Showing 36,241 - 36,260 results of 46,768 for search '"Design"', query time: 0.17s Refine Results
  1. 36241

    TRANSFORMATION OF PUBLIC PROCUREMENT OF INDUSTRIAL PRODUCTS TAKING INTO ACCOUNT THE ENVIRONMENTAL FACTOR by A. E. Gukasova, S. P. Kiseleva

    Published 2020-09-01
    “…Actual problems of industry and environmental aspects of their manifestation have been designated. To reduce the negative impact of industry on the environment, the authors suggest using public procurement tools. …”
    Get full text
    Article
  2. 36242

    Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement by Zhiqiang YAO, Zhirong ZHU, Guohua YE

    Published 2021-08-01
    “…In order to deal with the issue of the man-in-the-middle attack in the process of using dynamic host configuration protocol, a lightweight scheme was proposed.A new key agreement algorithm was developed based on public key cryptography to generate relevant keys, reducing the key storage burden.On the basis, a secure scheme was proposed, where two-way authentication of participants was designed to prevent the man-in-the-middle attack and digital signatures conforming to protocol specifications was constructed to ensure the legitimacy of the message source.By security analysis, the proposed scheme was demonstrated to be secure and valid against the man-in-the-middle attack and other common attacks.Experimental results show that the proposed scheme has the better performance compared with the related schemes, and can be compatible with both DHCPv4 and DHCPv6.…”
    Get full text
    Article
  3. 36243

    Research of Comprehensive Parameter Measure Method of RV Reducer by Zhang Xiyang, Chen Zhixin, Xu Zhiqiang

    Published 2018-01-01
    “…By analyzing the principle of RV reducer measurement,the measurement method of comprehensive parameters of RV reducer is studied,and the measurement and data processing method of each parameters are designed,which can accomplish automated measurement of comprehensive parameters in different RV reducer model. …”
    Get full text
    Article
  4. 36244

    PM2.5 concentration prediction model based on random forest regression analysis by Xu DU, Jingyu FENG, Shaoqing LV, Wei SHI

    Published 2017-07-01
    “…The random foreat regression algorithm was introduced to solve the shortcomings of neural network in predicting the PM2.5 concentration,such as over-fitting,complex network structure,low learning efficiency.A novel PM2.5 concentration prediction model named RFRP was designed by analyzing the 22 characteristic factors including the meteorological conditions,the concentration of air pollutants and the season.The historical meteorological data of Xi’an in 2013—2016 were collected to verify the effectiveness of the model.The experimental results show that the proposed model can not only predict the PM2.5 concentration effectively,but also improve the operating efficiency of the model without affecting the prediction accuracy.The average run time of the proposed model is 0.281 s,which is about 5.58% of the neural network prediction model.…”
    Get full text
    Article
  5. 36245

    Architecture and practice of BGP internet routing visibility and security detection by Chaoyang YE, Chen SHEN, Mingqing HUANG, Shicong ZHANG, Yisha LIU

    Published 2021-12-01
    “…Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol of today’s global internet for exchanging routing information.However, it was supposed that all participants were reliable without generating routing security issues by mistakes or on purpose when BGP was designed 50 years ago.As Internet is getting involved in all aspects of our society, internet routing security is becoming the problems that couldn’t be ignored anymore.A general architecture was proposed which coved inference of BGP routing knowledge database and provided visibility of global internet routing.Detection of route security events such as routing hijacks and routing leaks were realized.The deployment shows that the system can provide good visibility of internet routing and precise detection of routing security events.…”
    Get full text
    Article
  6. 36246

    Analysis of the throughput in full-duplex WLAN by Chen ZHAO, Yunzhou LI, Xibin XU, ANGJing W

    Published 2016-06-01
    “…WLAN is one of the important ways of accessing mobile internet.However,the performance of WLAN declines rapidly as the number of users increases.Improving the performance of WLAN with high density deployment is an important research direction of WLAN technology.Distributed coordination function(DCF)which was the basic media access method of IEEE 802.11 in infrastructure-based networks was modeled and the bottleneck of downlink throughput was pointed out.Taking advantage of full-duplex technology where there was a breakthrough in recent years,a new MAC protocol was designed and analyzed.By providing the AP full-duplex transmitting ability and simple modifications to traditional DCF protocol,the new protocol made the downlink throughput breaking through the bottleneck in infrastructure-based WLAN and increased the total throughput by more than 60%.…”
    Get full text
    Article
  7. 36247

    Handbook of Florida Water Regulation: Consumptive Use by Michael T. Olexa, Luke D'Isernia, Laura Minton, Dulcy Miller, Sarah Corbett

    Published 2019-05-01
    “… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
    Get full text
    Article
  8. 36248

    Apprendere (con) l’intelligenza artificiale. Un approccio media-archeologico by Stefano Moriggi, Mario Pireddu

    Published 2025-01-01
    “…Particular attention is given to the relationship between simulation and intelligence, highlighting how designing meaningful learning experiences requires a deep understanding of the underlying cultural frameworks. …”
    Get full text
    Article
  9. 36249

    Restorative Justice and Anti-LGBT Hate Crimes: Experiences and Disparities from the Ground by Ignacio Elpidio Domínguez Ruiz, Malin Roiha

    Published 2024-06-01
    “…We argue that restorative justice processes can be productively designed and adapted, but the existing practices and expectations of our research participants do not always conform to restorative paradigms that achieve these goals, which points to the need for a shift in justice culture and training to implement restorative practices.…”
    Get full text
    Article
  10. 36250

    About the ‘Cape’. Considerations on Geometries of the Maurizio Sacripanti’s Osaka Pavilion Roof by Lorena Greco, Maria Laura Rossi, Marta Salvatore

    Published 2018-06-01
    “…The object of the experimentation is the covering of the pavilion designed by Maurizio Sacripanti for the Universal Exposition of Osaka in 1970. …”
    Get full text
    Article
  11. 36251

    Research on secret key generation based on wireless channel characteristics in body area network by Jingjing HUANG

    Published 2021-12-01
    “…Wireless body area network (WBAN) is a human-centered wireless network.With limitations of power and computation capabilities of WBAN, the significant challenge of ensuring security is how to generate a shared key between two entities based on a lightweight symmetric cryptography.To investigate this issue, a secret key generation scheme in ultra-wideband (UWB) WBAN was designed.In this scheme, the difference of multipath relative delay and its average value were chosen as common random source to reduce key mismatch probability.Furthermore, with the aid of relay, secret key generation rate could be increased.Simulation and test results demonstrate that the proposed scheme can achieve a good tradeoff between key match probability and key generation rate.Furthermore, security analysis of the scheme was also provided to validate its feasibility.…”
    Get full text
    Article
  12. 36252

    4-H Horse and Pony Lease by E. L. Johnson, Wendy DeVito

    Published 2018-04-01
    “…This lease form was designed to cover the basic agreement between a 4-H member and a horse owner. …”
    Get full text
    Article
  13. 36253

    Autour d’un « tapis du Guergour » présenté à l’exposition universelle de Paris de 1889 by Gérard Boëly, Pierre Guichard, Mahmoud Ourabah

    Published 2021-09-01
    “…This article uses some bibliographical elements, a family memory, and the analysis of some carpet designs to complete the history of Guergour carpets. …”
    Get full text
    Article
  14. 36254

    Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud by Huaqun WANG, Zhe LIU, Debiao HE, Jiguo LI

    Published 2021-07-01
    “…To solve the problem of multi-source IoT data integrity verification, identity-based provable data possession for multi-source IoT terminal in public cloud (ID-MPDP) was proposed.Firstly, the formal definitions of system model and security model of ID-MPDP were given.Then, the specific ID-MPDP scheme was designed by using RSA.Finally, the performance analysis and security analysis of ID-MPDP were given.Through performance analysis and security analysis, ID-MPDP was provably secure, efficient and convertible.It has the following advantages, such as it can be used for the integrity checking for multi-source IoT terminal data, it has lower block expansion rate, it eliminates the certification management cost by using the identity-based public key cryptography and it is convertible.…”
    Get full text
    Article
  15. 36255

    Estimation scheme for parameters of wireless channel model in OFDM communication systems by WANG Yong, GE Jian-hua, WU Xiao-li

    Published 2007-01-01
    “…The conventional channel estimator in OFDM system was designed to cope with the worst-case channel condi-tion,thus performance degradation can be induced due to the imperfect channel estimation.Though wiener filter based on the minimum mean-squared error(MMSE) is the optimal linear estimator,it requires the prior information of transmis-sion channel.In order to select the near optimal prestored channel interpolation filter coefficients,three channel parame-ters detecting methods including maximum multipath delay,Doppler frequency and SNR based on the time and fre-quency correlation functions of the channel,the Euclidean distance of hard-decision in pilots position respectively,were proposed.The method proposed with low complexity allows an efficient implementation for adaptive channel estimation algorithm as well as multi-user OFDM systems.…”
    Get full text
    Article
  16. 36256

    Tenant-Oriented Customized VM Networking Technology by Zirui Zhuang, Jingyu Wang, Tong Xu

    Published 2015-10-01
    “…A tenant-oriented customized virtual machine networking system was designed and implemented based on OpenStack.By utilizing metadata definition and template based collaboration,the system implemented automated deployment and control of cloud infrastructures.Features such as unified graphical and draggable tenant interfaces,customized virtual machine networking orchestration,dynamic and batch resource configuration,quality of service control on network interfaces,and a connectivity based optimized mapping algorithm were included.The system provided users ability to configure networks,so that users can manage to conduct virtual machine networking swiftly and without knowledge of underlying technical details.It contributed to reduction of overall virtual networking latency,high efficiency matching of resources and increase in resource utilization.…”
    Get full text
    Article
  17. 36257

    Efficient and privacy-preserving profile matching protocols in opportunistic networks by Yong-kai LI, Shu-bo LIU, Zhao-huan YANG, Meng-jun LIU

    Published 2015-12-01
    “…In opportunistic networks,users can take the advantage of parallel opportunistic contacts with other mobile users and find the appropriate helpers to forward the messages or share the contents.Most of the existing profile-matching protocols were designed on the basis of homomorphic cryptosystem and were not quite efficient in encryption and decryption.Three efficient and privacy-preserving profile matching protocols were proposed to deal with different privacy requirements in opportunistic networks,which do not use any homomorphic encryption.The proposed protocols were proved to be privacy-preserving and correct.The performances of the protocols are thoroughly analyzed and evaluated via real smartphone experiments,and the results show that the proposed protocols can decrease encryption and decryption time by at least an order of magnitude than the Paillier cryptosystem based protocol.…”
    Get full text
    Article
  18. 36258

    Research of Sliding Mode Variable Structure Control for a New Robot Wrist Structure by Huang Youxin, Qian Donghai, Dong Xiaokang, Wu Peng

    Published 2017-01-01
    “…Aiming at the controlled model of a designed new type of multi- joint robot wrist structure which can be built in ADAMS and used in the MATLAB,the co- simulation with ADAMS and MATLAB is carried out. …”
    Get full text
    Article
  19. 36259

    Security mechanism in access control based on non-cooperative game by Yi-xuan ZHANG, Jing-sha HE, Bin ZHAO

    Published 2014-11-01
    “…Access control technology is an important information security technology to protect the sensitive information and critical resources in computer system and network.But traditional access control methods could only respond to access requests of users passively and can’t meet the changing dynamic network environment.In order to improve the ability to respond to malicious attacks and threats in access control system,a security mechanism is designed,which is suitable for access control,based on non-cooperative game theory in the game.When the subject makes an access request to the object,there will be a non-cooperative game between them to get Nash equilibrium.Then the security mechanism will compare the probabilities in the Nash equilibrium to the setting thresholds to get the conclusion that whether to authorize the subject or not.Experiment proves the effectiveness of the security mechanisms.…”
    Get full text
    Article
  20. 36260

    Exponential information’s extraction from power traces of modulo exponentiation implemented on FPGA by WU Zhen, CHEN Yun, CHEN Jun, WANG Min

    Published 2010-01-01
    “…A power analysis model on modulo exponentiation’s computation suitable for real environment was presented in the basis of analysis to the great amount of power traces in the rough.And a method of signal processing for extracting exponential information from the initial power traces was inferred too.Hereby,a power analysis platform was designed and implemented.The exponential information submerged in power traces of 32bit modulo exponentiation algorithms applied in a FPGA chip was successfully extracted where after.Meanwhile,a conclusion about SPA attack on RSA made by Messerges et al,such as the problem with an SPA attack was that the information about the secret key was difficult to directly observe,was proved to be incorrect.Finally,the static masking algorithm for modulo exponentiation of anti-SPA attack was also validated in this testing platform.…”
    Get full text
    Article