Showing 34,621 - 34,640 results of 44,324 for search '"Design"', query time: 0.13s Refine Results
  1. 34621

    Un processus d’enquête à l’université par la narration professionnelle by Simon Mallard

    Published 2019-06-01
    “…The article also promotes the description and the analysis of both convergences and tensions between the actors’ initiatives in the system (designers, trainers, and teachers in training device).Narrative work appears prominent in this system by promoting dialogue around the profession of teacher in a professional and technological High School. …”
    Get full text
    Article
  2. 34622

    « Gettiamo la semente comunista fra le donne proletarie » : Compagna et la révolution by Barbara Meazzi

    Published 2021-07-01
    “…Compagna, a four-page, four-column magazine, first appeared in Rome on 5 March 1922. It was designed to be the platform of the central office of the Communist Party of Italy, a forum for use by women: workers, housewives, labourers and proletarians. …”
    Get full text
    Article
  3. 34623

    AVALIAÇÃO DO DESEMPENHO DO LAYOUT E DA SINALIZAÇÃO DE UMA UNIDADE HOSPITALAR by Márcia Rangel, Claudia Mont’Alvão

    Published 2011-01-01
    “…Esse olhar da ergonomia visa contribuir com o trabalho dos arquitetos e designers para a projetação de ambientes, cada vez mais, adequados às necessidades reais de seus usuários.…”
    Get full text
    Article
  4. 34624

    Quality analysis method of Web browsing based on big data by Weihua CHENG, Xiaorong HE

    Published 2020-11-01
    “…The traditional network operation and maintenance often focuses on the operation status of the network and equipment,which is difficult to solve the user's subjective perception.It is urgent to establish an end-to-end Internet application awareness management system.Focusing on the quality analysis of web browsing,the quality analysis framework and method of user perceived data based on big data technology was studied,a quality analysis system framework based on big data technology was designed and proposed,which was used to realize the quality analysis of Internet business.Taking an international website as an example,a diagnosis method of "two looks and five cuts" was proposed to delimit and trace the cause,which improves the efficiency of manual analysis and verifies the effectiveness of the proposed method.…”
    Get full text
    Article
  5. 34625

    Application study of Costas arrays in multiuser radar systems by YAO Jian-guo1, HUANG Qing2

    Published 2010-01-01
    “…The construction and performance of frequency hopping codes were discussed but the emphasis was laid on the construction of Costas arrays.The frequency hopping codes called Costas arrays could be designed to have almost ideal auto-ambiguity and good cross-ambiguity.A mathematical model was established for frequency hop coded waveforms and the conditions for orthogonal sub-pulse were given.The auto-and cross-correlation properties of Costas arrays were illuminated,the practical properties of cross-correlation function of permutation matrices were revealed,the algorithms for computing ambiguity function were presented and the simulation results were demonstrated.After a study of the cross-ambiguity properties of Costas arrays the ways were suggested to reduce interference in a multiuser radar system.…”
    Get full text
    Article
  6. 34626

    Machines de théâtre et théâtres-machines des années 1960-1970 by Sandrine Dubouilh

    Published 2024-07-01
    “…In 1961, at a conference held at Royaumont, the painter and set designer Rene Allio announced a principle which has become a rule, that of the theatre ‘as an instrument’. …”
    Get full text
    Article
  7. 34627

    Openstack authentication protocol based on digital certificate by Zhiqiang ZHU, Renhao LIN, Cuiyun HU

    Published 2019-02-01
    “…As the industry standard for open source cloud platforms,openstack uses the single-factor authentication method based on username and password that provides by keystone components to identity authentication mechanism,while it is not suitable for application scenarios with high security level requirements.A digital certificate-based identity authentication protocol which had cloud user identification protocol and authentication protocol was designed to meet the requirements.With expending the keystone component to achieve a digital certificate-based identity authentication system,a combination of authentication server,UKey technology,encryption technology and well-established key management and so on was used.According to the research,the system can effectively resist multiple cyber-attacks and improve the security of cloud users when they log in to the cloud platform.…”
    Get full text
    Article
  8. 34628

    Serine Proteases of Malaria Parasite Plasmodium falciparum: Potential as Antimalarial Drug Targets by Asrar Alam

    Published 2014-01-01
    “…Malarial proteases are a group of molecules that serve as potential drug targets because of their essentiality for parasite life cycle stages and feasibility of designing specific inhibitors against them. Proteases belonging to various mechanistic classes are found in P. falciparum, of which serine proteases are of particular interest due to their involvement in parasite-specific processes of egress and invasion. …”
    Get full text
    Article
  9. 34629

    Common Freshwater Fish Parasites Pictorial Guide: Sessile Ciliates by Deborah B. Pouder, Eric W. Curtis, Roy P. Yanong

    Published 2005-08-01
    “… This publication is one in a series of pictorial guides that is designed to assist in the identification of common freshwater fish parasites. …”
    Get full text
    Article
  10. 34630

    Common Freshwater Fish Parasites Pictorial Guide: Digenean Trematodes by Deborah B. Pouder, Eric W. Curtis, Roy P. Yanong

    Published 2005-08-01
    “… This publication is one in a series of pictorial guides that is designed to assist in the identification of common freshwater fish parasites. …”
    Get full text
    Article
  11. 34631

    Modal Analysis of Aero-spiral Bevel Gear with Considering Temperature Field Action by Wentao Yu, Shijun Liu, Wenbo Xu, Hongtao Huang, Feng Wang

    Published 2021-11-01
    “…It is necessary to consider the modal condition with the temperature field in designing early. Based on the traditional linear modal theory,the modal analysis model of aero-spiral bevel gears is established,what is considering the influence of rotational speed and temperature field on the stiffness. …”
    Get full text
    Article
  12. 34632

    Handbook of Florida Water Regulation: Private Regulation by Michael T. Olexa, Luke D'Isernia, Laura Minton, Dulcy Miller, Sarah Corbett

    Published 2019-05-01
    “… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
    Get full text
    Article
  13. 34633

    Study on the Meshing Mechanism of Hy-Vo Silent Chain System by Cheng Yabing, Wang Xiaopeng, Liu Huan

    Published 2016-01-01
    “…According to the meshing mechanism of chain plate and sprocket,two kinds of plate with different meshing mechanism(inner-outer compound meshing and outer meshing) are designed. According to the six different plate connection orders,the dynamics simulation models of Hy-Vo silent chain system are built and simplified,and load and driving function are added to the models. …”
    Get full text
    Article
  14. 34634

    Ko Tae Mun, Ko Chung Hee, and the Osaka Family Origins of North Korean Successor Kim Jong Un by Kokita Kiyohito, Mark Selden, Tessa Morris-Suzuki

    Published 2011-01-01
    “…The following article by Kokita Kiyohito, on the family origins of Kim Jong Un, the leader designate of North Korea, is illuminating above all for the language, assumptions and treatment of issues related to North Korea in contemporary Japanese media, including the Asahi. …”
    Get full text
    Article
  15. 34635

    QML: a hybrid spatial index structure by Dong CUI, Qiaoyan WEN, Hua ZHANG, Huawei WANG

    Published 2021-12-01
    “…In order to enrich the functionalities of existing learned multidimensional indexes and improve the efficiency, the dynamic data segmentation algorithm DDSA was proposed, which could preserve the data distribution characteristics.A hybrid spatial index was constructed by combining the QuadTree and Z-order curve (QML).The range query algorithm were designed and KNN query algorithm respectively.The proposed index allowed flexible fast queries and updates with preserving the characteristics of data distribution.Experimental results show that QML optimizes the query efficiency on the premise of achieving rich functionalities, and the time complexity of data update is O(1).Compared with R*-tree, the storage consumption of QML is reduced by about 33%, and the update efficiency is improved by 40%~80% .The query efficiency is similar to the optimal tree Index.…”
    Get full text
    Article
  16. 34636

    Handbook of Florida Water Regulation: Appendix by Michael T. Olexa, Luke D'Isernia, Laura Minton, Dulcy Miller, Sarah Corbett

    Published 2019-05-01
    “… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
    Get full text
    Article
  17. 34637

    Research on active defense application based on honeypot by Dequan YANG, Weimin LIU, Zhou YU

    Published 2018-01-01
    “…Abstract:With the rapid development of financial information technology,cyber security events on the financial system have also increased greatly.Active defense plays an important role in improving the defense level of defined private network.How to quickly and effectively deploy and apply honeypot to capture and attack behavior,analyze the attack intention and raise the threshold of attack is the key to ensure the security of the defined private network.From the perspective of active defense,the advantage of honeypot active defense was analyzed,an active defense and defense filling passive defense integration was designed,and a honeypot within private network experimental environment was set up,the results show that the active defense technology can effectively improve the threshold of the attacker's attack,so as to improve the security level of the whole network.…”
    Get full text
    Article
  18. 34638

    Demagnetizer Frequency Converter by G. I. Goulkov, A. A. Migdalionok, Rashid Shaibi

    Published 2009-06-01
    “…The paper considers a power scheme and a control system of  two-member frequency converter with voltage inverter which is designed for power supply of a bearing ring demagnetizer inductor. …”
    Get full text
    Article
  19. 34639

    La montagne artificielle : une nouvelle forme artialisée de la nature ? by Claire Portal

    Published 2017-06-01
    “…From a corpus of about forty realizations, real and imaginary, this paper studies how the designers of artificial mountains, mainly architects, are inspired by landscape models to introduce this mountainous nature into cities, but also how they are reinventing the idea of “the mountain”, by introducing new aesthetics and new features into renewed urban contexts.…”
    Get full text
    Article
  20. 34640

    Carrier-grade NTP clock synchronization scheme of SD-WAN network by Qiangen ZHAO, Yu WANG, Ling TANG, Yongming YAN

    Published 2022-08-01
    “…SD-WAN is developing rapidly, and telecom operators and Internet companies are constantly expanding their layout.As a technology with diverse forms, SD-WAN has not made a clear specification for clock synchronization.The importance of clock synchronization to SD-WAN technology implementation and business running was analyzed.The advantages and disadvantages of the clock synchronization scheme of Internet public NTP service widely used in SD-WAN realizations were sketched.Thus the clock synchronization scheme of self-built NTP service in different scenarios was discussed.Furthermore, a clock synchronization method using management tunnel to transmit encrypted NTP synchronization data was designed, which made SD-WAN platform and devices obtain higher security and stability in time synchronization.…”
    Get full text
    Article