Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
35401
Life Prediction of AMT Shifting- gear Case based on the Real Measured Load Spectrum
Published 2016-01-01“…Through the comparison of different load spectrum stress,it is found that several measuring points are dangerous point,so that should focus on these place when designing. Combining with the fatigue damage theory,the fatigue life of target point is calculated and analyzed,and it has an important significance to improve the reliability of product.…”
Get full text
Article -
35402
Network-Aware HEFT Scheduling for Grid
Published 2014-01-01“…The original HEFT does not take care of parallel network flows while designing its schedule for a computational environment where computing nodes are physically at distant locations. …”
Get full text
Article -
35403
Single Machine Predictive Scheduling Using Inserted Idle Times
Published 2014-01-01“…Right-shift rescheduling method is used as the rescheduling strategy. Three methods are designed to construct predictive schedules. The computational experiments show that these algorithms provide high predictability with minor sacrifices in shop performance.…”
Get full text
Article -
35404
Dynamic security-empowering architecture for space-ground integration information network
Published 2021-09-01“…., the dynamic variability of threats, and the dynamic changes of protection technology) of space-ground integration information network (SGIIN), the existing security technologies were no longer applicable.Firstly, a security-empowering architecture for SGIIN was designed and formalized, which integrated capability orchestration unit of security service, analysis unit of security situation and the response unit of security threat measure.Then, a double judgment method for the effectiveness of threat measure was proposed.Finally the method is theoretically proved to be credible by using belief mini-entropy.…”
Get full text
Article -
35405
S’approprier un modèle français en Iran ? L’architecte André Godard (1881-1965) et la conception des musées iraniens
Published 2017-10-01“…The history of museums in Iran began in the second half of the nineteenth century and experienced its most significant phase in the 1930s, when the Mūze-ye Irān-e Bāstān, the national archaeological museum designed by the French architect André Godard (1881–1965), was inaugurated. …”
Get full text
Article -
35406
Cooperative Hunting Strategy with a Superior Evader Based on Differential Game
Published 2022-01-01“…Second, a cost function is designed, and the cooperative hunting strategy is developed using the distances between the centers of multiple Apollonius circles. …”
Get full text
Article -
35407
Finite automaton intrusion tolerance system model based on Markov
Published 2019-10-01“…To ensure that the system could still provide normal service for legitimate users when the LAN being invaded,a finite automaton intrusion tolerance model was designed.Based on Markov’s theory,the state transformation relationship of the service provided by the system by establishing the state transition probability matrix was described,quantified the transition state and found the key nodes in the system.The maintenance of key nodes could enhance the tolerance of the system and improve the reliability of the service.Experimental comparison shows that this model not only has strong intrusion tolerance,but also has obvious advantages in the integrity of the security system when it is invaded.…”
Get full text
Article -
35408
Leading Difficult Conversations Series #2: Preparing for the Conversation
Published 2021-02-01“… This publication series is designed to equip leaders with strategies and tactics to use when they are tasked with having a difficult conversation. …”
Get full text
Article -
35409
SSMCI:verification mechanism for security protocols centered on the attacker
Published 2017-10-01“…A automatic verification mechanism for security protocols analysis was proposed.The attacker model was proposed and the concept of ‘need’ was defined,a knowledge set which was necessary for the attacker to compose a target message term but unknown to the attacker.The attacker model was established as needed.The mechanism centered on the attacker was designed,in which whether add a protocol session was determined by the attacker.This might cause contradiction in time sequence,so some back-track algorithm was adopted to solve this contradiction.Experiments show that the system can verify the security of the protocol,and the number of state space is slightly better than the Scyther tool.…”
Get full text
Article -
35410
Experimental Investigation of the Transmission Efficiency of In-line Low Pulse Pulsing CVT
Published 2015-01-01“…An experimental prototype of in- line,low pulse pulsing continuously variable transmission( CVT) is designed and manufactured,its basic structure and working principle are introduced in detail. …”
Get full text
Article -
35411
Exploring perspective of impact ranking university trend in five universities in East Java Indonesia
Published 2025-01-01“…Global university ranking systems play a crucial role by providing the foundation for competition, as exemplified by the Times Higher Education (THE) rankings. The indicators are designed to offer a clear understanding of the teaching and learning environment. …”
Get full text
Article -
35412
UF/IFAS Nutrient Management Series: Computational Tools for Field Implementation of the Florida Phosphorus Index - Okeechobee Watershed Area
Published 2006-06-01“…Boetger, provides many tables with numerical values for each of the various factors listed in the Florida P Index to be used in computations to aid planners in designing conservation plans related to land application of animal wastes. …”
Get full text
Article -
35413
Model of runtime memory leak detection based on the virtual machine introspection
Published 2013-08-01“…The prototype system of the model was designed and im-plemented. By analyzing and evaluating effectiveness and performance of the prototype system, the results show that these models and methods can effectively detect memory leaks, and have better performance.…”
Get full text
Article -
35414
Spatio-temporal periodic behavior mining algorithm for social networks
Published 2013-01-01“…A hierarchical bipartite graph based model and a mining algorithm were presented to obtain the potential spatio-temporal periodic behavior,meanwhile avoided the subset omitting problem in previous schemes.Then the location analysis algorithm was designed to achieve the nearly inimum location dominating subset,it could monitor the small portion of the locations as early as possible.Finally experiments results show that the algorithms can find out the periodic location set as well as obtain nearly minimum location dominating subset,so as to cover the major portion of objectives using those popular locations.…”
Get full text
Article -
35415
TOPICAL ISSUES OF SOCIAL PARTNERSHIP DEVELOPMENT BETWEEN HEI AND EMPLOYERS IN EDUCATION MODERNIZATION CONTEXT
Published 2016-12-01“…The authors outline the strategic benchmarks of social partnership development towards shaping the national system of qualifications, designing professional and educational standards in the competence format.…”
Get full text
Article -
35416
Exemplary Youth Leadership Series: Activities to Engage Youth with Practices of Exemplary Leaders
Published 2019-11-01“… This publication series is designed to outline strategies and experiences to expose youth to and engage them with leadership concepts. …”
Get full text
Article -
35417
Pilot allocation based on users’ location and user classification in massive MIMO system
Published 2019-10-01“…Aiming at the problem of pilot contamination in massive MIMO systems,a pilot allocation scheme based on users’ location and user classification was proposed.The scheme designed the objective function and reasonable threshold based on path loss and angle of arrival.By comparing the user’s objective function with the threshold,all users in the system were divided into two types:high interference and low interference,and the low-interference users multiplex pilot sequences and extra orthogonal pilot sequences were assigned to high interference users to mitigate pilot contamination.Simulation results show that the scheme improves the performance of the communication system.…”
Get full text
Article -
35418
Suggestion on establishing curriculum system for information security major
Published 2016-07-01“…The problems of information security demands for professional talents and existing curriculum system setting of information security major were analyzed.A modular and hierarchical curriculum system construction scheme of information security was given under the guidance of information security professional standards promulgated by the Ministry of Education Information Security Teaching Guidance Committee.The construction of curriculum system for information security major at Xi'an University of Posts and Telecommunications was taken as the example.The modular and hierarchical optimization and implementation scheme of information se-curity undergraduate curriculum system were designed.It will be valuable to the information security profes-sional talent training.…”
Get full text
Article -
35419
Exemplary Youth Leadership Series: Enable Others to Act
Published 2020-10-01“… This publication series is designed to outline strategies and experiences to expose youth to and engage them with leadership concepts. …”
Get full text
Article -
35420
Remote Interoperability Testing Client for Wireless Personal Area Network Protocol
Published 2015-11-01“…When the entities in one interoperability testing case were not suitable to be placed in the same physical location,the remote testing method was needed to complete the testing.In order to guarantee the success of the remote testing,a platform based on the Internet environment was built.A system structure was designed for assure the platform was suitable for wireless personal area network protocol.The framework mainly contained the device connection module and the data forwarding module.To illustrate the application of proposed approach,a real case study was proposed:the 6LoWPANs protocol.The results of the experimentation performed on this protocol were also presented.…”
Get full text
Article