Showing 35,761 - 35,780 results of 46,768 for search '"Design"', query time: 0.18s Refine Results
  1. 35761

    Tunable Inductors Using Integrated Vanadium Dioxide Phase Change Thin Films by Liangyu Li, Weisong Wang, Eunsung Shin, Guru Subramanyam

    Published 2018-01-01
    “…This paper presents tunable inductors designed with vanadium dioxide (VO2) thin film to implement tunability. …”
    Get full text
    Article
  2. 35762

    Understanding Extension for School-Based Agricultural Education #1: Extension 101 by Debra Barry, John Diaz, Alyssa Shepherd, Jennifer Patton, Stephen Gran

    Published 2020-11-01
    “… This article and series were designed primarily for use by secondary agriscience teachers in school-based agricultural education programs (SBAE) to help build a strong understanding of Extension and the role of Extension professionals. …”
    Get full text
    Article
  3. 35763

    Routing algorithm based on characteristics analysis of vehicle trace in vehicular ad hoc network by Hua TAO, Fu-qin FENG, Peng XIAO, Cheng-wei TAN, Jun TAO

    Published 2016-06-01
    “…The coarse granularity vehicle mobility information is extracted from the vehicle trace data.Then a fine granularity mobility model was presented based on the coarse-grained mobility information.Based on the mobility model,a VANET routing algorithm,RPT-D,was proposed to quickly deliver the packets to the destination according to the mobility attributes.The RPT-GA algorithm,which was integrated with the QoS demands in the path selection objective,was designed.Finally,through the extensive simulations,the proposed algorithms are compared with other typical VANET routing algorithms,IGRP and GPSR,in terms of the transmission latency,the delivery ratio,the hop count and the extra package number.The simulation results verify the performance of the proposed algorithms.…”
    Get full text
    Article
  4. 35764

    Social Reflections of the Employment of Recreation Specialists in Turkey by Sefa Şahan Birol, Elif Birol

    Published 2022-09-01
    “…This research is structured using qualitative research methods and techniques and is designed as theoretical analytical research. A document analysis approach was used when collecting qualitative data, while a descriptive analysis approach was used in the solution of the data. …”
    Get full text
    Article
  5. 35765

    Analysis of students self-efficacy level by Cindy Asli Pravesti, Elia Firda Mufidah, Eva Nanda Nurlitasani, Maghfirotul Lathifah, Peppy Sisca Dwi Wulansari

    Published 2024-12-01
    “…These findings can assist counselors in designing effective guidance and counseling programs to help students at SMPN 9 Blitar achieve their developmental tasks optimally.…”
    Get full text
    Article
  6. 35766

    Fomes weberianus, 50 years of taxonomic confusion: lectotypification and taxonomic notes by Cony Decock, Milay Cabarroi-Hernández, Laura Guzmán-Dávalos, Paul M. Kirk, José Ángel García-Beltrán, Mario Amalfi

    Published 2024-06-01
    “…A new lectotype was designated and the species was re-described under the correct interpretation Phylloporia weberiana.…”
    Get full text
    Article
  7. 35767

    La lecture d’album au cycle 3 : regard réflexif sur quelques choix d’une équipe de recherche pluricatégorielle et pluridisciplinaire by Anne Leclaire-Halté

    Published 2015-06-01
    “…Its purpose is to shed light on the choices made by a multi-categorical and multidisciplinary team regarding the creation of a teaching sequence designed to train teachers. This sequence was created after some observations were made during a descriptive research phase on regular habits concerning the reading of picture books from third grade to fifth grade. …”
    Get full text
    Article
  8. 35768

    Full Mouth Rehabilitation with All-on-Six Endosseous Implants with Upper and Lower Arch - A Case Report by Gaurav Tripathi, Juhi Thadlani, Tushar Tanwani, Gaurav Agrawal, Sudeepti Soni, Ankita Shrivastava

    Published 2024-12-01
    “…The final prosthesis, consisting of a Direct Metal Laser Sintering (DMLS) framework with Zirconia crowns, was designed to ensure optimal aesthetics and function. …”
    Get full text
    Article
  9. 35769

    Stochastic Synchronization of Neutral-Type Neural Networks with Multidelays Based on M-Matrix by Wuneng Zhou, Xueqing Yang, Jun Yang, Jun Zhou

    Published 2015-01-01
    “…The problem of stochastic synchronization of neutral-type neural networks with multidelays based on M-matrix is researched. Firstly, we designed a control law of stochastic synchronization of the neural-type and multiple time-delays neural network. …”
    Get full text
    Article
  10. 35770

    Anonymous aggregator election protocol for wireless sensor networks by Shuai FU, Jian-feng MA, Hong-tao LI, GQi JIAN

    Published 2015-02-01
    “…An anonymous cluster head election protocol in clustered wireless sensor networks was proposed.The protocol detailed the decision rules and mode of cluster construction while an anonymous veto protocol based on bilinear pairings was adopted to verify election results,ensuring the successful election of cluster heads.A corresponding anonymous data aggregation scheme was designed,through which data aggregation can be accomplished without revealing the identities of aggregators.Extensive analysis and simulation results show that the proposed protocol achieves anonymity,energy efficiency and security of cluster heads election simultaneously and can resist eavesdropping attacks,node compromise attacks and collusion attacks effectively.…”
    Get full text
    Article
  11. 35771

    Finite-Time Antisaturation Tracking Control for Hypersonic Vehicle with Uncertain Dynamics by Yuwei Cui, Yushan He, Aijun Li, Jun Li, Shuo Song

    Published 2020-01-01
    “…An adaptive neural finite-time backstepping control strategy is constructed by designing modified virtual commands and compensation signals. …”
    Get full text
    Article
  12. 35772

    Exponential Passification of Markovian Jump Nonlinear Systems with Partially Known Transition Rates by Mengzhuo Luo, Shouming Zhong

    Published 2012-01-01
    “…Based on the condition, desired state-feedback controllers are designed, which guarantee that the closed-loop MJS is exponentially passive. …”
    Get full text
    Article
  13. 35773

    Pesticide Safety Miniposter: Triple Rinse Steps by Rebecca W. Baldwin, Stephanie K. Larrick Hill, Philip Koehler, W. Walker, J. C. Medley

    Published 2012-10-01
    “…This poster will serve as a valuable training tool for new technicians and a refresher tool for pesticide applicators. Designed by R.W. Baldwin, S.K. Hill, Philip Koehler, W. …”
    Get full text
    Article
  14. 35774

    Pesticide Safety Miniposter: Triple Rinse Steps by Rebecca W. Baldwin, Stephanie K. Larrick Hill, Philip Koehler, W. Walker, J. C. Medley

    Published 2012-10-01
    “…This poster will serve as a valuable training tool for new technicians and a refresher tool for pesticide applicators. Designed by R.W. Baldwin, S.K. Hill, Philip Koehler, W. …”
    Get full text
    Article
  15. 35775

    2003 Handbook of Employment Regulations Affecting Florida Farm Employers and Workers: Transportation -- Alcohol and Drug Testing [Federal] by Leo C. Polopolus, Michael T. Olexa, Fritz Roka, Carol Fountain

    Published 2003-07-01
    “… The purpose of Alcohol and Drug Testing is to establish programs designed to help prevent accidents and injuries resulting from the misuse of alcohol or use of controlled substances by drivers of commercial motor vehicles. . …”
    Get full text
    Article
  16. 35776

    Robust Output Feedback Disturbance Rejection Control by Simultaneously Estimating State and Disturbance by Jeang-Lin Chang

    Published 2011-01-01
    “…This paper tackles the problem of simultaneous estimation of the state and the unknown disturbance of an MIMO disturbed system and designs the disturbance rejection controller according to the estimation information. …”
    Get full text
    Article
  17. 35777

    Optimization of task scheduling for computing reuse in computing power network by Yunxiao MA, Zhonghui WU, Zuyun XU, Lujie ZHONG, Changqiao XU

    Published 2023-11-01
    “…To cope with the challenges posed by the future explosive growth in computing power demand, computing reuse technology was introduced into the computing power network to reduce service latency and computational resource consumption by reusing the results of computational tasks.Based on this, a service federation-based context-aware online learning algorithm was proposed.First, the reuse index was designed to reduce the extra lookup latency.Then, online learning was performed based on the service federation mechanism to make computational task scheduling decisions according to contextual information and historical experience.The experimental results show that the proposed algorithm outperforms the baseline algorithms in terms of service latency and computational resource consumption.…”
    Get full text
    Article
  18. 35778

    Research progress of digital image forensic techniques based on deep learning by Tong QIAO, Hongwei YAO, Binmin PAN, Ming XU, Yanli CHEN

    Published 2021-10-01
    “…In the new era of rapid development of internet, where massive forgery images with updated tampering techniques flood into, traditional algorithms are no longer able to deal with the latest multimedia tampering techniques, especially those caused by Deepfake and deep learning techniques.Thus, a universal framework for image forensics including image pre-processing module, feature extraction module and post-processing module designed for specific classification were proposed creatively.Accordingly, the state-of-the-art algorithms were reviewed,and meanwhile the main strength and limitations of current algorithms were generalized.More importantly, the future studies were also listed for advancing the development of digital image forensics.…”
    Get full text
    Article
  19. 35779

    Comparative analysis of single-stage reciprocating compressor compressing different gases by A. A. Kotlov, A. B. Burakov

    Published 2019-12-01
    “…The quality of the designed equipment is determined by the level of knowledge of the object and the perfection of methods for calculating its state. …”
    Get full text
    Article
  20. 35780

    Research on the security audit model in intrusion prevention based on write-related support vector data description by LUO Jun, PAN Zhi-song, MIAO Zhi-min, HU Gu-yu

    Published 2007-01-01
    “…The security audit model based on write-related SVDD was designed to resolve the one-class problem.Once the classifier has been trained using the write-related subset,all activities deviated from the normal patterns are classified as potential intrusion.The proposed one-class classification algorithms can be implemented to build up an anomaly detection system by using only normal samples and the algorithms also makes the security audit system detect the new anomaly behaviors.In the experiments,the One-class classifier acquires nearly 100% detection rate and average zero false alarm rate for sequences of system calls based on a small training dataset.…”
    Get full text
    Article