Showing 33,921 - 33,940 results of 46,768 for search '"Design"', query time: 0.19s Refine Results
  1. 33921
  2. 33922

    Gust Mitigation of Micro Air Vehicles Using Passive Articulated Wings by Adetunji Oduyela, Nathan Slegers

    Published 2014-01-01
    “…In a similar manner, micro air vehicle designers have been investigating using wing articulation to take advantage of this phenomenon. …”
    Get full text
    Article
  3. 33923

    Implementation of HACCP Management System in a Cake Manufacturing Company in Dhaka, Bangladesh: A Case Study by Md. Fahad Jubayer, Md. Sajjad Hossain, Md. Al-Emran, Md. Nasir Uddin

    Published 2022-01-01
    “…The prerequisite program was designed to address some hazards prior to production, thereby simplifying the HACCP plan. …”
    Get full text
    Article
  4. 33924

    A new Track of Fatigue crack growth in Aluminum Alloy (2219) under Cyclic Stresses by Abdullah Dhayea Assi

    Published 2020-12-01
    “…In addition, two programs were designed on MATLAB to perform the compute calculations to collect the results. …”
    Get full text
    Article
  5. 33925

    VIRTUAL MANUFACTURING AND SIMULATION ANALYSIS OF SPIRAL BEVEL GEAR BASED ON CURVATURE ADJUSTMENT by WANG XueJun, WANG ZhongHou, LI Yan, DIAO XinWei, LIU XiaoFeng

    Published 2022-01-01
    “…In view of the blindness and contingency of the trial cutting method in traditional processing of spiral bevel gears, this paper proposes a processing adjustment method of designing grinding wheel section according to the curvature of the tooth surface. …”
    Get full text
    Article
  6. 33926

    Graph-Based Node Finding in Big Complex Contextual Social Graphs by Keshou Wu, Guanfeng Liu, Junwen Lu

    Published 2020-01-01
    “…This inspires the conText-Aware Graph pattern-based top-K designated node matching (TAG-K) problem, which is NP-complete. …”
    Get full text
    Article
  7. 33927

    Digital Twin Satellite Internet: Architecture and Key Technologies by Yaoqi LIU, Hongguang LI, Yiqing ZHOU, Jinglin SHI, Yongtao SU, Jinxi QIAN

    Published 2022-03-01
    “…A digital twin satellite internet (DTSI) architecture was proposed, which provided support for the whole life cycle of satellite internet through the three-dimensional closed-loop mechanism of parallel twin, security endogenous and intelligent evolution.Then, the key problems and technologies of DTSI were discussed.Aiming at the complex and changeable satellite internet system, a standardized model processing and generation method based on mechanism and data driving was proposed.In the face of the data torrent formed by massive information and uneven distribution, a pool computing-storage strategy of three-level diversion strategy was proposed.In order to achieved high fi delity with the characteristics of the actual system, an intelligent orchestration and distributed heterogeneous processing platform was designed to classifi ed and quickly calculated diff erent models and events.In order to achieved high fi delity with the characteristics of the actual system, an intelligent orchestration and distributed heterogeneous processing platform was designed to classifi ed and quickly calculated diff erent models and events, the satellite internet twin cycle evolution system of observation-orientationdecision-act was formed, so as to realized the stable development of the whole life cycle of satellite internet.…”
    Get full text
    Article
  8. 33928

    Modeling and Analysis on the Evolution Process of Tool Working Angle in Gear Skiving Process by Yongpeng Chen, Hongliang Liu, Yong Yang

    Published 2022-01-01
    “…Finally,the influence of the designed rake angle and the helix angle of the skiving cutter on the working angle is analyzed. …”
    Get full text
    Article
  9. 33929

    State of the object and state’s indicators. Problems of personnel management by M. S. Mokiy, M. E. Cortés

    Published 2022-06-01
    “…The interpretation of economic relations as a system allows us to designate their basic element as a household. Then the objective function of economic relations is to meet the needs of all households. …”
    Get full text
    Article
  10. 33930

    KAJIAN PEMBANGUNAN SISTEM DRAINASE BERWAWASAN LINGKUNGAN DI KAWASAN PERUMAHAN by NURHAPNI, HANI BURHANUDIN

    Published 2021-10-01
    “…Increased run off due to the closing of the land by residential buildings should be designed so that the flow will not quickly disappear but could still be converted into ground water reserves. …”
    Get full text
    Article
  11. 33931

    A Novel Contextual Information Recommendation Model and Its Application in e-Commerce Customer Satisfaction Management by Feipeng Guo, Qibei Lu

    Published 2015-01-01
    “…Firstly, the model analyzes the differential impact of various sensitive contexts and specific examples on user interest and designs a user interest extraction algorithm based on distributed cognition theory. …”
    Get full text
    Article
  12. 33932

    Optimal Airport Surface Traffic Planning Using Mixed-Integer Linear Programming by P. C. Roling, H. G. Visser

    Published 2008-01-01
    “…Due to uncertainty in the input data driving the taxi-planning process, the taxi-planning tool is designed such that it produces solutions that are robust to uncertainty. …”
    Get full text
    Article
  13. 33933

    Distributed trust management scheme based on blockchain in Internet of vehicles by Haibo ZHANG, Yukun CAO, Kaijian LIU, Ruyan WANG

    Published 2023-05-01
    “…Aiming at the security problems caused by the low efficiency and accuracy of malicious vehicle identification in Internet of vehicles, a distributed trust management scheme based on blockchain in Internet of vehicles was proposed.A false information identification strategy was designed by aggregating the scoring information of vehicles, combined with Bayesian inference model.A reputation value updating algorithm was designed by combining the historical interaction information of vehicles and traffic information, malicious vehicles were identified by the reputation threshold.A blockchain was constructed roadside units to realize the distributed storage of traffic data and vehicle reputation values.The traditional proof of work consensus mechanism was improved to dynamically change the difficulty of miner node generating a block through the event level and the number of vehicles involved in scoring, and the waiting mechanism was used to temporarily stop the nodes that had recently blocked from participating in the election process of miner nodes, thus reducing the resource consumption caused by repeated calculations.The simulation results show that the proposed scheme can effectively identify false information, resist the deceptive behavior of malicious vehicles, improve the identification efficiency of malicious vehicles, reduce resource consumption, and is effective and feasible in distributed trust management for Internet of vehicles.…”
    Get full text
    Article
  14. 33934

    Distributed Robust Cooperative Hierarchical Control for Island Microgrids under Hijacking Attacks Based on Multiagent Systems by Abdollah Mirzabeigi, Ali Kazemy, Mehdi Ramezani, Seyed Mohammad Azimi

    Published 2023-01-01
    “…The theory and simulation results confirm the performance of the designed controller in solving this cyber-attack and other disturbances compared to other controllers.…”
    Get full text
    Article
  15. 33935

    Cooperation-based location authentication scheme for crowdsensing applications by Youliang TIAN, Maoqing TIAN, Hongfeng GAO, Miao HE, Jinbo XIONG

    Published 2022-09-01
    “…Utilizing mobile devices to collect location-related data in crowdsensing has the security problem of a location cheating attack.How to guarantee the quality of these sensitive data has become a challenge.In response to this, a location authentication scheme was proposed based on cooperation to detect malicious users who submit false locations.Firstly, users with mobile devices were used to generate location proofs for each other, and a location verification scheme was designed based on distance bounding protocols for obtaining new information by multiple collisions of the same random number, which ensured the user’s location should be unforgeable and achieved the purpose of improving the quality of collected data.In addition, a location proof cooperator select method based on region division and reputation model was proposed which effectively prevented collusion attack and solved the problem of concentration of equity.Meanwhile, the incentive mechanism based on reputation value and task completion time was designed to effectively improve the location proof cooperator efficiency of task completion.Finally, security analysis and performance evaluation indicate that the scheme has proved to be correctness and secure, and the advantages in computational cost and communication overhead.…”
    Get full text
    Article
  16. 33936

    A Novel Method for Functional Annotation Prediction Based on Combination of Classification Methods by Jaehee Jung, Heung Ki Lee, Gangman Yi

    Published 2014-01-01
    “…Automated protein function prediction defines the designation of functions of unknown protein functions by using computational methods. …”
    Get full text
    Article
  17. 33937

    La colonie latino-américaine dans l’atelier parisien de Le Corbusier by Ingrid Quintana Guerrero

    Published 2018-09-01
    “…The involvement of these young designers in the most important architectural studio of their time occurred simultaneously to their discovery of an intellectual universe in Paris. …”
    Get full text
    Article
  18. 33938

    A Novel System for Measuring Optical Properties in Arterial Blood of Man by A. Castañeda-Miranda, L. D. L. Vizcaya

    Published 2006-01-01
    “…A device to obtain the electromagnetic spectrum in the blood has being designed and is presented in this work. This device uses a quartz lamp, emitting electromagnetic radiation between 200 nm and 2200 nm. …”
    Get full text
    Article
  19. 33939

    An English Online Homework Tutoring System Supported by Internet Database by Huanxiang Hao

    Published 2021-01-01
    “…Therefore, this paper designs an Internet-based online tutoring platform for college English teaching, which is accelerated by using the K-means clustering algorithm. …”
    Get full text
    Article
  20. 33940

    Data poisoning attack detection approach for quality of service aware cloud API recommender system by Zhen CHEN, Wenchao QI, Taiyu BAO, Limin SHEN

    Published 2023-08-01
    “…To solve the problem that existing studies usually assumed that the QoS data of cloud API recommender system was reliable, ignoring the data poisoning attack on cloud API recommender system by malicious users in open network environment, a data poisoning attack detection approach based on multi-feature fusion was proposed.Firstly, a user connected network graph was constructed based on the designed similarity function, and users’ neighborhood features were captured using Node2vec.Secondly, sparse auto-encoder was used to mine user QoS deep feature, and user interpretation feature based on QoS data weighted average deviation was designed.Furthermore, a fake user detection model based on support vector machine was established by integrating user neighborhood feature, QoS deep feature, and interpretation feature, the model parameters were learned using grid search and alternating iterative optimization strategy to complete fake user detection.Finally, the effectiveness and superiority of the proposed approach were verified through extensive experiments, realizing the poison attack defense against QoS aware cloud API recommender system at the data side.…”
    Get full text
    Article