Showing 36,161 - 36,180 results of 46,768 for search '"Design"', query time: 0.17s Refine Results
  1. 36161

    Dynamic P2P trust model based on context factors by Yi-chun LIU, Ying-hong LIANG

    Published 2016-08-01
    “…A multi-dimensional trust model was constructed based on the context factors.The direct trust of the interac-tive entities was estimated by integrating the time-decay factor,the transaction impact factor and the participation fre-quency.The trust similarity algorithm was designed based on the Dice similarity and the feedback credibility was aggre-gated from multiple trust chains.The direct interaction,the evaluation similarity and the trust chain was integrated for calculating the recommendation trust.The peer's trust was evaluated by combing the direct trust and the recommendation trust.A new mechanisam was proposed for the trust's update,incentive or punishment according to the peer's behavior on the interaction.The practical example analysis shows that the proposed model can effectively explain the effect of the transaction contextual factors on the entity trust,and can improve the trust sensitivity to the context transaction factors.…”
    Get full text
    Article
  2. 36162

    Non-invasive eye tracking technology based on corneal reflex by Di GAO, Gui-sheng YIN, Chun-guang MA

    Published 2012-12-01
    “…For the deficiencies that existing eye tracking devices are complex,have too many restrictions on the position,need to wear special equipment.A novel method of eye tracking technology using the five near-infrared light as the source of corneal reflex was put forward.This method did not need any wearing equipment,and could adapt to the natural head movement,the algorithm designed calculates the position of sight in high accuracy.A novel method of pupil edge fitting was put forward:fitted circularly and removed false points to get accurate position of pupil center,improved mapping accuracy.Used the GrayScale of image to initialize eye position quickly and accurately.Using the theory of cross-ratio invariance to make coordinate mapping,finally calculated the attention coordinate accurately.…”
    Get full text
    Article
  3. 36163

    Les liminalités dans les représentations du cycle solaire quotidien by Danièle Dehouve

    Published 2020-07-01
    “…The transitions of the first type are sunrise and sunset, here called anchoring zones; they correspond to the notion of “thick boundary” developed by Desclés to designate the existence of intermediate spaces between categories; those of the second type are the midday and midnight points, here called pivots because they constitute zones of exchange and shifting between the rising sun and setting sun.…”
    Get full text
    Article
  4. 36164

    Security signaling optimization in optical network for smart substation by Yuhao ZHAO, Xiaoguang HAO, Shaobo GENG, Peng LUO, Kun ZHOU, Jialin ZHEN, Yurong MAO

    Published 2019-02-01
    “…The communication security issue brought by smart substation is of great importance and should not be ignored in backbone optical networks.To solve this problem,firstly,the communication security challenges faced by optical networks in smart substation environment were analyzed,a signaling security optimization technique for optical networks for smart substation services was proposed.A so-called light-weighted security signaling scheme was designed to establish the end-to-end trusted connection.Under the environment of multi-domain communication services in smart substation,evaluation simulation for the signaling interaction was conducted.Simulation results show that the proposed approach can greatly enhance the security ability of multi-domain optical network with better performance in term of connection success rate.…”
    Get full text
    Article
  5. 36165

    Synthesis, Characterization, and Spectroscopic Studies of Bis-(meso-4-methoxyphenyl)-Benziporphyrin and Its Pd-Metal Complex by Endale Mulugeta, Chang-Hee Lee

    Published 2021-01-01
    “…Here, a fairly and efficient synthesis of the free base and its metal complex is well designed. Dimethoxybenzene dicarbinol intermediate was prepared in excellent yields by reacting 4-methoxyphenylmagnesium bromide with isophthaladehyde in diethyl ether. …”
    Get full text
    Article
  6. 36166

    The development of Anthropocene Awareness Scale. by Donghun Kang, Moon Choi

    Published 2025-01-01
    “…After a series of reliability and factor analyses, the Anthropocene Awareness Scale was optimized into a unidimensional scale comprising eight items (Cronbach's alpha = 0.88). Designed to explore individual attitudes, the scale could provide quantitative researchers with an entry point into the Anthropocene discourse and facilitate empirical studies that generate evidence for environmental policies and education in the Anthropocene.…”
    Get full text
    Article
  7. 36167

    Byzantine-robust federated learning over Non-IID data by Xindi MA, Qinghua LI, Qi JIANG, Zhuo MA, Sheng GAO, Youliang TIAN, Jianfeng MA

    Published 2023-06-01
    “…The malicious attacks of Byzantine nodes in federated learning was studied over the non-independent and identically distributed dataset , and a privacy protection robust gradient aggregation algorithm was proposed.A reference gradient was designed to identify “poor quality” shared gradients in model training, and the influence of heterogeneity data on Byzantine node recognition was reduced by reputation evaluation.Meanwhile, the combination of homomorphic encryption and random noise obfuscation technology was introduced to protect user privacy in the process of model training and Byzantine node recognition.Finally, through the evaluation over the real-world datasets, the simulation results show that the proposed algorithm can accurately and efficiently identify Byzantine attack nodes while protecting user privacy and has good convergence and robustness.…”
    Get full text
    Article
  8. 36168

    Kognitiewe orientasie as determinant van verbruikersbesluitneming by Freddie Crous, G. Benecke, J. P. R. Joubert

    Published 2022-11-01
    “…A fundamental problem, however, is that as a result of their complexity and cognitive substructure, the models which have been designed to express this approach cannot be easily verified in practice. …”
    Get full text
    Article
  9. 36169

    Economic Development Trend Prediction Model Based on Unsupervised Learning in the Internet of Things Environment by Min Kuang

    Published 2021-01-01
    “…In addition, this paper conducts effective research on the various modules of functional analysis, obtains the system functional architecture, constructs the system functional structure based on the actual situation, and analyzes the operating process of the system. Finally, this paper designs a simulation test based on actual data. The experimental research results show that the system model proposed in this paper has a good performance in the forecast of economic development trends, and the system can be used for forecasting in subsequent economic development forecasts.…”
    Get full text
    Article
  10. 36170

    An Analytical Approach on Thermally Induced Vibrations of Nonhomogeneous Tapered Plate by Anupam Khanna, Ashish Singhal

    Published 2013-01-01
    “…A mathematical model to control the vibrations of a rectangular plate is constructed with an aim to assist engineers in designing and fabrication of various structures used in the field of science and technology, mostly used in satellite and aeronautical engineering. …”
    Get full text
    Article
  11. 36171

    THE CYCLOID MAGNETIC GEAR BASED ON HALBACH ARRAY by HAO WeiNa, ZHOU Jun

    Published 2017-01-01
    “…The permanent magnets were arranged by Halbach in order to improve the magnetic flux leakage and the utilization of permanent magnets,and a prototype was designed and manufactured according to the working principle. …”
    Get full text
    Article
  12. 36172

    Key Plant, Key Pests: Holly (Ilex sp.) by Juanita Popenoe, Caroline Roper Warwick, Jacqueline Bourdon, Liz A. Felter

    Published 2019-03-01
    “… This series of Key Plant, Key Pests publications are designed for Florida gardeners, horticulturalists, and landscape professionals to help identify common pests associated with common Florida flora. …”
    Get full text
    Article
  13. 36173

    Privacy protection scheme of DBSCAN clustering based on homomorphic encryption by Chunfu JIA, Ruiqi LI, Yafei WANG

    Published 2021-02-01
    “…In order to reduce the risk of data privacy leakage in the process of outsourced clustering, a privacy protection scheme of DBSCAN clustering based on homomorphic encryption was proposed.In order to encrypt the float data in the actual scene, three data preprocessing methods for different data accuracy were given, and a policy for choosing a proper data preprocessing method based on data characteristics, accuracy and computational cost was also proposed.For the ciphertext comparison operation that was not supported by homomorphic encryption, a protocol between the client and the cloud server was designed to realize the function of ciphertext comparison.Theoretical analysis and experimental results show that the proposed scheme can ensure the security of data privacy, and has a higher clustering accuracy rate and lower time overhead.…”
    Get full text
    Article
  14. 36174

    RESEARCH ON MEASUREMENT TECHNOLOGY OF CAPTO SHANK’S KEY DIMENSIONS USED IN HIGH SPEED MACHINING by ZHANG Jin, WANG ShuLin, SHI XiangYun, ZHOU YiJun

    Published 2019-01-01
    “…In order to accomplish accurate measurement for Capto shank’s key dimensions, based on analyzing Standard ISO detailedly measurement parameters were determined and measurement system for Capto shank was designed. Positioning scheme was decided according to the idea about restraining the degrees of freedom in space, axial positioning was achieved by shank’s own weight, radial positioning was achieved by the rational configuration of three supporting nails, and circumferential positioning was achieved by controlling ring gauge’s cavity dimension strictly. …”
    Get full text
    Article
  15. 36175

    Research and Comparison of Distribution Automation Communication Mode Based on a Typical Case by Feng Wang, Xiaoping Si, Fang Zhao, Zhaohui Li, Haiyong Luo

    Published 2013-11-01
    “…Different communication modes have big influence on the real time, reliability and effectiveness of thesystem, and also there is a big difference between the construction and maintenance cost. Through designing thecommunication network in a switching station in Shanghai, the difference among optical fiber communication, powerline communication and wireless communication was analyzed and compared, which provided a reference for theconstruction of the distribution automation communication network.…”
    Get full text
    Article
  16. 36176

    An Artificial Bee Colony Algorithm for Uncertain Portfolio Selection by Wei Chen

    Published 2014-01-01
    “…In order to solve the proposed model, a modified artificial bee colony (ABC) algorithm is designed. Finally, a numerical example is given to illustrate the modelling idea and the effectiveness of the proposed algorithm.…”
    Get full text
    Article
  17. 36177

    Crash-Induced Vibration and Safety Assessment of Breakaway-Type Post Structures Made of High Anticorrosion Steels by Sang-Youl Lee

    Published 2016-01-01
    “…To disperse the impact force when a car crashes into a post, the post could be designed with a breakaway feature. In this study, we used a new high anticorrosion steel for the development of advanced breakaways. …”
    Get full text
    Article
  18. 36178

    4-H Horse and Pony Lease by E. L. Johnson, Wendy DeVito

    Published 2018-04-01
    “…This lease form was designed to cover the basic agreement between a 4-H member and a horse owner. …”
    Get full text
    Article
  19. 36179

    Protestantes, curanderos y descreídos. Misiones interiores, religiosidad nacional-católica e intolerancia durante el primer franquismo, 1940-1960 by Francisco Bernal García

    Published 2022-07-01
    “…These pastoral interventions also had a coactive dimension –as they sought to exclude from public life any behaviour that was incompatible with the Catholic faith– and a coercive dimension –as they incorporated mechanisms designed to ensure that those who did not wish to do so joined in the missionary activities. …”
    Get full text
    Article
  20. 36180

    PROFESSOR WORK AT UNIVERSITY: DAILY PROBLEMS AND SOLUTIONS by Sergey A. Molodyakov

    Published 2016-12-01
    “…The educational programs should be designed according to the employers' requirements, particularly in such areas as computer engineering and programming. …”
    Get full text
    Article