Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
33681
Land Area Targets for Wind Energy: How Promising Is the New Onshore Wind Power Legislation?
Published 2022-09-01“…A major obstacle to expansion is that too few areas have been designated for wind turbines. To solve this problem, a new law has been passed, the “Windan-Land-Gesetz”. …”
Get full text
Article -
33682
An Assessment of Linezolid Utilization in Selected Canadian Provinces
Published 2006-01-01“…BACKGROUND: Linezolid is approved for the treatment of designated infections caused by methicillin-resistant and -susceptible Staphylococcus aureus and vancomycin-resistant Enterococcus faecium.…”
Get full text
Article -
33683
Flexural and Shear Strengthening of High-Strength Concrete Beams Using near Surface Basalt Fiber Bars
Published 2024-12-01“…Six of them were designed to have insufficient longitudinal steel reinforcement to make sure that the failure would be a flexural failure in the control beam. …”
Get full text
Article -
33684
Machine Learning-Based Offloading Strategy for Lightweight User Mobile Edge Computing Tasks
Published 2021-01-01“…Subsequently, two optimization algorithms are designed: for the relaxation optimization problem, an iterative optimization algorithm based on the Lagrange dual method is designed; based on the branch-and-bound integer programming method, the iterative optimization algorithm is used as the basic algorithm for each step of the operation, and a global optimization algorithm is designed for transmitting power allocation, computational offloading strategy, dynamic adjustment of local computing power, and receiving energy channel selection strategy. …”
Get full text
Article -
33685
An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security
Published 2023-09-01“…Industrial Internet of Things (IIoT) represents the expansion of the Internet of Things (IoT) in industrial sectors. It is designed to implicate embedded technologies in manufacturing fields to enhance their operations. …”
Get full text
Article -
33686
Flexible, Front-Facing Luminescent Solar Concentrators Fabricated from Lumogen F Red 305 and Polydimethylsiloxane
Published 2019-01-01“…The bulk-doped and thin-film devices produced light gains of 1.86 and 1.89, respectively, demonstrating that flexible designs can be developed without sacrificing power production. …”
Get full text
Article -
33687
Model Predictive Control for Automatic Carrier Landing with Time Delay
Published 2021-01-01“…Furthermore, a guidance trajectory based on the predicted trajectory shape and position deviation is designed in the MPC framework to eliminate the influence of carrier deck motion and real-time error. …”
Get full text
Article -
33688
Binary program taint analysis optimization method based on function summary
Published 2023-04-01“…Taint analysis is a popular software analysis method, which has been widely used in the field of information security.Most of the existing binary program dynamic taint analysis frameworks use instruction-level instrumentation analysis methods, which usually generate huge performance overhead and reduce the program execution efficiency by several times or even dozens of times.This limits taint analysis technology’s wide usage in complex malicious samples and commercial software analysis.An optimization method of taint analysis based on function summary was proposed, to improve the efficiency of taint analysis, reduce the performance loss caused by instruction-level instrumentation analysis, and make taint analysis to be more widely used in software analysis.The taint analysis method based on function summary used function taint propagation rules instead of instruction taint propagation rules to reduce the number of data stream propagation analysis and effectively improve the efficiency of taint analysis.For function summary, the definition of function summary was proposed.And the summary generation algorithms of different function structures were studied.Inside the function, a path-sensitive analysis method was designed for acyclic structures.For cyclic structures, a finite iteration method was designed.Moreover, the two analysis methods were combined to solve the function summary generation of mixed structure functions.Based on this research, a general taint analysis framework called FSTaint was designed and implemented, consisting of a function summary generation module, a data flow recording module, and a taint analysis module.The efficiency of FSTaint was evaluated in the analysis of real APT malicious samples, where the taint analysis efficiency of FSTaint was found to be 7.75 times that of libdft, and the analysis efficiency was higher.In terms of accuracy, FSTaint has more accurate and complete propagation rules than libdft.…”
Get full text
Article -
33689
RESEARCH ON MECHANICAL PROPERTIES OF GRADIENT LATTICE STRUCTURES BASED ON VORONOI METHOD (MT)
Published 2023-01-01“…By designing structures with different gradients, the strength of lattice structure can be improved, and its mechanical properties such as impact resistance, energy absorption and vibration reduction can be improved. …”
Get full text
Article -
33690
Investigation of Speed Matching Affecting Contrarotating Fan’s Performance Using Wireless Sensor Network including Big Data and Numerical Simulation
Published 2018-01-01“…The results show that when contrarotating fan worked under designed speed, performance of two-stages rotors could not be matched as the designed working condition was deviated. …”
Get full text
Article -
33691
Personalizing AI tools for second language speaking: the role of gender and autistic traits
Published 2025-01-01“…It underscores the importance of designing personalized and adaptive educational tools that address diverse learner needs, promoting inclusivity and effectiveness in L2 practice.…”
Get full text
Article -
33692
Incidence of constrained condylar and hinged knee implants and mid- to long-term survivorship: a register-based study from the Nordic Arthroplasty Register Association (NARA)
Published 2025-02-01“… Background and purpose: In complex primary total knee arthroplasty (TKA), constrained condylar knee (CCK) or rotating hinge knee (RHK) designs may be required to provide stability or address bony deficiencies. …”
Get full text
Article -
33693
Feasibility Verification of Mountable PZT-Interface for Impedance Monitoring in Tendon-Anchorage
Published 2015-01-01“…Secondly, a structural model of tendon-anchorage subsystem with mountable PZT-interface is designed for impedance monitoring. Finally, the feasibility of the mountable PZT-interface is numerically examined. …”
Get full text
Article -
33694
Futuristic Developments and Applications in Endoluminal Stenting
Published 2022-01-01“…In this review, we discuss the important developments in stent designs and novel indications for endoluminal and transluminal stenting. …”
Get full text
Article -
33695
Research Progress in Deep Eutectic Solvent Extraction of Bioactive Substances from Animal-derived Processing By-products
Published 2024-12-01“…Deep eutectic solvents are a new type of designable “green solvents” and are formed by mixing hydrogen bond donors with hydrogen bond acceptors in appropriate proportions. …”
Get full text
Article -
33696
Performance analysis of REST API technologies using Spring and Express.js examples
Published 2023-12-01“…The test application was designed and implemented in both studied technologies. …”
Get full text
Article -
33697
Visual Control System of a Spraying Robot for Hyphantria cunea Larva Nets
Published 2015-01-01“…A simulation environment was designed to verify the correctness of this method. …”
Get full text
Article -
33698
Robust Finite-Time Terminal Sliding Mode Control for a Francis Hydroturbine Governing System
Published 2016-01-01“…Numerical simulations are employed to verify the effectiveness and superiority of the designed finite-time sliding mode control scheme. The approach proposed in this paper is simple and also provides a reference for relevant hydropower systems.…”
Get full text
Article -
33699
Research on intelligent optimization of cryptogram service scheduling for service composition
Published 2013-08-01“…It uses the basic framework of the traditional frog-leaping algorithm and designs the encoding and decoding ac-cording. The corresponding individual vector updating method was re-designed. …”
Get full text
Article -
33700
A Study of Lock-Free Based Concurrent Garbage Collectors for Multicore Platform
Published 2014-01-01“…Two major performance critical components for designing CGC are studied in this paper, stack scanning and heap compaction. …”
Get full text
Article