”
Get full text
Article -
1691
Au centre de l’Amérique du Sud : des frontières leviers de territorialisation
Published 2022-03-01“…From the 1960s onwards, these “empty borders” became the horizons of the conquest processes, especially in the context of the internal colonization projects. …”
Get full text
Article -
1692
Improving Energy Harvesting Efficiency by Vibration-Induced Stresses of Piezoelectric Patch Glued Tapered Beams
Published 2020-08-01“…The energy harvesting process was achieved by gluing a piezoelectric patch onto the cantilever tapered beam. …”
Get full text
Article -
1693
Local Differential Privacy Graph Data Modeling Method for Link Prediction
Published 2023-10-01“… To solve the problem of node sensitive link privacy being exposed in the process of link prediction on industrial business graph data , according to the theory of local differential privacy , the shortcomings of the existing graph privacy protection technology are analyzed from the perspective of link prediction task performance. …”
Get full text
Article -
1694
Text-Dependent Writer Identification for Arabic Handwriting
Published 2012-01-01“…Prior to the feature extraction process, normalization operations were applied to the word or text line under analysis. …”
Get full text
Article -
1695
PRESSURE INJURIES IN ADULTS AND THE ELDERLY: A SCOPING REVIEW
Published 2024-10-01“…Granulation tissue, liquefaction necrosis, and/or coagulation were found in the wound bed, with epithelialized, macerated, or a flaky edge. The presence of exudate was rarely reported. …”
Get full text
Article -
1696
Evaluation of Image Segmentation Methods for In Situ Quality Assessment in Additive Manufacturing
Published 2024-11-01“…The control system software for printing and imaging (acquisition and processing) was custom developed in Python running on a Raspberry Pi. …”
Get full text
Article -
1697
DETERMINATION OF CUTTING TILLAGE DISK PARAMETER
Published 2017-06-01“…The soil as an object of processing is presented by deformation coefficient, the angles of external friction, compressive strength. …”
Get full text
Article -
1698
The Dynamic Inner Disk of a Planet-forming Star
Published 2025-01-01“…Planets are a natural byproduct of the stellar formation process, resulting from local aggregations of material within the disks surrounding young stars. …”
Get full text
Article -
1699
HECS4MQTT: A Multi-Layer Security Framework for Lightweight and Robust Encryption in Healthcare IoT Communications
Published 2025-06-01“…Unlike existing solutions that either impose high computational overhead at the edge or rely solely on transport-layer protection, HECS4MQTT introduces a layered encryption strategy that decouples edge and cloud security requirements. …”
Get full text
Article -
1700
Improving MRAM Performance with Sparse Modulation and Hamming Error Correction
Published 2025-06-01“…With the rise of the Internet of Things (IoT), smart sensors are increasingly being deployed as compact edge processing units, necessitating continuously writable memory with low power consumption and fast access times. …”
Get full text
Article