Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
35241
Research on smart authentication authorization and accounting in next generation network
Published 2006-01-01“…With the fast development of Internet,there were more and more network access methods and network services.But too many accounts were inconvenient for users to perform the AAA(authentication,authorization and accounting),and many service providers hadn’t appropriate AAA mechanisms.In order to solve these problems,the smart AAA was introduced.The architecture of the smart AAA was designed,and SOAP based SAML was used to exchange security information between smart AAA and other service providers.Analysis indicates the smart AAA will provide the universal and intelligent AAA services for both users and operators.…”
Get full text
Article -
35242
Identification of Early Citrus Black Spot Symptoms (Identificacíon de los Síntomas Iniciales de la Mancha Negra de los Cítricos)
Published 2011-07-01“…This bilingual identification sheet was designed to assist packinghouse employees to identify the early yet subtle symptoms of citrus black spot. …”
Get full text
Article -
35243
Spectral clustering and embedding-enhanced POI recommendation in location-based social network
Published 2020-03-01“…In order to effectively capture the spatial characteristics of multi-dimensional context information in LBSN,and deeply explore the non-linear interaction between users and POIs,a spectral embedding enhanced POI recommendation algorithm,namely PSC-SMLP,was proposed.A preference enhanced spectral clustering algorithm (PSC) and a novel spectral embedded enhanced neural network (SMLP) was designed to solve the above problems.Compared with state-of-the-art algorithms on two datasets,PSC-SMLP has better performance in terms of the precision,recall,nDCG and mean average precision.…”
Get full text
Article -
35244
Developing SMART Goals for Your Organization
Published 2005-12-01“…This publication is designed to introduce a sequential process for setting goals. …”
Get full text
Article -
35245
45th UID Conference
Published 2024-12-01“…In three intense days of study, the two cities hosted more than 350 scholars (including professors, researchers, PhDs, designers and drafters), from Italy and as well as from other countries. …”
Get full text
Article -
35246
An associated perception import method for big data
Published 2016-03-01“…Against the background of the existing database to the large data migration,Apache introduced the Sqoop as the main tool for the relational database to the big data migration.Sqoop simply cut the data table and randomly store it on diffe rent nodes.Being aimed at the problem of low efficiency of the query of the relationship between the Hadoop,a method of data importing and preprocessing was designed.To reduce the network transmission delay and improve the performance of the system,the high correlation degree was kept in the adjacent nodes.The contrast experiment shows that the performance of the data query can be improved greatly by the same or adjacent nodes.…”
Get full text
Article -
35247
Integrated algorithm based on vectors in node localization for wireless sensor networks
Published 2008-01-01“…An integrated algorithm based on DV-hop was designed and applied to mobile nodes. A location correction vector(LCV)was constructed by the differences between estimated distances and range measurements; an improved particle swarm optimization (PSO) was used to find correction steps of nodes; location correction equaled the value of LCV multiplying step. …”
Get full text
Article -
35248
Breast Cancer: When the Woman You Love Has Breast Cancer
Published 2007-03-01“…FCS8826, a 3-page fact sheet by Martha Monroe, Barbara Shea, and Linda Bobroff, is designed to help partners of people who have been diagnosed with breast cancer. …”
Get full text
Article -
35249
Research of Client Level Framework for SaaS Software Service Based on Mass Customization
Published 2012-09-01“…According to this, the interface configuration algorithm is designed to produce data, which interacts with the terminal components to create user interface for tenants. …”
Get full text
Article -
35250
Research on Service Dynamic-Extension Mechanism Based on SOA
Published 2012-09-01“…Services pool and service dynamic extension idea are introduced to this service dynamic expansion system model, and the services are designed into the form of services pool to be called by the system, and the system realizes the service dynamic extension by administrating the resource pool. …”
Get full text
Article -
35251
Performance of CP Sugarcane Cultivars Grown in Different Locations in Florida
Published 2007-11-01“…It reports the results of a series of experiments that were designed to compare and contrast relative sugarcane cultivar performance at different locations throughout the Everglades Agricultural Area (EAA). …”
Get full text
Article -
35252
SDFAC:software defined flow access control mechanism
Published 2015-11-01“…The software defined networking paradigm decouples control plane from data plane,offering flexible centralized control and fine grain flow management.Based on these advantages,a novel software defined access control mechanism SDFAC was proposed.Firstly,an analysis of the access control model was given from the flow granularity,and the precondition for the fine-grained access control was deduced from the model.Secondly,the framework and basic working process of the SDFAC was described.The flow authentication protocol was designed to support the function of SDFAC.Finally,the experiment results prove the feasibility and availability of SDFAC.…”
Get full text
Article -
35253
Worker Protection Standard: Information at a Central Location
Published 2006-03-01“… The Agricultural Worker Protection Standard (WPS) is a federal regulation designed to protect agricultural workers (people involved in the production of agricultural plants) and pesticide handlers (people mixing, loading, or applying pesticides or doing other tasks involving direct contact with pesticides). …”
Get full text
Article -
35254
Anonymization algorithm based on time density for data stream
Published 2014-11-01“…Aim to address the problem of anonymization on data streams,an anonymization algorithm based on time density for data stream was proposed.Time weight and time density were designed for describing the data stream’s temporal,when the published clusters reach the threshold,it will delete the minimum time density cluster to ensure the availability of published clusters.Furthermore,in order to maintain the higher efficiency,the algorithm scans the data only once to satisfy the anonymization requirements for speeding up.The experimental results on the real dataset show that the algorithm is efficient and effective meanwhile the quality of the output data.…”
Get full text
Article -
35255
Fanpower and Characters’Migration
Published 2015-12-01“…The numerous platforms and online communities dedicated to fans of specific media products encourage people to unleash their creativity and produce content based on their favourite characters, occasionally even disregarding their initial context and designing for them alternative narratives or universes. …”
Get full text
Article -
35256
PHARMACEUTICAL GELS
Published 2024-10-01“…Various methods of preparations of gels have been designed by incorporating variety of polymers in dispersion mediums to meet the needs of different applications. …”
Get full text
Article -
35257
Pas de provenance sans contexte
Published 2019-12-01“…Likewise, the term used to identify the culture of the artists, ‘Sape’, does not correspond to any contemporary group using that designation.…”
Get full text
Article -
35258
Turkey Reading Culture Map.
Published 2013-11-01“…Goal of the project is defined as follows: "specifying the solutions to problems faced directly or indirectly in accessing information, making suggestions to related corporations and persons, determining the perception of libraries in the society, raising the quality of services provided at public libraries and children's libraries affiliated with the Ministry, diversifying these libraries and designating the road map for the future." Carried out with the "method of face-to-face surveys" with 6.212 people in 26 cities, the research revealed the society's habits of reading and library usage.…”
Get full text
Article -
35259
Password authentication scheme for mobile computing environment
Published 2007-01-01“…By means of IC(integrated circuit) card,RSA cryptography,and discrete logarithm,a password authentication scheme for mobile computing environment was presented.No verification tables were preserved at the server side to consolidate the security.To be applicable for the mobile computing environment,the scheme was designed as a one-roundtrip protocol to meet the computation-constraint terminals and narrow-bandwidth radio interface.Moreover,the passwords in use could be changed by users without any interaction with servers over the radio.The performance of the scheme was measured by making use of M/G/1/N queuing model and compared with that of TLS.…”
Get full text
Article -
35260
Elder Companion Overview
Published 2004-02-01“… The Elder Companion training program is designed to train persons interested in becoming employed by local service providers as sitter/companions for the elderly. …”
Get full text
Article