Showing 501 - 520 results of 7,642 for search '"Boxing"', query time: 0.05s Refine Results
  1. 501

    Some Dimensional Results of a Class of Homogeneous Moran Sets by Jingru Zhang, Yanzhe Li, Manli Lou

    Published 2021-01-01
    “…We also prove that the upper box dimension and the packing dimension of the sets can get the maximum value of the homogeneous Moran sets under the condition supk≥1mk<∞ and estimate the upper box dimension of the sets in two cases.…”
    Get full text
    Article
  2. 502

    Le quai no 9 du port romain de Saint-Lupien à Rezé/Ratiatum (Loire-Atlantique) by Jimmy Mouchard, Matthieu Yacger

    Published 2020-12-01
    “…Excavated in parallel with the box no. 9, the most complete of the ensemble, the two distinct sets formed by boxes no. 12 to the west, and nos. 1 and 13 to the east, were only partially observed through the excavation of compact test trenches, but were nonetheless sufficient to highlight specific construction features of these elements. …”
    Get full text
    Article
  3. 503

    Cognitive flexibility in urban yellow mongooses, Cynictis penicillata by Mijke Müller, Neville Pillay

    Published 2024-03-01
    “…Once mongooses learned which box contained the preferred food type, the food types were reversed. …”
    Get full text
    Article
  4. 504

    Method against process control-flow hijacking based on mimic defense by Chuanxing PAN, Zheng ZHANG, Bolin MA, Yuan YAO, Xinsheng JI

    Published 2021-01-01
    “…To defeat the attack of process control flow hijacking, a threat model was established from the point of vulnerability utilization, and the fortress defense to cut off the key vulnerability utilization path was proposed.On the basis of studying the principle of mimic defense, a threat model of process mimic execution was proposed, and the threat model was analyzed and proved to be effective.Mimic execution could effectively cut off the attack path of control flow hijacking.The ptototype of mimic execution, MimicBox, was implemented.The validation experiment shows that MimicBox can effectively defend against most control flow hijacking attacks based on known binary vulnerabilities.The performance evaluation result shows that the overhead MimicBox lead to is less than 13% on CPU-intensive programs.The Comparative evaluation result shows that mimic execution is a more effective and practical active defense method compared with control flow integrity.…”
    Get full text
    Article
  5. 505

    Research on Rapid Evaluation of Rock Mass Quality Based on Ultrasonic Borehole Imaging Technology and Fractal Method by Yuezheng Zhang, Hongguang Ji, Wenguang Li, Kuikui Hou

    Published 2021-01-01
    “…Due to its inherent fractal characteristics, the fractal box dimension of the hole wall image can be used to describe the complexity of the structural surface. …”
    Get full text
    Article
  6. 506

    Fractal Dimension Analysis of the Julia Sets of Controlled Brusselator Model by Yuqian Deng, Xiuxiong Liu, Yongping Zhang

    Published 2016-01-01
    “…In the numerous fractal dimension definitions, box-counting dimension is taken to characterize the complexity of Julia set since the calculation of box-counting dimension is relatively achievable. …”
    Get full text
    Article
  7. 507

    Improved Cache trace driven attack on AES and CLEFIA by ZHAO Xin-jie1, GUO Shi-ze2, WANG Tao1, LIU Hui-ying1

    Published 2011-01-01
    “…An improved Cache trace attack on AES and CLEFIA was proposed by considering Cache miss trace informa-tion and S-box misalignment.Current trace driven attacks all assume that the S-box is perfectly aligned in Cache,and it’s impossible to recover the whole first round key of AES and CLEFIA under limited key searching space.However,the re-search demonstrates that the S-box is misaligned in Cache at most cases,by utilizing the Cache miss trace information of the cipher encryption,200 samples first round analysis and 50 samples last round analysis can reduce 128bit AES master key searching space to 216 and 1 respectively,80 samples first round analysis can reduce 128bit CLEFIA first round key searching space to 216,220 samples first three rounds analysis can reduce 128bit CLEFIA master key searching space to 216,all of the attacks above can be finished within 1 second.…”
    Get full text
    Article
  8. 508

    Des objets en bois remarquables issus d’un puits de la place d’Assas à Nîmes (Gard) by Pierre Mille, Éric Bayen, Frédéric Conche, Martial Monteil

    Published 2018-12-01
    “…Fifteen rare and remarkable wooden objects were found in this humid environment, such as various boxes, including two boxes with mirrors and two signet boxes, fragments of writing tablets, a hinge from a piece of furniture, three spindle fragments, the base of a wicker basket, etc. …”
    Get full text
    Article
  9. 509

    Fractal Characteristic of Rock Cutting Load Time Series by Hongxiang Jiang, Changlong Du, Songyong Liu, Kuidong Gao

    Published 2014-01-01
    “…Furthermore, the box-counting dimension was used to describe the fractal characteristic of cutting load time series under different conditions. …”
    Get full text
    Article
  10. 510

    Nonuniform Video Size Reduction for Moving Objects by Anh Vu Le, Seung-Won Jung, Chee Sun Won

    Published 2014-01-01
    “…Once an MOOI and its bounding box are identified, the inside and outside of it can be treated differently for object-aware size reduction. …”
    Get full text
    Article
  11. 511

    Research on Time-dependent Reliability of Subway Gearboxes Based on the Response Surface Method by Pei Bang, Li Zhiyuan, Li Xuefei, Chen Zhuo, He Penghui, Huang Xiaodan

    Published 2023-02-01
    “…In short circuit conditions, the box body has the maximum stress and the lowest reliability. …”
    Get full text
    Article
  12. 512

    Improvement and Force Analysis of Flying Shear Gearbox with Single Flywheel for Hot- rolled Plate by Liu Qingfeng, Chen Tao

    Published 2016-01-01
    “…The principle of crank and connecting rod mechanism for the flying shear gear box is analyzed,and a general model of maximum shear torque is deduced for this mechanism. …”
    Get full text
    Article
  13. 513

    Neural Network and Hybrid Methods in Aircraft Modeling, Identification, and Control Problems by Gaurav Dhiman, Andrew Yu. Tiumentsev, Yury V. Tiumentsev

    Published 2025-01-01
    “…Further, the same problem, but applied to a maneuverable aircraft, as a more complex object of modeling and identification, is solved using both a NARX network (black box) and a semi-empirical model (gray box). The significant advantage of the gray box model over the black box one is shown. …”
    Get full text
    Article
  14. 514

    TOPOLOGY OPTIMIZATION DESIGN OF HIGH SPEED EMU GEARBOX by GAO Yang, QUE HongBo, BIAN Xiang, WEI YuZhou

    Published 2022-01-01
    “…But it’s natural frequency is close to the main vibration frequency of wheel shaft system, which may cause resonance that leading to noise and box cracks. According to this characteristic, a topology optimization scheme is proposed to increase the natural frequency of the box. …”
    Get full text
    Article
  15. 515

    Simulation Analysis and Experimental Research on Vibration Characteristic of Roller Brush Gearbox of Intelligent Sweeper by Jing Li, Hongbin Yang, Jihua Ren, Aijun Xu

    Published 2021-08-01
    “…Aiming at the problem of excessive noise in the gearbox of a certain sweeper, a gearbox dynamics model is established in the multi-body dynamics software RecurDyn, the dynamic meshing force of the gear pair under steady-state conditions is obtained, and the effect of the meshing force on the box body is analyzed. By using the Ansys, the analysis of the modal and dynamic response of the box is carried out, it shows that the peak vibration response is mainly concentrated at the fundamental frequency, double frequency, and double frequency of the gear meshing frequency, which arouses the resonance noise with the gear pair. …”
    Get full text
    Article
  16. 516

    Making Simple Repairs: Building Your Toolbox by Mary N. Harrison

    Published 2019-05-01
    “…That way you can always find your tools when you need them. A simple metal box is fine. Always put your tools back in the box after using them. …”
    Get full text
    Article
  17. 517

    Making Simple Repairs: Building Your Toolbox by Mary N. Harrison

    Published 2019-05-01
    “…That way you can always find your tools when you need them. A simple metal box is fine. Always put your tools back in the box after using them. …”
    Get full text
    Article
  18. 518

    A Middleware Applications Design for Health Information Sharing by Ketut Agus Seputra, A.A. Gede Yudhi Paramartha, Gede Aditra Pradnyana, Kadek Yota Ernanda Aryanto

    Published 2024-06-01
    “…The evaluation involved two phases, back-end and front-end testing, using white-box and black-box testing. White-box testing delivers an average frame-rendering rate of up to 56 fps, and black-box testing has shown 100% successful results in the given task. …”
    Get full text
    Article
  19. 519

    Design of a New Type of Underactuated Manipulator by Bin Peng, Jiang Gang, Cheng Qian

    Published 2015-01-01
    “…According to the demand of clamping the medicine box proposed by the medicine factory,a new design scheme of underactuated manipulator is presented.The pneumatic drive is used in this design scheme of the manipulator,and using the theory of variable degree of freedom and dead center of mechanism,the actions of reliable clamping and lifting to medicine box are realized by using single power source.On this basis,through the structure analysis and calculation of its force,the function of manipulator is analyzed and the theoretical results are actually verified by entity model.The analysis of the manipulator shows that stability performance,large force clamping and the convenience of operation reached the the design requirements.…”
    Get full text
    Article
  20. 520

    Research and application of DRM technology in IPTV UHD video by Jingxin SHEN

    Published 2018-11-01
    “…The characteristics and differences of different DRM standards such as OMA,Microsoft,Intertrust,and ChinaDRM were compared.The requirements of DRM applications were presented.The key technologies of DRM were analyzed.Based on the high-tech set-top box commonly used in the industry,the architecture of DRM protection in IPTV high-definition video was designed.The hardware trust root of high security set-top box,remote download terminal key,double-encrypted content key and other mechanisms was put forward innovatively.Finally,the business process of decrypting DRM content was formulated and an implementation case was given.…”
    Get full text
    Article