Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
35781
Location publishing technology based on differential privacy-preserving for big data services
Published 2016-09-01“…Aiming at dealing with prospect knowledge and complex combinatorial attack,a new location big data publishing mechanism under differential privacy technology was given.And innovative usability evaluation feedback mechanism was designed.It gave corresponding solution details for the sensitive attributes and the identity recognition to analyze the quality of service,aimed at privacy protecting for location based big data under situations like combination of location information and non-location information and attacker’s arbitrary background knowledge.Simulation results based on different spatial indexing technology proved that the new publishing model has a higher accuracy under specified privacy conditions for the location query service.…”
Get full text
Article -
35782
Security considerations for smartphone devices
Published 2024-12-01“… In the paper the ways in which smartphone devices are designed to be secure are investigated. Different approaches were examined for Windows, Android and alike, as well as diving into the three security layers or areas of security. …”
Get full text
Article -
35783
Developing Sign Displays for Conveying Information
Published 2004-07-01“…As an illustration of this process, we discuss sign displays designed for homeowners in a residential community (Figure 1). …”
Get full text
Article -
35784
Worker Protection Standard: Notification and Hazard Communication
Published 2016-11-01“… The Worker Protection Standard (WPS) is a Federal regulation designed to protect agricultural workers (people involved in the production of agricultural plants) and pesticide handlers (people mixing, loading, or applying pesticides or doing other tasks involving direct contact with pesticides). …”
Get full text
Article -
35785
Theoretical Basis for Classifying Hyperuniform States of Two-Component Systems
Published 2025-01-01“…Our findings also offer valuable guidelines for designing multihyperuniform materials where each component preserves hyperuniformity, added to the overall hyperuniformity.…”
Get full text
Article -
35786
A Novel Scheme Adaptive Hybrid Dislocated Synchronization for Two Identical and Different Memristor Chaotic Oscillator Systems with Uncertain Parameters
Published 2014-01-01“…The drive system is synchronized by the sum of hybrid dislocated state variables for the response system. By designing effective hybrid dislocated adaptive controller and hybrid dislocated adaptive law of the parameters estimation, we investigate the synchronization of two identical memristor chaotic oscillator systems and two different memristor chaotic oscillator systems with uncertain parameters. …”
Get full text
Article -
35787
Hypothetical 3D reconstruction of the tomb of the nomarch Ini from Gebelein
Published 2024-12-01“…Blender, an open-source software designed for three-dimensional modeling, has been employed for the task. …”
Get full text
Article -
35788
Synchronization of General Complex Networks with Hybrid Couplings and Unknown Perturbations
Published 2013-01-01“…To overcome the bad effects of such perturbations, a simple but all-powerful robust adaptive controller is designed to synchronize the complex networks even without knowing a priori the functions and bounds of the perturbations. …”
Get full text
Article -
35789
Two-timescale unlicensed spectrum partitioning algorithm between LTE and Wi-Fi network
Published 2021-03-01“…According to the spectrum partitioning decisions of Wi-Fi and LTE respectively depended on global channel state information (CSI) and local CSI, an online two-timescale iteration algorithm was developed.The Wi-Fi spectrum was partitioned at the large timescale according to the global CSI whereas the LTE spectrum was partitioned according to the fast-changing local CSI.Then, the adaptive compensation mechanism was designed for improving the tracking performance of the two-timescale algorithm.Moreover, the sufficient condition was derived for the two-timescale algorithm tracking the moving equilibrium point without errors.Finally, the simulation results show that the proposed two-timescale algorithm achieves excellent system performance at very low overhead.…”
Get full text
Article -
35790
Numerical study of a horizontal shower water heat recovery system
Published 2025-01-01“…Based on these values, it can be concluded that the designed DWHR unit leads to satisfactory results considering cost-effectiveness reasons and maintenance.…”
Get full text
Article -
35791
PSGpower: A MATLAB toolbox for analyzing sleep EEG data
Published 2025-02-01“…PSGpower is a MATLAB toolbox designed to make these processing steps more efficient and standardized. …”
Get full text
Article -
35792
Dual use concerns of generative AI and large language models
Published 2024-12-01“…We suggest the implementation of the Dual Use Research of Concern (DURC) framework, originally designed for life sciences, to the domain of generative AI, with a specific focus on Large Language Models (LLMs). …”
Get full text
Article -
35793
Proof of work algorithm based on credit model
Published 2018-08-01“…A consensus protocol based on the credit model was proposed.Firstly,the consensus agreement drew on the idea of personal credit risk assessment and a node credit model based on BP neural network was designed.Secondly,a piecewise rotation model was also constructed to segment the search space according to the node’s credit level to generate new blocks.At the same time,the possible attack of the protocol was analyzed and the vulnerability of this protocol was fixed.Finally,the simulation experiments show that the protocol not only effectively reduces the huge resource consumption in the process of new block generation,but also suppresses the generation of the large mine pool,making the whole blockchain system more secure and reliable.…”
Get full text
Article -
35794
Trusted access scheme for intranet mobile terminal based on encrypted SD card
Published 2019-08-01“…In order to solve the problem of information security caused by illegal access of untrusted mobile terminals to intranet,a trusted access scheme for intranet mobile terminals based on encrypted SD card is designed.By using encrypted SD card as trusted hardware equipment,trusted start-up,integrity verification and Intranet trusted access of mobile terminal devices are realized.A secure storage and encrypted communication mechanism for data interaction between mobile terminal and Intranet is also created.The experimental results show that the scheme can effectively authenticate the security of mobile terminals without changing the basic architecture of mobile terminals,and to some extent protect the security of the Intranet environment.…”
Get full text
Article -
35795
Kinematical Analysis of Waist Structure of Single Drive Robot
Published 2018-01-01“…Aiming at the situation that the robot is multi-driven and has complex kinematical characteristics and control system,a waist structure of robot with dodge function is designed,which has the characteristics of single-drive,multi-degree of freedom,simple structure,accurate and easy motion classification. …”
Get full text
Article -
35796
Application of Interactive Multi-Biometrics Recognition on E-Commerce
Published 2015-10-01“…An interactive multi-biometrics recognition method was proposed,and its application on e-commerce was researched from third-party payment platform.For our interactive multi-biometrics recognition,the identification of users was accomplished with the recognition of multi-biometrics features like nose,ear,and finger-knuckle-print.Payment confirmation and signature were achieved with interactive face scan and fingerprint identification.A frame of third party payment platform was designed,based on which a simple and light-weighted pre-authentication layered model for online payment was established.This model can well guarantee security and reliability of payers,sellers,and banks,simplify the process of payment for users as well.…”
Get full text
Article -
35797
Experimental Study on Precision Grinding of a Ball Screw Raceway
Published 2023-08-01“…On this basis, a four-factor three-level quadrature test is designed for the four main process parameters of grinding torque, grinding speed, grinding time and abrasive particle size in the grinding process of the lead screw; a set of optimal process parameters is obtained by taking the surface roughness of the lead screw as the detection index. …”
Get full text
Article -
35798
River Water Quality Monitoring Through IoT Enabled Technologies
Published 2022-03-01“…Then the data that we collect using various equipment and be analyzed using the software that we have designed. Other than that, the hardware of the system, data visualization, software, we automate the process of monitoring This water quality monitoring system has been the major issue and can be use the digital, intelligent, and effectively gives the quality of river water.…”
Get full text
Article -
35799
Parameterized Local Reduction of Decision Systems
Published 2012-01-01“…The existing attribute reductions are designed to just keep confidence of every certain rule as they cannot identify key conditional attributes explicitly for special decision rules. …”
Get full text
Article -
35800
Topological Modification of a Helical Gear with Circular Tooth Profile in Gear Cutter and Tooth Drum-shaped
Published 2018-01-01“…Based on the gear meshing theory and the tooth contact analysis(TCA) technology,the modification parameters for helical gear are designed,and error sensitivity is studied,that is,the effects of helix angle and pressure angle errors on the transmission error and contact trace. …”
Get full text
Article