Showing 33,681 - 33,700 results of 46,768 for search '"Design"', query time: 0.26s Refine Results
  1. 33681

    Land Area Targets for Wind Energy: How Promising Is the New Onshore Wind Power Legislation? by Felix Reutter, Charlotte Geiger, Paul Lehmann, Jan-Niklas Meier, Philip Tafarte

    Published 2022-09-01
    “…A major obstacle to expansion is that too few areas have been designated for wind turbines. To solve this problem, a new law has been passed, the “Windan-Land-Gesetz”. …”
    Get full text
    Article
  2. 33682

    An Assessment of Linezolid Utilization in Selected Canadian Provinces by Sandra Walker, Linda Dresser, Debbie Becker, Alissa Scalera

    Published 2006-01-01
    “…BACKGROUND: Linezolid is approved for the treatment of designated infections caused by methicillin-resistant and -susceptible Staphylococcus aureus and vancomycin-resistant Enterococcus faecium.…”
    Get full text
    Article
  3. 33683

    Flexural and Shear Strengthening of High-Strength Concrete Beams Using near Surface Basalt Fiber Bars by Ahmed Ashteyat, Ala’ Taleb Obaidat, Ahmad Al-Khreisat, Mu’tasime Abdel-Jaber

    Published 2024-12-01
    “…Six of them were designed to have insufficient longitudinal steel reinforcement to make sure that the failure would be a flexural failure in the control beam. …”
    Get full text
    Article
  4. 33684

    Machine Learning-Based Offloading Strategy for Lightweight User Mobile Edge Computing Tasks by Shuchen Zhou, Waqas Jadoon, Junaid Shuja

    Published 2021-01-01
    “…Subsequently, two optimization algorithms are designed: for the relaxation optimization problem, an iterative optimization algorithm based on the Lagrange dual method is designed; based on the branch-and-bound integer programming method, the iterative optimization algorithm is used as the basic algorithm for each step of the operation, and a global optimization algorithm is designed for transmitting power allocation, computational offloading strategy, dynamic adjustment of local computing power, and receiving energy channel selection strategy. …”
    Get full text
    Article
  5. 33685

    An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security by Mouaad Mohy-Eddine, Azidine Guezzaz, Said Benkirane, Mourade Azrour, Yousef Farhaoui

    Published 2023-09-01
    “…Industrial Internet of Things (IIoT) represents the expansion of the Internet of Things (IoT) in industrial sectors. It is designed to implicate embedded technologies in manufacturing fields to enhance their operations. …”
    Get full text
    Article
  6. 33686

    Flexible, Front-Facing Luminescent Solar Concentrators Fabricated from Lumogen F Red 305 and Polydimethylsiloxane by Ian A. Carbone, Katelynn R. Frawley, Melissa K. McCann

    Published 2019-01-01
    “…The bulk-doped and thin-film devices produced light gains of 1.86 and 1.89, respectively, demonstrating that flexible designs can be developed without sacrificing power production. …”
    Get full text
    Article
  7. 33687

    Model Predictive Control for Automatic Carrier Landing with Time Delay by Kaikai Cui, Wei Han, Yujie Liu, Xinwei Wang, Xichao Su, Jie Liu

    Published 2021-01-01
    “…Furthermore, a guidance trajectory based on the predicted trajectory shape and position deviation is designed in the MPC framework to eliminate the influence of carrier deck motion and real-time error. …”
    Get full text
    Article
  8. 33688

    Binary program taint analysis optimization method based on function summary by Pan YANG, Fei KANG, Hui SHU, Yuyao HUANG, Xiaoshao LYU

    Published 2023-04-01
    “…Taint analysis is a popular software analysis method, which has been widely used in the field of information security.Most of the existing binary program dynamic taint analysis frameworks use instruction-level instrumentation analysis methods, which usually generate huge performance overhead and reduce the program execution efficiency by several times or even dozens of times.This limits taint analysis technology’s wide usage in complex malicious samples and commercial software analysis.An optimization method of taint analysis based on function summary was proposed, to improve the efficiency of taint analysis, reduce the performance loss caused by instruction-level instrumentation analysis, and make taint analysis to be more widely used in software analysis.The taint analysis method based on function summary used function taint propagation rules instead of instruction taint propagation rules to reduce the number of data stream propagation analysis and effectively improve the efficiency of taint analysis.For function summary, the definition of function summary was proposed.And the summary generation algorithms of different function structures were studied.Inside the function, a path-sensitive analysis method was designed for acyclic structures.For cyclic structures, a finite iteration method was designed.Moreover, the two analysis methods were combined to solve the function summary generation of mixed structure functions.Based on this research, a general taint analysis framework called FSTaint was designed and implemented, consisting of a function summary generation module, a data flow recording module, and a taint analysis module.The efficiency of FSTaint was evaluated in the analysis of real APT malicious samples, where the taint analysis efficiency of FSTaint was found to be 7.75 times that of libdft, and the analysis efficiency was higher.In terms of accuracy, FSTaint has more accurate and complete propagation rules than libdft.…”
    Get full text
    Article
  9. 33689

    RESEARCH ON MECHANICAL PROPERTIES OF GRADIENT LATTICE STRUCTURES BASED ON VORONOI METHOD (MT) by LIN Wei, YANG FengShuang, SHI YingYu

    Published 2023-01-01
    “…By designing structures with different gradients, the strength of lattice structure can be improved, and its mechanical properties such as impact resistance, energy absorption and vibration reduction can be improved. …”
    Get full text
    Article
  10. 33690

    Investigation of Speed Matching Affecting Contrarotating Fan’s Performance Using Wireless Sensor Network including Big Data and Numerical Simulation by Hengxuan Luan, Liyuan Weng, Ranhui Liu, Yuanzhong Luan, Dongmin Li

    Published 2018-01-01
    “…The results show that when contrarotating fan worked under designed speed, performance of two-stages rotors could not be matched as the designed working condition was deviated. …”
    Get full text
    Article
  11. 33691

    Personalizing AI tools for second language speaking: the role of gender and autistic traits by Yiran Du, Chenghao Wang, Bin Zou, Yinan Xia

    Published 2025-01-01
    “…It underscores the importance of designing personalized and adaptive educational tools that address diverse learner needs, promoting inclusivity and effectiveness in L2 practice.…”
    Get full text
    Article
  12. 33692

    Incidence of constrained condylar and hinged knee implants and mid- to long-term survivorship: a register-based study from the Nordic Arthroplasty Register Association (NARA) by Jake von Hintze, Ville Ponkilainen, Annette W-Dahl, Nils P Hailer, Ove Furnes, Anne M Fenstad, Mona Badawy, Alma B Pedersen, Martin Lindberg-Larsen, Mika J Niemeläinen, Keijo Mäkelä, Antti Eskelinen

    Published 2025-02-01
    “… Background and purpose: In complex primary total knee arthroplasty (TKA), constrained condylar knee (CCK) or rotating hinge knee (RHK) designs may be required to provide stability or address bony deficiencies. …”
    Get full text
    Article
  13. 33693

    Feasibility Verification of Mountable PZT-Interface for Impedance Monitoring in Tendon-Anchorage by Thanh-Canh Huynh, Young-Hwan Park, Jae-Hyung Park, Jeong-Tae Kim

    Published 2015-01-01
    “…Secondly, a structural model of tendon-anchorage subsystem with mountable PZT-interface is designed for impedance monitoring. Finally, the feasibility of the mountable PZT-interface is numerically examined. …”
    Get full text
    Article
  14. 33694

    Futuristic Developments and Applications in Endoluminal Stenting by Joel Ferreira-Silva, Renato Medas, Mohit Girotra, Monique Barakat, James H. Tabibian, Eduardo Rodrigues-Pinto

    Published 2022-01-01
    “…In this review, we discuss the important developments in stent designs and novel indications for endoluminal and transluminal stenting. …”
    Get full text
    Article
  15. 33695

    Research Progress in Deep Eutectic Solvent Extraction of Bioactive Substances from Animal-derived Processing By-products by BAI Haoxin, XU Weimin, MA Jingjing, GENG Zhiming, ZOU Ye, YANG Biao, YANG Jing, CHENG Mei, YAN Zheng, WANG Daoying, GU Xuedong

    Published 2024-12-01
    “…Deep eutectic solvents are a new type of designable “green solvents” and are formed by mixing hydrogen bond donors with hydrogen bond acceptors in appropriate proportions. …”
    Get full text
    Article
  16. 33696

    Performance analysis of REST API technologies using Spring and Express.js examples by Maciej Wicha, Beata Pańczyk

    Published 2023-12-01
    “…The test application was designed and implemented in both studied technologies. …”
    Get full text
    Article
  17. 33697

    Visual Control System of a Spraying Robot for Hyphantria cunea Larva Nets by Ying Zhao, Qun Sun, Chong Wang, Cuihua Zhang

    Published 2015-01-01
    “…A simulation environment was designed to verify the correctness of this method. …”
    Get full text
    Article
  18. 33698

    Robust Finite-Time Terminal Sliding Mode Control for a Francis Hydroturbine Governing System by Fengjiao Wu, Junling Ding, Zhengzhong Wang

    Published 2016-01-01
    “…Numerical simulations are employed to verify the effectiveness and superiority of the designed finite-time sliding mode control scheme. The approach proposed in this paper is simple and also provides a reference for relevant hydropower systems.…”
    Get full text
    Article
  19. 33699

    Research on intelligent optimization of cryptogram service scheduling for service composition by Jian-jun LI, Bin YU, Wu-ping CHEN

    Published 2013-08-01
    “…It uses the basic framework of the traditional frog-leaping algorithm and designs the encoding and decoding ac-cording. The corresponding individual vector updating method was re-designed. …”
    Get full text
    Article
  20. 33700

    A Study of Lock-Free Based Concurrent Garbage Collectors for Multicore Platform by Hao Wu, Zhen-Zhou Ji

    Published 2014-01-01
    “…Two major performance critical components for designing CGC are studied in this paper, stack scanning and heap compaction. …”
    Get full text
    Article