Showing 35,581 - 35,600 results of 46,768 for search '"Design"', query time: 0.24s Refine Results
  1. 35581

    The analysis of working medium flow through flow cavity elements of pneumatic-hydraulic systems by A. S. Pugachuk, O. A. Vorozheeva, A. V. Chernyshev

    Published 2019-12-01
    “…The article discusses the issues of modeling the flow of working medium in the working cavity of ball valves with various types of designs of locking elements: with turned and stamped ball. …”
    Get full text
    Article
  2. 35582

    The Drug-Trafficking Economy and Its Dynamics in Latin America by Daniel Pontón C.

    Published 2013-09-01
    “…This opens the possibility for a new methodological framework for designing policies that seek to adapt state controlling, neutralization, and prevention capacities to the new and changing rationalities of the world economy of drug trafficking.…”
    Get full text
    Article
  3. 35583

    Passion Fruit Problems in the Home Landscape by Amir Rezazadeh, Mark T. Bailey, Ali Sarkhosh

    Published 2020-11-01
    “…This new 5-page document is designed to help Master Gardeners and homeowners by answering commonly asked questions about passion fruit production problems. …”
    Get full text
    Article
  4. 35584

    Low-rate modem for transmission of small data in medium frequency range for Arctic by P. I. Puzyrev, S. A. Zavyalov, V. V. Erokhin, V. Yu. Shein

    Published 2018-09-01
    “…The structure of the modem is designed for implementation in software and for the implementation in languages of the description of equipment for SDR systems. …”
    Get full text
    Article
  5. 35585

    Research on key management and authentication protocol of PDA in smart grid by Xiao YU, Li TIAN, Zhe LIU, Jie WANG

    Published 2018-03-01
    “…According to PDA in smart grid,which faced with security issues,key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.With the construction of mobile trusted platform by trusted hardware module and PDA,a key management mechanism was designed which presented for the indentify of hardware and controlled by user,to guarantee the security of key management and build a safe and effective mechanism of key backup and recovery.Based on trusted hardware module,security access for PDA in smart grid was realized,with the public and private key of key management strategy and improved access authentication protocol based on public key cryptography.…”
    Get full text
    Article
  6. 35586

    STUDENTS’ BACKGROUND IN MATHEMATICS: THE CAUSES OF NEGATIVE TRENDS by Vera I. Toktarova, Svetlana N. Fedorova

    Published 2017-02-01
    “…Due to this problem the analysis of the quality of students’ mathematical training in higher educational institutions is provided, the tendency of decreasing of its level is designated, the reasons of this fact are considered. …”
    Get full text
    Article
  7. 35587

    Video migration strategy based on bandwidth demand prediction and cloud resource reservation by ONGXin C, HUANGKai S, USen S, ANGFang-chun Y, ILing-ling Z

    Published 2014-05-01
    “…Finally the video migration strategies are designed to determine the methods of migration videos. …”
    Get full text
    Article
  8. 35588

    The Prevalence of Chronic Pain in Canada by Donald Schopflocher, Paul Taenzer, Roman Jovey

    Published 2011-01-01
    “…Published population estimates of the prevalence of chronic pain have been highly variable due, in part, to differences in definitions and study methodologies. Designing health care delivery models that address chronic pain and reduce its impact, however, require accurate, up-to-date prevalence data. …”
    Get full text
    Article
  9. 35589

    Study on RPKI Safeguard Based on Local Trust Anchor Management by Di Ma, Shuo Shen

    Published 2013-09-01
    “…RPKI is a PKI designed to support validation of claims by current holders of internet number resources (IPv4 addresses, IPv6 addresses and AS numbers), which is employed to establish a secure inter-domain routing system. …”
    Get full text
    Article
  10. 35590

    Illustrated Key to the Genera of Free-Living Marine Nematodes in the Superfamily Chromadoroides Exclusive of the Chromadoridae by Armen C. Tarjan, Edwin J. Keppner

    Published 2003-08-01
    “…Specific anatomical features are designated to facilitate use of the key. This document is EENY-082, one of a series of Featured Creatures from the Entomology and Nematology Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
    Get full text
    Article
  11. 35591

    Dose uniformity evaluations for gamma radiation processing facility using Monte Carlo simulations and its validation by Raksha Rajput, Jyoti Garg, Jain Reji George, Kalpana Khedkar, P. K. Jothish, N. Jayachandran, Pradip Mukherjee

    Published 2024-11-01
    “…The simulation tool used is an efficient tool for dose mapping studies of radiation processing facilities of different designs.…”
    Get full text
    Article
  12. 35592

    Azaleas at a Glance by Sydney Park Brown, Dewayne L. Ingram, James T. Midcap

    Published 2012-02-01
    “…Generally, their open, relaxed growth habit is more suited to informal landscape designs. This revised 5-page fact sheet was written by Sydney Park Brown, Dewayne L. …”
    Get full text
    Article
  13. 35593

    Review of 5Gmobile communication technology standard by Ying DU, Hao ZHU, Hongmei YANG, Zhiqin WANG, Yang XU

    Published 2018-08-01
    “…The industry is working togetheRto create 5G technology standard,which shouldmeet the needs ofmobile broadband and internet of things.Recently,3GPP declares the first 5G standard which supports the standalone deployment frozen.5G supports wider bandwidth,low latency,flexible configuration.New service-based architecture is designed for 5G,which supports important service capabilities,e.g.network slice,edge computing.5G standards were introduced,including new radio,new core and security.In the end,the trends of 5G standard were summarized.…”
    Get full text
    Article
  14. 35594

    Pinning Synchronization of Nonlinearly Coupled Complex Dynamical Networks on Time Scales by Fang-Di Kong

    Published 2020-01-01
    “…To achieve synchronization for nonlinearly coupled complex dynamical networks on time scales, a pinning control strategy is designed. Some pinning synchronization criteria are established for nonlinearly coupled complex dynamical networks on time scales, which guarantee the whole network can be pinned to some desired state. …”
    Get full text
    Article
  15. 35595

    New records of a rare fungus Tricholoma focale (Agaricales) in Ukraine by Sukhomlyn M.M., Pasailiuk M.V., Fontana N.M.

    Published 2024-12-01
    “…Including our data, in total 15 localities of the fungus are known in Ukraine; ten of them are outside the territories designated as protected areas. Due to the ongoing military activities, four previously reported records are located within the temporarily occupied areas and thus are inaccessible for further observations. …”
    Get full text
    Article
  16. 35596

    Glass Superstrate Nanoantennas for Infrared Energy Harvesting Applications by Isa Kocakarin, Korkut Yegin

    Published 2013-01-01
    “…Contrary to usual antenna designs, we implemented glass superstrate as opposed to glass substrate for better antenna performance. …”
    Get full text
    Article
  17. 35597

    Secure access authentication scheme for 4G wireless network based on PCL by Li-li WANG, Tao FENG, Jian-feng MA

    Published 2012-04-01
    “…Considering the access authentication for mobile terminals in the 4G wireless network,a new secure access authentication scheme based on the self-certified public key system was designed.Then the deductive process of the scheme was derived with the protocol derivation system and its security attributes was formally proofed with protocol composition logic.By the security proof and comprehensive analysis,it is showed that the proposed scheme not only has session authentication and key confidentiality,but also can defend pseudo-base station attack and reply attack,provide the undeniable service and identity privacy.Moreover,the scheme can improve the access efficiency of the mobile terminals.…”
    Get full text
    Article
  18. 35598

    THE EFFECTS OF SOCIAL MEDIA CONTENT CHARACTERISTICS ON CONSUMER ENGAGEMENT – A SYSTEMATIC LITERATURE REVIEW by Flavia HERLE

    Published 2024-12-01
    “…However, we identified several gaps in the literature, which future research should address to clarify how social media content should be designed and delivered in order to maximise consumer engagement. …”
    Get full text
    Article
  19. 35599

    New Stability Criteria for Event-Triggered Nonlinear Networked Control System with Time Delay by Hongqian Lu, Yue Hu, Chaoqun Guo, Wuneng Zhou

    Published 2019-01-01
    “…In addition, an event-triggered controller is designed for nonlinear networked control system with time delay. …”
    Get full text
    Article
  20. 35600

    Approach to deep Web data acquiring based on circular strategy and dynamic knowledge by Xue-feng XIAN, Zhi-ming CUI, Peng-peng ZHAO, Yin-hong LIANG, Li-gang FANG

    Published 2012-10-01
    “…Concerning on the acquisition problems on deep Web data integration such as high cost and low efficiency of query selecting,a novel deep Web data acquiring method was proposed based on circular strategy and dynamic knowledge.According to the relationship between deep Web data sources from the same domain,the circulation strategic acquisition of data source in batches was applied in such method,as well as a designed method of query selecting on dynamic knowledge based on integrated systematic.Compared with current,the method reduces the acquisition cost and with more accuracy.Experimental results show that the method can raise the acquisition efficiency of deep Web data integration.…”
    Get full text
    Article