Showing 33,901 - 33,920 results of 46,768 for search '"Design"', query time: 0.19s Refine Results
  1. 33901

    A New Approach to Assess the Quality of Small High-Speed Centrifugal Fans Using Noise Measurement by Dingjun Cui, Ian A. Craighead

    Published 1999-01-01
    “…The requirements for a special approach for the quality assessment of small high-speed centrifugal fans are outlined and a new parameter designating the noise levels from the product in comprehensive form will be discussed and described as a criterion for such quality assessment.…”
    Get full text
    Article
  2. 33902

    About the competence-based technology for educational environment survey by Dmitriy N. Bezgodov

    Published 2022-05-01
    “…This technology includes special matrix and “value-and-competence parallelepiped” designed as the instruments of university educational environment control and correction.…”
    Get full text
    Article
  3. 33903

    PhD in Public Administration and Management (By Coursework and Research) (PHDPAM-CW&R) by Kabale University

    Published 2022
    “…is designed for those seeking academic research and teaching careers as faculty or professors in the study of governance, public administration, management and administrative sectors within Universities but also as professional career managers and administrators for a wide range of organizational contexts.…”
    Get full text
    Other
  4. 33904

    Scalability in SLA lattice through lattice orientation and hybrid frame and plate architectures by Mahan Ghosh, Nandika Anne D'Souza, Yunwei Xu, Mohan Sai Kiran Kumar Yadav Nartu, Vignesh Pagadalu, Sina Rastegarzadeh, Jida Huang

    Published 2025-03-01
    “…Lightweighting has been a key goal for engineers and designers, with lattice structures widely explored as the building blocks for structural components. …”
    Get full text
    Article
  5. 33905

    A novel adaptive droop-based SoC balancing control strategy for distributed energy storage system in DC microgrid by Liangliang Guo, Xinrui Liu, Xinyu Li, Rui Wang, Hanwen Ren, Zhiliang Wang, Qiuye Sun

    Published 2025-04-01
    “…In the secondary control layer, a virtual voltage equalization controller (VVEC) is designed to reduce the influence of line impedance on SoC balance. …”
    Get full text
    Article
  6. 33906

    Mechanical properties and microbial assessment of additively manufactured diamond and gyroid Ti-6Al-4V ELI scaffolds for interbody fusion cages applications by Mohit Kumar, Vijay Kumar Meena, Suman Singh

    Published 2025-01-01
    “…This study is meticulously designed to focus on both the mechanical and microbial assessments. …”
    Get full text
    Article
  7. 33907

    Dual band four port MIMO antenna with dual circular polarization for Wi-Fi/WiMAX applications by Poonam Thanki, Trushit Upadhyaya, Upesh Patel, Khaled Aliqab, Meshari Alsharari, Ayman A. Althuwayb, Ammar Armghan, Vishal Sorathiya

    Published 2025-01-01
    “…An I shaped strip is used to join separate ground planes of designed E shaped monopole antenna to have same voltage levels. …”
    Get full text
    Article
  8. 33908

    THE EXPERIMENTAL PROGRAM "DEVELOPING SOCIAL INTELLIGENCE IN PRIMARY SCHOOL STUDENTS" by GUȚUL Aliona

    Published 2023-11-01
    “…This article presents an Experimental Program designed to enhance the social intelligence of primary school students. …”
    Get full text
    Article
  9. 33909

    Algorithm for scenario benefit route planning based on user’s requests by Nan WANG, Honglei ZHOU, Jinbao LI, Lingli LI

    Published 2018-05-01
    “…Most of the existing research for point of interest route planning only consider the static properties of POI,however,the congestion of the hot spots and users’ discontent may greatly reduce the travel quality.In order to increase the tourists’ satisfaction,the dynamic attributes of POI was considered and a route planning algorithm based on user’s requests was proposed.Firstly,Markov-GM(1,1) forecasting algorithm was designed to predict the number of people in each scenic spot.Markov-GM(1,1) could make the average predication error 12.2% lower than the GM(1,1) algorithm by introducing the predication residual.And then,the forward refinement (FR) algorithm was designed which could avoid visiting the unnecessary place and satisfy user’s requests as well.The average solving time of forward refinement algorithm was 9.4% lower than TMT algorithm under the same amount of user’s requests.Finally,based on the factors such as spot popularity,KL divergence of time,visiting order and distance et al,the scenic route profit planning algorithm which could make the number of Rank 1-5 spots 34.8% higher than Time_Based algorithm and 47.3% higher than Rand_GA algorithm.…”
    Get full text
    Article
  10. 33910

    Optimization of LMBP high-speed railway wheel size prediction algorithm based on improved adaptive differential evolution algorithm by Yu Zhang, Jiawen Zhang, Lin Luo, Xiaorong Gao

    Published 2019-10-01
    “…Based on the analysis of the research status of wheel-to-life prediction at home and abroad and the repair of wheel-set wear and tear, this article designs and implements an adaptive differential evolution algorithm Levenberg–Marquardt back propagation wheel-set size prediction model. …”
    Get full text
    Article
  11. 33911

    The application research of ancient calligraphy recognition model based on improved filtering and AI technology in calligraphy education in colleges and universities by Xing You

    Published 2025-02-01
    “…The data showed that the recognition accuracy of the ancient Chinese character recognition model designed by this research is significantly higher than the common methods in the market. …”
    Get full text
    Article
  12. 33912

    D2D data sharing partner selection mechanism based on privacy degree and stability degree by Zhangjian HUANG, Guohua YE, Zhiqiang YAO

    Published 2019-12-01
    “…Device to device (D2D) data sharing has become a promising solution to offload cellular network traffic,but the privacy vulnerability and service instability of data sharing partners affect the quality of shared services.To solve this problem,a D2D data sharing partner selection mechanism based on degree of privacy degree and stability degree (named PSUS) was proposed.Firstly,the privacy information of the provider was abstracted and summarized,and the privacy measurement method was built according to the privacy preferences of the provider and the historical records of shared services,and the privacy degree of the provider in different shared services was obtained.Then,the data sharing process was designed based on privacy degree,and the provider cached data under the constraints of privacy preferences and participates in sharing services with low privacy to meet the provider's privacy requirements.Finally,on the basis of the provider who has satisfied the privacy requirements,a multi-index evaluation method was designed to evaluate the service stability of providers to select stable sharing partners.The feasibility of the proposed mechanism was demonstrated by analysis of performance.…”
    Get full text
    Article
  13. 33913

    Reforming the Welfare State: Camden 1965-73 by Mark Swenarton

    Published 2011-06-01
    “…The outcome was a series of projects, including Fleet Road, Alexandra Road, Highgate New Town, Branch Hill and Maiden Lane, designed by members of Cook’s team, including Neave Brown, Peter Tábori and Gordon Benson and Alan Forsyth, as well as projects designed by up-and-coming private architects like Colquhoun & Miller, Edward Cullinan and Farrell Grimshaw. …”
    Get full text
    Article
  14. 33914

    Research on dynamic cooperative technology of manned and unmanned networked information system by Haijun YE, Guofeng WANG, Zhiyong FENG

    Published 2023-07-01
    “…To meet the needs of information security sharing and systematic dynamic cooperation of manned and unmanned formations and to build a dynamic communication network, firstly, a networked high-precision system time synchronization scheme was designed, using integrated network link management strategy and wireless channel on-demand preference algorithm, and the time synchronization accuracy could be up to 100 nanosecond level.Secondly, a data privacy protection and secure sharing solution for airborne networks was built, implementing communication data security of manned and unmanned formation, and analyzing and discussing the performance and security to prove that the proposed solution has a provable high security strength.Meanwhile, a dynamic cooperation model of manned and unmanned formation was designed to discover, authenticate and revoke each node in real time, perform legitimacy identity verification, optimize allocation scheme for multi-objective information acquisition through multi-machine collaborative construction, differentiated data was used to transmit synchronize data, save network resources, improve data transmission efficiency, and meet the demand of systematic cooperative operations.…”
    Get full text
    Article
  15. 33915

    Optimal Control of Semiactive Two-Stage Vibration Isolation Systems for Marine Engines by YuanYuan Fang

    Published 2021-01-01
    “…The optimal controller taking the minimum force transmitted from the engine to base as the control objective is designed. The system model and numerical simulation analysis are established using MATLAB. …”
    Get full text
    Article
  16. 33916

    Prevention and Detection Research of Intelligent Sports Rehabilitation under the Background of Artificial Intelligence by Qiong Huang, Fubin Wang

    Published 2022-01-01
    “…In the inner loop, a sliding mode iterative learning controller is designed to suppress periodic disturbance and abnormal jitter and achieve stable tracking of the target trajectory. …”
    Get full text
    Article
  17. 33917

    Grouping Formation and Obstacle Avoidance Control of UAV Swarm Based on Synchronous DMPC by Yunfeng He, Xianjun Shi, Jianhua Lu, Chaolun Zhao, Guorong Zhao

    Published 2024-01-01
    “…Finally, the effectiveness of the designed algorithm and its superiority in obstacle avoidance are verified through simulations.…”
    Get full text
    Article
  18. 33918

    Massive access technology in 6G cellular Internet of things network by Feiyan TIAN, Xiaoming CHEN, Caijun ZHONG, Zhaoyang ZHANG

    Published 2020-03-01
    “…To realize Internet of everything (IoE),the 6G cellular Internet of things (IoT) network need to provide wireless access with low power,massive connectivity and wide coverage.Through the analysis and research on the massive access technology in 6G cellular IoT network,especially in combination with the sporadic characteristics of IoT applications,a new access framework based on the grant-free random access protocol was designed to facilitate efficient massive access with limited spectrum resources.The proposed framework consisted of two phases.One was joint activity detection and channel estimation.The other was data transmission,which was divided into two categories,uplink data transmission and downlink data transmission,according to the different directions of data transmission.Due to the uncertainty of channel state information at the base station under the massive grant-free random access and considering the low power demand of 6G IoT devices,two robust uplink and downlink access algorithms were designed by maximizing the system energy efficiency.Extensive simulation results validate the effectiveness and robustness of the proposed algorithm.…”
    Get full text
    Article
  19. 33919

    Pairing-free certificateless blockchain-based access authentication method for spatial information network by HUO Ru, WANG Zhihao, SHAO Zihao, HUANG Tao

    Published 2024-08-01
    “…Furthermore, a certificateless public key without pairing and elliptic curve hybrid encryption algorithm based on blockchain was proposed, and an access authentication mechanism was designed to ensure the security of the access authentication process and the traceability of operations. …”
    Get full text
    Article
  20. 33920

    Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph by Wenjuan WANG, Xuehui DU, Dibin SHAN

    Published 2021-01-01
    “…Aiming at the problem of complex multi-step attack detection, the method of attack scenario construction oriented to cloud computing environment was studied.Firstly, a dynamic probabilistic attack graph model was constructed, and a probabilistic attack graph updating algorithm was designed to make it update periodically with the passage of time and space, so as to adapt to the elastic and dynamic cloud computing environment.Secondly, an attack intention inference algorithm and a maximum probability attack path inference algorithm were designed to solve the uncertain problems such as error and fracture of attack scenarios caused by false positive or false negative, and ensure the accuracy of attack scenario.Meanwhile, the attack scenario was dynamically evolved along with the dynamic probability attack graph to ensure the completeness and freshness of the attack scenario.Experimental results show that the proposed method can adapt to the elastic and dynamic cloud environment, restore the penetration process of attacker’s and reconstruct high-level attack scenario, and so provide certain references for building supervised and accountable cloud environment.…”
    Get full text
    Article