Showing 36,041 - 36,060 results of 46,768 for search '"Design"', query time: 0.16s Refine Results
  1. 36041

    Worker Protection Standard: Information at a Central Location by Frederick M. Fishel, Tatiana Sanchez

    Published 2016-11-01
    “… The Worker Protection Standard (WPS) is a Federal regulation designed to protect agricultural workers (people involved in the production of agricultural plants) and pesticide handlers (people mixing, loading, or applying pesticides or doing other tasks involving direct contact with pesticides). …”
    Get full text
    Article
  2. 36042

    Pesticide Safety Miniposter: Pesticide Spill Control by Rebecca W. Baldwin, Stephanie K. Larrick Hill, Philip Koehler, P. A. Mitola, J. C. Medley

    Published 2012-10-01
    “…This poster will serve as a valuable training tool for new technicians and a refresher tool for pesticide applicators. Designed by R.W. Baldwin, S.K. Hill, Philip Koehler, P.A. …”
    Get full text
    Article
  3. 36043

    Nanotechnology Role Development for COVID-19 Pandemic Management by Hamza Abu Owida, Jamal I. Al-Nabulsi, Nidal M. Turab, Nawal Louzi

    Published 2022-01-01
    “…This research will be extremely useful during the COVID-19 outbreak in terms of developing rules for designing nanostructure materials to combat the outbreak.…”
    Get full text
    Article
  4. 36044

    L’appropriation collective d’un dispositif pédagogique à l’école primaire. La construction d’un compromis provisoire entre des principes de justice différents : le cas du « plan de... by Gwénaël Lefeuvre, Bruno Fondeville, Rémi Bonasio, Philippe Veyrunes

    Published 2019-01-01
    “…As part of a research conducted in support of a primary school, we will question the collective ownership process of a particular educational device designed by the teaching team: the work plan. The objectives of teachers from this device, are to promote the individualisation of academic learning of students, taking into account their individual rhythms and promote their autonomy in work. …”
    Get full text
    Article
  5. 36045

    Genetic Architecture of Transcription and Chromatin Regulation by Kwoneel Kim, Hyoeun Bang, Kibaick Lee, Jung Kyoon Choi

    Published 2015-06-01
    “…Regulatory patterns commonly observed in yeast and human across different technical platforms and experimental designs suggest a higher genetic complexity of transcription regulation in contrast to a more robust genetic architecture of chromatin regulation.…”
    Get full text
    Article
  6. 36046

    Tardive Dyskinesia, Oral Parafunction, and Implant-Supported Rehabilitation by S. Lumetti, G. Ghiacci, G. M. Macaluso, M. Amore, C. Galli, E. Calciolari, E. Manfredi

    Published 2016-01-01
    “…Implant failures were all in the maxilla and stopped when a rigid titanium structure was placed to connect implants. Ad hoc designed studies are desirable to elucidate the mutual influence between oral movement disorders and implant-supported rehabilitation.…”
    Get full text
    Article
  7. 36047

    ENGINE FAULT DIAGNOSIS BASED ON DEEP BELIEF NETWORK IMPROVED BY ADAPTIVE CROW SEARCH ALGORITHM (MT) by WANG Liang, TANG MingWei

    Published 2023-01-01
    “…Based on the crow search algorithm(CSA), by the adaptive crow search algorithm(ACSA) the adaptive value strategy of sensing probability and flight distance, which effectively enhanced the performance of the algorithm is designed. In view of the fact that the selection of deep belief network(DBN) model parameters has great influence on the engine fault diagnosis results, ACSA is used to optimize the selection of its model parameters, and an engine fault diagnosis method based on DBN improved by ACSA is proposed. …”
    Get full text
    Article
  8. 36048

    Survey on trust evaluation mechanism in sensor-cloud by Tian WANG, Guangxue ZHANG, Shaobin CAI, Weijia JIA, Guojun WANG

    Published 2018-06-01
    “…Sensor-cloud has gradually developed into a research hotspot.A good trust evaluation mechanism can better address some security issues in this new structure,such as internal attacks.A good trust evaluation mechanism can also ensure the security and efficient transmission of information in this structure.After an extensive research on sensor-cloud and trust evaluation mechanisms,it was found that trust evaluation mechanisms in sensor-cloud can be divided into two categories,among entities and in entity.After comparing the advantages and shortcomings of existing trust evaluation mechanisms,a new fog-based trust evaluation mechanism was designed and future research directions of trust evaluation mechanisms were discussed in sensor-cloud.…”
    Get full text
    Article
  9. 36049

    Choosing a Web Service for Creating a Digital Educational Event by A. B Neuzorava, N. S. Goroshko

    Published 2021-01-01
    “…The paper presents the results of designing a digital event using an open survey form on the example of an ecological and mathematical interactive rapid test for students of all forms and types of education. …”
    Get full text
    Article
  10. 36050

    Heterogeneous executor scheduling algorithm for mimic cloud service by Liming PU, Shuxin LIU, Ruihao DING, Kai WANG

    Published 2020-03-01
    “…At present,most heterogeneous scheduling models were only designed from the perspective of space or time,without comprehensive consideration the characteristics of time and space,and there was a problem of insufficient balance between dynamics and heterogeneity.In order to balance the dynamic,heterogeneous and redundant characteristics of the mimic cloud service system,an executor pool scheduling algorithm based on priority and time slice was proposed,which performed priority pre-sorting based on the executor pool similarity indicator,and scheduled the program in combination with strategies such as time slice.The experimental results show that the algorithm has good dynamics,and its time slice strategy can achieve a balance of dynamics and heterogeneity,and the algorithm takes less time.…”
    Get full text
    Article
  11. 36051

    EDUCATIONAL TECHNOLOGY “FLIPPED CLASSROOM” IN TEACHING THE DISCIPLINE “THE RUSSIAN LANGUAGE AND THE CULTURE OF SPEECH” by E. V. Kalachinskaya

    Published 2018-01-01
    “…The author presents the new methodical approaches to designing the discipline “The Russian Language and the Culture of Speech” aimed at improving the quality of teaching.…”
    Get full text
    Article
  12. 36052

    Sensor Resource Sharing Approaches in Sensor-Cloud Infrastructure by Yujin Lim, Jaesung Park

    Published 2014-04-01
    “…Generally, wireless sensor networks have been designed to support predefined application services. …”
    Get full text
    Article
  13. 36053

    Optical Orbital Angular Momentum Demultiplexing and Channel Equalization by Using Equalizing Dammann Vortex Grating by Mingyang Su, Junmin Liu, Yanliang He, Shuqing Chen, Ying Li

    Published 2017-01-01
    “…A novel equalizing Dammann vortex grating (EDVG) is proposed as orbital angular momentum (OAM) multiplexer to realize OAM signal demultiplexing and channel equalization. The EDVG is designed by suppressing odd diffraction orders and adjusting the grating structure. …”
    Get full text
    Article
  14. 36054

    CALCULATION OF ACTUAL MODIFICATION OF CYCLOIDAL GEAR BASED ON OPTIMAL APPROXIMATION PRINCIPLE by ZHOU JingYuan, LI TianXing, SU JianXin, WANG Bin, ZHANG RuiYao

    Published 2023-12-01
    “…At present, a method is proposed to invert the actual modification for a cycloid gear designed by using a composite modification method, where the modification is unknown. …”
    Get full text
    Article
  15. 36055

    A Novel Chaotic Map and an Improved Chaos-Based Image Encryption Scheme by Xianhan Zhang, Yang Cao

    Published 2014-01-01
    “…Furthermore, the new chaotic map and Arnold’s Cat Map based image encryption method is designed and proved to be of solid robustness. The simulation results and security analysis indicate that such method not only can meet the requirement of imagine encryption, but also can result in a preferable effectiveness and security, which is usable for general applications.…”
    Get full text
    Article
  16. 36056

    Resource management model based on cloud computing environment by Ahyoung Kim, Junwoo Lee, Mucheol Kim

    Published 2016-11-01
    “…To investigate these problems in a cloud computing environment, we designed and deployed the cloud service infrastructure based on open-source software, namely, CloudStack. …”
    Get full text
    Article
  17. 36057

    k nearest neighbor pattern match queries over spatio-temporal label trajectories by Jianqiu XU, Junxiu LIANG, Xiaolin QIN

    Published 2018-04-01
    “…Spatio-temporal label trajectories extended traditional spatio-temporal trajectories with semantic labels.k nearest neighbor pattern match was proposed to return the k nearest trajectories that fulfilled the temporal pattern condition.The Label R-Tree (LR-Tree for short) was proposed,which appending a label table and adding label bitmap in each entry,and k nearest neighbor pattern match query algorithm based on LR-Tree was designed.Using both real and synthetic datasets,the LR-Tree was extensively evaluated in comparison with 3DR-Tree,SETI and TB-Tree.The experimental results demonstrate that LR-Tree showing better pruning ability,and verify the effectiveness of proposed algorithm and index.…”
    Get full text
    Article
  18. 36058

    Optimal strategy selection method for moving target defense based on signaling game by Lyu JIANG, Hengwei ZHANG, Jindong WANG

    Published 2019-06-01
    “…To solve the problem of the optimal strategy selection for moving target defense,the defense strategy was defined formally,the defense principle from the perspective of attack surface shifting and exploration surface enlarging was taken into account.Then,network attack-defense behaviors were analyzed from the sight of dynamic confrontation and bounded information.According to the analysis of attack-defense game types and confrontation process,the moving target defense model based on signaling game was constructed.Meanwhile,the method to quantify strategies was improved and the solution of perfect Bayesian equilibrium was proposed.Furthermore,the optimal defense strategy selection algorithm was designed by the equilibrium analysis.Finally,the simulation demonstrates the effectiveness and feasibility of the proposed optimal strategy and selection method.…”
    Get full text
    Article
  19. 36059

    WHAT SHOULD BE THE MODERN ENGINEERING EDUCATION (THINKING OF GLOBAL FORUM PARTICIPANTS) by Vyacheslav M. Prikhod’Ko, Alexander N. Solovyev

    Published 2016-12-01
    “…We have distinguished the dominant points of view: the goal is to prepare engineers able to create and implement projects under the ideas of «sustainable development», the content is determined by a multidisciplinary educational programmes designed taking into account the views of all interested parties, the main idea of the methods - student-oriented approach, wide using of e-learning, m-learning, evaluation of educational achievements in terms of developing the necessary competencies.…”
    Get full text
    Article
  20. 36060

    Distributed Drives Monitoring and Control: A Laboratory Setup by Mini Sreejeth, Parmod Kumar, Madhusudan Singh

    Published 2013-01-01
    “…A laboratory setup of distributed drives system comprising a three-phase induction motor (IM) drive and a permanent magnet synchronous motor (PMSM) drive is modeled, designed, and developed for the monitoring and control of the individual drives. …”
    Get full text
    Article