Showing 35,801 - 35,820 results of 46,768 for search '"Design"', query time: 0.16s Refine Results
  1. 35801

    Reinforcement learning based recovery flight control for flapping-wing micro-aerial vehicles under extreme attitudes by Yang Yu, Qiang Lu, Botao Zhang

    Published 2025-01-01
    “…Then, a hybrid control approach is designed to significantly improve the flight stability by combining the reinforcement learning-based control approach with the proportional-derivative control approach. …”
    Get full text
    Article
  2. 35802

    King-Type Derivative-Free Iterative Families: Real and Memory Dynamics by F. I. Chicharro, A. Cordero, J. R. Torregrosa, M. P. Vassileva

    Published 2017-01-01
    “…From the error equation of this class, different families of iterative schemes with memory can be designed increasing the order of convergence up to six. …”
    Get full text
    Article
  3. 35803

    Complex Dynamics in a Singular Delayed Bioeconomic Model with and without Stochastic Fluctuation by Xinyou Meng, Qingling Zhang

    Published 2015-01-01
    “…The conditions of singularity induced bifurcation are gained, and a state feedback controller is designed to eliminate such bifurcation. Furthermore, saddle-node bifurcation is also showed. …”
    Get full text
    Article
  4. 35804

    Research on extended access control mechanism in online social network by Rongna XIE, Xiaonan FAN, Lin YUAN, Zichen GUO, Jiayu ZHU, Guozhen SHI

    Published 2021-10-01
    “…Aiming at the problem of inability to extend control over the data published by users in social networks, an extended access mechanism based on privacy labels was proposed.This mechanism granted users and data different types of labels based on the number of user relationship hops and resource forwarding hops, so as to achieve fine-grained extended access control to the data.The generation algorithm and distribution method of privacy labels were proposed.The constraint rules of privacy label were designed and the possible policy conflicts were analyzed.Finally, the test proves that the mechanism achieves fine-grained extended control in social networks, and proves its security and validity of the mechanism.…”
    Get full text
    Article
  5. 35805

    Research on industrial control system intrusion detection method based on simulation modelling by Yi-wei GAO, Rui-kang ZHOU, Ying-xu LAI, Ke-feng FAN, Xiang-zhen YAO, Lin LI

    Published 2017-07-01
    “…At present,intrusion detection system over fieldbus network layer was a basic protection method in industrial control system.However,it has some weakness,such as poor generality,high false-positive rate,and unable to detect unknown anomaly.An industrial control system intrusion detection method based on fieldbus network equipment simulation was proposed.The method prevented control program from being tampered or destroyed based on controller simulation modelling.Controlled object simulation modelling was designed for ensuring that the system input was credible.Thus the intrusion detection of industrial control network was realized.At last,the results indicate that the proposed intrusion detecting method is available.…”
    Get full text
    Article
  6. 35806

    Creating Work and Family Balance: Workshop Evaluation by David C. Diehl, Suzanna Smith, Betsy Crisp, Karen S. Headlee

    Published 2012-01-01
    “…Workshop presenters: the evaluation instrument described in this article provides a simple and streamlined way to conduct a useful evaluation and solicit feedback for program refinement. It was designed to accompany a Florida Cooperative Extension Service workshop, Creating Work and Family Balance. …”
    Get full text
    Article
  7. 35807

    Combined Homing Guidance Law of Torpedo Based on Fuzzy Control by Baoming MU, Jianqing CHENG, Feng PAN

    Published 2024-12-01
    “…For this reason, this paper designs a fuzzy combined guidance law based on the principle of fuzzy control by combining three different typical guidance methods, namely, fixed lead angle guidance method, proportional guidance method, and variable structure guidance method. …”
    Get full text
    Article
  8. 35808

    Secure interface architecture for the software defined system on wafer by LI Peijie, SHEN Jianliang, GUO Wei, CAO Zhipeng, MEI Bo

    Published 2024-10-01
    “…And then an arbitration scheduling mechanism was designed to achieve threat localization and dynamic reconfiguration. …”
    Get full text
    Article
  9. 35809

    Sliding-Mode Control of the Active Suspension System with the Dynamics of a Hydraulic Actuator by Rui Bai, Dong Guo

    Published 2018-01-01
    “…Based on the proposed model, a sliding-mode control method is designed to control the active suspension system. Stability proof and analysis of the closed-loop system of the active suspension is given by using Lyapunov stability theory. …”
    Get full text
    Article
  10. 35810

    Introduction to a lecture series on wind-wildlife interactions by Jill A. Shaffer, Todd E. Katzner

    Published 2023-10-01
    “…This introductory lecture launches a series designed to review background information, concepts, and techniques that reflect the state of the art in the science, mitigation, and policy regarding windwildlife interactions within the USA. …”
    Get full text
    Article
  11. 35811

    Fire safety of a novel concept of ventilated façade integrating Phase Change Materials by Ovadiuc Emanuil-Petru, Calotă Răzvan, Năstase Ilinca, Simion Adrian, Anghel Ion

    Published 2025-01-01
    “…Ventilated facades represent a modern solution increasingly adopted in smart, low-energy building designs. A critical consideration in the implementation of these systems is ensuring fire resistance while simultaneously minimizing the risk of fire propagation. …”
    Get full text
    Article
  12. 35812

    How 3D Interaction Metaphors Affect User Experience in Collaborative Virtual Environment by Hamid Hrimech, Leila Alem, Frederic Merienne

    Published 2011-01-01
    “…These findings provide a basis for designing 3D navigation techniques in a CVE.…”
    Get full text
    Article
  13. 35813

    Clustering algorithm preserving differential privacy in the framework of Spark by Zhi-qiang GAO, Qing-peng LI, Ren-yuan HU

    Published 2016-11-01
    “…Aimed at the problem that traditional methods fail to deal with malicious attacks with arbitrary background knowledge during the process of massive data clustering analysis,an improved clustering algorithm, especially designed for preserving differential privacy,under the framework of Spark was proposed.Furthermore,it’s theoretically proved to meet the standard of ε-differential privacy in the framework of Spark platform.Finally,experimental results show that guaranteeing the availability of proposed clustering algorithm,the improved algorithm has an advantage over privacy protection and satisfaction in the aspect of time as well as efficiency.Most importantly,the proposed algorithm shows a good application prospect in the analysis of data clustering preserving privacy protection and data security.…”
    Get full text
    Article
  14. 35814

    Research on system call forwarding mechanism of SGX-based LibOS by LIU Ximeng, HUANG Yingkang, LIU Weijie, FAN Beixi, ZHANG Tian, ZHANG Jie

    Published 2024-10-01
    “…SGX-based LibOS are designed to run unmodified applications within SGX Enclave, but differences in their architecture, system call simulation, and system call forwarding can make them difficult to use and debug. …”
    Get full text
    Article
  15. 35815

    Single-Layer Circularly Polarized Wide Band Reflectarray Antenna with High Aperture Efficiency by Xinyu Da, Jialiang Wu, Jing Zhao, Lin Baoqin, Kai Wu

    Published 2018-01-01
    “…For experimental verification, an array of 25 × 25 reflectarray prototype has been designed and manufactured by employing the angular rotation technique. …”
    Get full text
    Article
  16. 35816

    Understanding Extension for School-Based Agricultural Education #1: Extension 101 by Debra Barry, John Diaz, Alyssa Shepherd, Jennifer Patton, Stephen Gran

    Published 2020-11-01
    “… This article and series were designed primarily for use by secondary agriscience teachers in school-based agricultural education programs (SBAE) to help build a strong understanding of Extension and the role of Extension professionals. …”
    Get full text
    Article
  17. 35817

    Malicious PDF document detection based on mixed feature by Xuehui DU, Yangdong LIN, Yi SUN

    Published 2019-02-01
    “…Aiming at the problem of poor robustness and easy to evade detection in the detection of malicious PDF document,a malicious PDF document detection method based on mixed features was proposed.It adopted dynamic and static analysis technology to extract the regular information,structure information and API calling information from the document,and then a feature extraction method based on K-means clustering algorithm was designed to filter and select the key mixed features that characterize the document security.Ultimately,it improved the robustness of features.On this basis,it used random forest algorithm to construct classifier and perform experiment to discuss the detection performance of the scheme and its ability to resist mimicry attacks.…”
    Get full text
    Article
  18. 35818

    Key Plant, Key Pests: Sycamore (Platanus spp.) by Matthew Borden, Kelly Laplante, Juanita Popenoe, Adam Dale, Caroline R. Warwick, Brian Pearson

    Published 2021-03-01
    “… This series of Key Plant, Key Pests publications are designed for Florida gardeners, horticulturalists, and landscape professionals to help identify common pests associated with regional flora. …”
    Get full text
    Article
  19. 35819

    Coronavirus Crisis: Government Aid That Also Promotes Employee Ownership by David P. Ellerman, Tej Gonza

    Published 2020-06-01
    “…In the current deeper crisis, aid should be designed to create a fairer, more inclusive and more socially responsible economy by promoting employee ownership as both an incentive and a reward. …”
    Get full text
    Article
  20. 35820

    Time-Domain Characterization of Dual Band Spiral Antenna with WMTS/UWB Application by Saira Joseph, Sunil Jacob, Binu Paul, Shanta Mridula, Pezholil Mohanan

    Published 2017-01-01
    “…A coplanar waveguide- (CPW-) fed spiral antenna with dual band application is presented. The antenna is designed to operate over the UWB (3.1–10.6 GHz) band as well as in a lower band suitable for WMTS (1.395–1.4 GHz). …”
    Get full text
    Article