Showing 33,701 - 33,720 results of 46,768 for search '"Design"', query time: 0.16s Refine Results
  1. 33701

    Mechanically doped aluminum materials with peculiar physical and mechanical characteristics by F. G. Lovshenko, G. F. Lovshenko

    Published 2001-02-01
    “…The article introduces results of investigation of the production technology, structure, physic and mechanical properties of new mechanical doped heat-resistant alloys of special designation…”
    Get full text
    Article
  2. 33702

    ProcessM: Intelligent Process Mining software by Tomasz P. Pawlak, Jędrzej Potoniec

    Published 2025-05-01
    “…ProcessM is an open-source software designed for users with limited technical expertise specializing in business process analysis. …”
    Get full text
    Article
  3. 33703

    Aggregated privacy-preserving auditing for cloud data integrity by Kai HE, Chuan-he HUANG, Xiao-mao WANG, Jing WANG, Jiao-li SHI

    Published 2015-10-01
    “…To solve the problem of data integrity in cloud storage,an aggregated privacy-preserving auditing scheme was proposed.To preserve data privacy against the auditor,data proof and tag proof were encrypted and combined by using the bilinearity property of the bilinear pairing on the cloud server.Furthermore,an efficient index mechanism was designed to support dynamic auditing,which could ensure that data update operations did not lead to high additional computation or communication cost.Meanwhile,an aggregation method for different proofs was designed to handle multiple auditing requests.Thus the proposed scheme could also support batch auditing for multiple owners and multiple clouds and multiple files.The communication cost of batch auditing was independent of the number of auditing requests.The theoretical analysis and experimental results show that the proposed scheme is provably secure.Compared with existing auditing scheme,the efficacy of the proposed individual auditing and batch auditing improves 21.5% and 31.8% respectively.…”
    Get full text
    Article
  4. 33704

    Methodology of software development with the use of the model of distributed object-based stochastic hybrid systems by R. Е. Sharykin

    Published 2022-03-01
    “…Such mathematical model is planned to be created for the system being designed along with the system specification at all stages of the software development.The following stages of the development are considered as building of preliminary mathematical model by designing its specification, choosing and specification of system metrics, statistical analysis of the model, approbation of the mathematical model in conditions close to real, analysis by analytical methods and the implementation. …”
    Get full text
    Article
  5. 33705

    Trabalho infantil e cultura camponesa: interpelações às políticas públicas by Thais Barbosa Reis, Maria Dione Carvalho de Moraes

    Published 2016-01-01
    “…However, public policies designed to eradicate child labor need to dialogue with the socio-cultural particularities of this world, so that they can be constructed having legitimacy and effectiveness.…”
    Get full text
    Article
  6. 33706

    Entropy and Selection: Life as an Adaptation for Universe Replication by Michael E. Price

    Published 2017-01-01
    “…By this logic, intelligent life (as the least-entropic known entity) is more likely than black holes or anything else to be an adaptation designed by cosmological natural selection. This view contrasts with Smolin’s suggestion that black holes are an adaptation designed by cosmological natural selection and that life is the by-product of selection for black holes. …”
    Get full text
    Article
  7. 33707

    Proactive caching and personalized delivery mechanism of heterogeneous content for MAR applications in the Metaverse by XU Siya, FU Qimeng, GUO Shaoyong

    Published 2024-10-01
    “…Then, based on the ECSD, heterogeneous content pre-caching mechanisms based on storage space division and user preference prediction were designed. Specially, by introducing the personalized recommendation mechanism of foreground content, a differentiated delivery strategy of foreground content was designed. …”
    Get full text
    Article
  8. 33708

    Cross-network access control mechanism for complex network environment by Fenghua LI, Tianzhu CHEN, Zhen WANG, Linjie ZHANG, Guozhen SHI, Yunchuan GUO

    Published 2018-02-01
    “…,integration of multi-network and information flow in cross-network.These characteristics bring access control for complex network environment the new requirement of coarse-grained control,sticky policies and inconsistent operation semantics.To satisfy these requirements,cross-network access control mechanism in complex network environments (CACCN) was designed by mapping the cyberspace-oriented access control.First of all,the process of mapping was illustrated using the example of space-ground integrated networks.Next,a management model was proposed to manage the control elements in CACCN and a series of management functions were designed by using Z-notation.The analysis on practical example demonstrates that the mechanism can satisfy a series of access control requirements.…”
    Get full text
    Article
  9. 33709

    Observer le travail enseignant by Christine Félix, René Amigues, Laurence Espinassy

    Published 2014-01-01
    “…Firstly, the epistemological and theoretical bases for observation, designed as an operational method and source of knowledge production, will be presented. …”
    Get full text
    Article
  10. 33710

    Speech enhancement method based on multi-domain fusion and neural architecture search by Rui ZHANG, Pengyun ZHANG, Chaoli SUN

    Published 2024-02-01
    “…In order to further improve the self-learning and noise reduction ability of speech enhancement model, a speech enhancement method based on multi-domain fusion and neural architecture search was proposed.The multi-spatial domain mapping and fusion mechanism of speech signals were designed to realize the mining of real complex number correlation.Based on the characteristics of convolution pooling of the model, a complex neural architecture search mechanism was proposed, and the speech enhancement model was constructed efficiently and automatically through the designed search space, search strategy and evaluation strategy.In the comparison and generalization experiment between the optimal speech enhancement model and the baseline model, the two indexes of PESQ and STOI increase by 5.6% compared with the optimal baseline model, and the number of model parameters is the lowest.…”
    Get full text
    Article
  11. 33711

    Corps et vision du monde chez les Berbères de Kabylie by Tassadit Yacine

    Published 2019-07-01
    “…Paradoxically, this terminological shortage is at the root of the production of a plethora of very important terms that, while designating the body and its various constituent parts, furnishes a broad range of expressions, metaphors and metonymies highly infused with meanings, allusions and symbols. …”
    Get full text
    Article
  12. 33712

    A spatial diversity cooperative spectrum sensing system based on blockchain and deep learning by Zhongshan XIAO, Chunqi WANG, Daquan FENG

    Published 2023-10-01
    “…Cooperative spectrum sensing is a key technology in cognitive radio.A data-driven intelligent cooperative spectrum sensing system was proposed with spatial diversity running on a smart contract to address issues of security, privacy, incentive and hidden terminals in cooperative spectrum sensing.Specifically, a motivated spectrum sensing system was designed by taking advantage of the decentralization of blockchain technology and the immutability of data.Secondly, a deep learning-based approach was proposed to identify malicious users in the system.In addition, to achieve higher accuracy in recruiting sensing nodes more efficiently in the system, a hard decision cooperative spectrum sensing fusion algorithm based on performance weights and spatial diversity was designed.The experimental results indicate that the proposed solution outperforms traditional cooperative spectrum sensing algorithms in terms of security, privacy, motivation, and sensing accuracy.…”
    Get full text
    Article
  13. 33713

    Analyse d’une expérimentation de service public de covoiturage courte distance au prisme du concept de dispositif by Maylis Poirel

    Published 2021-10-01
    “…On the one hand, it explores the physical componants of the "carsharing station" and shows how they are designed to cross the "driver" and "passenger" user flows. …”
    Get full text
    Article
  14. 33714

    Satellite-Earth Integration Intelligent Resource Management and Control Architecture of Giant Sensing Constellation by Yingte CHAI, Gang WANG, Chao ZHANG, Guangxi ZHU, Wei FU, Zhengqiang GUO

    Published 2022-09-01
    “…The giant sensing constellation will have the capabilities of on-board automatic processing, on-board independent planning, multisensors and multi-mode automatic switching.The traditional control mode of relying solely on the ground system can no longer meet the requirements of the giant sensing constellation.According to the requirements of intelligent and networked control, an integrated intelligent resource management and control architecture was proposed.It was based on the integration of satellite and earth.The work contents of satellite and earth were specifically designed.The interaction mechanism between satellite and earth was designed.The architecture it proposed could be well applied to the independent resource management and controlled of giant sensing constellation.The architecture realized the "networking, autonomy and intelligence" of the giant sensing constellation and it could played an important role in major national security emergency response and other tasks.…”
    Get full text
    Article
  15. 33715

    Network security threat warning method based on qualitative differential game by Shirui HUANG, Hengwei ZHANG, Jindong WANG, Ruiyu DOU

    Published 2018-08-01
    “…Most current network security research based on game theory adopts the static game or multi-stage dynamic game model,which does not accord with the real-time change and continuity of the actual network attack-defense process.To make security threats warning more consistent with the attack-defense process,the threat propagation process was analyzed referring to the epidemic model.Then the network attack-defense game model was constructed based on the qualitative differential game theory,by which the evolution of the network security state could be predicted.Based on the model,the qualitative differential game solution method was designed to construct the attack-defense barrier and divide the capture area.Furthermore,the threat severity in different security states were evaluated by introducing multidimensional Euclidean distance.By designing the warning algorithm,the dynamic warning of the network security threat was realized,which had better accuracy and timeliness.Finally,simulation results verify the effectiveness of the proposed algorithm and model.…”
    Get full text
    Article
  16. 33716

    Toxicity of Common Indoor Household Insecticides Registered in Florida by Frederick M. Fishel

    Published 2019-09-01
    “…Insecticides are designed to control insect pests, but they can also be toxic (poisonous) to desirable plants and animals, including humans. …”
    Get full text
    Article
  17. 33717

    Trajectory privacy protection scheme based on differential privacy by Si CHEN, Anmin FU, Mang SU, Huaijiang SUN

    Published 2021-09-01
    “…To solve the problem that the current sampling mechanism and data obfuscation method may raise insufficient data availability and privacy protection, a trajectory privacy protection scheme based on differential privacy was proposed.A new efficient sampling model based on time generalization and spatial segmentation was presented, and a k-means clustering algorithm was designed to process sampling data.By employing the differential privacy mechanism, the trajectory data was disturbed to solve the user privacy leaking problem caused by the attacker with powerful background knowledge.Simultaneously, to respond to the error boundary of the query range of pandemic, an effective prediction mechanism was designed to ensure the availability of released public track data.Simulation results demonstrate that compared with the existing trajectory differential privacy protection methods, the proposed scheme has obvious advantages in terms of processing efficiency, privacy protection intensity, and data availability.…”
    Get full text
    Article
  18. 33718

    THEORETICAL ANALYZING AND MODELING FOR ELECTROMAGNETIC VIBRATION OF PERMANENT MAGNET SYNCHRONOUS MOTOR by LI Liang, JIANG YuChen

    Published 2016-01-01
    “…The research on electromagnetic vibration is foundations of designing the low noising PMSM. The structure of PMSM is introduced. …”
    Get full text
    Article
  19. 33719

    CBGTPy: An extensible cortico-basal ganglia-thalamic framework for modeling biological decision making. by Matthew Clapp, Jyotika Bahuguna, Cristina Giossi, Jonathan E Rubin, Timothy Verstynen, Catalina Vich

    Published 2025-01-01
    “…Here we introduce CBGTPy, a virtual environment for designing and testing goal-directed agents with internal dynamics that are modeled on the cortico-basal-ganglia-thalamic (CBGT) pathways in the mammalian brain. …”
    Get full text
    Article
  20. 33720

    An Improved RSSI-Based Positioning Method Using Sector Transmission Model and Distance Optimization Technique by Haiping Zhu, Talal Alsharari

    Published 2015-09-01
    “…The calculated distances designated for trilateration are also optimized to eliminate the abnormal distances from positioning calculations. …”
    Get full text
    Article