Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
35701
Sick Day Management for Adults with Diabetes Who Take Insulin
Published 2012-03-01“…The best way for people with diabetes to prevent a minor illness from becoming a major illness is to have a personalized sick day plan designed with their health care provider before they get ill. …”
Get full text
Article -
35702
Evaluation of blended instruction based on network platform in cryptography teaching
Published 2019-06-01“…According to the characteristics of cryptography course,a hybrid teaching method was designed through the network platform.In order to get the implementation effect of teaching,the evaluation is made from five aspects:teaching method,teaching content,teaching attitude,teaching environment and comprehensive evaluation.The evaluation results show that students' learning effect is improved after using the blended teaching method.The feedback results suggest that we should constantly optimize the teaching content and teaching methods; improve the ability to control the classroom,guide students to learn; teamwork can improve efficiency and reduce the intensity of teachers.These results provide useful help for further improving the practical teaching of cryptography.…”
Get full text
Article -
35703
Novel approach based on neighborhood relation signature against polymorphic internet worms
Published 2011-01-01“…A class of neighborhood-relation signatures(NRS) was proposed based on neighborhood relationship between worm bytes.Because NRS embodies common characteristics of different morph of some polymorphic worms,Different patterns of polymorphic worms efficiently were detected.NRS generating algorithm(NRSGA) was designed to generate three types of signatures: 1-NRS,2-NRS and(1,2)-NRS.Some experiments were performed to demonstrate the correct-ness of the process of signatures generation and the effectiveness of NRS.Experiment results show that our approach has lower false negative ratio in detecting worms,and is effective to prevent polymorphic worms from propagating.…”
Get full text
Article -
35704
Finite Time Control for Fractional Order Nonlinear Hydroturbine Governing System via Frequency Distributed Model
Published 2016-01-01“…Furthermore, based on finite time stability and sliding mode control theory, a robust control law to ensure the occurrence of the sliding motion in a finite time is designed for stabilization of the fractional order HGS. …”
Get full text
Article -
35705
CFD Study of Industrial FCC Risers: The Effect of Outlet Configurations on Hydrodynamics and Reactions
Published 2012-01-01“…This paper presents a numerical study of the influence of different riser outlet designs on the dynamic of the flow and reactor efficiency. …”
Get full text
Article -
35706
‘New’ Radio Policies for Non-commercial Media in Mexico
Published 2014-05-01“…Despite the recent constitutional reforms that were announced as the beginning of new policies designed to satisfy the most diverse needs of communication and information, the demands of civil society to consolidate an atmosphere of media plurality have not been attended to. …”
Get full text
Article -
35707
A Review of Miniature Radio Transmitters for Wildlife Tracking
Published 2025-01-01“…This article surveys the literature on miniature radio transmitters designed to track free-ranging wild animals using emitter-localization techniques. …”
Get full text
Article -
35708
Ewaluacje konstruktywistyczne. Implikacje dla wczesnej edukacji
Published 2020-12-01“…The content of the second part of the paper is devoted to analyze the problems of designing, planning and conducting programs implemented in early education. …”
Get full text
Article -
35709
Cross-domain access control policy mapping mechanism for balancing interoperability and autonomy
Published 2020-09-01“…Cross-domain access control can improves interoperability but reduces intra-domain autonomy.To balance inter-domain interoperability and intra-domain autonomy,a cross-domain access control policy mapping to the problem of multi-objective integer optimization programming was formulated.Both the maximization of inter-domain interoperability and the minimization of intra-domain autonomy were taken as the objectives.Further,seven constraints were designed to prevent typical cross-domain conflicts.To solve the optimization problem,a constrained NSGA-III algorithm was proposed.The experimental results show that the proposed algorithm can quickly converge and accurately find the policy mapping even in the large-scale datasets.…”
Get full text
Article -
35710
Automatic Road Pavement Assessment with Image Processing: Review and Comparison
Published 2011-01-01“…Third, an evaluation and comparison protocol which has been designed for evaluating this difficult task—the road pavement crack detection—is introduced. …”
Get full text
Article -
35711
A tactile sensor for recognition of softness using interlocking structure of carbon nanoparticle- polydimethylsiloxane composite
Published 2025-06-01“…This study introduces a novel tactile sensor designed with an interlocking structure of polydimethylsiloxane (PDMS) embedded with carbon nanoparticles (CNP), aimed at enhancing the detection and differentiation of material softness. …”
Get full text
Article -
35712
CAE SIMULATION ANALYSIS AND RIG TEST VALIDATION RESEARCH OF AUTOMOBILE LEAFSPRING (MT)
Published 2023-01-01“…There are two methods to verify the durability characteristics of a new designed leafspring, there are physical test which takes more time and cost and CAE simulation which is time-saving and cost-saving. …”
Get full text
Article -
35713
DNS log analysis system based on big data fusion algorithm
Published 2019-05-01“…The existing problems of big data analysis of DNS logs in the current industry were summarized,and a DNS log analysis system based on big data fusion algorithm was designed.The system integrates six information databases,such as record information database,website database,domain name database,IP address database,CNAME domain name database and security information database.It has powerful log analysis performance,comprehensive content analysis,and classification.With high analysis depth and flexible report customization function,it can provide decision-making basis for telecom operators to improve the management efficiency,optimize network security and enhance the network rate.…”
Get full text
Article -
35714
Thrombolysis of Postoperative Acute Pulmonary Embolism with a Thrombus in Transit
Published 2020-01-01“…Case reports of RHTT will inform future studies designed to evaluate whether and when thrombolysis should be administered.…”
Get full text
Article -
35715
ONSA:optimal non-uniformly statistic-source anonymity protocol in WSN
Published 2015-06-01“…According to the characteristics of hierarchical event source-location privacy (SLP) in wireless sensor networks (WSN).Firstly,the effect of the cluster size and the statistical property of fake packet injection on the privacy,latency and network traffic were analyzed.Then,an optimal non-uniformly statistic-source anonymity protocol (ONSA)was proposed to achieve source anonymity and reduce the network traffic.ONSA is designed to achieve a tradeoff between network traffic and real event report latency through adjusting the transmission rate and the radius of non-uniform clusters.The simulation results demonstrate that ONSA significantly reduces the network traffic while providing source anonymity and meeting the system requirement of the delay.…”
Get full text
Article -
35716
PRACTICE OF USING MANUFACTURING OUTSOURCING AND POSSIBLE SUPPLY CHAINS TRANSFORMATION IN THE FASHION INDUSTRY
Published 2020-07-01“…The main factors that are prerequisites for possible changes in the configuration of global supply chains in the fashion industry have been designated. The impact of digital technologies on the configuration of supply chains has been evaluated. …”
Get full text
Article -
35717
De l’innovation à un modèle de dynamique innovationnelle en enseignement supérieur
Published 2014-04-01“…The framework we have elaborated is designed for educational purposes and not technological purposes.…”
Get full text
Article -
35718
Emulation platform for inter-domain protocols validation of integrated space-terrestrial network
Published 2019-05-01“…The inter-domain routing protocol is a key factor in the rapid integration of various satellite systems and heterogeneous networks in integrated space-terrestrial network (ISTN).However,the wide difference between network topologies of space and terrestrial networks may present significant challenges to the deployment of existing inter-domain protocols.To test the performance of these protocols,an emulation platform for ISTN was designed to efficiently emulate the dynamic and large-scale space network and the existing terrestrial networks using virtual network technology.Extensive experiments demonstrate that,with the expansion of the scale of space network and the scale of terrestrial Internet’s routing table,the integration efficiency between space and terrestrial networks becomes very low.…”
Get full text
Article -
35719
Research on anonymous identity authentication technology in Fabric
Published 2021-06-01“…Solving the privacy problem of users in the consortium blockchain becomes the key to accelerate the implementation of the practical application of blockchain.A set of anonymous identity authentication scheme based on PKI is designed based on Hyperledger Fabric platform, a typical representative of the consortium blockchain.By splitting the private key d into two parts, different roles use each private key to generate the joint signature of the anonymous certificate to achieve the separation of permissions in the process of certificate generation and solve the single point attack problem in the process of anonymous certificate tracking.The analysis shows that the improved scheme can achieve higher security than the original scheme with lower computing and storage overhead.…”
Get full text
Article -
35720
Finite-Time Pinning Synchronization Control for Coupled Complex Networks with Time-Varying Delays
Published 2022-01-01“…Based on the finite-time stability theorem, a finite-time tractive synchronous controller is designed. In addition, the selection process of tractive nodes is developed to control as few nodes as possible such that all nodes are synchronized in the network in finite time. …”
Get full text
Article