Showing 34,461 - 34,480 results of 46,768 for search '"Design"', query time: 0.18s Refine Results
  1. 34461

    Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range by Zhe SUN, Hong NING, Lihua YIN, Binxing FANG

    Published 2023-02-01
    “…Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the cyberspace security majors of various universities.Building on longstanding practices in data security research and teaching, the teaching team of “Academician Fang Binxing’s Experimental Class” (referred to as “Fang Class”) at Guangzhou University has proposed a teaching method for data privacy protection based on a teaching-in-practice range.In the selection of teaching course content, the teaching team selected eight typical key privacy protection techniques including anonymity model, differential privacy, searchable encryption, ciphertext computation, adversarial training, multimedia privacy protection, privacy policy conflict resolution, and privacy violation traceability.Besides, the corresponding teaching modules were designed, which were deployed in the teaching practice range for students to learn and train.Three teaching methods were designed, including the knowledge and application oriented teaching method which integrates theory and programming, the engineering practice oriented teaching method based on algorithm extension and adaptation, and the comprehensive practice oriented teaching method for practical application scenarios.Then the closed loop of “learning-doing-using” knowledge learning and application was realized.Through three years of privacy protection teaching practice, the “Fang class” has achieved remarkable results in cultivating students’ knowledge application ability, engineering practice ability and comprehensive innovation ability, which provided useful discussion for the construction of the initial course of data privacy protection.…”
    Get full text
    Article
  2. 34462

    Comparative Study of Seismic Behavior between Monolithic Precast Concrete Structure and Cast-in-Place Structure by Chao-gang Qin, Guo-liang Bai, Ya-zhou Xu, Ning-fen Su, Tao Wu

    Published 2018-01-01
    “…We doubt whether the monolithic precast concrete structure could be designed as the cast-in-place structure in high seismic intensity area. …”
    Get full text
    Article
  3. 34463

    Adaptive Image Denoising Method Based on Diffusion Equation and Deep Learning by Shaobin Ma, Lan Li, Chengwen Zhang

    Published 2022-01-01
    “…Then, the threshold function is adaptively designed and improved so that it can automatically control the threshold of the function according to the maximum gray value of the image and the number of iterations, so as to further preserve the important details of the image such as edge and texture. …”
    Get full text
    Article
  4. 34464

    Beam steering by two vertically faced metasurfaces using polarization free unit cells with three operating modes by Mohammadreza Jahangiri, Hossein Soleimani, Mohammad Soleimani

    Published 2025-01-01
    “…Channel modeling and signal to noise ratio of the designed metasurface in wireless network is represented in comparison with planar metasurface with the same cell number.…”
    Get full text
    Article
  5. 34465

    A high speed processor for elliptic curve cryptography over NIST prime field by Xianghong Hu, Xueming Li, Xin Zheng, Yuan Liu, Xiaoming Xiong

    Published 2022-07-01
    “…Our results indicate that the ECC processor is superior to other state‐of‐the‐art designs reported in the literature in terms of speed and area‐time product metrics.…”
    Get full text
    Article
  6. 34466

    Performance of Polymer Composite Constituted Cabinet Dryer Integrated within a Solar Flat Plate Collector by S. Raj Sachin, Anton M. Kuzmin, Subramanian Krishnakumar, Anandhan Jayaganthan, Yesgat Admassu

    Published 2023-01-01
    “…The dryer cabinet was designed at industrial scale to dry 5 kg of ginger at a single setting. …”
    Get full text
    Article
  7. 34467

    An Attention-Based Multidimensional Fault Information Sharing Framework for Bearing Fault Diagnosis by Yunjin Hu, Qingsheng Xie, Xudong Yang, Hai Yang, Yizong Zhang

    Published 2025-01-01
    “…Meanwhile, we propose an innovative Dynamic Adjustment Strategy (DAS) designed to adaptively regulate the training weights of FLT and FQT tasks to achieve optimal training results. …”
    Get full text
    Article
  8. 34468

    Computationally secure steganography based on speech synthesis by Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU

    Published 2022-06-01
    “…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
    Get full text
    Article
  9. 34469

    Surface defect detection on industrial drum rollers: Using enhanced YOLOv8n and structured light for accurate inspection. by Guofeng Qin, Qinkai Zou, Mengyan Li, Yi Deng, Peiwen Mi, Yongjian Zhu, Hao Liu

    Published 2025-01-01
    “…The system and algorithm designed in this paper can better ensure the production quality of drum rollers. …”
    Get full text
    Article
  10. 34470

    Ligand-Based Pharmacophore Modeling and Virtual Screening of RAD9 Inhibitors by Nirmal K. Prasad, Vishnupriya Kanakaveti, Siddhartha Eadlapalli, Ramakrishna Vadde, Angamba Potshangbam Meetei, Vaibhav Vindal

    Published 2013-01-01
    “…Focusing on this interaction, the present study was designed to identify the interaction sites of RAD9 to bind BCL-2 protein and also to inhibit RAD9-BCL-2 interactions by designing novel small molecule inhibitors using pharmacophore modeling and to restore BCL-2 for interacting with anticancer drugs. …”
    Get full text
    Article
  11. 34471

    Investigation and Application of Water-Saving Monitoring Technology in Public Institutions by WANG Kang, ZHENG Yongjie, ZHANG Zhen, TANG Yanping, SONG Wenhao, GUO Xiaoming

    Published 2022-01-01
    “…Considering the characteristics of water use and the current situation of water facilities in public institutions,this study comprehensively employs the Internet of Things (IoT),cloud deployment,databases,three-dimensional (3D) visualization,and other advanced techniques to create a water-saving reconstruction scheme with integrated software and hardware for public institutions.Therefore,a smart water management platform for public institutions is built to implement advanced water-saving concepts and improve the water management level.The main research results are as follows:① By intelligent remote monitoring equipment,the multiclass water measurement network is designed to realize the fine collection of zonal water use data;② this study designs a reconstruction scheme of water facilities and explores the utilization mode of unconventional water sources to improve the utilization efficiency of water resources;③ multiple algorithms and statistical methods are used to analyze the time series of water use data,and thus this study realizes the analysis of pipeline network leakage and damage,identification of water use anomalies,and water-saving statistical analysis,and the investigation of water use laws;④ the platform with functions of monitoring and early warning is established to achieve real-time remote monitoring of water use,statistical analysis of historical water use,and identification and warning of pipe network leakage,so as to detect water anomalies in time and save water.The research results are first applied to the construction of the water-saving institution of the Pearl River Water Resources Commission to build a benchmark for the construction of water-saving institutions in the southern region.On the basis of application experience,the comprehensively integrated monitoring technology for water-saving in public institutions is developed,which provides a new idea for public institutions to save water.…”
    Get full text
    Article
  12. 34472

    Anies Baswedan-Muhaimin Iskandar Campaign Communication Strategy in the 2024 Presidential Election: Case Study of the “Ubah Bareng” Movement by Natasha Adhyswasti Padma Buana, Aditya Perdana

    Published 2024-09-01
    “…Thus, Ubah Bareng serves as a platform that integrates volunteers, political parties, and Timnas in designing campaign programs. This relation allows Ubah Bareng to operates independently from the official campaign structure while playing pivotal role in designing and executing campaign strategies. …”
    Get full text
    Article
  13. 34473

    A new electoral bottom-up model of institutional governance by Carlos M. Garrido, Francisco C. Santos, Elias Fernández Domingos, Ana M. Nunes, Jorge M. Pacheco

    Published 2025-01-01
    “…We find that the endogenous creation of local institutions that require a minimum consensus amongst group members—who, in turn, decide the nature of the institution (reward/punishment) via an electoral process—leads to higher overall cooperation than previously proposed designs, especially at low risk, proving that carrots and sticks implemented through local voting processes are more powerful than other designs. …”
    Get full text
    Article
  14. 34474

    <i>In-vitro</i> Characterization of Optimized Multi-Unit Dosage Forms of Theophylline and its Solid State Characterisation by MU Uhumwangho, KV Murthy Ramana

    Published 2013-05-01
    “…The objective of this study is to compare the drug release profile of an optimized multi-unit dose (MU) tablet consisting of rapid and slow release components, a formulated sustained released tablet and two brands of sustained release tablet formulations in the market with a designed model. The fast release component consisted of conventional granules while the slow release component consisted of wax granules of theophylline. …”
    Get full text
    Article
  15. 34475

    Ancient Stone Inscription Image Denoising and Inpainting Methods Based on Deep Neural Networks by Haoming Zhang, Yue Qi, Xiaoting Xue, Yahui Nan

    Published 2021-01-01
    “…On the basis of these collected and generated images, we designed a stone inscription image denoising model based on multiscale feature fusion and introduced Charbonnier loss function to improve this image denoising model. …”
    Get full text
    Article
  16. 34476

    Mutual Coupling Reduction Using Improved Dual-Layer Mushroom and E-Shaped Stub by Chunxia Cheng, Liyan Luo

    Published 2021-01-01
    “…The diversity gain and envelop correlation coefficient of the diversity performance show that the designed antenna can be used in MIMO or Rx/Tx systems.…”
    Get full text
    Article
  17. 34477

    Implementation of the pancasila student profile strengthening project on sustainable lifestyle themes by Tri Agus Tiyani, Zaka Hadikusuma Ramadan

    Published 2024-08-01
    “…The research results show that the implementation of the P5 sustainable lifestyle theme at SDN 04 Bungaraya was carried out in 3 stages: planning stage, implementation stage and evaluation stage. 1) The planning stage includes several activities, namely preparing the learning ecosystem, designing P5, designing modules, and preparing facilities and infrastructure; 2) The implementation stage includes project introduction, conceptual, contextual and project action; 3) The evaluation stage includes diagnostic assessment, formal assessment, summative assessment, and follow-up. …”
    Get full text
    Article
  18. 34478

    Active Vibration Control of Helicopter Maneuvering Flight Using Feedforward-Robust Hybrid Control Based on Reference Signal Reconstruction by Yifan Qin, Yang Lu, Jinchao Ma, Huiyu Yue

    Published 2021-01-01
    “…Current control laws for active control of helicopter structural vibration are designed for steady-state flight conditions, while the vibration response of maneuvering flight has not been taken into consideration yet. …”
    Get full text
    Article
  19. 34479

    Perancangan Dinamometer untuk Mengukur Gaya Potong pada Mesin Freis untuk Pemesinan Material Fiber Reinforced Polymer by Firman Ridwan, Refki Harvendri

    Published 2020-04-01
    “…Dimensions of the dynamometer are designed with a total length of 32 cm, width 32 cm, and height of 18 cm.…”
    Get full text
    Article
  20. 34480

    The value of a collaborative community of practice to disseminate an inclusive pedagogy in a UK university by Alison Cornforth

    Published 2025-01-01
    “…The website aimed to share inclusive teaching resources, designed in previous practice, and initiatives for colleagues new to teaching, with the purpose of supporting new Professional Standards Framework (PSF) (AdvanceHE, 2023) criteria. …”
    Get full text
    Article