Showing 35,561 - 35,580 results of 46,768 for search '"Design"', query time: 0.22s Refine Results
  1. 35561

    Tubular Ridge Surfaces with Intensified Heat Exchange and Technology of Their Manufacturing for Air Coolers of Fuel and Energy Complex by V. B. Kuntysh, A. B. Sukhotskiy, E. S. Sаnkоvih, V. P. Mulin

    Published 2013-06-01
    “…The paper presents designs of bimetallic ridge pipes (BRP) with spirally-wound aluminium KLM-edges for heat exchange air coolers. …”
    Get full text
    Article
  2. 35562

    Acetic Acid Bacteria and the Production and Quality of Wine Vinegar by Albert Mas, María Jesús Torija, María del Carmen García-Parrilla, Ana María Troncoso

    Published 2014-01-01
    “…Despite the different methods of vinegar production (more or less designated as either “fast” or “traditional”), the use of pure starter cultures remains far from being a reality. …”
    Get full text
    Article
  3. 35563

    South Florida Tropical Fruit Grower Perspectives: Water Conservation Management Practices by Kati W. Migliaccio, Jonathan H. Crane, Edward Evans, Bruce Schaffer, Yuncong Li, Rafael Muñoz-Carpena

    Published 2010-01-01
    “…Crane, Edward Evans, Bruce Schaffer, Yuncong Li, and Rafael Muñoz-Carpena, presents results of fruit grower responses from a survey designed to assess changing views of agricultural producers in Miami-Dade county from 2006 to 2009 regarding water quantity and quality management practices — methods, demographics, water quality and quantity opinions concerning lifestyle, agriculture, and best management practices (BMPs). …”
    Get full text
    Article
  4. 35564

    Inverse Projective Synchronization between Two Different Hyperchaotic Systems with Fractional Order by Yi Chai, Liping Chen, Ranchao Wu

    Published 2012-01-01
    “…By using the stability theory of fractional-order differential equations and Lyapunov equations for fractional-order systems, two kinds of suitable controllers for achieving inverse projective synchronization are designed, in which the generalized synchronization, antisynchronization, and projective synchronization of fractional-order hyperchaotic Lorenz system and fractional-order hyperchaotic Chen system are also successfully achieved, respectively. …”
    Get full text
    Article
  5. 35565

    DEVELOPMENT OF A NIGERIAN CULTURAL ATTIRE RECOGNITION SYSTEM by OGUNBIYI DIMPLE, JIMOH KUDIRAT, ADEBAYO OLAJIDE, OKELOLA LOVELYN

    Published 2023-09-01
    “…Samples of clothing images depicting the cultural groups were obtained from publicly available online sources and an architecture to classify the images classes was designed using the Convolutional Neural Network (CNN) model. …”
    Get full text
    Article
  6. 35566

    A PROJECT MANAGEMENT UTILITY FOR AGRICULTURAL FACILITIES AND PUBLIC HEALTH by TILEMACHOS KOLIOPOULOS, KRYSTYNA CIARKOWSKA, JACEK ANTONKIEWICZ, SOKRATIS THEOCHARATOS, CRINA RADU, ION CRISTEA, PANAGIOTIS KOULOUMPIS

    Published 2018-06-01
    “…Useful results are presented based on geoinformatics utility that develops sanitary drawings in sustainable designs minimizing risks and indoor pollution hazardous emissions in working spaces minimizing health risks. …”
    Get full text
    Article
  7. 35567

    Endogenous security architecture of Ethernet switch based on mimic defense by Ke SONE, Qinrang LIU, Shuai WEI, Wenjian ZHANG, Libo TAN

    Published 2020-05-01
    “…Aiming at the unknown vulnerabilities and unknown backdoor security threats faced by Ethernet switches,a switch endogenous security architecture based on mimicry defense theory was proposed.The theoretical basis,construction mode and security mechanism of the architecture ware introduced,the algorithm strategy and security improvement effect of TAMA algorithm were proposed and analyzed,a prototype of mimic switch was designed and implemented,and the security tests of white box stuffing and attack chain were carried out.Theoretical analysis and test results show that the architecture has good unknown vulnerabilities and unknown backdoor defense capabilities in various attack scenarios.…”
    Get full text
    Article
  8. 35568

    Blasting neuroblastoma using optimal control of chemotherapy by Craig Collins, K. Renee Fister, Bethany Key, Mary Williams

    Published 2009-05-01
    “…The treatmentschedule is designed to simultaneously satisfy this constraint and achievethe best results in fighting the tumor. …”
    Get full text
    Article
  9. 35569

    Worker Protection Standard—Certified Crop Advisor Exemption by Frederick M. Fishel, Tatiana Sanchez

    Published 2016-11-01
    “… The Worker Protection Standard (WPS) is a Federal regulation designed to protect agricultural workers (people involved in the production of agricultural plants) and pesticide handlers (people mixing, loading, or applying pesticides or doing other tasks involving direct contact with pesticides). …”
    Get full text
    Article
  10. 35570

    Allocating Freight Empty Cars in Railway Networks with Dynamic Demands by Ce Zhao, Lixing Yang, Shukai Li

    Published 2014-01-01
    “…Moreover, a genetic algorithm is designed to obtain the optimal empty cars distribution strategies in railway networks. …”
    Get full text
    Article
  11. 35571

    Research on outsourcing of digital image forensics based on privacy preserving by Bing-wen FENG, Jian WENG, Wei LU

    Published 2016-08-01
    “…The rapid growth of digital image forensics calls for outsourcing digital forensics services to the cloud.It meets the requirement of image content authentication from both the public and organizations.However,it also brings the privacy concerns over the abuse of sensitive information.Based on the research in related fields,a digital forensics cloud platform with privacy preservation was presented.Furthermore,privacy-preserving outsourcing of three types of digital forensics methods,including copy-move detection,source identification and natural image sta-tistic-based tamper detection,were designed.Various future research directions were also discussed.…”
    Get full text
    Article
  12. 35572

    Finite-Time Formation of Unmanned Aerial Vehicles with Switching Topologies and Disturbances: An Average Dwell Time Approach by Chao Ma, Wei Wu

    Published 2019-01-01
    “…Then, the topology-dependent controller can be designed in terms of matrix technique. Finally, an illustrative example is given to verify the effectiveness of our proposed formation strategy.…”
    Get full text
    Article
  13. 35573

    Azaleas at a Glance by Sydney Park Brown, Dewayne L. Ingram, James T. Midcap

    Published 2012-02-01
    “…Generally, their open, relaxed growth habit is more suited to informal landscape designs. This revised 5-page fact sheet was written by Sydney Park Brown, Dewayne L. …”
    Get full text
    Article
  14. 35574

    Test and Analysis of Three Directional Vibration for Harmonic Reducer by Tan Jing, Shi Deyu, Huang Dishan, Gu Jingjun

    Published 2018-01-01
    “…To simulate the working state of industrial robot,the harmonic reducer loading device is designed. In the case of loading,the vibration of a harmonic reducer in three direction is measured. …”
    Get full text
    Article
  15. 35575

    Comparative Study on the Kinematics Analytical Method of Hybrid-driven Five-bar Mechanism by Hou Zhili, 2Li Ruiqin, Wu Wenge

    Published 2015-01-01
    “…The kinematics characteristic of the closed chain two degree of freedom planar five-bar mechanism is analyzed by using the closed vector polygon projection method,complex number-vector method and matrix method.The kinematics equations are deduced,furthermore,the characteristic and application situations of each method are compared and analyzed.The kinematics equations are validated according to the example designed.By using the Solid Works motion simulation software,the motion path is changed with the original position of driving link,and the inner link between kinematics equations and output motion path is achieved.The reference for solving kinematic characteristic of hybrid driven mechanism in analytic method can be provided.…”
    Get full text
    Article
  16. 35576

    Research on Large Scale Antenna Arrays for 5G Mobile Communication Technology by Feng Gao, Kai He, Zhiyuan Song, Wentao Zhu, Lifang Wang, Peng Gao

    Published 2015-05-01
    “…A high-performance 5×5 tightly coupled phased array was designed and simulated.…”
    Get full text
    Article
  17. 35577

    Scalable and multi-application wireless sensor networks simulation based on node clustering by LI Wen-jun, LIN Hong-sheng, ZHOU Xiao-cong, ZHENG Yao-zhan

    Published 2008-01-01
    “…A node clustering based simula- tor ETMA was designed and implemented on top of TOSSIM. Empirical studies on ETMA show that the node clustering approach can support multi-application WSN simulation with high scalability.…”
    Get full text
    Article
  18. 35578

    Self-Organized Fission Control for Flocking System by Mingyong Liu, Panpan Yang, Xiaokang Lei, Yang Li

    Published 2015-01-01
    “…Motivated by the fission behavior of biological flocks, information coupling degree (ICD) is firstly designed to represent the interaction intensity between individuals. …”
    Get full text
    Article
  19. 35579

    Malware classification method based on static multiple-feature fusion by Bo-wen SUN, Yan-yi HUANG, Qiao-kun WEN, Bin TIAN, Peng WU, Qi LI

    Published 2017-11-01
    “…In recent years,the amount of the malwares has tended to rise explosively.New malicious samples emerge as variability and polymorphism.By means of polymorphism,shelling and confusion,traditional ways of detecting can be avoided.On the basis of massive malicious samples,a safe and efficient method was designed to classify the mal-wares.Extracting three static features including file byte features,assembly features and PE features,as well as im-proving generalization of the model through feature fusion and ensemble learning,which realized the complementarity between the features and the classifier.The experiments show that the sample achieve a stable F1-socre (93.56%).…”
    Get full text
    Article
  20. 35580

    PROSPECTS OF DEVELOPMENT OF HOUSING CONSTRUCTION by E. Bogomolova, A. Kozlovskiy, N. Moiseenko

    Published 2018-03-01
    “…The attention is paid to possibilities of the private-state partnership and co-investing habitation civil-engineering designs. The issues of distribution of shares between participants in housing construction are considered. …”
    Get full text
    Article