Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
34621
Un processus d’enquête à l’université par la narration professionnelle
Published 2019-06-01“…The article also promotes the description and the analysis of both convergences and tensions between the actors’ initiatives in the system (designers, trainers, and teachers in training device).Narrative work appears prominent in this system by promoting dialogue around the profession of teacher in a professional and technological High School. …”
Get full text
Article -
34622
« Gettiamo la semente comunista fra le donne proletarie » : Compagna et la révolution
Published 2021-07-01“…Compagna, a four-page, four-column magazine, first appeared in Rome on 5 March 1922. It was designed to be the platform of the central office of the Communist Party of Italy, a forum for use by women: workers, housewives, labourers and proletarians. …”
Get full text
Article -
34623
AVALIAÇÃO DO DESEMPENHO DO LAYOUT E DA SINALIZAÇÃO DE UMA UNIDADE HOSPITALAR
Published 2011-01-01“…Esse olhar da ergonomia visa contribuir com o trabalho dos arquitetos e designers para a projetação de ambientes, cada vez mais, adequados às necessidades reais de seus usuários.…”
Get full text
Article -
34624
Quality analysis method of Web browsing based on big data
Published 2020-11-01“…The traditional network operation and maintenance often focuses on the operation status of the network and equipment,which is difficult to solve the user's subjective perception.It is urgent to establish an end-to-end Internet application awareness management system.Focusing on the quality analysis of web browsing,the quality analysis framework and method of user perceived data based on big data technology was studied,a quality analysis system framework based on big data technology was designed and proposed,which was used to realize the quality analysis of Internet business.Taking an international website as an example,a diagnosis method of "two looks and five cuts" was proposed to delimit and trace the cause,which improves the efficiency of manual analysis and verifies the effectiveness of the proposed method.…”
Get full text
Article -
34625
Application study of Costas arrays in multiuser radar systems
Published 2010-01-01“…The construction and performance of frequency hopping codes were discussed but the emphasis was laid on the construction of Costas arrays.The frequency hopping codes called Costas arrays could be designed to have almost ideal auto-ambiguity and good cross-ambiguity.A mathematical model was established for frequency hop coded waveforms and the conditions for orthogonal sub-pulse were given.The auto-and cross-correlation properties of Costas arrays were illuminated,the practical properties of cross-correlation function of permutation matrices were revealed,the algorithms for computing ambiguity function were presented and the simulation results were demonstrated.After a study of the cross-ambiguity properties of Costas arrays the ways were suggested to reduce interference in a multiuser radar system.…”
Get full text
Article -
34626
Machines de théâtre et théâtres-machines des années 1960-1970
Published 2024-07-01“…In 1961, at a conference held at Royaumont, the painter and set designer Rene Allio announced a principle which has become a rule, that of the theatre ‘as an instrument’. …”
Get full text
Article -
34627
Openstack authentication protocol based on digital certificate
Published 2019-02-01“…As the industry standard for open source cloud platforms,openstack uses the single-factor authentication method based on username and password that provides by keystone components to identity authentication mechanism,while it is not suitable for application scenarios with high security level requirements.A digital certificate-based identity authentication protocol which had cloud user identification protocol and authentication protocol was designed to meet the requirements.With expending the keystone component to achieve a digital certificate-based identity authentication system,a combination of authentication server,UKey technology,encryption technology and well-established key management and so on was used.According to the research,the system can effectively resist multiple cyber-attacks and improve the security of cloud users when they log in to the cloud platform.…”
Get full text
Article -
34628
Serine Proteases of Malaria Parasite Plasmodium falciparum: Potential as Antimalarial Drug Targets
Published 2014-01-01“…Malarial proteases are a group of molecules that serve as potential drug targets because of their essentiality for parasite life cycle stages and feasibility of designing specific inhibitors against them. Proteases belonging to various mechanistic classes are found in P. falciparum, of which serine proteases are of particular interest due to their involvement in parasite-specific processes of egress and invasion. …”
Get full text
Article -
34629
Common Freshwater Fish Parasites Pictorial Guide: Sessile Ciliates
Published 2005-08-01“… This publication is one in a series of pictorial guides that is designed to assist in the identification of common freshwater fish parasites. …”
Get full text
Article -
34630
Common Freshwater Fish Parasites Pictorial Guide: Digenean Trematodes
Published 2005-08-01“… This publication is one in a series of pictorial guides that is designed to assist in the identification of common freshwater fish parasites. …”
Get full text
Article -
34631
Modal Analysis of Aero-spiral Bevel Gear with Considering Temperature Field Action
Published 2021-11-01“…It is necessary to consider the modal condition with the temperature field in designing early. Based on the traditional linear modal theory,the modal analysis model of aero-spiral bevel gears is established,what is considering the influence of rotational speed and temperature field on the stiffness. …”
Get full text
Article -
34632
Handbook of Florida Water Regulation: Private Regulation
Published 2019-05-01“… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
Get full text
Article -
34633
Study on the Meshing Mechanism of Hy-Vo Silent Chain System
Published 2016-01-01“…According to the meshing mechanism of chain plate and sprocket,two kinds of plate with different meshing mechanism(inner-outer compound meshing and outer meshing) are designed. According to the six different plate connection orders,the dynamics simulation models of Hy-Vo silent chain system are built and simplified,and load and driving function are added to the models. …”
Get full text
Article -
34634
Ko Tae Mun, Ko Chung Hee, and the Osaka Family Origins of North Korean Successor Kim Jong Un
Published 2011-01-01“…The following article by Kokita Kiyohito, on the family origins of Kim Jong Un, the leader designate of North Korea, is illuminating above all for the language, assumptions and treatment of issues related to North Korea in contemporary Japanese media, including the Asahi. …”
Get full text
Article -
34635
QML: a hybrid spatial index structure
Published 2021-12-01“…In order to enrich the functionalities of existing learned multidimensional indexes and improve the efficiency, the dynamic data segmentation algorithm DDSA was proposed, which could preserve the data distribution characteristics.A hybrid spatial index was constructed by combining the QuadTree and Z-order curve (QML).The range query algorithm were designed and KNN query algorithm respectively.The proposed index allowed flexible fast queries and updates with preserving the characteristics of data distribution.Experimental results show that QML optimizes the query efficiency on the premise of achieving rich functionalities, and the time complexity of data update is O(1).Compared with R*-tree, the storage consumption of QML is reduced by about 33%, and the update efficiency is improved by 40%~80% .The query efficiency is similar to the optimal tree Index.…”
Get full text
Article -
34636
Handbook of Florida Water Regulation: Appendix
Published 2019-05-01“… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
Get full text
Article -
34637
Research on active defense application based on honeypot
Published 2018-01-01“…Abstract:With the rapid development of financial information technology,cyber security events on the financial system have also increased greatly.Active defense plays an important role in improving the defense level of defined private network.How to quickly and effectively deploy and apply honeypot to capture and attack behavior,analyze the attack intention and raise the threshold of attack is the key to ensure the security of the defined private network.From the perspective of active defense,the advantage of honeypot active defense was analyzed,an active defense and defense filling passive defense integration was designed,and a honeypot within private network experimental environment was set up,the results show that the active defense technology can effectively improve the threshold of the attacker's attack,so as to improve the security level of the whole network.…”
Get full text
Article -
34638
Demagnetizer Frequency Converter
Published 2009-06-01“…The paper considers a power scheme and a control system of two-member frequency converter with voltage inverter which is designed for power supply of a bearing ring demagnetizer inductor. …”
Get full text
Article -
34639
La montagne artificielle : une nouvelle forme artialisée de la nature ?
Published 2017-06-01“…From a corpus of about forty realizations, real and imaginary, this paper studies how the designers of artificial mountains, mainly architects, are inspired by landscape models to introduce this mountainous nature into cities, but also how they are reinventing the idea of “the mountain”, by introducing new aesthetics and new features into renewed urban contexts.…”
Get full text
Article -
34640
Carrier-grade NTP clock synchronization scheme of SD-WAN network
Published 2022-08-01“…SD-WAN is developing rapidly, and telecom operators and Internet companies are constantly expanding their layout.As a technology with diverse forms, SD-WAN has not made a clear specification for clock synchronization.The importance of clock synchronization to SD-WAN technology implementation and business running was analyzed.The advantages and disadvantages of the clock synchronization scheme of Internet public NTP service widely used in SD-WAN realizations were sketched.Thus the clock synchronization scheme of self-built NTP service in different scenarios was discussed.Furthermore, a clock synchronization method using management tunnel to transmit encrypted NTP synchronization data was designed, which made SD-WAN platform and devices obtain higher security and stability in time synchronization.…”
Get full text
Article