Suggested Topics within your search.
Suggested Topics within your search.
- Etiology 2
- Genetics 2
- History and criticism 2
- Academic writing 1
- Adaptations 1
- Adaptive control systems 1
- Adjustment (Psychology) 1
- Board books 1
- Children with disabilities 1
- Climate change mitigation 1
- Climatic changes 1
- Cognitive Therapy 1
- Courtship 1
- Cultural Diversity 1
- Cultural policy 1
- Desertification 1
- Developmental psychology 1
- Diabetes 1
- Diabetes Mellitus, Type 2 1
- Dissertations, Academic 1
- Ebiragiro by'okuhandika Runyankole -Rukiga 1
- Ebisaakuzo/ebishaakuzo 1
- Education 1
- Ethnicity 1
- Ethnoscience 1
- European cooperation 1
- Exercise 1
- Farmers 1
- Film adaptations 1
- Genanalyse 1
-
1121
An Efficient Adaptive Anticollision Algorithm Based on 4-Ary Pruning Query Tree
Published 2013-12-01“…To reduce these excessive idle timeslots the 4-ary tree anticollision algorithm brings, an anti-collision algorithm based on adaptive 4-ary pruning query tree (A4PQT) is proposed in this paper. …”
Get full text
Article -
1122
Antecedents of marketing climate change adaption construction materials: Evidence from Ghana
Published 2023-11-01Get full text
Article -
1123
Management of surface and spring water for rice cultivation as climate adaptation in dry land
Published 2025-01-01“…This research aims to examine the use of rainfall, surface flow and spring water to support rice planting in the second growing season as a form of adaptation to climatic conditions of dry land in karst areas. …”
Get full text
Article -
1124
Adaptive Control Using Neural Networks and Approximate Models for Nonlinear Dynamic Systems
Published 2020-01-01“…In this research, a comparative study of two recurrent neural networks, nonlinear autoregressive with exogenous input (NARX) neural network and nonlinear autoregressive moving average (NARMA-L2), and a feedforward neural network (FFNN) is performed for their ability to provide adaptive control of nonlinear systems. Three dynamical nonlinear systems of different complexity are considered. …”
Get full text
Article -
1125
Adaptive threshold scheme for fault detection for positive switched systems with parametric uncertainty
Published 2025-01-01Get full text
Article -
1126
Avoiding catastrophic overfitting in fast adversarial training with adaptive similarity step size.
Published 2025-01-01“…To address these issues, this paper proposes a fast adversarial training method-fast adversarial training with adaptive similarity step size (ATSS). In this method, random noise is first added to the input clean samples, and the model then calculates the gradient for each input sample. …”
Get full text
Article -
1127
Psychological preconditions for the implementation of the police officers` coping behavior in the context of adaptive perfectionism
Published 2021-09-01“…The first group consisted of subjects with an adaptive form of perfectionism (63 people), the second - subjects with a maladaptive form of perfectionism (39 people). …”
Get full text
Article -
1128
4D Printing of magneto- and thermo-responsive, adaptive and multimodal soft robots
Published 2025-12-01Subjects: Get full text
Article -
1129
Les Fiançailles au couvent : Prokofiev adapte La Duègne de Sheridan
Published 2011-12-01Get full text
Article -
1130
Lossless image authentication algorithm based on adaptive combinations of image basic blocks
Published 2012-06-01“…As the existing block-wise lossless image authentication algorithms were inadequate in the division of image authentication blocks,a novel lossless image authentication algorithm based on adaptive combinations of image basic blocks was proposed.The image authentication block was composed of some basic image blocks by the source image characteristics and requirements of watermarking image fidelity,and the authentication code was generated by a digital signature algorithm and embedded into the authentication block via a lossless watermarking algorithm.Moreover,the robust transmission of the image ID was achieved via multi-embedding,and using the ID and authentication block ID the image authentication algorithm could prevent vector quantizationattack.Theoretical analyses and experimental results demonstrate that the algorithm not only improves the existing tamper localization accuracy but also has strong adaptability and can resist vector quantization attack.…”
Get full text
Article -
1131
Comparative transcriptomics reveal stage-dependent parasitic adaptations in the myxozoan Sphaerospora molnari
Published 2025-02-01“…We identified genes that are thus far unique to S. molnari, which reveal their evolutionary novelty and likely role as adaptations to specific host niches. In addition, we describe the pathogenicity-associated genetic toolbox of S. molnari and discuss the implications of our discoveries for disease control by shedding light on specific targets for potential intervention strategies.…”
Get full text
Article -
1132
Farmers’ adaptation practices in climate-stressed coastal Bangladesh: a systematic review
Published 2025-01-01Subjects: Get full text
Article -
1133
An Adaptive Fuzzy-Logic Traffic Control System in Conditions of Saturated Transport Stream
Published 2016-01-01“…This paper considers the problem of building adaptive fuzzy-logic traffic control systems (AFLTCS) to deal with information fuzziness and uncertainty in case of heavy traffic streams. …”
Get full text
Article -
1134
Polymorphism in the TRP8 gene in Kyrgyz population: putative association with highland adaptation
Published 2015-12-01Subjects: “…trpm8 gene, population analysis, singlenucleotide polymorphisms, associations, distribution, cold adaptation…”
Get full text
Article -
1135
Adaptation trust evolution scheme for mobile robot in industrial wireless sensor-cloud
Published 2017-06-01“…Industrial wireless sensor networks and production equipments are deployed in unattended and distributed intelligent manufacturing system (IMS).Sensor-cloud as a potential technology can effectively integrate distributed equipments as a service and provide it to mobile robots.However,when the mobile robots access the remote devices via sensor-cloud platform,because potential attackers easily intercept keys and eavesdrop equipment operation contents through wireless channels,which makes the key management and the control of equipment operation permission become crucial to the safe and reliable operation of IMS.Therefore,the utility function of game players were formalized,the adaptive trust update process was analyzed,and an adaptive trust management mechanism based on evolutionary game was proposed.Simulation results show that the proposed method can effectively improve the security of sensor-cloud network systems and equipments.…”
Get full text
Article -
1136
Hurst and priority adaptive RED combined with dynamic scheduling algorithm based on AOS
Published 2012-10-01“…In order to efficiently transmit different types of high-capacity and burst data,based on virtual channel multiplexing technology on advanced orbiting systems(AOS),a Hurst and priority adaptive random early detection(RED) combined with dynamic scheduling algorithm named HPRED-DS was proposed.In queue management state,the algorithm designed an adaptive two-level packet dropping strategy based on Hurst parameter and priority.In virtual channel scheduling state,a VIP,synchronous and asynchronous mixed virtual channels scheduling mode was designed.Meanwhile,the algorithm efficiently combined queue management and virtual channel scheduling.Experimental results show that on the basis of maintaining high treatment efficiency and throughput,the algorithm stabilizes queue length,reduces delay and delay jitter,can meet various services’transmitting requirement.…”
Get full text
Article -
1137
Transposition from Freud to Freud: The Adaptation of Psychoanalytic Theory into a Netflix Series
Published 2021-06-01Subjects: Get full text
Article -
1138
IPTV user’s on-demand behavior based on adaptive segmental stretched exponential model
Published 2018-05-01“…The IPTV user’s on-demand behavior model based on adaptive segmental stretched exponential (ASSE) was proposed to optimize the configuration of IPTV CDN system,to improve the video scheduling and storage strategy,and to provide users with better experience for video access.At the same time,the probability of the video access by using the actual IPTV user’s on-demand data of China Telecom was simulated.Experiments show that compared with the traditional modeling methods,the ASSE model proposed not only achieves the purpose of simplifying the mathematical model and reducing the computation,but also improves the accuracy of the curve fitting.It has good consistency with the actual data.…”
Get full text
Article -
1139
RETRACTED: A study of cotton fiber movement in pneumomechanical spinning machine adapter
Published 2024-01-01Get full text
Article -
1140
Research on cloud-based traffic adaptive command and control method for mobile botnet
Published 2014-11-01“…Botnet is a serious attack evolved from traditional malwares.With the rapid development of computing capability and mobile Internet access technology,building a realistic mobile botnet has become a potential threat.An adaptive traffic control mechanism for cloud-based mobile botnet was proposed.It adopts different traffic consumption strategies according to different 3G or Wi-Fi network environments.Then scheduling algorithms to execute botnet commands was applied.The experimental results show the traffic adaptive algorithm can improve the stealthy and efficiency of mobile botnet while ensure that the botnet commands can be executed effectively.…”
Get full text
Article