Showing 35,981 - 36,000 results of 46,768 for search '"Design"', query time: 0.21s Refine Results
  1. 35981

    Automatic detection method of software upgrade vulnerability based on network traffic analysis by Jinhui TENG, Yan GUANG, Hui SHU, Bing ZHANG

    Published 2020-02-01
    “…During the software upgrade process,the lack of authentication for upgrade information or packages can lead to remote code execution vulnerabilities based on man-in-the-middle attack.An automatic detection method for upgrading vulnerabilities was proposed.The method described the upgrade mechanism by extracting the network traffic during the upgrade process,then matched it with the vulnerability feature vector to anticipate upgrading vulnerabilities.In a validation environment,the man-in-the-middle attack using the portrait information was carried out to verify the detection results.In addition,an automatic vulnerability analysis and verification system based on this method was designed.184 Windows applications samples was test and 117 upgrade vulnerabilities were detected in these samples,which proved validity of the method.…”
    Get full text
    Article
  2. 35982

    Construction contemplation of cloud platform for domestic password service based on quantum secret communication by Dong WANG, Guochun LI, Xuehao YU, Zhiyu CHEN, Bingyu GE, Lei XIE, Jing TAN

    Published 2018-07-01
    “…With the increasingly serious environment of network space security,the importance of cryptography is becoming more and more prominent.There are many problems in the current application of cryptographic technology and the demand of secure and controllable password resource for key information structure is urgent.According to technology advantages and disadvantages of classical and quantum passwords were analyzed and the integration direction of quantum cryptography and classical password technology was proposed.At the same time,by giving full consideration to the development trend of cloud computing architecture,the password cloud service concept was proposed and the domestic password service cloud platform based on quantum secret communication was designed.It has positive guiding significance for building a new firewall of cyber security based on quantum secret communication.…”
    Get full text
    Article
  3. 35983

    A VLSI Implementation of Rank-Order Searching Circuit Employing a Time-Domain Technique by Trong-Tu Bui, Tadashi Shibata

    Published 2013-01-01
    “…The prototype circuit was designed and fabricated in a 0.18 μm CMOS technology. …”
    Get full text
    Article
  4. 35984

    The Impact of the Myeloid Response to Radiation Therapy by Michael J. Gough, Kristina Young, Marka Crittenden

    Published 2013-01-01
    “…We discuss how radiation therapy similarly triggers inflammation followed by repair, the consequences to adaptive immune responses in the treatment site, and how the myeloid response to radiation may impact immunotherapies designed to improve control of residual cancer cells.…”
    Get full text
    Article
  5. 35985

    A Novel CPW-Fed UWB Antenna with Band-Stop Function by Huaming Chen, Zhengrong Li, Baiyu Li, Guangfu Sun

    Published 2014-01-01
    “…Simulated and measured results show that the designed antenna operates at 2.9 GHz–13.08 GHz with band rejection in the frequency band of 7.7 GHz–9.05 GHz for satellite applications, and the proposed antenna is suitable for UWB wireless communication applications.…”
    Get full text
    Article
  6. 35986

    Joint space-time Huffman limited feedback precoding for spatially and temporally correlated MIMO channels by Mei-yan JU, Xin GE, Yue-heng LI, Guo-ping TAN

    Published 2013-11-01
    “…Based on space correlation, the precoding structure under zero-forcing (ZF) criterion was derived and the rotating quan-tization codebook was designed which reduces the effect of space correlation on system performance. …”
    Get full text
    Article
  7. 35987

    Production and characterization of Al-xNi in situ composites using hot pressing by Yamanoglu R.

    Published 2014-01-01
    “…In this study, a new metal matrix composite of aluminium was designed with the addition of nickel alloy particles. …”
    Get full text
    Article
  8. 35988

    Adaptive Fuzzy PID Control System for Satellite Earth Station Antenna Group Factor Based on Edge Calculation by Haibin SHAN, Yanjun SHI, Zijing LIU, Yuanhong LI, Wenhua ZHAO, Muquan HE, Chuzhou LI

    Published 2023-03-01
    “…The antenna tracking control system of satellite ground receiving station generally adopts PID control.Due to the infl uence of various uncertain factors, it is diffi cult to obtain the optimal control parameters for this kind of system, resulting in the PID control eff ect is not ideal.An adaptive fuzzy PID antenna tracking control system based on edge computing was designed.The parameters of PID controller were adjusted in time by fuzzy control algorithm, and the optimal calculation of fuzzy control input and output domain was realized in edge computing server.The simulation results showed that the adaptive fuzzy PID antenna tracking control system based on edge calculation could achieve good control eff ect.…”
    Get full text
    Article
  9. 35989

    Pesticide Safety Miniposter: Daily Personal Care by Rebecca W. Baldwin, Stephanie K. Hill, Philip Koehler, W. Walker, J. C. Medley

    Published 2012-10-01
    “…The poster explains methods for the decontamination of vehicles, application equipment, personal items like cell phones, and clothing. Designed by R.W. Baldwin, S.K. Hill, Philip Koehler, W. …”
    Get full text
    Article
  10. 35990

    Location privacy preserving scheme against attack from friends in SNS by Xi LIN, Yi-liang HAN, Yan KE, Xiao-yuan YANG

    Published 2016-10-01
    “…In order to enrich the performance of the user's location information and to meet the diverse needs of users,a location privacy protection scheme based on attribute encryption was designed,which provided precise,more accurate,fuzzy and private four modes to manage the location information.The scheme was based on the algorithm of WT-CP-ABE.The location information was divided into three parts according to a close friend of grade,then the key infor-mation and position information was encrypted with attribute-based encryption and symmetric encryption method respec-tively and the ciphertext was published to the social network.The security of the scheme is analyzed,which shows that the scheme has the advantage of user attribute information confidentiality,data confidentiality and can resist the collusion attack.…”
    Get full text
    Article
  11. 35991

    Educational potential of “Foreign Language” course to develop soft skills of technical students by Svetlana G. Menshenina, Polina G. Labzina

    Published 2019-06-01
    “…A special course of the discipline "Foreign Language" is designed by the authors. The preliminary results of the experimental work demonstrate that positive dynamics of skills development has been observed.…”
    Get full text
    Article
  12. 35992

    RESEARCH SCHOOLS AS ORGANIZATIONAL SYSTEM FOR TRAINING OF PHD STUDENTS by Boris I. Bednyi, Victor B. Kazantsev, Evgeny V. Chuprunov

    Published 2016-12-01
    “…The article presents an analysis of the general approaches to designing structured programs for the training of PhD students adopted by the European Union countries in the framework of the third cycle of the Bologna process. …”
    Get full text
    Article
  13. 35993

    A revised name and new insights into the Middle Jurassic sauropod trackways from Portugal. A correction of Santos et al. 2009 by Vanda F. Santos, José J. Moratalla, Rafael Royo-Torres, Matteo Belvedere, Diego Castanera, Luis M.P. Ceríaco, Pedro Mocho, Marc Merino, Christian A. Meyer, Lara Sciscio

    Published 2024-12-01
    “…The Galinha dinosaur tracksite (Portugal) was declared a Natural Monument in 1996 and is currently designated as Ourém/Torres Novas Dinosaur Footprints Natural Monument. …”
    Get full text
    Article
  14. 35994

    Seismic Fragility Analysis of Buildings Based on Double-Parameter Damage Models considering Soil-Structure Interaction by Panpan Zhai, Peng Zhao, Yang Lu, Chenying Ye, Feng Xiong

    Published 2019-01-01
    “…In this work, an eight-story RC building was designed to study the influence of the SSI on the seismic fragility of RC buildings. …”
    Get full text
    Article
  15. 35995

    Mechanism for green unicast routing protection in multi-granularity transport networks by Jun-ling SHI, Xing-wei WANG, Min HUANG

    Published 2014-10-01
    “…The mechanism for green unicast routing protection is designed with the constraint of quality of service (QoS),energy consumption and the survivability of single link or node failure considered.The path is calculated under the constraint of QoS based on K-shortest path algorithm.The resource allocation is done on multi-layer auxiliary graph considering the minimum times of wavelength conversion.Three protection levels are provided according to the service demands.The mechanism is implemented over EON (Europe optical network) topology by simulation.Performance evaluation has been done on the blocking probability,the protecting/working resource ratio and the load balance degree by comparing with certain existent mechanism.It has been shown that the proposed mechanism is both feasible and effective.…”
    Get full text
    Article
  16. 35996

    Spanish Abstract Meaning Representation: Annotation of a General Corpus by Shira Wein, Lucia Donatelli, Ethan Ricker, Calvin Engstrom, Alex Nelson, Leonie Harter, Nathan Schneider

    Published 2022-11-01
    “… Abstract Meaning Representation (AMR), originally designed for English, has been adapted to a number of languages to facilitate cross-lingual semantic representation and analysis. …”
    Get full text
    Article
  17. 35997

    Psychoeducational Guide for Climateric Women by Marianela Fonseca Fernández, Diana Maité Roselló Díaz, Laura Magda López Angulo, Alexis Lorenzo Ruíz

    Published 2024-09-01
    “…Based on this diagnosis, a psychoeducational guide for climacteric women was developed. The guide is designed with the intention of providing women in the climacteric period with the necessary guidance to face this stage of life and enhance their well-being. …”
    Get full text
    Article
  18. 35998

    Une appellation transnationale pour l’Océan Pacifique: Te moana nui a Kiwa (Nouvelle-Zélande) - Te moana nui a Hiva (Tahiti) by Bruno Saura

    Published 2022-12-01
    “…For a generation, the name « (Te) moana nui a Hiva» has been used more and more widely, in Tahiti, to designate, in an extensive way, the Pacific Ocean. …”
    Get full text
    Article
  19. 35999

    Training Specialists for the Digital Economy in Orenburg State University by Zh. A. Ermakova

    Published 2019-08-01
    “…Special focus is given to designing and implementation of an electronic information and educational environment at university, and its characteristics are described. …”
    Get full text
    Article
  20. 36000

    Heterotopic Ossification in the Abdomen of an Elderly Patient, as an Incidental Finding During Elective Surgery: A Case Report by Gordana Bozhinovska-Beaka, Biljana Prgova Veljanova, Tatjan Troik, Ivica Stojanovski, Patricija Kalamaras, Nadica Bozhinovska-Dimova

    Published 2023-11-01
    “…Non-genetic HO can occur nearly anywhere in the body, but is often designated by the tissue type it involves, such as myositis ossificans when involving skeletal muscle, or fasciitis ossificans when involving fascia. …”
    Get full text
    Article