Showing 35,381 - 35,400 results of 46,768 for search '"Design"', query time: 1.01s Refine Results
  1. 35381

    New type of hot spot cluster centered positioning algorithm and its application by Shao-wu ZHOU, Bo-wei HUANG, Zhao-fu ZENG, Ming-hui ZHOU, Jie ZHAN

    Published 2012-05-01
    “…Considering the facts that the personnel orientation in the coal mine was difficult,and the existing algorithm is of high fixed position error,a new algorithm of hot spot cluster centered positioning for terrain underground in the coal mine was designed.The locations of moving nodes in po ion area were classified by using the RSSI,and the blind spots problems of positioning,which was not explained by the locating method mentioned in the existing literatures,was solved efficiently by means of new algorithm.Besides,the algorithm improved the real time performance and the accuracy of positioning.The validity of new algorithm was verified by the result of numerical simulation and experiment.…”
    Get full text
    Article
  2. 35382

    COVID-19 – a new challenge for the medical community by D. Valančius, V. Kasiulevičius

    Published 2020-06-01
    “…The virus that causes COVID-19 is designated severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). …”
    Get full text
    Article
  3. 35383

    Group-scheduling mechanism for large-scale time-sensitive network by Xuesong QIU, Xuchuan HUANG, Wencui LI, Wenjing LI, Shaoyong GUO

    Published 2020-11-01
    “…In order to achieve the deterministic delay of time-triggered traffic in a large-scale time-sensitive network,a kind of group-scheduling mechanism was proposed.By designing a topology pruning strategy and a flow grouping strategy based on spectral clustering,the impact of the rapid increase in network topology scale and traffic scale on the speed of scheduling response was avoided,and the scheduling calculation efficiency was improved.The results of experiment show that the mechanism can solve the model in a relatively short time for large-scale scheduling problem and achieve a relatively high scheduling success rate.…”
    Get full text
    Article
  4. 35384

    MP2P high capacity and security resource node selection strategy based on Bayesian game by Yan LIU, yin ZHANGGuo, zhou HEJin, Feng XU

    Published 2016-01-01
    “…Firstly, the safety resource calculation method was designed that takes the node capability and the node reputa-tion into consideration. …”
    Get full text
    Article
  5. 35385

    Evolving multicast tree based artificial fish swarm algorithm by Xuan MA, Qing LIU

    Published 2012-09-01
    “…An artificial fish swarm algorithm with two regions model was proposed.The algorithm used a multicast tree formed by the predecessor orientation method to represent an artificial fish,and divided the search space into feasible re-gion and infeasible region.The artificial fishes in the feasible region and the infeasible region were given different mov-ing objectives,respectively.The behavior operator was designed to adaptively implement four behaviors of artificial fish.Experimental results show that the proposed algorithm can effectively make use of the infeasible individuals and per-forms better in searching least-cost multicast tree with delay constraint.…”
    Get full text
    Article
  6. 35386

    Exemplary Youth Leadership Series: Model the Way by Megan Stein

    Published 2019-11-01
    “… This publication series is designed to outline strategies and experiences to expose youth to and engage them with leadership concepts. …”
    Get full text
    Article
  7. 35387

    Bilan du programme autrichien de recherche sur les paysages by Karolina Begusch-Pfefferkorn

    Published 2008-06-01
    “…Landscapes and regions were to be explored from different angles; implementing the research findings was to be part of the research work. The programme was designed to make room for science open to society, for unconventional ideas, methods, and courses of action. …”
    Get full text
    Article
  8. 35388

    Performance study on a novel VBLAST modulation scheme under SUC detection by JIANG Zhan-jun, PAN Wen, WANG Yan, YOU Xiao-hu

    Published 2009-01-01
    “…A new modulation scheme was proposed to deal with the error propagation(EP) existing during the successive cancellation(SUC) detection in the VBLAST(vertical Bell labs layered space-time) system.In the scheme,the former demodulated signal was designed to use the modulation with better noise suppression performance(e.g.binary phase shift keying modulation),and the latter demodulated signal was suggested to employ the modulation with higher frequency ef-ficiency(e.g.multi-decimal modulations).Analysis and simulation results show that system reliability for SUC detection is improved without penalty to the system availability.…”
    Get full text
    Article
  9. 35389

    Liver Cell Death: Update on Apoptosis by Marc Bilodeau

    Published 2003-01-01
    “…The recognition that apoptosis can be modulated by the cell itself or by the extracellular environment has given hope that treatments can be designed to modify the evolution of disease. This article presents an overview of this important phenomenon, as well as models of hepatocyte apoptosis and goals of current research. …”
    Get full text
    Article
  10. 35390

    UF/IFAS Nutrient Management Series: Computational Tools for Field Implementation of the Florida Phosphorus Index - Okeechobee Watershed Area by G. Wade Hurt, Rao S. Mylavarapu, S. P. Boetger

    Published 2006-06-01
    “…Boetger, provides many tables with numerical values for each of the various factors listed in the Florida P Index to be used in computations to aid planners in designing conservation plans related to land application of animal wastes. …”
    Get full text
    Article
  11. 35391

    Stability analysis of discrete-time switched systems with bipartite PDT switching by Qiang Yu, Xiujuan Jiang

    Published 2024-11-01
    “…Next, the stabilizing controllers for discrete-time switched-controlled systems are designed. Finally, we give a practical example to show the effectiveness of the conclusions and less conservatism than those based on the persistent dwell-time switching.…”
    Get full text
    Article
  12. 35392

    10 Common Palms of the Tampa Bay Area by Gitta Hasing, Andrew K. Koeser, Melissa H. Friedman, Timothy K. Broschat

    Published 2016-08-01
    “… Palms often serve as key specimens in urban landscape designs. Despite this, their identity is often unknown to Florida’s new, seasonal, and even long-term residents. …”
    Get full text
    Article
  13. 35393

    Load Contact Analysis and Strength Calculation of Spur Gear by Wang Yunzhi

    Published 2016-01-01
    “…Finally,a software of meshing analysis and modification designing of spur gear tooth flank is developed based on the MATLAB language.…”
    Get full text
    Article
  14. 35394

    New low-earth orbit satellites authentication and group key agreement protocol by Zijian ZHANG, Qi ZHOU, Chuan ZHANG, Xiaoyao TONG, Chunlei LI, Long WANG

    Published 2018-06-01
    “…Due to the function of communication and continuous monitoring,the low-earth orbit satellites are widely used in the aerospace field.However,there is no special authentication protocol in the existing satellite communication system.In order to solve this problem,a lightweight authentication protocol which considering the switch of communication path in the authentication process was designed for the low-earth orbit satellites,and the proposed protocol was verified by simulation and compared with the 3GPP AKA protocol.The simulation results show that the protocol has a 20% higher efficiency than 3GPP AKA protocol,and the spend of group key agreement protocol is about 300 ms.…”
    Get full text
    Article
  15. 35395

    Research on SDN based network virtualization platform and its isolation by Kai ZHANG, Xiaofeng QIU, Xinning ZHU

    Published 2016-09-01
    “…The rapid development of cloud computing has recently prompted extensive application of visualization in enterprise-level environments.In addition to server and storage virtualization,network virtualization attracts more and more attention with the application of SDN and OpenFlow.Therewith,software-defined network platforms designed for network virtualization were presented.Firstly,the objectives of the SDN based network virtualization platform were analyzed.Subsequently,the system architectures and principles of four typical network virtualization platforms based on SDN were compared.At last,the safety and isolation mechanism provided by the network virtualization platforms were investigated.…”
    Get full text
    Article
  16. 35396

    Evaluating climatic vulnerability in India: Moving from risk to resilience by Nikam Rahul J, Arunachalam Kantha Deivi, Mayani Suranjana V., Bhattacharya Debleena, Mayani Vishal J., Sharma Archana

    Published 2025-01-01
    “…Assessments of Climate Vulnerability and Risk are crucial for designing adaptation strategies and identifying vulnerable locations and individuals. …”
    Get full text
    Article
  17. 35397

    Investigation of Sliding Mode Control in the Nonlinear Modeling of Cordless Jigsaws by Sándor Apáti, György Hegedűs, Sándor Hajdu, Péter Korondi

    Published 2025-01-01
    “…The aim of this paper was to reduce the current spikes in battery-powered saw motors by designing and implementing a sliding mode model-following adaptive controller. …”
    Get full text
    Article
  18. 35398

    Aeronautical Ad Hoc network node failure analysis method by Lixia XIE, Liping YAN, Hongyu YANG

    Published 2021-12-01
    “…To analyze the stability changes of aeronautical ad hoc network (AANET) caused by node failure affecting reaction effectively, an AANET node failure analysis method was proposed.Firstly, the model of business-entity asymmetric dependent network was established based on the characteristics of AANET.Secondly, an improved failure traffic redistribution algorithm was designed to obtain the affected node set.Finally, the AANET affecting impact value was calculated according to the node weight, then the affecting impact degree was determined.The experimental results show that the proposed method has better accuracy in the failure affecting impact analysis of AANET.…”
    Get full text
    Article
  19. 35399

    Optimization of multiple sampling for solving network boundary specification problem by Ruochen Zhang

    Published 2025-02-01
    “…Abstract Missing data caused by boundary specification has a detrimental effect on the analysis of network structures, and designing optimal sampling methods is crucial for conducting network investigations. …”
    Get full text
    Article
  20. 35400

    Budget Template for Home Canning by Kevin Athearn, Amarat Simonne, Soohyoun Ahn

    Published 2018-03-01
    “…Athearn, Amarat Simonne, and Soohyoun Ahn and published by the UF/IFAS Food and Resource Economics Department presents a template designed to assist you in estimating the cost and potential returns from canning food at home. …”
    Get full text
    Article