Showing 35,201 - 35,220 results of 46,768 for search '"Design"', query time: 0.16s Refine Results
  1. 35201

    A Protocol for Diagnosis and Management of Aortic Atherosclerosis in Cardiac Surgery Patients by Wouter W. Jansen Klomp, George J. Brandon Bravo Bruinsma, Arnoud W. J. Van ’t Hof, Jan G. Grandjean, Arno P. Nierich

    Published 2017-01-01
    “…At the time of clinical implementation and validation, we did not yet standardize the indications for modified TEE and the changes in patient management in the presence of aortic atherosclerosis. Therefore, we designed a protocol, which combined the diagnosis of atherosclerosis of thoracic aorta and the subsequent considerations with respect to the intraoperative management and provides a systematic approach to reduce the risk of cerebral complications.…”
    Get full text
    Article
  2. 35202

    Power Flow Analysis of the Main Reducing Gear of Coaxial Counter-rotating High-speed Helicopter by Zhang Shifei, Chen Peng, Wu Wenmin, Xia Fuchun, Liu Lei

    Published 2018-01-01
    “…A mechanism scheme of main reducing gear of coaxial counter-rotating high-speed helicopter is studied,and a rapid evaluation on the gear power flow for designers is provided. Firstly,the unite analysis method of gear is introduced into the analysis of the helicopter main reducing gear,and the mathematical model of gear is built. …”
    Get full text
    Article
  3. 35203

    Self-defence model of SIP proxy server for against DoS attack by ZHANG Zhao-xin, DU Yue-jin, LI Bin, ZHANG Hong-li

    Published 2009-01-01
    “…Through deeply analyzing on the principle,mode,character of DoS,and the DoS attack faced by SIP network,combining with the idea of Client Puzzle,DFA,long-distance linkage,host linkagethe,the character of SIP network,and the principle of SIP proxy server,the defence model of SIP proxy server for DoS attack was put forward,and the testbed to test the ability of this model to resist DoS attack was designed.The experiment result proves that this model can effectively resist the DoS attack for SIP proxy server with millisecond delay of signal transfer,and improves the usablity of SIP network.…”
    Get full text
    Article
  4. 35204

    Privacy Protection for Personal Health Device Communication and Healthcare Building Applications by Soon Seok Kim, Yong Hee Lee, Jong Mo Kim, Deok Seok Seo, Gwang Hee Kim, Yoon Seok Shin

    Published 2014-01-01
    “…As the suggested method is designed to conform with ISO/IEEE 11073-20601, which is the international standard, interoperability with various health devices was considered. …”
    Get full text
    Article
  5. 35205

    Comparison Analysis of Single Loop Resonator Based Miniaturized Triple-Band Planar Monopole Antennas by Kaimin Wu, Yongjun Huang, Ruiming Wen, Jian Li, Guangjun Wen

    Published 2015-01-01
    “…Numerical and experimental methods are performed to demonstrate and discuss the proposed designs.…”
    Get full text
    Article
  6. 35206

    Mechanism Analysis and Experimental Study on Friction Noise of Vehicle V-ribbed Belt by Wusheng Tang, Kai Ning, Yaochen Shi, Xuelian Yu

    Published 2020-01-01
    “…The vibration and noise of V-ribbed belt transmission are measured on the designed vibration and noise test bench. The experimental results show that,the fluctuation of tension force results in low frequency vibration noise of V-ribbed belt, and the viscoelastic sliding between belt and pulley results in high frequency friction noise.…”
    Get full text
    Article
  7. 35207

    Research on mapping method of logical carrying network across multiple domains by Min ZHANG, Chun-ming WU, Bin WANG, Ming JIANG

    Published 2012-08-01
    “…In order to solve the mapping problem of logical carrying network across multiple domains,a hierarchical linear program model was presented,which aims to minimize the cost of mapping.Based on this model,a mapping algorithm for logical carrying network across multiple domains was designed using primal decomposition and subgradient optimization technique.The correctness of this method was proved by theoretical analysis,and the validity of the proposed method was assessed by a collection of numerical simulation experiments through the performance of convergence and runtime,as well as mapping request acceptance ratio and revenue in a dynamical network environment.…”
    Get full text
    Article
  8. 35208

    The analysis of operability of dilatometric microthruster with polymer working components by M. V. Smagin, E. E. Kolyagin, I. S. Vavilov

    Published 2023-12-01
    “…The study of the device's operability with low power consumption is carried out. It is based on the designed prototype of the thruster in vacuum conditions. …”
    Get full text
    Article
  9. 35209

    Provable security EPC information service communication scheme for EPC network by Jing-feng LI, Heng PAN, Wei-feng GUO

    Published 2013-08-01
    “…To resolve the security drawbacks of EPC information services, a provable security EPC information service communication scheme—ESCM was designed. By using some cryptographic mechanisms such as the digital signature and the message authentication code, the ESCM could implement mutual authentication and session key agreement be-tween the EPC Information service servers and querying application belonging to a different trust domain. …”
    Get full text
    Article
  10. 35210

    Sampling Plan Using Process Loss Index Using Multiple Dependent State Sampling Under Neutrosophic Statistics by Muhammad Aslam, Muhammad Azam, Mohammed Albassam

    Published 2019-01-01
    “…This paper presents the designing of a sampling plan using the process loss consideration for the multiple dependent state sampling under the neutrosophic statistics. …”
    Get full text
    Article
  11. 35211

    A Narrative Review on Microbial Response to Antibiotic Stress: Mechanisms of Resistance and Adaptation by Nazia Khan

    Published 2025-01-01
    “…Understanding these processes is crucial for developing strategies to combat antibiotic resistance and designing next-generation antimicrobial therapies.…”
    Get full text
    Article
  12. 35212

    MANAJEMEN PEMBELAJARAN BAHASA INGGRIS PADA PROGRAM PENDIDIKAN KESETARAAN PAKET C by Leonardus Yesino, Pina Dewi Apiyanti, Dadan Budiman, Saepudin Zuhri, Ricky Yoseptry, Yosal Iriantara

    Published 2025-02-01
    “…The results indicate that the management of learning includes planning based on a flexible curriculum, implementation using interactive and contextual methods, and formative and summative evaluations. The learning is designed to enhance the communication skills of the participants. …”
    Get full text
    Article
  13. 35213

    Florida 4-H Horse Member Advancement Program Level III by Edward L. Johnson, R. L. Horton, Nancy Johnson

    Published 2003-08-01
    “… This program is designed to help members improve their understanding of horses and horse care, advance their skills in riding and handling horses, provide goals for leading, make their 4-H horse experiences more interesting and enjoyable, and let them progress at their own speeds while challenging them to keep working to become better horsemen and 4-H members. …”
    Get full text
    Article
  14. 35214

    Mosquées algériennes et expérimentations architecturales. Une législation en cours by Dalila Senhadji

    Published 2017-06-01
    “…We will analyze the process of designing and building the place of worship. This includes identifying the actors involved and the project manager, decrypting the administrative procedures Department of Religious Affairs, to understand the architectural choices.…”
    Get full text
    Article
  15. 35215

    Developing SMART Goals for Your Organization by Henry M. Cothran, Allen F. Wysocki

    Published 2005-12-01
    “…This publication is designed to introduce a sequential process for setting goals. …”
    Get full text
    Article
  16. 35216

    An Embedded Laser Marking Controller Based on ARM and FPGA Processors by Wang Dongyun, Ye Xinpiao

    Published 2014-01-01
    “…Based on the principle of laser galvanometer scanning marking, the hardware and software were designed for the application. Experiments showed that this new embedded laser marking controller controls the galvanometers synchronously and could achieve precise marking.…”
    Get full text
    Article
  17. 35217

    A method of SQL access logs pretreatment for power business system by Weiwei LI, Tao ZHANG, Yuanyuan MA, Cheng ZHOU

    Published 2015-12-01
    “…With the development of smart grid interactive,the database interaction between the information inside and outside is increasing.A method of SQL access log compression for power business system to respond to the demand of database security audit for the power system was designed in detail.This method can realize the compression of SQL access log and have the function of simple classification for SQL logs.The test results show that the method can achieve a large margin compression of SQL access logs and meet the requirements of log preprocessing for the database behavior audit of power business system.…”
    Get full text
    Article
  18. 35218

    Research on relay related handover security in LTE-A by Hao WU, Tao WANG, Shao-bo WU

    Published 2013-08-01
    “…With those solutions, mobile users in the network can communicate effectively after the handover proc-ess. The designed process was also analyzed by using Petri network model. …”
    Get full text
    Article
  19. 35219

    High-Sensitivity Biosensor-Based Enhanced SPR by ZnO/MoS2 Nanowires Array Layer with Graphene Oxide Nanosheet by Shiliang Guo, Xiaogang Wu, Zhiquan Li, Kai Tong

    Published 2020-01-01
    “…A novel SPR biosensor that can achieve a high sensitivity is proposed; therefore, a new prism coupling structure based on metal nanowires array layer is designed in this paper. The thickness of each medium layer for the structure is analyzed to obtain the optimal SPR spectrum, by the finite element method, so that the sensitivity is able to be enhanced greatly. …”
    Get full text
    Article
  20. 35220

    In Search of Lemko Values. Culturemes of the Names of Values Based on Selected Folklore Texts of the Lemkos by Tomasz Kwoka

    Published 2024-12-01
    “…The culturemes identified by the author (God, church, work, land, forests, cottage, poverty, longing, injustice) are strongly value-laden, designating the elements of the surrounding world which were, have been, and still are important for the Lemko community in Poland. …”
    Get full text
    Article