Showing 34,281 - 34,300 results of 46,768 for search '"Design"', query time: 0.17s Refine Results
  1. 34281

    Forecast uncertainties real-time data-driven compensation scheme for optimal storage control by Arbel Yaniv, Yuval Beck

    Published 2025-03-01
    “…This study introduces a real-time data-driven battery management scheme designed to address uncertainties in load and generation forecasts, which are integral to an optimal energy storage control system. …”
    Get full text
    Article
  2. 34282

    About Innovative Content of Subject-Oriented Pedagogical Education by R. M. Asadullin

    Published 2019-11-01
    “…The effectiveness of this model is confirmed by the high level of students’ mastery of designing methods and constructing the educational process, as well as their positive experience in the implementation of educational activities.…”
    Get full text
    Article
  3. 34283

    Position/Force Tracking Impedance Control for Robotic Systems with Uncertainties Based on Adaptive Jacobian and Neural Network by Jinzhu Peng, Zeqi Yang, Tianlei Ma

    Published 2019-01-01
    “…Then, a robust term is designed to compensate the external disturbances and the approximation errors of RBFNN. …”
    Get full text
    Article
  4. 34284

    Multiple redundant flow fingerprint model based on time slots by Kexian LIU, Jianfeng GUAN, Wancheng ZHANG, Zhikai HE, Dijia YAN

    Published 2023-02-01
    “…With the increasingly widespread use of the Internet, various network security problems are frequently exposed, while the “patching” style security enhancement mechanisms cannot effectively prevent the growing security risks.The researchers in the field of network security believe that the future Internet architecture should take security as a basic attribute to provide the native security support which is also called as endogenous safety and security.In order to support the data trustworthiness of endogenous security, a time-slot based multiple redundant flow fingerprint model was designed and implemented based on the research of the watermark (or fingerprint) mechanism.The proposed model used only three time slot intervals and operated the packets within the specified time slots, so that the fingerprint can be embedded without conflicting with the adjacent bit operations.Redundant coding was introduced to improve the fingerprint robustness, and the behaviors such as jitter or malicious disruptions by attackers in the network were considered.Furthermore, the impacts of delayed interference, spam packet interference and packet loss interference were analyzed.The analytical results show that the robustness of the fingerprint model improves with increasing redundant bits when the packet distribution in the network stream is given.Besides, in order to reduce the consumption of time and space and improve the efficiency and accuracy of packet operations, a flow fingerprinting prototype system was designed and implemented based on the kernel, and its efficiency and robustness were evaluated.The experimental result show that the model has high robustness.Additionally, the application scenario of the model was elaborated, which can effectively detect man-in-the-middle attacks and prevent network identity spoofing with the help of the flow fingerprinting model.…”
    Get full text
    Article
  5. 34285

    Optimal Scheme for Process Quality and Cost Control by Integrating a Continuous Sampling Plan and the Process Yield Index by Chunzhi Li, Shurong Tong, Keqin Wang

    Published 2018-01-01
    “…The single level continuous sampling plan (CSP-1) is an in-line process control tool that has been commonly adopted in various manufacturing industries. However, CSP-1 is designed for only satisfying the quality constraint. …”
    Get full text
    Article
  6. 34286

    Seismic vulnerability analysis of reinforced concrete frame with infill wall considering in-plane and out-of-plane interactions by Dan Wang

    Published 2022-09-01
    “…Based on the test data on masonry infill walls, this paper designs a performance indicator for infill wall in the light of IP-OOP interactions, and determines the response threshold of each damage state. …”
    Get full text
    Article
  7. 34287

    Re-evaluation of the Bahariya Formation carcharodontosaurid (Dinosauria: Theropoda) and its implications for allosauroid phylogeny. by Maximilian Kellermann, Elena Cuesta, Oliver W M Rauhut

    Published 2025-01-01
    “…In 1996, a relatively complete carcharodontosaurid cranium was described from similar aged rocks in Morocco and designated the neotype of the species Carcharodontosaurus saharicus in 2007. …”
    Get full text
    Article
  8. 34288

    A Modular Step-Up DC–DC Converter Based on Dual-Isolated SEPIC/Cuk for Electric Vehicle Applications by Ahmed Darwish, George A. Aggidis

    Published 2025-01-01
    “…The modular DC–DC boost converter proposed in this paper is designed to achieve a high voltage step-up ratio for the input FC voltages through the use of isolated series-connecting boosting submodules connected. …”
    Get full text
    Article
  9. 34289

    The function of the indicative, structural, evaluative, and characteristic criteria in the analysis of the generative process of meaning and signification in linguistic and literar... by Mehyar Alavi Moghaddam

    Published 2021-06-01
    “…In spite of the distinction between the "designation of meaning" based on Saussure's semiotic theory and the "lack of designation of meaning," based on the belief in the dark layers and the mystery of the text, it seems according to structuralism, semiotic theories of Saussure and post-structuralism can achieve an understanding of the literary text and the process of meaning emergence and criteria in the linguistic structures and literary signs of the text and difference between word level to meaning in linguistic work and sign to meaning in literary work. …”
    Get full text
    Article
  10. 34290

    Clustering and Prediction Analysis of the Coordinated Development of China’s Regional Economy Based on Immune Genetic Algorithm by Yang Yang

    Published 2021-01-01
    “…According to the characteristics of the model, an improved immune genetic algorithm is designed to solve the problem, and the effectiveness of the immune genetic algorithm is verified through an example.…”
    Get full text
    Article
  11. 34291

    Systematic Review into Diagnostics for Post-Kala-Azar Dermal Leishmaniasis (PKDL) by Emily R. Adams, Inge Versteeg, Mariska M. G. Leeflang

    Published 2013-01-01
    “…Only a few of these studies reported a valid estimate of diagnostic accuracy, as most were case-control designs or used a reference standard with low sensitivity. …”
    Get full text
    Article
  12. 34292

    Systemic Impacts of National Civilized Cities on Sustainable Development: A Quasi-Experimental Analysis of Economic and Environmental Outcomes in China by Weixin Yang, Yunpeng Yang, Zhili Chen, Yuxun Gu

    Published 2025-01-01
    “…This paper explores the systemic relationship between urban civilization initiatives and economic prosperity by examining the economic impact of China’s “National Civilized City” (NCC) designation. We begin by synthesizing literature that addresses the complex interactions between urban development and environmental sustainability, emphasizing a systems approach. …”
    Get full text
    Article
  13. 34293

    Modeling the Effects of Formulary Exclusions: How Many Patients Could Be Affected by a Specific Exclusion? by Anne M. Sydor, Emily Bergin, Jonathan Kay, Erik Stone, Robert Popovian

    Published 2024-03-01
    “…**Background:** Medication formularies, initially designed to promote the use of cost-effective generic drugs, are now designed to maximize financial benefits for the pharmacy benefit management companies that negotiate purchase prices. …”
    Get full text
    Article
  14. 34294

    A method for locating fault sections of power optical communication network intelligent operation and maintenance equipment off-grid based on Dijkstra algorithm by Hailong ZHANG, Bo LI, Najuan JIA

    Published 2023-01-01
    “…In order to determine the mapping relationship between the off grid fault section and the fault current distribution, and find the shortest path between the off grid fault section and the fault current distribution, an off grid fault section location method based on Dijkstra algorithm was designed for the intelligent O&M equipment of the electro-optical communication network.The LightGBM algorithm in the data-driven method was selected to determine the mapping relationship between the off grid fault section and the fault current distribution through a large number of samples.Based on Dijkstra algorithm, the shortest path of mapping relationship was found, and the off network fault section was searched.The location platform for off grid fault section of intelligent operation and maintenance equipment of power optical communication network was designed to realize the location and alarm of off grid fault point, namely, signal loss of intelligent operation and maintenance equipment.The comparison experiment shows that the location result of this method was the closest to the actual location and the most accurate in the off network fault section location caused by the interruption of optical cable in the SDH ring network circuit area, the off network fault section location caused by the fault of optical cable in the multi way bus section, and the off network fault section location scenario caused by the fault of optical cable in the multi way bus section in the ring power area.It effectively improved the accuracy of fault location and has good applicability.…”
    Get full text
    Article
  15. 34295

    Optimal Limb Length Ratio of Quadruped Robot Minimising Joint Torque on Slopes by Tadayoshi Aoyama, Kosuke Sekiyama, Yasuhisa Hasegawa, Toshio Fukuda

    Published 2009-01-01
    “…For the same reason, a robot’s structure needs to be suitably designed for locomotion in its working environment. …”
    Get full text
    Article
  16. 34296

    THE DRAMATIC APPROACH OF I. HOFFMAN IN STRUCTURING THE SPACE OF FASHION by E. V. Skalatskaya

    Published 2016-06-01
    “…A concrete material, where the action of the concept is demonstrated, it is the demonstration of clothing on seasonal fashion shows of designer`s collection. The methodology is the dramatic approach of I. …”
    Get full text
    Article
  17. 34297

    A Modified Dijkstra Algorithm for ROS Based Autonomous Mobile Robots by Orkan Murat Çelik, Murat Köseoğlu

    Published 2023-03-01
    “…In this study, an AMR was designed to execute different path planning algorithms. …”
    Get full text
    Article
  18. 34298

    Active Fault Tolerant Control Based on a Novel Tracking Differentiator for Elevating Stage Control System by Haijie Mao, Wei Li, Xiaolin Feng

    Published 2018-01-01
    “…The simulation results show that the fault diagnosis method is simple and timely, the designed tracking differentiator is fast and effective, and the effect of the fault tolerant control based on smooth switching strategy is also satisfactory.…”
    Get full text
    Article
  19. 34299

    Bidirectional measurement differential positioning method for LEO communication satellites by WANG Xinyang, ZHAO Yafei, LI Jinkang, PENG Mugen

    Published 2024-04-01
    “…In scenarios such as direct-to-handset satellite, terminal designs were often configured to communicate with only one satellite, making the exploration of single-satellite positioning methods of urgent significance. …”
    Get full text
    Article
  20. 34300

    Investigating fraction computation problem-solving among pre-service primary school teachers by Puri Pramudiani, Fitri Alyani, Maarten Dolk, Wanty Widjaja

    Published 2024-10-01
    “…This study explores how Pre-Service Primary School Teachers approach problem-solving in fractional computations. A workbook is designed to support pre-service primary school teachers ' computational thinking in fraction-context challenges. …”
    Get full text
    Article