Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
35841
A CFD ANALYSIS IN SOLIDWORKS FLOW SIMULATION FOR TWO MIXING FLUIDS WITH DIFFERENT TEMPERATURES IN NOZZLES
Published 2020-03-01“… The heat can have a direct impact on the mechanical elements by creating deformations and by causing the induction of additional stress in them. In designing of the heat exchangers or for the electronic components, the temperature changes for structural analysis as well as structural performance of thermal impact for the entire element must be analyzed. …”
Get full text
Article -
35842
Prospects for Development of Highly Satiating Foods in Poland
Published 2017-12-01“…In this time of obesity epidemic, the use of specifically designed food products which suppress hunger and give the feeling of satiety could be an effective tool in preventing obesity and controlling body mass. …”
Get full text
Article -
35843
Le site de la Scène nationale (Augustonemetum/Clermont-Ferrand, Puy-de-Dôme) : une auberge et son enseigne peinte
Published 2016-12-01“…The identification of the hostel is supported by the discovery of a wooden sign on which a painted inscription includes the term uiator, designated as the typical customer in literary and epigraphic documentation.…”
Get full text
Article -
35844
Invasive Species Curriculum
Published 2007-03-01“…This 156-page Invasive Species Curriculum helps fill this need by providing important information about invasive species through a dozen classroom activities, glossary, list of web sites and supporting materials designed for middle school use. Each activity addresses specific Sunshine State Standards and Florida Comprehensive Assessment Test (FCAT) benchmarks for grades 6-8. …”
Get full text
Article -
35845
Predictions for 2025: Artificial Intelligence in Modern Drug Development, Quantum Proof Encryption, and Health Data Monetization
Published 2024-12-01“…The Noble Prizes in medicine, chemistry, physics awarded this year further validated the profound impact of technology on healthcare and life sciences. For 2025-designated by the United Nations as The Year of Quantum Technology, we can envision further technology-driven innovations in all domains, triggering the transition to a novel health ecosystem. …”
Get full text
Article -
35846
Experimental Study on Oil Interruption Performance of Novel Cageless Angular Contact Ball Bearings
Published 2022-08-01“…In order to explore the dry operation performance of a novel cageless angular contact ball bearing, an oil break test scheme under the bearing ring is designed, and a test platform and an operation program are constructed. …”
Get full text
Article -
35847
Creating Work and Family Balance: Workshop Evaluation
Published 2012-01-01“…Workshop presenters: the evaluation instrument described in this article provides a simple and streamlined way to conduct a useful evaluation and solicit feedback for program refinement. It was designed to accompany a Florida Cooperative Extension Service workshop, Creating Work and Family Balance. …”
Get full text
Article -
35848
Groebner Bases Based Verification Solution for SystemVerilog Concurrent Assertions
Published 2014-01-01“…Case studies show that computer algebra can provide canonical symbolic representations for both assertions and circuit designs and can act as a novel solver engine from the viewpoint of symbolic computation.…”
Get full text
Article -
35849
Natural thermal plasters for fibre-composite matrices. Structural-energy-environmental analysis
Published 2021-06-01“…The article presents the first results of MIRACLE research, aimed at designing, testing, and implementing innovative reinforcement systems with bio-composite matrix, with additives containing natural thermal-plasters, usable in the restoration of residential buildings created before 1945. …”
Get full text
Article -
35850
Path recommendation based on geographic coordinates and trajectory data
Published 2017-05-01“…In order to overcome the lacking of tourism information recommendation at the tourism websites,travel review websites and travel websites,a hybrid density clustering approach was proposed to identify scenic hotspot based on the data of geographical coordinates and tour route data.To help users searching high-quality resources and planning an effective tour path,a tour path generation algorithm was designed which contained all the attractions in the scenic area by using the HITS algorithm to evaluate the attraction and improving the traditional ACO algorithm.The multi algorithm comparison experiment was conducted to evaluate the effectiveness of the hot spots and route planning methods.The results show that the method is efficient and practical.…”
Get full text
Article -
35851
Wireless sensor security communication and anti-leak locating technology based on region partition in power mobile inspection
Published 2016-02-01“…In order to solve the problem of low transmission efficiency and security of the grid,ensure the normal operation of power network,reduce network burden and improve the security of system access,a secure communication and private key location technology of wireless sensor based on region partition was designed by using the technology of time synchronization verification. …”
Get full text
Article -
35852
Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
Published 2014-01-01“…Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. …”
Get full text
Article -
35853
Research and implementation on college students internet addiction disorder and anti-addict system
Published 2014-10-01“…Based on the traffic analysis on Cernet2,a new discovery mechanism of games service provider IP address is proposed,including Boilerpipe text extraction algorithm and Stanford Chinese NLP,realize this new general method and computing architecture of college student internet addiction.Three kinds of Internet addiction behaviors-online games,video viewing and social networking sites visit,including the total hours spend,length of continuous addiction,frequency,selected time of addiction are analyzed.Concept of Internet addiction disorder index is proposed with quantization on the internet addiction disorder made through AHP.Finally,Internet addiction prevention system is designed and implemented.…”
Get full text
Article -
35854
Culture et interculturel en psychologie : préférence pour la démarche scientifique et conséquences épistémologiques
Published 2010-11-01“…This definition opposes two designs of the relations between cultures (separation versus meeting). …”
Get full text
Article -
35855
Analyse des styles ou stratégies d’enseignants dans l’apprentissage grammatical
Published 2014-10-01“…This is done on the basis of adjustments of situations, representations about the area of pupils’close development, personal designs on the study of language. These strategies revealed by the researcher allow to understand a style of teaching grammar.…”
Get full text
Article -
35856
Problems of career success for young professionals in public and municipal service
Published 2022-12-01“…According to the results of the study, it has been concluded that in the modern system of higher education needs additional training programmes taking into account the designated competencies and criteria for assessing the success of young professionals in the state and municipal service.…”
Get full text
Article -
35857
Implementation of a big data anonymization system based on Spark
Published 2018-04-01“…Group based anonymization is a classical data anonymization framework,which achieves the effect of privacy protection by constructing groups of anonymized data records ensuring that records in the same group cannot be distinguished with each other.The electric power industry big data analysis involves the core data of the power enterprises and the user privacy data,the data sensitivity is stronger,traditional data anonymization systems are unable to meet the needs of big data business applications and safety protection of electric power industry.A new big data anonymization system based on Spark was designed and implemented,which could provide the support for multiple data formats stored on Hadoop and substantially improve the processing efficiency for big data.…”
Get full text
Article -
35858
La place des élèves des classes spécialisées dans l’école élémentaire : un analyseur de leur construction identitaire
Published 2017-06-01“…In primary school, children with disabilities can be admitted collectively to a specialised class, called "Class for School Inclusion" (CLIS). CLIS 1 are designed specifically for children with cognitive disabilities. …”
Get full text
Article -
35859
Protesto indígena na Colômbia: a Minga em questão
Published 2016-01-01“…However, in the interministerial meetings, where the dialogue between the protesters and the state representatives takes place, the governmental strategies designed to delay and neutralize the protests prevail.…”
Get full text
Article -
35860
Mobile office system oriented to intelligent terminal
Published 2018-02-01“…Mobile intelligent terminal is the key entry to the internet services.Combining mobile intelligent terminal with office platform becomes a new mode of mobile OA,which is able to overcome the space-time limitation of traditional office model.To improve the efficiency of management and work,and to ensure the security of data,the security requirements of mobile OA were analyzed,a secure and controllable office system for mobile intelligent terminal also could be designed.The system structure,security function module,and business process were introduced,as well as the main function of mobile OA system was realized.By providing the unified management for mobile devices,data security based on licensing and use-control could be achieved.…”
Get full text
Article