Showing 36,341 - 36,360 results of 46,768 for search '"Design"', query time: 0.17s Refine Results
  1. 36341

    Survey on privacy preserving techniques for blockchain by Zonghui WANG, Shengli ZHANG, Shi JIN, Hui WANG

    Published 2018-09-01
    “…Blockchain is a kind of distributed ledger technology with the characteristics of decentralization,security reliability,tamper-proof and programmable.The open and transparent feature of the blockchain system has seriously threatened the transaction privacy of users,and the corresponding privacy problem solution is designed for different application scenarios.Firstly,the basic working principle of block chain technology was introduced,and typical privacy issues was introduced in blockchain,such as transaction privacy and account privacy.Secondly,the existing typical blockchain privacy protection schemes were divided into three types:mixed-coin technology,cryptography technology and secure channel technology,and presents a comprehensive and comprehensive introduction to this three privacy protection schemes; Finally,the blockchain data privacy protection technology was analyzed,the application and development on IoT security were prospeted.…”
    Get full text
    Article
  2. 36342

    Anti-jamming transmission in a multi-channel wireless network based on incomplete information dynamic game by Hengjie ZHOU, Minhong SUN, Hua ZHONG, Wei LIU

    Published 2018-02-01
    “…Intelligent jammer can analyze the history of user’s transmission and control their own behavior,so it has brought new threats to the wireless network.In order to analyze the behavior of users and intelligent jammers in a multi-channel wireless network,a dynamic Stackelberg game with incomplete information was modelled.In the model,it was assumed that the intelligent jammer followed the user and they transmitted at a same wireless channel,and both of them took power control as their strategy.Furthermore,their benefit functions were designed of which the observation error of the jammer was taken into account.Then,the Stackelberg equilibrium (SE) point of the game model was derived and the existence and the uniqueness of the SE were proved.The validity of the multi-channel dynamic Stackelberg game anti-jamming model with incomplete information was verified by simulations.…”
    Get full text
    Article
  3. 36343

    Clifford-Valued Shearlet Transforms on Cl(P,Q)-Algebras by Firdous A. Shah, Aajaz A. Teali, Mawardi Bahri

    Published 2022-01-01
    “…In this article, we introduce a novel integral transform coined as the Clifford-valued shearlet transform on Cl(p,q) algebras which is designed to represent Clifford-valued signals at different scales, locations, and orientations. …”
    Get full text
    Article
  4. 36344

    Un coma ça tape où ? Incorporer le corps dans le voir by Germain Rœsz

    Published 2014-07-01
    “…Il propose le concept de Raum pour désigner cet état paradoxal où l’on touche et sent sans son corps. …”
    Get full text
    Article
  5. 36345

    Measurement Feedback Self-Tuning Weighted Measurement Fusion Kalman Filter for Systems with Correlated Noises by Xin Wang, Shu-Li Sun

    Published 2012-01-01
    “…For the linear discrete stochastic systems with multiple sensors and unknown noise statistics, an online estimators of the noise variances and cross-covariances are designed by using measurement feedback, full-rank decomposition, and weighted least squares theory. …”
    Get full text
    Article
  6. 36346

    Mechanism Optimization of Weight-Bearing Lower Extremity Exoskeleton based on Analysis of Multi Degree of Freedom by Chen Zhiqing, Cao Heng, Zhu Jun, Lü Rongan

    Published 2016-01-01
    “…To solve this problem,aiming at the exoskeleton robot " ELEbot" designed by east China University of Science and Technology,by using the screw theory,the " ELEbot" degrees of freedom and constraints in the single leg support phase are calculated and determined and then an improved mechanism to meet demand for degrees of freedom in this posture is put forward and the rationality of the drive configuration is verified. …”
    Get full text
    Article
  7. 36347

    How to Use PERMA Model of Positive Psychology in Occupational Therapy to Improve Well-being by Kam Man WONG, Guang ZENG

    Published 2018-02-01
    “…The use of 3C (choice, context, celebration) theories in designing activities could help patients experience positive emotion, engagement, relationship, meaning and sense of success. …”
    Get full text
    Article
  8. 36348

    Handbook of Florida Water Regulation: Hazardous Waste Management by Michael T. Olexa, Luke D'Isernia, Laura Minton, Dulcy Miller, Sarah Corbett

    Published 2019-05-01
    “… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
    Get full text
    Article
  9. 36349

    Leukocytapheresis in patients with inflammatory bowel diseases by Małgorzata Woźniak, Ilona Kurnatowska, Ewa Małecka-Panas, Renata Talar-Wojnarowska

    Published 2021-06-01
    “…Considering the current level of knowledge, it is essential to conduct large, well-designed, randomized clinical trials to evaluate the effects of leukocytapheresis in the management of IBD patients.…”
    Get full text
    Article
  10. 36350

    Metabolic cities of the future. Between Agriculture and Architecture by Leonardo Zaffi, Michele D'Ostuni

    Published 2020-12-01
    “…Resuming the fascination of mega-structures proposed in the second half of the twentieth century, in the gap between utopia and dystopia, this essay investigates models and solutions for the integration of agricultural production systems within above-ground architectures, designed to meet the demand for new living spaces in future ultra-populated cities, as a possible response to the soil impoverishment that made it difficult to implement traditional farming systems in and around urban areas.…”
    Get full text
    Article
  11. 36351

    Modified Binary Partition Assisted Broadcast Protocol for Emergency Message Dissemination in VANET by Daiyue Cheng, Guoan Zhang, Xiang Ye

    Published 2015-09-01
    “…A modified binary partition assisted broadcast(MBPAB)protocol was proposed, which was designed for emergency messages dissemination in vehicular Ad Hoc network(VANET). …”
    Get full text
    Article
  12. 36352

    Risques et impacts environnementaux des retenues d’altitude pour la production de neige de culture dans un contexte de changement climatique by André Evette, Laurent Peyras, Hugues François, Stéphanie Gaucherand

    Published 2011-10-01
    “…Mountain reservoirs are hydraulic structures implanted in recreational mountain resorts designed to provide a water reserve mainly used for the production of artificial snow. …”
    Get full text
    Article
  13. 36353

    Influence community search on directed graphs by DU Ming, HU Xinyu, ZHOU Junfeng

    Published 2024-11-01
    “…The problem of influence community search on directed graphs was proposed, and a corresponding online search algorithm was designed. To further enhance the efficiency of community mining, an index-based influence search method on directed graphs and its optimization strategies were proposed. …”
    Get full text
    Article
  14. 36354

    Multiplying textile lives. Textile collection and recycling in urban Africa by Moritz Kasper, Elmar Stroomer

    Published 2021-06-01
    “…And with increased consumption comes an increased urgency for concepts and designs that utilize textile resources beyond linear lines and singular lives. …”
    Get full text
    Article
  15. 36355

    Comparative analysis of the implementation performance using selected scripting languages in the Godot game engine by Sebastian Alchimowicz, Małgorzata Plechawska-Wójcik

    Published 2024-06-01
    “…In order to analyze the implementation of scripting languages, research scenarios were designed in which the scripts were written in a similar way to facilitate the analysis of the performance of their implementation. …”
    Get full text
    Article
  16. 36356

    La “Nuit de la Nation” : culture jeune, rock’n’roll et panique morale dans la France des années 1960 by Florence Tamagne

    Published 2018-10-01
    “…The free concert, which attracted about 150.000 people, was the theatre of many incidents and acts of violence attributed to the “blousons noirs”, an expression that designated young offenders, generally fans of rock’n’roll. …”
    Get full text
    Article
  17. 36357

    Voix soufflées, voix volées, voix intervocales by Helga Finter

    Published 2013-06-01
    “…The roles of the director and sound designer are then transformed. The analysis is based on a body of productions from the 1970s onwards, including works by Robert Wilson, Lee Breuer and the Wooster Group, and foregrounds the possibilities offered by technology in the treatment and alterations of voice in the theatre.American Theatre, Laurie Anderson, Robert Ashley, body, Lee Breuer, Meredith Monk, technology, theatricality, voice, Robert Wilson, Wooster Group…”
    Get full text
    Article
  18. 36358

    Kinematics Analysis and Simulation of Rehabilitation Wearable Upper Limb Exoskeleton based on Adams by Jiqun Yu, Ning Liu, Lü Qiongying

    Published 2020-11-01
    “…Firstly, the entire wearable robot is designed and modeled in ergonomics. The D-H coordinates are established by the exoskeleton upper limb kinematics model, and use Lagrange method to analyze its dynamics, and the theoretical driving torque of each joint is solved. …”
    Get full text
    Article
  19. 36359

    High-performance and high-concurrency encryption scheme for Hadoop platform by Wei JIN, Mingjie YU, Fenghua LI, Zhengkun YANG, Kui GENG

    Published 2019-12-01
    “…,single encryption algorithm,complicated key management,low encryption performance) and they cannot protect data stored in Hadoop effectively,a high-performance encryption and key management scheme for Hadoop was proposed.Firstly,a three-level key management system was extended with the domestic commercial cipher algorithm.Then,a new data structure for encryption zone key to reduce time consumption was designed.Finally,the computing process of data stream in parallel was scheduled.The experimental results show that compared with the existing Hadoop schemes,the proposed scheme can improve the efficiency of key management,and can speed up file encryption.…”
    Get full text
    Article
  20. 36360

    Culturally Responsive Teaching: A Framework for Educating Diverse Audiences by John Diaz, Cecilia Suarez, Laura Valencia

    Published 2019-10-01
    “…This includes: (1) acquiring a knowledge base of diverse cultures, (2) designing or utilizing culturally relevant curricula, (3) utilizing cultural caring and developing a learning community, (4) practicing intercultural communications, and (5) establishing cultural congruity in classroom instruction. …”
    Get full text
    Article