Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
35801
Reinforcement learning based recovery flight control for flapping-wing micro-aerial vehicles under extreme attitudes
Published 2025-01-01“…Then, a hybrid control approach is designed to significantly improve the flight stability by combining the reinforcement learning-based control approach with the proportional-derivative control approach. …”
Get full text
Article -
35802
King-Type Derivative-Free Iterative Families: Real and Memory Dynamics
Published 2017-01-01“…From the error equation of this class, different families of iterative schemes with memory can be designed increasing the order of convergence up to six. …”
Get full text
Article -
35803
Complex Dynamics in a Singular Delayed Bioeconomic Model with and without Stochastic Fluctuation
Published 2015-01-01“…The conditions of singularity induced bifurcation are gained, and a state feedback controller is designed to eliminate such bifurcation. Furthermore, saddle-node bifurcation is also showed. …”
Get full text
Article -
35804
Research on extended access control mechanism in online social network
Published 2021-10-01“…Aiming at the problem of inability to extend control over the data published by users in social networks, an extended access mechanism based on privacy labels was proposed.This mechanism granted users and data different types of labels based on the number of user relationship hops and resource forwarding hops, so as to achieve fine-grained extended access control to the data.The generation algorithm and distribution method of privacy labels were proposed.The constraint rules of privacy label were designed and the possible policy conflicts were analyzed.Finally, the test proves that the mechanism achieves fine-grained extended control in social networks, and proves its security and validity of the mechanism.…”
Get full text
Article -
35805
Research on industrial control system intrusion detection method based on simulation modelling
Published 2017-07-01“…At present,intrusion detection system over fieldbus network layer was a basic protection method in industrial control system.However,it has some weakness,such as poor generality,high false-positive rate,and unable to detect unknown anomaly.An industrial control system intrusion detection method based on fieldbus network equipment simulation was proposed.The method prevented control program from being tampered or destroyed based on controller simulation modelling.Controlled object simulation modelling was designed for ensuring that the system input was credible.Thus the intrusion detection of industrial control network was realized.At last,the results indicate that the proposed intrusion detecting method is available.…”
Get full text
Article -
35806
Creating Work and Family Balance: Workshop Evaluation
Published 2012-01-01“…Workshop presenters: the evaluation instrument described in this article provides a simple and streamlined way to conduct a useful evaluation and solicit feedback for program refinement. It was designed to accompany a Florida Cooperative Extension Service workshop, Creating Work and Family Balance. …”
Get full text
Article -
35807
Combined Homing Guidance Law of Torpedo Based on Fuzzy Control
Published 2024-12-01“…For this reason, this paper designs a fuzzy combined guidance law based on the principle of fuzzy control by combining three different typical guidance methods, namely, fixed lead angle guidance method, proportional guidance method, and variable structure guidance method. …”
Get full text
Article -
35808
Secure interface architecture for the software defined system on wafer
Published 2024-10-01“…And then an arbitration scheduling mechanism was designed to achieve threat localization and dynamic reconfiguration. …”
Get full text
Article -
35809
Sliding-Mode Control of the Active Suspension System with the Dynamics of a Hydraulic Actuator
Published 2018-01-01“…Based on the proposed model, a sliding-mode control method is designed to control the active suspension system. Stability proof and analysis of the closed-loop system of the active suspension is given by using Lyapunov stability theory. …”
Get full text
Article -
35810
Introduction to a lecture series on wind-wildlife interactions
Published 2023-10-01“…This introductory lecture launches a series designed to review background information, concepts, and techniques that reflect the state of the art in the science, mitigation, and policy regarding windwildlife interactions within the USA. …”
Get full text
Article -
35811
Fire safety of a novel concept of ventilated façade integrating Phase Change Materials
Published 2025-01-01“…Ventilated facades represent a modern solution increasingly adopted in smart, low-energy building designs. A critical consideration in the implementation of these systems is ensuring fire resistance while simultaneously minimizing the risk of fire propagation. …”
Get full text
Article -
35812
How 3D Interaction Metaphors Affect User Experience in Collaborative Virtual Environment
Published 2011-01-01“…These findings provide a basis for designing 3D navigation techniques in a CVE.…”
Get full text
Article -
35813
Clustering algorithm preserving differential privacy in the framework of Spark
Published 2016-11-01“…Aimed at the problem that traditional methods fail to deal with malicious attacks with arbitrary background knowledge during the process of massive data clustering analysis,an improved clustering algorithm, especially designed for preserving differential privacy,under the framework of Spark was proposed.Furthermore,it’s theoretically proved to meet the standard of ε-differential privacy in the framework of Spark platform.Finally,experimental results show that guaranteeing the availability of proposed clustering algorithm,the improved algorithm has an advantage over privacy protection and satisfaction in the aspect of time as well as efficiency.Most importantly,the proposed algorithm shows a good application prospect in the analysis of data clustering preserving privacy protection and data security.…”
Get full text
Article -
35814
Research on system call forwarding mechanism of SGX-based LibOS
Published 2024-10-01“…SGX-based LibOS are designed to run unmodified applications within SGX Enclave, but differences in their architecture, system call simulation, and system call forwarding can make them difficult to use and debug. …”
Get full text
Article -
35815
Single-Layer Circularly Polarized Wide Band Reflectarray Antenna with High Aperture Efficiency
Published 2018-01-01“…For experimental verification, an array of 25 × 25 reflectarray prototype has been designed and manufactured by employing the angular rotation technique. …”
Get full text
Article -
35816
Understanding Extension for School-Based Agricultural Education #1: Extension 101
Published 2020-11-01“… This article and series were designed primarily for use by secondary agriscience teachers in school-based agricultural education programs (SBAE) to help build a strong understanding of Extension and the role of Extension professionals. …”
Get full text
Article -
35817
Malicious PDF document detection based on mixed feature
Published 2019-02-01“…Aiming at the problem of poor robustness and easy to evade detection in the detection of malicious PDF document,a malicious PDF document detection method based on mixed features was proposed.It adopted dynamic and static analysis technology to extract the regular information,structure information and API calling information from the document,and then a feature extraction method based on K-means clustering algorithm was designed to filter and select the key mixed features that characterize the document security.Ultimately,it improved the robustness of features.On this basis,it used random forest algorithm to construct classifier and perform experiment to discuss the detection performance of the scheme and its ability to resist mimicry attacks.…”
Get full text
Article -
35818
Key Plant, Key Pests: Sycamore (Platanus spp.)
Published 2021-03-01“… This series of Key Plant, Key Pests publications are designed for Florida gardeners, horticulturalists, and landscape professionals to help identify common pests associated with regional flora. …”
Get full text
Article -
35819
Coronavirus Crisis: Government Aid That Also Promotes Employee Ownership
Published 2020-06-01“…In the current deeper crisis, aid should be designed to create a fairer, more inclusive and more socially responsible economy by promoting employee ownership as both an incentive and a reward. …”
Get full text
Article -
35820
Time-Domain Characterization of Dual Band Spiral Antenna with WMTS/UWB Application
Published 2017-01-01“…A coplanar waveguide- (CPW-) fed spiral antenna with dual band application is presented. The antenna is designed to operate over the UWB (3.1–10.6 GHz) band as well as in a lower band suitable for WMTS (1.395–1.4 GHz). …”
Get full text
Article