Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
35581
The analysis of working medium flow through flow cavity elements of pneumatic-hydraulic systems
Published 2019-12-01“…The article discusses the issues of modeling the flow of working medium in the working cavity of ball valves with various types of designs of locking elements: with turned and stamped ball. …”
Get full text
Article -
35582
The Drug-Trafficking Economy and Its Dynamics in Latin America
Published 2013-09-01“…This opens the possibility for a new methodological framework for designing policies that seek to adapt state controlling, neutralization, and prevention capacities to the new and changing rationalities of the world economy of drug trafficking.…”
Get full text
Article -
35583
Passion Fruit Problems in the Home Landscape
Published 2020-11-01“…This new 5-page document is designed to help Master Gardeners and homeowners by answering commonly asked questions about passion fruit production problems. …”
Get full text
Article -
35584
Low-rate modem for transmission of small data in medium frequency range for Arctic
Published 2018-09-01“…The structure of the modem is designed for implementation in software and for the implementation in languages of the description of equipment for SDR systems. …”
Get full text
Article -
35585
Research on key management and authentication protocol of PDA in smart grid
Published 2018-03-01“…According to PDA in smart grid,which faced with security issues,key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.With the construction of mobile trusted platform by trusted hardware module and PDA,a key management mechanism was designed which presented for the indentify of hardware and controlled by user,to guarantee the security of key management and build a safe and effective mechanism of key backup and recovery.Based on trusted hardware module,security access for PDA in smart grid was realized,with the public and private key of key management strategy and improved access authentication protocol based on public key cryptography.…”
Get full text
Article -
35586
STUDENTS’ BACKGROUND IN MATHEMATICS: THE CAUSES OF NEGATIVE TRENDS
Published 2017-02-01“…Due to this problem the analysis of the quality of students’ mathematical training in higher educational institutions is provided, the tendency of decreasing of its level is designated, the reasons of this fact are considered. …”
Get full text
Article -
35587
Video migration strategy based on bandwidth demand prediction and cloud resource reservation
Published 2014-05-01“…Finally the video migration strategies are designed to determine the methods of migration videos. …”
Get full text
Article -
35588
The Prevalence of Chronic Pain in Canada
Published 2011-01-01“…Published population estimates of the prevalence of chronic pain have been highly variable due, in part, to differences in definitions and study methodologies. Designing health care delivery models that address chronic pain and reduce its impact, however, require accurate, up-to-date prevalence data. …”
Get full text
Article -
35589
Study on RPKI Safeguard Based on Local Trust Anchor Management
Published 2013-09-01“…RPKI is a PKI designed to support validation of claims by current holders of internet number resources (IPv4 addresses, IPv6 addresses and AS numbers), which is employed to establish a secure inter-domain routing system. …”
Get full text
Article -
35590
Illustrated Key to the Genera of Free-Living Marine Nematodes in the Superfamily Chromadoroides Exclusive of the Chromadoridae
Published 2003-08-01“…Specific anatomical features are designated to facilitate use of the key. This document is EENY-082, one of a series of Featured Creatures from the Entomology and Nematology Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
Get full text
Article -
35591
Dose uniformity evaluations for gamma radiation processing facility using Monte Carlo simulations and its validation
Published 2024-11-01“…The simulation tool used is an efficient tool for dose mapping studies of radiation processing facilities of different designs.…”
Get full text
Article -
35592
Azaleas at a Glance
Published 2012-02-01“…Generally, their open, relaxed growth habit is more suited to informal landscape designs. This revised 5-page fact sheet was written by Sydney Park Brown, Dewayne L. …”
Get full text
Article -
35593
Review of 5Gmobile communication technology standard
Published 2018-08-01“…The industry is working togetheRto create 5G technology standard,which shouldmeet the needs ofmobile broadband and internet of things.Recently,3GPP declares the first 5G standard which supports the standalone deployment frozen.5G supports wider bandwidth,low latency,flexible configuration.New service-based architecture is designed for 5G,which supports important service capabilities,e.g.network slice,edge computing.5G standards were introduced,including new radio,new core and security.In the end,the trends of 5G standard were summarized.…”
Get full text
Article -
35594
Pinning Synchronization of Nonlinearly Coupled Complex Dynamical Networks on Time Scales
Published 2020-01-01“…To achieve synchronization for nonlinearly coupled complex dynamical networks on time scales, a pinning control strategy is designed. Some pinning synchronization criteria are established for nonlinearly coupled complex dynamical networks on time scales, which guarantee the whole network can be pinned to some desired state. …”
Get full text
Article -
35595
New records of a rare fungus Tricholoma focale (Agaricales) in Ukraine
Published 2024-12-01“…Including our data, in total 15 localities of the fungus are known in Ukraine; ten of them are outside the territories designated as protected areas. Due to the ongoing military activities, four previously reported records are located within the temporarily occupied areas and thus are inaccessible for further observations. …”
Get full text
Article -
35596
Glass Superstrate Nanoantennas for Infrared Energy Harvesting Applications
Published 2013-01-01“…Contrary to usual antenna designs, we implemented glass superstrate as opposed to glass substrate for better antenna performance. …”
Get full text
Article -
35597
Secure access authentication scheme for 4G wireless network based on PCL
Published 2012-04-01“…Considering the access authentication for mobile terminals in the 4G wireless network,a new secure access authentication scheme based on the self-certified public key system was designed.Then the deductive process of the scheme was derived with the protocol derivation system and its security attributes was formally proofed with protocol composition logic.By the security proof and comprehensive analysis,it is showed that the proposed scheme not only has session authentication and key confidentiality,but also can defend pseudo-base station attack and reply attack,provide the undeniable service and identity privacy.Moreover,the scheme can improve the access efficiency of the mobile terminals.…”
Get full text
Article -
35598
THE EFFECTS OF SOCIAL MEDIA CONTENT CHARACTERISTICS ON CONSUMER ENGAGEMENT – A SYSTEMATIC LITERATURE REVIEW
Published 2024-12-01“…However, we identified several gaps in the literature, which future research should address to clarify how social media content should be designed and delivered in order to maximise consumer engagement. …”
Get full text
Article -
35599
New Stability Criteria for Event-Triggered Nonlinear Networked Control System with Time Delay
Published 2019-01-01“…In addition, an event-triggered controller is designed for nonlinear networked control system with time delay. …”
Get full text
Article -
35600
Approach to deep Web data acquiring based on circular strategy and dynamic knowledge
Published 2012-10-01“…Concerning on the acquisition problems on deep Web data integration such as high cost and low efficiency of query selecting,a novel deep Web data acquiring method was proposed based on circular strategy and dynamic knowledge.According to the relationship between deep Web data sources from the same domain,the circulation strategic acquisition of data source in batches was applied in such method,as well as a designed method of query selecting on dynamic knowledge based on integrated systematic.Compared with current,the method reduces the acquisition cost and with more accuracy.Experimental results show that the method can raise the acquisition efficiency of deep Web data integration.…”
Get full text
Article