Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
36021
Teach Aquaculture Curriculum: Introduction
Published 2010-08-01“…Chapman, introduces the Teach Aquaculture Curriculum. The curriculum is designed to engage students in aquaculture and the aquatic sciences through a series of hands-on activities involving all the sciences, mathematics, reading, and writing. …”
Get full text
Article -
36022
Conceptual model of intelligent command and control for UAV cluster based on OPM
Published 2025-02-01“…The top-level conceptual model of intelligent command and control of UAV cluster, SD1-level amplification model as well as SD2-level sub-process model is designed and constructed by means of operational-functional unified specification modeling(OFUS). …”
Get full text
Article -
36023
Representation for uncertainty trust of WSN based on lightweight-cloud
Published 2014-02-01“…According to the characteristic of qualitative and quantitative uncertainty conversion ability of cloud model, a lightweight cloud model was designed, and the uncertainty representation of direct trust, indirect trust, and recommenda-tion trust in WSN was proposed. …”
Get full text
Article -
36024
Adsorption of n-Aliphatic Alcohols in the Determination of Surface Areas of Metal-Doped Alumina Samples
Published 1999-03-01“…The adsorbates used were methanol, ethanol, l-propanol and n-butanol (n-aliphatic alcohols) which were designated C 1 , C 2 , C 3 and C 4 , respectively. It was observed that A L and A BET of the adsorbent occupied by the adsorbate molecules decreased from C 1 to C 4 . …”
Get full text
Article -
36025
Research on Space-Ground Network Security Guarantee Technology
Published 2020-09-01“…The characteristics of space-ground network was combed.Against security threats in space-ground network,the security risks faced by measurement control,operation control,terminal access,wireless transmission,transmission,business information system,maintenance management were analyzed.Further,by dividing space-ground network security into four layers:foundation layer,access layer,network layer and application layer,a security architecture to protect space-ground network was proposed.An implement mechanism (including unifi ed security management and security situation aware,entity authentication and access protection,interconnection control,cipher on-demand service,dynamic reconstruction of security service ) was designed to guarantee the security of space-ground network.…”
Get full text
Article -
36026
Study on the connectivity model of VANET based on 802.11p/WAVE and its application
Published 2013-06-01“…Firstly,a vehicular mobility model was proposed for the freeway traffic scenarios.Then the connectivity pa-rameters of VANET,such as the connected probability between any two cars,the diameter size of connected cluster and the number of connected cluster,were analyzed.And on the basis of these,the conclusion that the location of VANET node at one time snapshot meets the gamma distribution was drawn.Furthermore,a VANET message package format considering flooding message number was designed,in which TTL field was discussed in detail by introducing the ana-lytic expression of connectivity model.Finally,simulations also verify the conclusion.The connectivity model proposed should provide an important theoretical basis for the upper-level protocols of VANET WAVE stack.…”
Get full text
Article -
36027
Efficient Neural Network Modeling for Flight and Space Dynamics Simulation
Published 2011-01-01“…The technique will free the neural network designer from guessing the size and structure for the required neural network model and will help to minimize the number of neurons. …”
Get full text
Article -
36028
Multiple Addressing Coordination and Switching Technology in Space-Integrated-Ground Information Network
Published 2020-12-01“…The construction requirements and deployment status of the space-integrated-ground integrated information network was analyzed, and the diffi culties in the integration of satellite network and internet was discussed.To tackle the problems of complex network structure, high dynamic topology, diffi cult data compatibility and limited satellite resources, a multi addressing coordination and switching technology based on IP address, ID identifi cation and content name was proposed.In particular, a multi addressing datagram format was designed, and the multi addressing route forwarding mechanism was extended.It could realized the interconnection of heterogeneous networks, the stability of mobile communication, the compatible switching of polymorphic data, and the effi cient routing with low power consumption of satellites.…”
Get full text
Article -
36029
Novel chaotic block encryption scheme for WSN based on dynamic sub key
Published 2017-12-01“…In view of high efficiency and security requirements in WSN encryption algorithm,a lightweight chaotic block encryption algorithm was designed and a novel scheme of dynamic sub keys extension was proposed.To greatly reduce the computing burden of WSN nodes,this scheme made full use of WSN cloud servers monitoring platform,which was powerful in data computing and processing,and transfered the sub keys synchronization task from nodes to cloud servers.Experimental results and performance analysis show that the scheme has good characteristics of diffusion,confusion and statistical balance,strong key security and high algorithm efficiency.It has a good application prospect in the field of WSN communication encryption.…”
Get full text
Article -
36030
Device for studying uneven rotation of crankshaft
Published 2020-11-01“…For this purpose, an analysis is performed and a device is created that allows controlling the uneven rotation of the engine crankshaft containing photoelectron sensors, one of which allows reading the moment of passing the upper dead point, the other is designed to control the angular speed of the flywheel. …”
Get full text
Article -
36031
Key Plant, Key Pests: Oak (Quercus spp.)
Published 2020-12-01“… This series of Key Plant, Key Pests publications is designed for Florida gardeners, horticulturalists, and landscape professionals to help identify common pests associated with common Florida flora. …”
Get full text
Article -
36032
The Clearing System of Mutual Settlements between Participants of the Innovation-Industrial Cluster
Published 2023-09-01“…The most important component of the cluster development infrastructure is the digital platform of the industrial cluster – an information system designed to support the interaction of cluster members throughout its entire life cycle. …”
Get full text
Article -
36033
Synopsis of proposals on fungal nomenclature: a review of the proposals concerning Chapter F of the International Code of Nomenclature for algae, fungi, and plants submitted to the...
Published 2024-08-01“…The proposals deal with: fungi whose morph-names have the same epithet; the listing of synonyms under entries for protected names in the Code Appendices; the processes of protection and rejection; the use of DNA sequences as nomenclatural types; the use of genomes as nomenclatural types; and the designation of fungi known only from DNA sequences. …”
Get full text
Article -
36034
Research on QR code logistics privacy based on segmented encryption and time-limited control
Published 2019-08-01“…In view of the disadvantages of the existing logistics system in the market in user privacy protection,a privacy protection scheme based on QR code segmentation encryption,hierarchical authorization and time-limited control was proposed.This scheme segments all the recipient information into RSA and Base64 encryption,after integration,it is embedded into the QR code.In the process of logistics transportation and delivery,different levels of QR code decryption permissions are granted to different branches or transfer centers to view the designated content.At the same time,the QR code automatically becomes invalid after the user signs for it,so as to protect the user's privacy.The core idea of the scheme is to minimize the contact group of recipient information and reduce the possibility of user information disclosure.…”
Get full text
Article -
36035
Advanced Methods in Fluorescence Microscopy
Published 2013-01-01“…Also considered are the recent innovations in structured and light sheet illumination, the use of FRET and molecular beacons that exploit specific characteristics of designer fluorescent proteins, fluorescence speckles, and second harmonic generation for native anisometric structures like collagen, microtubules and sarcomeres.…”
Get full text
Article -
36036
Research on caching strategy based on transmission delay in Cell-Free massive MIMO systems
Published 2021-12-01“…To meet the ultra-low latency and ultra-high reliability requirements of users in the future mobile Internet, the wireless caching technology was combined with Cell-Free massive MIMO systems.The caching model was designed based on AP cooperative caching and regional popularity evaluation.The transmission delay expression involving AP clustering, cooperative caching, and regional popularity was derived, and the content placement problem was expressed as total content transmission delay minimization.Through the demonstration of the NP-hard and submodular monotony of the optimization problem, the greedy algorithm-based optimization strategy was proposed.Simulation results show that the proposed strategy can effectively reduce the content transmission delay and improve the cache hit rate.…”
Get full text
Article -
36037
Effect of Functionalized Carbon Nanotubes in the Detection of Benzene at Room Temperature
Published 2018-01-01“…In this paper, carbon nanotubes (CNTs) were functionalized by acid treatment and further functionalized with dodecylamine and were designated as CNT-carboxylic and CNT-amide, respectively. …”
Get full text
Article -
36038
Research on weak greedy routing over graph embedding for wireless sensor networks
Published 2011-01-01“…The greedy routing in sensor networks can be classified into two categories,strong greedy routing and weak greedy routing.The weak greedy routing protocol needs geographic location and strong greedy routing needs greedy em-bedding network.In order to solve these problems and minimize operation complexity and energy overhead,a light-weight tree-based network embedding graph(TNEG) was proposed and over the TNEG,a local monotone function was designed and two routing rules were proposed,then two weak greedy routing protocols,TGR and biTGR were de-signed.The simulation shows two protocols achieve good performance on path stretch factor and load balance factor.…”
Get full text
Article -
36039
The Bifurcation and Control of a Single-Species Fish Population Logistic Model with the Invasion of Alien Species
Published 2014-01-01“…Secondly, the state feedback controller is designed to eliminate the unexpected singularity induced bifurcation by combining harvested effort with the purification capacity. …”
Get full text
Article -
36040
Entre ethos professionnel et logiques d’entreprises : La recherche et l’innovation dans les agences d’architecture
Published 2020-12-01“…However, the common law mechanisms open to architecture agencies and designed to promote research and innovation are considered to have received insufficient investments by the field of architecture (CIR, CII, CIFRE). …”
Get full text
Article