Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
35721
Blockchain trading mechanism based on attached chain for the delay tolerant network
Published 2020-11-01“…In order to deploy a blockchain on the non-continuous connectivity delay tolerant network,a blockchain trading mechanism was designed,which could run on this type of network.First,the identifier was introduced into the existing block structure and a block structure on the attached chain was presented,which could append the blocks generated during network disconnection.Then,the approaches including the block package,block mining and block consensus on the attached chain were proposed.Finally,a confirming consensus approach was presented to avoid block fraud in the process of appending the attached chain.Through theoretical proof and experimental analysis,the proposed mechanism can support blockchain trading in the delay tolerant network.…”
Get full text
Article -
35722
„Uwspólnione” tworzenie sensu w interakcji dziecka z dorosłym
Published 2018-09-01“…In the didactical intervention operations designed, the research data came from participated observation, focus interview, and children’s production analysis (graphical visualization, pairedassociate learning tasks and tests of unfinished tasks). …”
Get full text
Article -
35723
Research on the privacy-preserving point-in-polygon protocol
Published 2016-04-01“…First, an blivious point-line protocol was designed by extending the traditional point-line protocol, making the use of 1-out-n oblivious transfer and the geometric properties of the vector. …”
Get full text
Article -
35724
2003 Handbook of Employment Regulations Affecting Florida Farm Employers and Workers: Transportation -- Alcohol and Drug Testing [Federal]
Published 2003-07-01“… The purpose of Alcohol and Drug Testing is to establish programs designed to help prevent accidents and injuries resulting from the misuse of alcohol or use of controlled substances by drivers of commercial motor vehicles. . …”
Get full text
Article -
35725
Epoxidation of Alkenes with Molecular Oxygen Catalyzed by Immobilized Co(acac)2 and Co(bpy)2Cl2 Complexes within Nanoreactors of Al-MCM-41
Published 2012-01-01“…Cobalt complexes with different ligands such as bipyridine, and acetylacetonate were immobilized within nanoreactors of Al-MCM-41, designated as Co(acac)2/Al-MCM-41 and Co(bipy)22+/Al-MCM41. …”
Get full text
Article -
35726
Research on networking troubleshooting method based on software defined network
Published 2016-12-01“…Based on the reaserch status of networking troubleshooting in software defined network,a new net-working troubleshooting method was proposed.A TCP packet marked in head field was sent and detailed forward information in every hop would be written in its data filed once the test packet was matched.Taking advantages of the programmable feature of the controller and OpenFlow extensible match,special flow table was designed for matching test-used packet.The analysis module extracted and split the forward information,and thus printed the suspicious network problem which can be used to track and located the problematic network node.The experiment results indicate that the proposed method is fairy efficient.…”
Get full text
Article -
35727
Experimental Protocol for Color Difference Evaluation Under Stabilized LED Light
Published 2024-12-01“…First, a set of color patches should be selected or designed for the specific purpose of the experiment to be carried out. …”
Get full text
Article -
35728
Lightweight integrity verification scheme for cloud based group data
Published 2016-10-01“…In order to protect the security of the data stored in the cloud by group users,a data integrity verification scheme was designed which can protect the privacy of the group users.The scheme can efficiently detect the shared data in the cloud and support the dynamic updating of the data,and use the characteristic of the ring signature to hide the iden-tity of the signer corresponding to the data block.That is,the third-party verifier can not spy on the users identity and other private information when validating.The aggregated approach is used to generate data labels,which reduces the storage cost of labels and supports the dynamic operation of group data,so that the users in the group can easily modify the cloud group data.…”
Get full text
Article -
35729
Chaos and Dynamics Induced by the Amplitude of Load Torque: Analysis and Control
Published 2022-01-01“…Furthermore, an analog circuit is designed and implemented in OrCAD-PSpice software to verify the numerical results and good agreement is observed with numerical results.…”
Get full text
Article -
35730
A comprehensive Python tool for interval valued bipolar Neutro-sophic sets and operations
Published 2025-03-01“…While applications for IVNS environments have been established, this chapter proposes a novel Python toolbox specifically designed for handling Interval Valued Bipolar Neutrosophic Sets (IVBNSs) within the neutrosophic framework. …”
Get full text
Article -
35731
Study of the Mg-Nd alloy obtained by electrolysis in molten oxifluoride media
Published 2003-01-01“…An electrolysis cell was designed having the anode made of super dense graphite and the cathode made of molybdenum metal. …”
Get full text
Article -
35732
An Ecological Approach to Contemporary Rural Identities: The Case of Tourism Farms in South-East Estonia
Published 2011-03-01“…We focus on how tourism farmers use the potential of their living environment, consisting of both cultural and natural elements, for designing and mediating certain affordances for activities that can be performed in their farms. …”
Get full text
Article -
35733
Analysis of Structure Strength of A Gear- box in Light Truck
Published 2016-01-01“…Those analysis provide an important experimental basis for designing and manufacturing gearboxes.…”
Get full text
Article -
35734
Hybrid electroconvulsive therapy in an adolescent with major depressive disorder: a case report
Published 2025-01-01“…We tried to preserve the rapid relief of depressive symptoms in electroconvulsive therapy (ECT) while causing less cognitive impairment, thus designing the hybrid-ECT (HECT), a modified ECT therapy. …”
Get full text
Article -
35735
The Urgency of Job Loss Security Program for the Protection of Human Rights
Published 2024-09-01“…Jaminan Kehilangan Pekerjaan (JKP) or The Job Loss Security Program is a recent government initiative designed to enhance legal, economic, and social protection for workers affected by Termination of Employment. …”
Get full text
Article -
35736
Combination-Combination Projective Synchronization of Multiple Chaotic Systems Using Sliding Mode Control
Published 2018-01-01“…Concretely, on the basic of the adaptive laws and stability theory, the corresponding sliding mode control surfaces and controllers are designed to achieve the combination-combination projective synchronization between the combination of two chaotic systems as drive system and the combination of multiple chaotic systems as response system with disturbances. …”
Get full text
Article -
35737
Research and implement of embedded wireless mobile communication system
Published 2008-01-01“…Furthermore, according to software engineering principle, the general frame was designed to gener- ate embedded network protocol by UML state machine technology. …”
Get full text
Article -
35738
Analisis SWOT (strengths, weaknesses, opportunities, threats) pusat informasi dan konseling remaja (pik-remaja)
Published 2021-02-01“…The strength of the PIK-Remaja program is that it is a program designed with peer counseling as and integrated with social and religious institutions. …”
Get full text
Article -
35739
Technique of analyzing device drivers of embedded linux system using UML
Published 2012-11-01“…A method to model and analyze the device drivers in embedded Linux system using UML was proposed.By using UML modeling method,the dependencies among the device driver components and the focus of the device driver development are clarified.On this basis,the SDWiFi device driver model was studied,the SDIO communication interface between the host and Wi-Fi chips was designed and the SDWiFi device driver was transplanted.At last,the SDWiFi wireless LAN equipment was configured and tested using wireless tools.The test results show that the SDWiFi wireless LAN equipment works properly.The efficiency of the device driver development is improved by modeling and analyzing the device drivers using UML.…”
Get full text
Article -
35740
Developing English Language Teachers’ Action Research Competencies Through an Exploratory Action Research Project
Published 2025-01-01“…Data reveal that each participating teacher critically reflected on the teaching context, selected a research question, collected and interpreted evidence, designed and evaluated an action, and disseminated their research. …”
Get full text
Article