Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
35181
Synthesis and Properties of Sulfhydryl-Reactive Near-Infrared Cyanine Fluorochromes for Fluorescence Imaging
Published 2003-04-01“…Each fluorochrome was designed to contain an iodoacetamido group that reacts specifically with sulfhydryl-containing molecules. …”
Get full text
Article -
35182
Changing the Narrative Language of Prosperity in Africa
Published 2021-12-01“…However, a new emphasis on prosperity since the 1980s characterized a part of the African independent church movement with affinities to Pentecostal worship practices, designated as the Neo-Pentecostal movement. The research question for this article is why the narrative language of prosperity within the Pentecostal context changed in Africa and how the damages that it caused can be reversed, and the answer is found in hermeneutical challenges and solutions. …”
Get full text
Article -
35183
Breast Cancer: When the Woman You Love Has Breast Cancer
Published 2007-03-01“…FCS8826, a 3-page fact sheet by Martha Monroe, Barbara Shea, and Linda Bobroff, is designed to help partners of people who have been diagnosed with breast cancer. …”
Get full text
Article -
35184
Neural Sliding Mode Adaptive PD Tracking Control of Omnidirectional Mobile Robots
Published 2023-11-01“…Secondly, the backstepping trajectory tracking controller is used to obtain the virtual velocity, and the PD controller is designed based on the error between the virtual input and the actual input. …”
Get full text
Article -
35185
Analysis on network scheme and resolution test of SDN/NFV technology co-deployed in cloud datacenter
Published 2016-01-01“…Traditional datacenters have been heavily impacted due to the development and large-scale deployment of cloud computing technology.Co-deployment of SDN and NFV technology shows its distinct advantages of vitualizing network resources in the scenario of cloud datacenter.Resolution tests aiming at co-deployment of SDN and NFV have directive significance.According to the resolution test,SDN and NFV technology were matured already for the commercial deployment in operators' network.Further research needs to be focused on the key problems found out in scheme designing and the resolution test.…”
Get full text
Article -
35186
Migraciones y teatro: conformación de un nuevo mapa teatral cubano, más allá de la insularidad palpable
Published 2009-12-01“…Cuban migration to Europe and America (North, Central and South) has designed a creative and pedagogical map that expands its original theatrical geography into the new “lived spaces” (Ortiz & Mendoza) -sometimes these being bilingual spaces. …”
Get full text
Article -
35187
Finite-Time Distributed Energy-to-Peak Control for Uncertain Multiagent Systems
Published 2014-01-01“…A sufficient condition for the existence of the designed controller is given with the form of linear matrix inequalities (LMIs). …”
Get full text
Article -
35188
A Parallel ETL Tool Based on an Improved Chain-MapReduce Framework
Published 2013-12-01“…Then an improved chain-MapReduce framework was presented, based on this framework,a parallel ETL tool was designed. Several optimization rules on ETL which will make the ETL process generate less MapReduce jobs to avoid unnecessary I/O and network cost were presented. …”
Get full text
Article -
35189
Rain attenuation distribution characteristic of Ka band satellite communication
Published 2006-01-01“…Using the ITU-R rain attenuation forecasting model,and based on the rainfall data and the geographic location parameters of main cities in our country,the isograms of rain attenuation distribution for the communication satellite with the orbital location 92° E in Ka band(30/20GHz)was presentd.A further analysis was made on the rain attenuation char-acteristic of the Ka band satellite communication system by integrating with the landform and the climate distribution pattern in our country.The results could be used as the theoretical basis when designing the Ka band satellite communica-tion system.…”
Get full text
Article -
35190
Conditionnement d'une horloge de haute précision Leroy pour son transport et sa mise en réserve
Published 2014-04-01“…A storage packaging as well as a demountable light transport case was designed to ensure its long-term conservation in accordance to these specific characteristics. …”
Get full text
Article -
35191
Key security detection based on dynamic binary instrumentation
Published 2017-11-01“…For the key security problem in the cryptographic software,the method of key security detection based on dynamic binary instrumentation was proposed.Aimed at CryptoAPI cryptographic software,the method firstly pointed out the potential key security vulnerabilities by analyzing the key applying patterns of CryptoAPI.Then it recorded cryptographic data information during the execution of the program dynamically using Pin platform.On this basis,a relevance vulnerability detection algorithm was designed to detect the key security.Test result indicated that it can effectively detect the two kinds of key security vulnerabilities.…”
Get full text
Article -
35192
Mobile RFID system authentication protocol based on one-way pseudo random function
Published 2017-06-01“…Aiming at the cost,efficiency and security of mobile RFID system authentication,a mobile RFID authentication protocol based on one-way pseudo random function was designed.The protocol reduced system cost by making full use of the three party of the shared key and communication information to encrypt transmission and authentication.Through the implementation of three party authentication and key update work,the agreement suffered counterfeit,desynchronization and other attacks was avoided.Finally,the logical proof of GNY and its security and performance analysis were gived to show the feasibility and security of the new protocol.…”
Get full text
Article -
35193
Flexible Dual-Frequency Applicator for Local Hyperthermia
Published 2012-01-01“…A flexible and dual-frequency microstrip applicator for microwave local hyperthermia is described. It is designed on conformal liquid crystal polymer (LCP) substrate and operating at ISM (Industrial, Scientific and Medical) frequencies of 915 MHz and 2.45 GHz. …”
Get full text
Article -
35194
Residential Irrigation System Rainfall Shutoff Devices, or Rain Sensors
Published 2017-09-01“… Rain sensors—also called rain shutoff devices—are designed to interrupt the cycle of an automatic irrigation system controller when a specific amount of rainfall has occurred. …”
Get full text
Article -
35195
PROFESSIONAL EMPLOYMENT OF PHD PROGRAM GRADUATES AND SOME WAYS FOR IMPROVING PHD PROGRAMS
Published 2016-12-01“…The need is emphasized to study and take into account career paths of graduates and employers’ requirements when designing PhD programs of a new type.…”
Get full text
Article -
35196
ECONOMIC POTENTIAL OF FRENCH COMPANIES IN RUSSIAN ECONOMY
Published 2019-06-01“…The main obstacles to economic integration of two countries have been designated. A historical aspect of the relationship between France and Russia, causing its mutually beneficial cooperation in our days, has been considered.…”
Get full text
Article -
35197
Identification of the risks of consumer credit cooperatives
Published 2019-04-01“…Directions of reduction of risks of losses of credit consumer cooperatives have been designated. The necessity of identification of risks of credit consumer cooperatives for substantiation of strategy and tactics of cooperative development has been emphasized.…”
Get full text
Article -
35198
Cluster Anti-Synchronization of Complex Networks with Nonidentical Dynamical Nodes
Published 2012-01-01“…Based on the community structure of the networks, the controllers are designed differently between the nodes in one community that have direct connections to the nodes in other communities and the nodes without direct connections with the nodes in other communities strategy; some sufficient criteria are derived to ensure cluster anti-synchronization of the network model. …”
Get full text
Article -
35199
Performance of admission control for multi-traffic in wireless communication network base on discrete time queue
Published 2006-01-01“…An admission control scheme with priority for real-time traffic was designed, and a discrete time queue model Geo1 + Geo2/Geo1,Geo2/s,s(PP) was proposed to investigate the performance of the multi-traffic admission control scheme,which based on the wireless communication running mechanism and the variable QoS(quality of service) re- quirement of multi-traffic. …”
Get full text
Article -
35200
Un panthéon martyrial censuré par Isabelle II : enquête sur l’estampe « Víctimas de la causa popular »
Published 2023-09-01“…Particularly innovative, the lithograph « Víctimas de la causa popular », designed by Victoriano Ametller and Louis Charles Legrand, dated 1853, implements a graphic and textual discourse that is both complex and highly effective, which aims to bring together beyond of the Republican-Democratic camp. …”
Get full text
Article