Showing 35,781 - 35,800 results of 46,768 for search '"Design"', query time: 0.18s Refine Results
  1. 35781

    Location publishing technology based on differential privacy-preserving for big data services by Lin ZHANG, Yan LIU, Ru-chuan WANG

    Published 2016-09-01
    “…Aiming at dealing with prospect knowledge and complex combinatorial attack,a new location big data publishing mechanism under differential privacy technology was given.And innovative usability evaluation feedback mechanism was designed.It gave corresponding solution details for the sensitive attributes and the identity recognition to analyze the quality of service,aimed at privacy protecting for location based big data under situations like combination of location information and non-location information and attacker’s arbitrary background knowledge.Simulation results based on different spatial indexing technology proved that the new publishing model has a higher accuracy under specified privacy conditions for the location query service.…”
    Get full text
    Article
  2. 35782

    Security considerations for smartphone devices by Almina Mušinbegović, Harun Alijagic, Amer Hrnjic, Ali Abd Almisreb

    Published 2024-12-01
    “… In the paper the ways in which smartphone devices are designed to be secure are investigated. Different approaches were examined for Windows, Android and alike, as well as diving into the three security layers or areas of security. …”
    Get full text
    Article
  3. 35783

    Developing Sign Displays for Conveying Information by Anna M. Prizzia, Mark E. Hostetler, Martin B. Main

    Published 2004-07-01
    “…As an illustration of this process, we discuss sign displays designed for homeowners in a residential community (Figure 1). …”
    Get full text
    Article
  4. 35784

    Worker Protection Standard: Notification and Hazard Communication by Frederick M. Fishel, Tatiana Sanchez

    Published 2016-11-01
    “… The Worker Protection Standard (WPS) is a Federal regulation designed to protect agricultural workers (people involved in the production of agricultural plants) and pesticide handlers (people mixing, loading, or applying pesticides or doing other tasks involving direct contact with pesticides). …”
    Get full text
    Article
  5. 35785

    Theoretical Basis for Classifying Hyperuniform States of Two-Component Systems by Hiroshi Frusawa

    Published 2025-01-01
    “…Our findings also offer valuable guidelines for designing multihyperuniform materials where each component preserves hyperuniformity, added to the overall hyperuniformity.…”
    Get full text
    Article
  6. 35786

    A Novel Scheme Adaptive Hybrid Dislocated Synchronization for Two Identical and Different Memristor Chaotic Oscillator Systems with Uncertain Parameters by Jie Chen, Junwei Sun, Ming Chi, Xin-Ming Cheng

    Published 2014-01-01
    “…The drive system is synchronized by the sum of hybrid dislocated state variables for the response system. By designing effective hybrid dislocated adaptive controller and hybrid dislocated adaptive law of the parameters estimation, we investigate the synchronization of two identical memristor chaotic oscillator systems and two different memristor chaotic oscillator systems with uncertain parameters. …”
    Get full text
    Article
  7. 35787

    Hypothetical 3D reconstruction of the tomb of the nomarch Ini from Gebelein by Wojciech Ejsmond, Jakub Stępnik

    Published 2024-12-01
    “…Blender, an open-source software designed for three-dimensional modeling, has been employed for the task. …”
    Get full text
    Article
  8. 35788

    Synchronization of General Complex Networks with Hybrid Couplings and Unknown Perturbations by Xinsong Yang, Shuang Ai, Tingting Su, Ancheng Chang

    Published 2013-01-01
    “…To overcome the bad effects of such perturbations, a simple but all-powerful robust adaptive controller is designed to synchronize the complex networks even without knowing a priori the functions and bounds of the perturbations. …”
    Get full text
    Article
  9. 35789

    Two-timescale unlicensed spectrum partitioning algorithm between LTE and Wi-Fi network by Weihua WU, Runzi LIU, Qinghai YANG

    Published 2021-03-01
    “…According to the spectrum partitioning decisions of Wi-Fi and LTE respectively depended on global channel state information (CSI) and local CSI, an online two-timescale iteration algorithm was developed.The Wi-Fi spectrum was partitioned at the large timescale according to the global CSI whereas the LTE spectrum was partitioned according to the fast-changing local CSI.Then, the adaptive compensation mechanism was designed for improving the tracking performance of the two-timescale algorithm.Moreover, the sufficient condition was derived for the two-timescale algorithm tracking the moving equilibrium point without errors.Finally, the simulation results show that the proposed two-timescale algorithm achieves excellent system performance at very low overhead.…”
    Get full text
    Article
  10. 35790

    Numerical study of a horizontal shower water heat recovery system by Purghel Dragoș, Teodosiu Cătălin Ioan

    Published 2025-01-01
    “…Based on these values, it can be concluded that the designed DWHR unit leads to satisfactory results considering cost-effectiveness reasons and maintenance.…”
    Get full text
    Article
  11. 35791

    PSGpower: A MATLAB toolbox for analyzing sleep EEG data by Ahren B. Fitzroy, Rebecca M.C. Spencer

    Published 2025-02-01
    “…PSGpower is a MATLAB toolbox designed to make these processing steps more efficient and standardized. …”
    Get full text
    Article
  12. 35792

    Dual use concerns of generative AI and large language models by Alexei Grinbaum, Laurynas Adomaitis

    Published 2024-12-01
    “…We suggest the implementation of the Dual Use Research of Concern (DURC) framework, originally designed for life sciences, to the domain of generative AI, with a specific focus on Large Language Models (LLMs). …”
    Get full text
    Article
  13. 35793

    Proof of work algorithm based on credit model by Zuan WANG, Youliang TIAN, Qiuxian LI, Xinhuan YANG

    Published 2018-08-01
    “…A consensus protocol based on the credit model was proposed.Firstly,the consensus agreement drew on the idea of personal credit risk assessment and a node credit model based on BP neural network was designed.Secondly,a piecewise rotation model was also constructed to segment the search space according to the node’s credit level to generate new blocks.At the same time,the possible attack of the protocol was analyzed and the vulnerability of this protocol was fixed.Finally,the simulation experiments show that the protocol not only effectively reduces the huge resource consumption in the process of new block generation,but also suppresses the generation of the large mine pool,making the whole blockchain system more secure and reliable.…”
    Get full text
    Article
  14. 35794

    Trusted access scheme for intranet mobile terminal based on encrypted SD card by Jiyang LI, Pengyuan ZHAO, Zhe LIU

    Published 2019-08-01
    “…In order to solve the problem of information security caused by illegal access of untrusted mobile terminals to intranet,a trusted access scheme for intranet mobile terminals based on encrypted SD card is designed.By using encrypted SD card as trusted hardware equipment,trusted start-up,integrity verification and Intranet trusted access of mobile terminal devices are realized.A secure storage and encrypted communication mechanism for data interaction between mobile terminal and Intranet is also created.The experimental results show that the scheme can effectively authenticate the security of mobile terminals without changing the basic architecture of mobile terminals,and to some extent protect the security of the Intranet environment.…”
    Get full text
    Article
  15. 35795

    Kinematical Analysis of Waist Structure of Single Drive Robot by Hu Yankai, Zheng Meng, Hou Zhao, Lin Yuanbin, He Beilin

    Published 2018-01-01
    “…Aiming at the situation that the robot is multi-driven and has complex kinematical characteristics and control system,a waist structure of robot with dodge function is designed,which has the characteristics of single-drive,multi-degree of freedom,simple structure,accurate and easy motion classification. …”
    Get full text
    Article
  16. 35796

    Application of Interactive Multi-Biometrics Recognition on E-Commerce by Ling Tan, Lu Zhang

    Published 2015-10-01
    “…An interactive multi-biometrics recognition method was proposed,and its application on e-commerce was researched from third-party payment platform.For our interactive multi-biometrics recognition,the identification of users was accomplished with the recognition of multi-biometrics features like nose,ear,and finger-knuckle-print.Payment confirmation and signature were achieved with interactive face scan and fingerprint identification.A frame of third party payment platform was designed,based on which a simple and light-weighted pre-authentication layered model for online payment was established.This model can well guarantee security and reliability of payers,sellers,and banks,simplify the process of payment for users as well.…”
    Get full text
    Article
  17. 35797

    Experimental Study on Precision Grinding of a Ball Screw Raceway by Song Xianchun, Yan Dong, Zhuang Lijun, Jia Xinpeng

    Published 2023-08-01
    “…On this basis, a four-factor three-level quadrature test is designed for the four main process parameters of grinding torque, grinding speed, grinding time and abrasive particle size in the grinding process of the lead screw; a set of optimal process parameters is obtained by taking the surface roughness of the lead screw as the detection index. …”
    Get full text
    Article
  18. 35798

    River Water Quality Monitoring Through IoT Enabled Technologies by Rita de Fátima Muniz, Badria Almaz Ali Yousif, Azadeh Shemshad

    Published 2022-03-01
    “…Then the data that we collect using various equipment and be analyzed using the software that we have designed. Other than that, the hardware of the system, data visualization, software, we automate the process of monitoring This water quality monitoring system has been the major issue and can be use the digital, intelligent, and effectively gives the quality of river water.…”
    Get full text
    Article
  19. 35799

    Parameterized Local Reduction of Decision Systems by Degang Chen, Yanyan Yang, Xiao Zhang

    Published 2012-01-01
    “…The existing attribute reductions are designed to just keep confidence of every certain rule as they cannot identify key conditional attributes explicitly for special decision rules. …”
    Get full text
    Article
  20. 35800

    Topological Modification of a Helical Gear with Circular Tooth Profile in Gear Cutter and Tooth Drum-shaped by Zhang Xijin, Jiang Jinke, Jia Chao, Hou Xiangying, Yang Qian

    Published 2018-01-01
    “…Based on the gear meshing theory and the tooth contact analysis(TCA) technology,the modification parameters for helical gear are designed,and error sensitivity is studied,that is,the effects of helix angle and pressure angle errors on the transmission error and contact trace. …”
    Get full text
    Article