Showing 21 - 40 results of 104 for search '"second base"', query time: 0.06s Refine Results
  1. 21

    Archimedean Spiral Antenna Calibration Procedures to Increase the Downrange Resolution of a SFCW Radar by Ioan Nicolaescu, Piet van Genderen

    Published 2008-01-01
    “…Two procedures are investigated, one based on an error-term flow graph for the frequency signal and the second based on a reference metallic plate located at a certain distance from the ground in order to identify the phase dispersion given by the antenna. …”
    Get full text
    Article
  2. 22

    Construction of a bundle for the safety of patients with mental disorders during hospitalization by Marina Diva de Oliveira, Camila Souza de Almeida, Helen Cristiny Teodoro Couto Ribeiro, Richardson Miranda Machado, Juliano Teixeira Moraes

    Published 2025-01-01
    “…In the first, a comprehensive literature review was developed through a scoping review and conducted to examine evidence on the safety of psychiatric patients during hospitalization. In the second, based on the evidence listed, a set of actions was developed for the safety of psychiatric patients during hospitalization. …”
    Get full text
    Article
  3. 23

    Detection Metbod of Trojan's Control Domain Based on Improved Neural Network Algoritbm by Aijiang Liu, Changhui Huang, Guangjun Hu

    Published 2014-07-01
    “…Firstly, the character that the Trojans use domain name to control was analyzed and the method that DNS adopted to detect Trojans was introduced. Secondly, based on the analysis of static and dynamic characters for Trojan domain name, eight indicators were obtained as the input of BP neural network algorithm, including operation time of domain name, the period to visit the domain name, the variation speed of IP address, the country change of IP address, IP address of private address, the same domain name with multiple IP address for different countries, TTL value and search times of domain name. …”
    Get full text
    Article
  4. 24

    RESEARCH ON EARLY WARNING METHOD OF ROTOR VIBRATION OF TURBOGENERATOR UNIT (MT) by HUANG YangSen, LIU YunPing, WANG Yong, FENG XiaoJian, LIU Xiong

    Published 2023-01-01
    “…Firstly, the running law of rotor vibration is analyzed. Secondly, based on the vibration operation law, the calculation method of rotor vibration abnormal threshold is proposed. …”
    Get full text
    Article
  5. 25

    Finite-Time Synchronization and Synchronization Dynamics Analysis for Two Classes of Markovian Switching Multiweighted Complex Networks from Synchronization Control Rule Viewpoint by Bin Yang, Xin Wang, Yongju Zhang, Yuhua Xu, Wuneng Zhou

    Published 2019-01-01
    “…Firstly, sufficient conditions of finite-time synchronization for a class of NCMSMWCNs and a class of linear coupled Markovian switching multiweighted complex networks (LCMSMWCNs) are investigated. Secondly, based on the derived results, how nonlinear coupled one affects synchronization dynamics of the NCMSMWCNs is analyzed from synchronization control rule. …”
    Get full text
    Article
  6. 26

    Research on heterogeneous identifier namespace management and control architecture in polymorphic network environment by Shuai GAO, Xindi HOU, Ningchun LIU, Hongke ZHANG

    Published 2022-04-01
    “…Aiming at the interoperability and conversion problem of heterogeneous identifier namespace, a heterogeneous identifier namespace management and control architecture was proposed based on the polymorphic network environment.Firstly, the design objectives and principles of heterogeneous identifier namespace management and control were given.A theoretical model was also proposed for the network identifier namespace selection and conversion process, and the distributed heterogeneous cyberspace compatibility problem was thus transformed into a centralized network layer function configuration problem.Secondly, based on the proposed theoretical model, the key applications and functional modules for managing the heterogeneous identifier namespace were designed on the control plane.Then, the specific workflow of heterogeneous identifier namespace management and control was presented.Finally, based on the polymorphic network environment, a prototype verification system was built to validate the proposed heterogeneous space management and control architecture as well as the related functions.…”
    Get full text
    Article
  7. 27

    Analysis and improvement for authentication protocols of mobile ad hoc network with CSP approach by Li-cai LIU, Li-hua YIN, Yun-chuan GUO, Yan SUN

    Published 2013-08-01
    “…First, the communication behaviors of all participants in TAM and its security (authentication and confidentiality) specifications were formally modeled using CSP. Second, based on these models, the participants' behaviors were verified by FDR and the verification result indicates that the original TAM could not guarantee authentication and confidentiality. …”
    Get full text
    Article
  8. 28

    A survey of V2X security protection technologies by Fuyuan CHEN, Zhenjiang DONG, Jiankuo DONG, Minjie XU

    Published 2023-03-01
    “…The vehicle-road-cloud collaborative V2X system has gradually become a national strategy, and the safety of V2X is related to driving security, life security, property security and even national security, which has increasingly become a hot spot for industry research.Firstly, the overall situation of the V2X security industry and the technology architecture of vehicle-road-cloud collaboration were introduced.Secondly, based on the “vehicle-road-cloud” technology system of V2X, the current status of domestic and international research was discussed, and the remaining problems and challenges in the field of V2X security protection were analyzed from three levels: V2X terminal security, roadside security and cloud security.Finally, the future development and research focus of the V2X security and protection technology were foreseen.…”
    Get full text
    Article
  9. 29

    Global Existence and Blow-Up of Solutions to a Parabolic Nonlocal Equation Arising in a Theory of Thermal Explosion by Wenyuan Ma, Zhixuan Zhao, Baoqiang Yan

    Published 2022-01-01
    “…First, we prove a comparison principle for some kinds of semilinear parabolic equations under nonlinear boundary conditions; using it, we show a new theorem of subsupersolutions. Secondly, based on the new method of subsupersolutions, the existence of global solutions and blow-up solutions is presented for different values of p. …”
    Get full text
    Article
  10. 30

    1R Pseudo-rigid-body Model of Initially Curved Flexible Beam with End Loaded Moment by Li Yuan, Du Qiuyue

    Published 2018-01-01
    “…The theoretical results are given with example,and are compared with ANSYS simulation to verify the effectiveness of the theory. Secondly,based on the1 R pseudo-rigid-body model( PRBM) of the straight beam subjected to the moment,the 1 R PRBM of the initially curved flexible beam subjected to the moment is firstly developed and is compared with the theoretical results to verify its effectiveness. …”
    Get full text
    Article
  11. 31

    Distributed Power Trading System Based on Blockchain Technology by Shuguo Chen, Weibin Ding, Zhongzheng Xiang, Yuanyuan Liu

    Published 2021-01-01
    “…Firstly, the improved AdaBoost algorithm is used to predict the supply and demand gap of power trading nodes. Secondly, based on the fact that the information on the blockchain is only open to the power supply side, a two-stage game model of asymmetric information between the power supply side and the power user is constructed to capture the price competition behavior between them in order to find the Nash equilibrium price in two stages. …”
    Get full text
    Article
  12. 32

    Learning Force-Relevant Skills from Human Demonstration by Xiao Gao, Jie Ling, Xiaohui Xiao, Miao Li

    Published 2019-01-01
    “…First, the force-relevant skill is encapsulated as a statistical model where the key parameters are learned from the demonstrated data (motion, force). Second, based on the learned skill model, a task planner is devised which specifies the motion and/or the force profile for a given manipulation task. …”
    Get full text
    Article
  13. 33

    Application of K-means algorithm based on A-D model in calling abnormal customer mining by Jian ZHOU, Yongge SHI, Meibin HE

    Published 2018-04-01
    “…In order to make use of massive voice communication records and cluster high-quality clients (telecom fraud clients,advertisers) with various kinds of voice communication abnormalities,a behavioral feature model of abnormal voice communication customers was designed and constructed.Based on the model,a clustering analysis algorithm for customers with abnormal voice communication behavior was proposed.First of all,by analyzing the call records of customers,the characteristics of call behaviors was got,such as the number of calls,call rates,and so on.Then AHP-DEMATEL model was constructed by blending the AHP model and DEMATEL method.Secondly,based on the model,an improved K-means algorithm was proposed to cluster the abnormal clients according to the voice communication records.Finally,the real data was used to verify the analysis.The results show that compared with other similar algorithms,the proposed algorithm improves the performance of multi-type abnormal customer comprehensive clustering analysis and single-type abnormal customer clustering analysis greatly.…”
    Get full text
    Article
  14. 34

    Weight of the Default Component of CDS Spreads: Avoiding Procyclicality in Credit Loss Provisioning Framework by Mariya Gubareva

    Published 2019-01-01
    “…Our results contrast with previous research. Second, based on the obtained historical weights of the default risk premium, a forward-looking term structure of the probabilities of default implied by the current CDS quotes is derived. …”
    Get full text
    Article
  15. 35

    5G mobile/multi-access edge computing integrated architecture and deployment strategy by Jianmin ZHANG, Weiliang XIE, Fengyi YANG, Zhouyun WU

    Published 2018-04-01
    “…Mobile/multi-access edge computing (MEC) technology migrates computing storage capabilities and service service capabilities to the edge of the network,enabling applications,services and content to be localized,close-range and distributed.Therefore,to a certain extent,the business requirements of 5G enhanced mobile broadband,low latency and high reliability and large-scale machine communication terminal connection are solved.At the same time,the MEC fully exploits mobile network data and information to implement the awareness and analysis of context information of the mobile network and open it to third-party service applications.This effectively enhances the level of intelligence in mobile networks and promotes the deep integration of networks and services.Therefore,the value and significance of the MEC was firstly analyzed according to the typical 5G service scenario.Secondly,based on the research progress of ETSI and 3GPP,a MEC fusion architecture oriented to 5G was proposed,and the overall deployment strategy of MEC was discussed and analyzed.Furthermore,the possible problems and challenges in the future application of MEC technology in 5G networks were discussed to provide reference for subsequent research and development.…”
    Get full text
    Article
  16. 36

    Anomalous Trajectory Detection Using Masked Autoregressive Flow Considering Route Choice Probability by Pengqian Cao, Renxin Zhong, Wei Huang

    Published 2022-01-01
    “…First, we divide the urban traffic network into small grids and represent subtrajectories with a sequence of grids. Second, based on the subtrajectories, we employ the MAFRC-ATD model to calculate the anomaly score of each trajectory. …”
    Get full text
    Article
  17. 37

    Study on remote sensing satellites random access to internet constellation and on-orbit intelligent processing by Xiaoyu CHANG, Weijia ZHANG, Xudong1 LI, Xiaonan ZHANG, Gang WANG, Gang JIA

    Published 2022-04-01
    “…The low earth orbit (LEO) satellite Internet constellation is a hot spot in current global research.And it is highly anticipated that the LEO satellite Internet constellation supports random access to remote sensing satellites and direct on-orbit information processing.However, due to the different orbital heights, the difficult access problems of the bidirectional highly dynamic heterogeneous constellation will be caused.Firstly, the random access scenario under different orbit characteristics and satellite numbers of LEO satellite Internet constellation was set up, and the impact of the spatiotemporal discontinuous visibility and Doppler frequency shift on the remote sensing satellite access performance was focused on.Secondly, based on the characteristics of the random access scenario, the process of on-orbit processing tasks with different delays and the allocation of satellite-ground functions were analyzed.Finally, the problems existing in the current on-orbit intelligent processing algorithm and the focus of future research were expounded, so as to provide reliable theoretical support for the development and applications of LEO satellite Internet constellation and remote sensing satellites in the future.…”
    Get full text
    Article
  18. 38

    Automatic Analysis Algorithm of Position and Orientation Characteristic Set of Parallel Mechanism based on Neural Network by Wang Gang, Mao Zhiwei, Luo Yufeng, Shi Zhixin

    Published 2018-01-01
    “…First of all,by analyzing the topological structure of parallel mechanism,the essence is summed up. Secondly,based on the neural network theory,the topological structure of parallel mechanism is described and digitized. …”
    Get full text
    Article
  19. 39

    Sociological Analysis of Islamic Law on The Implementation of the Jo Kawin Bocah Program in Reducing Early Marriage Rates (Case Study on the PKK Team of Temanggung Regency) by Luqiya Suci Rahmadani, Malik Ibrahim, Hanifah Salma Muhammad

    Published 2024-11-01
    “…First, the PKK Movement Team enhances the program through collaboration with the government, communities, institutions like GenRe (Planned Generation), and mass media for effective dissemination. Second, based on Atho' Mudzhar's sociological theory of Islamic law, factors such as religious practices, social structures, interactions, and support from community organizations significantly influence the program's outcomes. …”
    Get full text
    Article
  20. 40

    Physiological Characteristics and Nonparametric Test for Master-Slave Driving Task’s Mental Workload Evaluation in Mountain Area Highway at Night by Haiwei Wang, Jianrong Liu, Feng You

    Published 2019-01-01
    “…First, we establish the experimental platform based driving simulator and design the master-slave driving task. Second, based on the physiological data and subjective evaluation for mental workload, we use statistical methods to composite the physical changes evolution analysis in a driving simulator. …”
    Get full text
    Article