Showing 36,181 - 36,200 results of 46,768 for search '"Design"', query time: 0.18s Refine Results
  1. 36181

    Structure Optimization and Simulation of a Multi-link Type Lower Limb Rehabilitation Robot by Fan Zefeng, Li Juan, Li Weida, Sun Lining

    Published 2015-01-01
    “…For reducing labor costs and improving the effect of lower limb rehabilitation training,a new-type multi-link lower limb rehabilitation robot is designed.Based on the research of the biomechanics of human walking and the mapping relations of human joint trajectory,a new-type multi-link lower limb rehabilitation robot is presented,and the kinematics model of the robot is established and analyzed to get the hip and knee angle curve of the robot.Meanwhile,the influence of key structural parameter on the joint trajectory and the mapping relationship is analyzed.The evaluation index of joint trajectory and the reproducibility of mapping relationship is established.By using the MATLAB,the structure parameters of multi-link lower limb rehabilitation mechanism is optimized.According to the results,the structure parameters of the robot structure are revised.…”
    Get full text
    Article
  2. 36182

    Identity authentication scheme based on identity-based encryption by Ren-ji HUANG, Xiao-ping WU, Hong-cheng LI

    Published 2016-06-01
    “…In large-scale communication nodes network,there are a large number of network nodes and so many types of equipment.So there are problems of certificate management difficulties and resource waste in the tradi-tional PKI cryptosystem.A mutual node authentication scheme based on identity-based encryption,which solved the problem of the digital certificate management in the PKI system by the identity-based encryption and the key escrow problem in identity based cryptograph by splitting the key as well,was designed.At the same time,the introduction of random factor,timestamp and hash algorithm in the authentication protocol prevented various network attacks.Finally,the security and efficiency of the encryption algorithm and the security of the authentication protocol were analyzed,which proved the security and reliability of the authentication scheme.…”
    Get full text
    Article
  3. 36183

    Motion Route Planning and Obstacle Avoidance Method for Mobile Robot Based on Deep Learning by Jichao Cui, Guanghua Nie

    Published 2022-01-01
    “…According to the obstacle avoidance trajectory and constraints, this paper establishes a safe distance model for obstacle avoidance, then analyzes the braking process of the robot, and designs an improved safety model for obstacle avoidance. …”
    Get full text
    Article
  4. 36184

    Bridge monitoring system based on Internet of things technology by Zheng LI, Sheng ZHANG, Luyu ZHANG, Yang ZHANG

    Published 2018-09-01
    “…The Internet of everything is the trend of today’s smart cities.With the rapid development of Internet of things technology,a good opportunity is provided to obtain real-time status information on important infrastructures.Aiming at the problem such as low monitoring efficiency,poor flexibility and rigorous testing results with traditional artificial bridge monitoring methods a bridge monitoring system based on the Internet of things technology was designed.A variety of sensors and cameras were used in the system to collect the data of bridge’s dynamic status in real-time,and the wireless multi-hop network was used to transfer the perception data to the bridge health monitoring cloud platform for further processing and analysis.Real-time monitoring,early warning,analysis and assessment of bridge safety conditions could be realized by the system,and is very important to the bridge safety engineering.…”
    Get full text
    Article
  5. 36185

    L’Éducation sentimentale, roman des masses by Sylvie Triaire

    Published 2018-03-01
    “…En partant d’une analyse du lexique désignant le peuple, qui révèle une égalisation des termes et un refus d’investir axiologiquement tel terme plus qu’un autre (notamment celui de « peuple »), l’article s’attache à montrer la poétique des masses à l’œuvre dans ce roman de la césure historique de 48, poétique qui accompagne une réflexion politique sur les masses, montrées en Février 48, dérobées puis liquidées en Juin 48, afin de laisser place à la société de masse (reposant sur la production, la consommation de masse, la voie / voix plébiscitaire).…”
    Get full text
    Article
  6. 36186

    Public opinion model based on super-influencer integrating network community and content by Jianliang WEI, Hao JI, Tengyan TIAN, Shengli ZHOU

    Published 2020-05-01
    “…Aiming at the abnormal deviation and distortion of online public opinion,a public opinion model based on super-influencer integrating network community and content was designed.Deffuant-Weisbuch (DW) model was adopted,and factors such as user relationship,node identity and information noise were incorporated into the model,and the generation of public opinion deviation was simulated through simulation experiments.The results indicate that super-influencer leads to irreversible deviation of network public opinion,controversial content causes opinion fluctuation and convergence,but not the final opinion as a whole.There are differences in the interference effect between strong and weak communities,and by increasing the internal strength and external influence of the community,it can conduct public opinion confrontation with super-influencer,thus reversing the direction of public opinion deviation.…”
    Get full text
    Article
  7. 36187

    Démarche d'investigation, pédagogie transmissive et principe d'autorité : l'exemple du système héliocentrique by Estelle Blanquet, Éric Picholle

    Published 2018-11-01
    “…Its association with a sequence specifically designed to legitimize unusual viewpoints allows 30-50 % of students to access the Galilean (ie relativistic) paradigm. …”
    Get full text
    Article
  8. 36188

    Application-aware IPv6 networking by Lin HE, Peng KUANG, Shicheng WANG, Ying LIU, Xing LI, Shuping PENG

    Published 2020-08-01
    “…,service level agreement,SLA).A framework called application-aware IPv6 networking (APN6) was proposed,which could encapsulate applications’ requirements into packets.Networks could be aware of an application’s requirements and perform traffic steering and network resource adjustment.Besides,a secure access control mechanism was designed to solve application information forgery and tampering issues in APN6,which ensured that APN6 only provided services to legal users.…”
    Get full text
    Article
  9. 36189

    Honeypot contract detection of blockchain based on deep learning by Hongxia ZHANG, Qi WANG, Dengyue WANG, Ben WANG

    Published 2022-01-01
    “…Aiming at the problems of low accuracy of current detection methods and poor generalization of model, a honeypot contract detection method based on KOLSTM deep learning model was proposed.Firstly, by analyzing the characteristics of honeypot contract, the concept of key opcode was proposed, and a keyword extraction method which could be used to select the key opcode in smart contract was designed.Secondly, by adding the key opcode weight mechanism to the traditional LSTM model, a KOLSTM model which could simultaneously capture the sequence features and key opcode features hidden in the honeypot contract was constructed.Finally, the experimental results show that the model had a high recognition accuracy.Compared with the existing methods, the F-score is improved by 2.39% and 19.54% respectively in the two classification and multi-classification detection scenes.…”
    Get full text
    Article
  10. 36190

    Effect of Mn Content and Solution Annealing Temperature on the Corrosion Resistance of Stainless Steel Alloys by Ihsan-ul-Haq Toor

    Published 2014-01-01
    “…The corrosion behavior of two specially designed austenitic stainless steels (SSs) having different Nickel (Ni) and Manganese (Mn) contents was investigated. …”
    Get full text
    Article
  11. 36191

    Distributed dynamic mapping scheme based on cost function by Guo-dong GE, Yun-fei GUO, Ju-long LAN, Cai-xia LIU

    Published 2014-10-01
    “…For supporting efficient host mobility and mapping identifiers onto locators,a distributed dynamic mobility mapping scheme based on cost function was proposed.In the scheme,depending on the mobility pattern and communication feature,the communication of mobile node is divided into three communication models,namely,moving update model,balanced transmission model and resolving query model.In order to minimize the total resolving cost,three mapping approach are proposed based on distributed multicast,consistent hash functions and proactive sharing respectively in the mobile domain.For each mapping approach,corresponding registration update,resolution query and packet delivery strategies are designed.Simulation results show that the scheme can achieve the minimum resolving cost,and can have low resolve latency and good adaptability for network topology dynamic changing.…”
    Get full text
    Article
  12. 36192

    An energy-efficient multi-channel MAC protocol for linear sensor network by Fei TONG, Rucong SUI, Yu CHEN, Heng SU, Hengrui LIU, Shangfeng SU, Yuke YAN

    Published 2022-12-01
    “…Sensor nodes in linear sensor network (LSN) are deployed linearly due to the linear topology of the monitoring area.Most of the state-of-the-art medium access control (MAC) protocols designed for LSN adopted the duty-cycling and pipelined-forwarding (DCPF) schemes.They can reduce data propagation delay and network energy consumption but may still cause issues such as transmission competition, interference, and energy hole.To address these issues, an improved DCPF MAC protocol was proposed based on multiple channels and redundant-node deployment for LSN.The extensive simulations based on OPNET demonstrate that, compared with existing protocols, the proposed protocol shows a better performance in terms of energy efficiency, packet delivery ratio, throughput, and packet transmission latency.…”
    Get full text
    Article
  13. 36193

    Intelligent adaptation and integrated scheduling method for computing and networking resources by Weiting ZHANG, Chenghui SUN, Hongchao WANG, Jianing DAI

    Published 2023-08-01
    “…To effectively support the development needs of the deep integration of networking and computing, a novel computing and network convergence architecture has emerged.In this context, how to realize the intelligent perception of computing and networking resources and the efficient scheduling of computational tasks are key problems.To this end, the new network scenario for computing and networking convergence were analyzed, a scheduling model for computing tasks and nodes was designed, and a deep reinforcement learning-based resource scheduling algorithm was proposed.The proposed algorithm was able to intelligently make scheduling decisions that minimize the system cost by sensing key information such as user devices, available capacity of computing and networking resources, and link status.Finally, the effectiveness of the proposed algorithm in saving system cost was verified by simulation experiments.…”
    Get full text
    Article
  14. 36194

    A Deployment Method of Middlebox Service Chain Based on Multi-Flow Table by Shiran Liu, Julong Lan, Yuxiang Hu, Tong Duan

    Published 2015-08-01
    “…Aiming at the path cycle and source address binding problem in middlebox service chain deployment,a service chain deployment approach by combining the OpenFlow mechanism and NetFPGA was proposed.First of all,the OpenFlow multi-flow table was used for marking service chains and labeling service sequences so that data packets could be processed correctly according to desired service order;secondly,the service chain deployment algorithm was designed to achieve the mapping relationship between the service path and flow table rules;thirdly,a prototype system was implemented based on the hardware platforms of NetFPGA-10G.Finally,experimental results show that the proposed method have the advantage of feasibility and outperforms compared methods in the aspect of the flow table number and time overhead.…”
    Get full text
    Article
  15. 36195

    THE DEVELOPMENT OF THE FIRST DEPARTMENT OF MANAGEMENT IN OUR COUNTRY by G. R. Latfullin

    Published 2019-12-01
    “…The activity of the Department marked the beginning of management in the Institute, it served as a source of distribution in it managerial “spirit”, the ideology of manageability. The article designates new concepts and modern methodologies for the development of management science at the present stage: innovative digital economy and management, anthropologization, value and project approaches. …”
    Get full text
    Article
  16. 36196

    School Based 4-H Programming: Incorporating Family Engagement into Your Program by Vanessa Spero

    Published 2019-06-01
    “…For the purposes of Florida 4-H, a school-based program can be defined as school enrichment (offered to groups of youth, taught by Extension staff or trained volunteers, and designed to support the school curriculum), an in-school club following a more traditional club approach during school hours, or an after-school club operating directly after school hours. …”
    Get full text
    Article
  17. 36197

    Highways and Wildlife: Problems and Solutions by Joe Schaefer, Frank J. Mazzotti, Craig Huegel

    Published 2004-01-01
    “…Increased knowledge of wildlife movements, use of habitat, and reactions to highways, in addition to greater experience with innovative roadway designs, offer opportunities to lessen the negative impacts of roads on native fauna. …”
    Get full text
    Article
  18. 36198

    Handbook of Florida Water Regulation: Florida Pesticide Law by Michael T. Olexa, Luke D'Isernia, Laura Minton, Dulcy Miller, Sarah Corbett

    Published 2019-05-01
    “… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
    Get full text
    Article
  19. 36199

    Pedestrian surveillance system based on mobile vehicle by Huijun XING, Shuo CHANG

    Published 2017-02-01
    “…Pedestrian surveillance is one of the most important aspects in the surveillance system.Traditional surveillance equipment can only cover the limit area.Namely,once the surveillance equipment is implemented,it can only monitor a specific region.Besides,the surveillance system can't detect if there is a person in the surveillance picture or not.The professional staffs are needed to determine whether there is a person in the surveillance picture.To solve this problem,a computer vision based on mobile pedestrian surveillance system was designed.By implementing a surveillance camera on a mobile small vehicle and remotely control it,the system could switch the monitoring area.Besides,the system could classify and locate the pedestrian in the picture with the deep convolutional neural network and correlation filters.Finally,the system was tested on the spot,which verified the feasibility of the system.…”
    Get full text
    Article
  20. 36200

    Lecteur méfiant de science-fiction et développement de savoir-faire en lecture by Philippe Clermont

    Published 2024-06-01
    “…While any literary reading in general requires this kind of investigation, if only to resolve the inferences necessary for comprehension, SF would require more effort because of the semantic oddities designed to represent the science-fictional universe more or less distanced from the readers’ real reference point. …”
    Get full text
    Article