Showing 33,581 - 33,600 results of 46,768 for search '"Design"', query time: 0.17s Refine Results
  1. 33581

    Multi-language oriented automatic realization method for cryptographic protocols by Xing-hua LI, Shuai-tuan LI, Deng LI, Jian-feng MA

    Published 2012-09-01
    “…A multi-objective-language-oriented automatic code generation scheme for security protocols was put forward.First,based on XML,a description method for security protocols was designed.Second,a graphic user interface(GUI)was developed,through which the XML description documents could be automatically generated by configuring the se-curity protocol.Finally,a security protocol interpreter was designed,through which the corresponding objective code was generated with the XML description document as input.nalysis indicates that compared with the existing schemes the scheme has obvious advantages.…”
    Get full text
    Article
  2. 33582

    IFAS Assessment of Non-native Plants in Florida's Natural Areas: Status Assessment by Alison M. Fox, Doria R. Gordon, Joan A. Dusky, Linda Tyson, Randall K. Stocker, Kenneth A. Langeland, Aimee L. Cooper

    Published 2010-01-01
    “…Cooper, is the component of the IFAS Assessment that provides evaluations of plants that currently occur within Florida. designed to identify those non-native plant species that are invasive in areas of Florida where designated management objectives include the conservation of native biodiversity. …”
    Get full text
    Article
  3. 33583

    Intelligent optimization algorithm based on benchmarking by Anshi XIE

    Published 2018-07-01
    “…Many of the issues in scientific research,engineeringand management can be transformed into optimization problems.The various methods applied to these problems were a variety of models.Designing different methods was designing different models.The theme was to model the benchmarking philosophy in business management as a meta-heuristic search method for single objective bound-constrained real-parameter optimization problems.According to the principle of Occam’s Razor,many complicated operators and their probability tuning rules were abandoned and a simple framework was used to organize the core operators to achieve the effect of many composition algorithms.…”
    Get full text
    Article
  4. 33584

    Kinematics Analysis of Ship Welding Robot with Variable Topology Structure by Zhengqiang Guo, Yuchen Pan, Xuepeng Yuan, Haibo Huang, Hongzhou Wang

    Published 2019-04-01
    “…Finally, the simulation result shows that the newly designed manipulator can meet the requirements of ship welding effectively.…”
    Get full text
    Article
  5. 33585

    IFAS Assessment of Non-native Plants in Florida's Natural Areas: Status Assessment by Alison M. Fox, Doria R. Gordon, Joan A. Dusky, Linda Tyson, Randall K. Stocker, Kenneth A. Langeland, Aimee L. Cooper

    Published 2010-01-01
    “…Cooper, is the component of the IFAS Assessment that provides evaluations of plants that currently occur within Florida. designed to identify those non-native plant species that are invasive in areas of Florida where designated management objectives include the conservation of native biodiversity. …”
    Get full text
    Article
  6. 33586

    Research on Topology Reconfiguration in Cognitive Radio Networks by Qian He

    Published 2015-08-01
    “…Considering the inevitable trends for heterogeneous network convergence and self-adaptation ability,cognitive radio network(CRN)concept has been proposed with some essential characteristics to achieve global endto-end goals.CRN are composed of cognitive devices which have the capable of changing network configurations based on the dynamic environment.This capability opens up the possibility of designing flexible and dynamic topology control strategies with the purpose of opportunistically reusing idle licensed spectrum and effectively achieving data transmission.This work focuses on the problem of designing effective topology reconfiguration algorithm to offer optimal routing solutions.…”
    Get full text
    Article
  7. 33587

    Comprehensive Review of Wearable Antennas With Flexible Periodic Structures for Body-Effect Mitigation by Adel Ashyap, Raad Raad, Faisel Tubbal, Wajid Ali Khan, Suhila Abulgasem

    Published 2025-01-01
    “…Moreover, it discusses the challenges and considerations involved in designing appropriate wearable antennas.…”
    Get full text
    Article
  8. 33588

    SEKOLAH ISLAM TERPADU PENEKANAN PADA ARSITEKTUR HIJAU DI KABUPATEN BONE by Ismail B Arifin, Marwati Marwati, Burhanuddin Burhanuddin

    Published 2014-12-01
    “…Method that is applied is descriptive, that is collecting and analyzing the primary and secondary data. Then, planning and designing approaches are done to review various aspects oriented with architect knowledge, basic theoretic and standard. …”
    Get full text
    Article
  9. 33589

    Disturbance Rejection Attitude Control for a Quadrotor: Theory and Experiment by Li Ding, Qing He, Chengjun Wang, Rongzhi Qi

    Published 2021-01-01
    “…In this article, an attitude tracking controller is designed for a quadrotor unmanned aerial vehicle (UAV) subject to lumped disturbances. …”
    Get full text
    Article
  10. 33590

    Privacy level evaluation of differential privacy for time series based on filtering theory by Wen-jun XIONG, Zheng-quan XU, Hao WANG

    Published 2017-05-01
    “…The current differential privacy preserving methods on correlated time series were not designed by protecting against a specific attack model,and the privacy level of them couldn’t be measured.Therefore,an attack model was put forward to solve the above problems.Since the noise series added by these methods was independent and identically distributed,and the time series could be seen as a short-time stationary process,a linear filter was designed based on filtering theory,in order to filter out the noise series.Experimental results show that the proposed attack model is valid,and can work as a unified measurement for these methods.…”
    Get full text
    Article
  11. 33591

    Research on Adaptive Trajectory Tracking Algorithm for a Quadrotor Based on Backstepping and the Sigma-Pi Neural Network by Zhiming Chen, Kang Niu, Lei Li

    Published 2019-01-01
    “…Then a new trajectory tracking algorithm is designed by using the sigma-pi neural network and backstepping. …”
    Get full text
    Article
  12. 33592

    Economic Determination of Modified Multiple Dependent State Sampling Plan under Some Lifetime Distributions by Muhammad Aslam, P. Jeyadurga, S. Balamurali, Muhammad Azam, Ali AL-Marshadi

    Published 2021-01-01
    “…In this paper, the modification of multiple dependent state sampling plan is proposed and designed for assuring a mean lifetime of the products under Birnbaum–Saunders distribution and Weibull distribution. …”
    Get full text
    Article
  13. 33593

    A Multiport Electric Energy Routing Scheme Applied to Battery Energy Storage System by Guanglin Sha, Qing Duan, Wanxing Sheng, Aiqiang Pan, Zhe Liu, Chunyan Ma, Caihong Zhao, Jiaxun Teng, Lumin Fu, Yi Zheng

    Published 2021-01-01
    “…The working principle of current fed isolated bidirectional DC-DC converter (CF-IBDC) and cascaded H-bridge (CHB) is analyzed, and the decoupling control strategy is designed. In this paper, a hierarchical control strategy is designed for the repurposed battery energy storage (RBES) grid-connected system based on CPET, which consists of three layers: energy layer, power layer, and state of charge (SOC) layer. …”
    Get full text
    Article
  14. 33594

    Data integrity verification based on model cloud federation of TPA by Junfeng TIAN, Tianle LI

    Published 2018-08-01
    “…Aiming at the untrustworthiness of third-party auditor (TPA) in the publicity verification model,a data integrity verification model based on the cloud federation of TPA was proposed.Firstly,the cloud federation of TPA’s architecture was designed and the main functional components and function of the system platform was defined.The federation could manage and control the TPA cloud members.Secondly,TPA was designed in detail by using trusted computing technology and blockchain technology to ensure the credibility of the TPA execution environment and workflow.Finally,the data integrity verification model was built by using cloud federation of TPA.The correctness,security and effectiveness of the model were analyzed theoretically and experimentally.…”
    Get full text
    Article
  15. 33595

    Intelligent Control of the RAFNC Launch for Dual Clutch Automatic Transmission by Hu Junhua, Wu Guangqiang

    Published 2015-01-01
    “…Aiming at the complexity of the dynamics characteristic of launch working condition and the vehicle itself,a robust adaptive fuzzy neural controller is designed for the slip- friction phase of launch performance of vehicle with dual clutch transmission( DCT). …”
    Get full text
    Article
  16. 33596

    Function encoding based approach for App clone detection in cloud environment by Jia YANG, Cai FU, Lansheng HAN, Hongwei LU, Jingliang LIU

    Published 2019-08-01
    “…An efficient function-based encoding scheme in the cloud environment for detecting the cloned Apps was designed,called Pentagon.Firstly,a basic block feature extraction method was proposed.Secondly,a monotonic encoding algorithm for the App function was designed,which encoded the function based on the control flow graph structure and basic block attributes.Finally,a three-party libraries filtering method was proposed by using an efficient clustering algorithm based on the function feature.Experiments verified the effectiveness of the proposed scheme.The average search time is close to 79 ms,and the clone detection accuracy achieves 97.6%.…”
    Get full text
    Article
  17. 33597

    Dynamic Characteristic Testing Device and Experiment Analysis of Non-circular Gear by Liu Yongping, Xian Xilon, Wang Peng

    Published 2015-01-01
    “…The parameter control and data acquisition systems are designed,which could realize the control of testing device and the processing of data acquisition through the computer. …”
    Get full text
    Article
  18. 33598

    Optimum Array Spacing in Grid-Connected Photovoltaic Systems considering Technical and Economic Factors by S. Sánchez-Carbajal, P. M. Rodrigo

    Published 2019-01-01
    “…Therefore, the proposed method will be useful for PV designers to improve the energetic and economic behavior of their systems.…”
    Get full text
    Article
  19. 33599

    Human-AI collaboration is not very collaborative yet: a taxonomy of interaction patterns in AI-assisted decision making from a systematic review by Catalina Gomez, Sue Min Cho, Shichang Ke, Chien-Ming Huang, Mathias Unberath

    Published 2025-01-01
    “…A human-centered perspective attempts to alleviate this concern by designing AI solutions for seamless integration with existing processes. …”
    Get full text
    Article
  20. 33600

    La Station Nation du RER A. Un patrimoine souterrain by Raphaël Labrunye, Raphaël Lescure

    Published 2020-04-01
    “…Pursuing a proven approach, the RATP Group hired consulting architects who were the designers of a new aesthetic sense of the metropolitan transportation. …”
    Get full text
    Article