Showing 35,701 - 35,720 results of 46,768 for search '"Design"', query time: 0.14s Refine Results
  1. 35701

    Sick Day Management for Adults with Diabetes Who Take Insulin by Nancy J. Gal, Linda B. Bobroff

    Published 2012-03-01
    “…The best way for people with diabetes to prevent a minor illness from becoming a major illness is to have a personalized sick day plan designed with their health care provider before they get ill. …”
    Get full text
    Article
  2. 35702

    Evaluation of blended instruction based on network platform in cryptography teaching by Wanqing WU, Ruizhong DU

    Published 2019-06-01
    “…According to the characteristics of cryptography course,a hybrid teaching method was designed through the network platform.In order to get the implementation effect of teaching,the evaluation is made from five aspects:teaching method,teaching content,teaching attitude,teaching environment and comprehensive evaluation.The evaluation results show that students' learning effect is improved after using the blended teaching method.The feedback results suggest that we should constantly optimize the teaching content and teaching methods; improve the ability to control the classroom,guide students to learn; teamwork can improve efficiency and reduce the intensity of teachers.These results provide useful help for further improving the practical teaching of cryptography.…”
    Get full text
    Article
  3. 35703

    Novel approach based on neighborhood relation signature against polymorphic internet worms by WANG Jie1, WANG Jian-xin1, LIU Xu-chong2

    Published 2011-01-01
    “…A class of neighborhood-relation signatures(NRS) was proposed based on neighborhood relationship between worm bytes.Because NRS embodies common characteristics of different morph of some polymorphic worms,Different patterns of polymorphic worms efficiently were detected.NRS generating algorithm(NRSGA) was designed to generate three types of signatures: 1-NRS,2-NRS and(1,2)-NRS.Some experiments were performed to demonstrate the correct-ness of the process of signatures generation and the effectiveness of NRS.Experiment results show that our approach has lower false negative ratio in detecting worms,and is effective to prevent polymorphic worms from propagating.…”
    Get full text
    Article
  4. 35704

    Finite Time Control for Fractional Order Nonlinear Hydroturbine Governing System via Frequency Distributed Model by Bin Wang, Lin Yin, Shaojie Wang, Shirui Miao, Tantan Du, Chao Zuo

    Published 2016-01-01
    “…Furthermore, based on finite time stability and sliding mode control theory, a robust control law to ensure the occurrence of the sliding motion in a finite time is designed for stabilization of the fractional order HGS. …”
    Get full text
    Article
  5. 35705

    CFD Study of Industrial FCC Risers: The Effect of Outlet Configurations on Hydrodynamics and Reactions by Gabriela C. Lopes, Leonardo M. Rosa, Milton Mori, José R. Nunhez, Waldir P. Martignoni

    Published 2012-01-01
    “…This paper presents a numerical study of the influence of different riser outlet designs on the dynamic of the flow and reactor efficiency. …”
    Get full text
    Article
  6. 35706

    ‘New’ Radio Policies for Non-commercial Media in Mexico by Luz de Azucena Rueda de León Contreras, Laura Mota Díaz

    Published 2014-05-01
    “…Despite the recent constitutional reforms that were announced as the beginning of new policies designed to satisfy the most diverse needs of communication and information, the demands of civil society to consolidate an atmosphere of media plurality have not been attended to. …”
    Get full text
    Article
  7. 35707

    A Review of Miniature Radio Transmitters for Wildlife Tracking by Sivan Toledo

    Published 2025-01-01
    “…This article surveys the literature on miniature radio transmitters designed to track free-ranging wild animals using emitter-localization techniques. …”
    Get full text
    Article
  8. 35708

    Ewaluacje konstruktywistyczne. Implikacje dla wczesnej edukacji by Henryk Mizerek

    Published 2020-12-01
    “…The content of the second part of the paper is devoted to analyze the problems of designing, planning and conducting programs implemented in early education. …”
    Get full text
    Article
  9. 35709

    Cross-domain access control policy mapping mechanism for balancing interoperability and autonomy by Tianyi ZHU, Fenghua LI, Wei JIN, Yunchuan GUO, Liang FANG, Lin CHENG

    Published 2020-09-01
    “…Cross-domain access control can improves interoperability but reduces intra-domain autonomy.To balance inter-domain interoperability and intra-domain autonomy,a cross-domain access control policy mapping to the problem of multi-objective integer optimization programming was formulated.Both the maximization of inter-domain interoperability and the minimization of intra-domain autonomy were taken as the objectives.Further,seven constraints were designed to prevent typical cross-domain conflicts.To solve the optimization problem,a constrained NSGA-III algorithm was proposed.The experimental results show that the proposed algorithm can quickly converge and accurately find the policy mapping even in the large-scale datasets.…”
    Get full text
    Article
  10. 35710

    Automatic Road Pavement Assessment with Image Processing: Review and Comparison by Sylvie Chambon, Jean-Marc Moliard

    Published 2011-01-01
    “…Third, an evaluation and comparison protocol which has been designed for evaluating this difficult task—the road pavement crack detection—is introduced. …”
    Get full text
    Article
  11. 35711

    A tactile sensor for recognition of softness using interlocking structure of carbon nanoparticle- polydimethylsiloxane composite by Sangmin Lee, Jaewon Jang, Wanjun Park

    Published 2025-06-01
    “…This study introduces a novel tactile sensor designed with an interlocking structure of polydimethylsiloxane (PDMS) embedded with carbon nanoparticles (CNP), aimed at enhancing the detection and differentiation of material softness. …”
    Get full text
    Article
  12. 35712

    CAE SIMULATION ANALYSIS AND RIG TEST VALIDATION RESEARCH OF AUTOMOBILE LEAFSPRING (MT) by CHEN WeiHuan, XIONG Wei, XIN JianWei, GE WenTao, Yu XianZhong, ZHOU XianSu

    Published 2023-01-01
    “…There are two methods to verify the durability characteristics of a new designed leafspring, there are physical test which takes more time and cost and CAE simulation which is time-saving and cost-saving. …”
    Get full text
    Article
  13. 35713

    DNS log analysis system based on big data fusion algorithm by Ming LIAO, Ming CHEN, Ji ZHOU, Xiaohua XIANG, Fang LI, Yefen JIAO

    Published 2019-05-01
    “…The existing problems of big data analysis of DNS logs in the current industry were summarized,and a DNS log analysis system based on big data fusion algorithm was designed.The system integrates six information databases,such as record information database,website database,domain name database,IP address database,CNAME domain name database and security information database.It has powerful log analysis performance,comprehensive content analysis,and classification.With high analysis depth and flexible report customization function,it can provide decision-making basis for telecom operators to improve the management efficiency,optimize network security and enhance the network rate.…”
    Get full text
    Article
  14. 35714

    Thrombolysis of Postoperative Acute Pulmonary Embolism with a Thrombus in Transit by Cynthia Mardinger, Paul J. E. Boiteau, John B. Kortbeek

    Published 2020-01-01
    “…Case reports of RHTT will inform future studies designed to evaluate whether and when thrombolysis should be administered.…”
    Get full text
    Article
  15. 35715

    ONSA:optimal non-uniformly statistic-source anonymity protocol in WSN by Xiao-guang NIU, Chuan-bo WEI, Wei-jiang FENG, Guo-jun PENG, Huan-guo ZHANG

    Published 2015-06-01
    “…According to the characteristics of hierarchical event source-location privacy (SLP) in wireless sensor networks (WSN).Firstly,the effect of the cluster size and the statistical property of fake packet injection on the privacy,latency and network traffic were analyzed.Then,an optimal non-uniformly statistic-source anonymity protocol (ONSA)was proposed to achieve source anonymity and reduce the network traffic.ONSA is designed to achieve a tradeoff between network traffic and real event report latency through adjusting the transmission rate and the radius of non-uniform clusters.The simulation results demonstrate that ONSA significantly reduces the network traffic while providing source anonymity and meeting the system requirement of the delay.…”
    Get full text
    Article
  16. 35716

    PRACTICE OF USING MANUFACTURING OUTSOURCING AND POSSIBLE SUPPLY CHAINS TRANSFORMATION IN THE FASHION INDUSTRY by N. Yu. Barkova

    Published 2020-07-01
    “…The main factors that are prerequisites for possible changes in the configuration of global supply chains in the fashion industry have been designated. The impact of digital technologies on the configuration of supply chains has been evaluated. …”
    Get full text
    Article
  17. 35717

    De l’innovation à un modèle de dynamique innovationnelle en enseignement supérieur by Christelle Lison, Denis Bédard, Chantale Beaucher, Denis Trudelle

    Published 2014-04-01
    “…The framework we have elaborated is designed for educational purposes and not technological purposes.…”
    Get full text
    Article
  18. 35718

    Emulation platform for inter-domain protocols validation of integrated space-terrestrial network by Zengyin YANG, Hewu LI, Qian WU, Jianping WU, Jun LIU

    Published 2019-05-01
    “…The inter-domain routing protocol is a key factor in the rapid integration of various satellite systems and heterogeneous networks in integrated space-terrestrial network (ISTN).However,the wide difference between network topologies of space and terrestrial networks may present significant challenges to the deployment of existing inter-domain protocols.To test the performance of these protocols,an emulation platform for ISTN was designed to efficiently emulate the dynamic and large-scale space network and the existing terrestrial networks using virtual network technology.Extensive experiments demonstrate that,with the expansion of the scale of space network and the scale of terrestrial Internet’s routing table,the integration efficiency between space and terrestrial networks becomes very low.…”
    Get full text
    Article
  19. 35719

    Research on anonymous identity authentication technology in Fabric by Yueyang YE, Xinglan ZHANG

    Published 2021-06-01
    “…Solving the privacy problem of users in the consortium blockchain becomes the key to accelerate the implementation of the practical application of blockchain.A set of anonymous identity authentication scheme based on PKI is designed based on Hyperledger Fabric platform, a typical representative of the consortium blockchain.By splitting the private key d into two parts, different roles use each private key to generate the joint signature of the anonymous certificate to achieve the separation of permissions in the process of certificate generation and solve the single point attack problem in the process of anonymous certificate tracking.The analysis shows that the improved scheme can achieve higher security than the original scheme with lower computing and storage overhead.…”
    Get full text
    Article
  20. 35720

    Finite-Time Pinning Synchronization Control for Coupled Complex Networks with Time-Varying Delays by Hebing Zhang, Xiaojing Zheng, Ning Li

    Published 2022-01-01
    “…Based on the finite-time stability theorem, a finite-time tractive synchronous controller is designed. In addition, the selection process of tractive nodes is developed to control as few nodes as possible such that all nodes are synchronized in the network in finite time. …”
    Get full text
    Article