Showing 35,601 - 35,620 results of 46,768 for search '"Design"', query time: 0.24s Refine Results
  1. 35601

    Mysticism and the Reformation: a brief survey by B. McGinn

    Published 2015-12-01
    “…Today a more adequate understanding of the mystical element of Christianity as a deeper awareness of God’s presence in the life of believers suggests a new evaluation of the relation of Protestantism and  mysticism, beginning Martin Luther, and continuing with figures like Johann Arndt, and a number of the “Spiritual Reformers,” such as Andreas Karlstadt, Sebastian Franck, Valentin Weigel, as well as the theosophical Lutheran Jacob Boehme. This essay is designed to reopen the question of the relation between Protestantism and mysticism. …”
    Get full text
    Article
  2. 35602

    Buckling Analysis of Laminated Composite Panel with Elliptical Cutout Subject to Axial Compression by Hamidreza Allahbakhsh, Ali Dadrasi

    Published 2012-01-01
    “…The results give useful information into designing a laminated composite cylindrical panel, which can be used to improve the load capacity of cylindrical panels.…”
    Get full text
    Article
  3. 35603

    Towards edge-collaborative,lightweight and secure region proposal network by Jinbo XIONG, Renwan BI, Qianxin CHEN, Ximeng LIU

    Published 2020-10-01
    “…Aiming at the problem of image privacy leakage and computing efficiency in edge environment,a lightweight and secure region proposal network (SecRPN) was proposed.A series of secure computing protocols were designed based on the additive secret sharing scheme.Two non-collusive edge servers cooperate to perform calculation modules such as secure feature processing,secure anchor transformation,secure bounding-box correction,and secure non-maximum suppression.Theoretical analysis guarantees the correctness and security of SecRPN.The actual performance evaluation shows that SecRPN is outstanding in the computational cost and communication overhead compared with the existing works.…”
    Get full text
    Article
  4. 35604

    Adaptive Fuzzy Synchronization of Fractional-Order Chaotic Neural Networks with Backlash-Like Hysteresis by Wenqing Fu, Heng Liu

    Published 2018-01-01
    “…An adaptive fuzzy synchronization controller is designed for a class of fractional-order neural networks (FONNs) subject to backlash-like hysteresis input. …”
    Get full text
    Article
  5. 35605

    Strategies to Increase the Adoption of Residential Pollinator Gardening: Tackling Percieved Barriers by Colby Silvert, Laura A. Warner, John Diaz, Cody Gusto, Rachel Mallinger

    Published 2023-05-01
    “…However, research shows that urban, developed landscapes can be designed and maintained to successfully provide habitats for diverse, healthy pollinator populations, including bees. …”
    Get full text
    Article
  6. 35606

    Low failure recovery cost controller placement strategy in software defined networks by Qi WU, Hongchang CHEN

    Published 2020-12-01
    “…The controller placement is an important problem in software defined networks.Existing researches pay more attention to deploying controller planning for node failures and ignore the fact that the link failure can also effect the network drastically.To solve the problem,a mathematical model for the controller placement that plans ahead for the link failures to avoid a drastic increase failure recovery cost was proposed.To solve the model,an algorithm based on simulated annealing was designed.The simulation results show that the proposed model and algorithm can improve the robustness of the network.The maximum failure recovery cost is significantly reduced when a link falls in failures.…”
    Get full text
    Article
  7. 35607

    Denotation and application mechanism of complicated network shared management information model by GAO Zhi-peng, QIU Xue-song, WANG Zhi-li, LI Wen-jing

    Published 2008-01-01
    “…At last, a prototype system was designed to prove the conclusions.…”
    Get full text
    Article
  8. 35608

    Internet of vehicles empowered by edge intelligence by Yan ZHANG, Ke ZHANG, Jiayu CAO

    Published 2018-12-01
    “…By pushing computing,storage and other resources to the proximity of end devices,edge intelligence empowers network edge entities powerful information processing and content delivery capabilities,while providing efficient and low-latency service support for the development and implementation of novel mobile services.Thus,edge intelligence is profoundly changing the functions of mobile applications and the utilization patterns of network resources.The application of edge intelligence technology in vehicular networks was studied firstly,and the core scientific problems that need to be solved in designing an efficient vehicular edge system was presented.Then,the technical challenges faced in solving these problems were analyzed and the corresponding solution strategies were given.…”
    Get full text
    Article
  9. 35609

    Static-analysis-based event input generation approach for Android application by Yi-lin YE, Zhen-ji ZHOU, Zheng HONG, Hui-ying YAN, Li-fa WU

    Published 2017-06-01
    “…A static-analysis-based event input generation approach for Android applications was proposed.Based on the inter-component call graph and the system dependence graph of single component,the event inputs that security-related callbacks depend on were extracted.Furthermore,an event input algorithm was designed to automatically generate event inputs according to Android application runtime.The experimental results show that the proposed method can achieve higher coverage of permission methods and basic components,which can cover more security-related execution paths and help to collect more security-related runtime behaviors during the process of dynamic analysis.…”
    Get full text
    Article
  10. 35610

    The overcurrent protection characteristics testing digital substation intelligent electric devices by A. V. Simakov, V. V. Kharlamov, V. I. Skorokhodov

    Published 2021-04-01
    “…A method for checking the electrical and time characteristics of the overcurrent protection of an intelligent electronic device is proposed. The device is designed in accordance with the IEC-61850 standard and operates in the local area network of a digital substation of architecture III.…”
    Get full text
    Article
  11. 35611

    Combination of Anterior and Posterior Subcutaneous Internal Fixation for Unstable Pelvic Ring Injuries: The “Hula Hoop Technique” by Daniel Balbachevsky, Robinson Esteves Pires, Rodrigo Guerra Sabongi, Theóphilo Asfora Lins, Geiser de Souza Carvalho, Hélio Jorge Alvachian Fernandes, Fernando Baldy dos Reis

    Published 2019-03-01
    “…The present study reports the association of anterior and posterior subcutaneous internal fixation by applying spine-designed implants on the pelvic ring disruption: supra-acetabular pedicle screws with an interconnecting rod (Infix), plus posterior transiliac fixation with the same system, which the authors have named the “Hula Hoop Technique”.…”
    Get full text
    Article
  12. 35612

    Doulas como "amortecedores afetivos" Notas etnográficas sobre uma nova acompanhante de parto by Soraya Fleischer

    Published 2005-01-01
    “…In this article, I intend to present some recent ethnographic notes designed to provoke reflection (and inspire new research) about the doulas. …”
    Get full text
    Article
  13. 35613

    Digital transformation of Russian customs authorities’ activities on the example of automatic release technology by A. O. Bondarenko

    Published 2022-01-01
    “…In order to expand the coverage of the declaration array by automatic release technology, the main directions for improving the automation mechanism at the release of goods have been designated, trends of automation of customs operations and its influence on the development of foreign economic activity have been defined. …”
    Get full text
    Article
  14. 35614

    Distributed Asynchronous Fusion Algorithm for Sensor Networks with Packet Losses by Tianpeng Chu, Guoqing Qi, Yinya Li, Andong Sheng

    Published 2014-01-01
    “…Then the fusion estimator is designed to fuse local estimates in the neighborhood. …”
    Get full text
    Article
  15. 35615

    Service selection approach for enhancing trustworthiness of Web service by ZHAO Sheng-hui1, WU Guo-xin1, CHEN Gui-lin3, CHEN Hai-bao3

    Published 2011-01-01
    “…Making use of the game theory,a model of service selection based on Nash bargaining solution was build,and an approach for enhancing Web service trustworthiness was proposed.A bargaining algorithm is designed between ser-vice sides of both complete rationality,through adjusting service price,to achieve maximum utility for both service re-questor and provider,and increase the success rate of transactions and service trustworthiness.Results of experiments show that,on the basis of the game that according to quality of service,reputation and security between service provider and requestor,the service selection can promote the establishment of trustable service computing environment and en-hance credibility of the service.…”
    Get full text
    Article
  16. 35616

    Simple and Efficient Preconditioner for Surface Integral Solution of Scattering from Multilayer Dielectric Bodies by B. B. Kong, X. Q. Sheng

    Published 2016-01-01
    “…A simple and efficient preconditioner is designed for the surface integral solution of multilayer dielectric bodies and validated by numerical experiments. …”
    Get full text
    Article
  17. 35617

    Thiamine Deficiency in Self-Induced Refeeding Syndrome, an Undetected and Potentially Lethal Condition by Einat Hershkowitz, Alon Reshef, Olga Munich, Bracha Yosefi, Arie Markel

    Published 2014-01-01
    “…Rapid restoration of nutrients and electrolytes after prolonged starvation could result in a life threatening condition characterized by sensory and neurological dysfunction and severe metabolic imbalance that has been designated as refeeding syndrome. Its diagnosis is frequently missed resulting in severe complications and even death. …”
    Get full text
    Article
  18. 35618

    Les Français de Londres, pas tous expatriés by Diane Le Luyer

    Published 2024-03-01
    “…Underlying the measures deployed for them, the objectives of influence pursued by the nation-state sometimes compete with the objectives of support for the population. Designed from a modern and universalist perspective, the public policies are based on a valuable image of the population established abroad that can be used to capitalise on the pursuit of a soft power agenda. …”
    Get full text
    Article
  19. 35619

    The Entomological Collection of Thomas Say by Jonathan R. Mawdsley

    Published 1993-01-01
    “…A protocol for the designation of Say lectotypes and neotypes is proposed.…”
    Get full text
    Article
  20. 35620

    Data outsourcing authentication model based on authenticated data structures for cloud computing by XU Jian1, ZHOU Fu-cai1, CHEN Xu1, ZHU Zhi-liang2

    Published 2011-01-01
    “…The outsourcing authentication model based on authenticated data structures was proposed.The formal defini-tion,data query authentication protocol and data updating authentication protocol of the model was presented.The crucial problems when the authenticated data structures are being used were analyzed.With designing the new extended coher-ence proof generation algorithm and the new extended verifying algorithm,authenticated data structures in the model very well was used.Finally the model with others through the performance analysis including the security and efficiency,the results of which show that:the model is more efficient than others as well as the consistency and correctness require-ments are also guaranteed.…”
    Get full text
    Article