Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
36481
Research on active defense application based on honeypot
Published 2018-01-01“…Abstract:With the rapid development of financial information technology,cyber security events on the financial system have also increased greatly.Active defense plays an important role in improving the defense level of defined private network.How to quickly and effectively deploy and apply honeypot to capture and attack behavior,analyze the attack intention and raise the threshold of attack is the key to ensure the security of the defined private network.From the perspective of active defense,the advantage of honeypot active defense was analyzed,an active defense and defense filling passive defense integration was designed,and a honeypot within private network experimental environment was set up,the results show that the active defense technology can effectively improve the threshold of the attacker's attack,so as to improve the security level of the whole network.…”
Get full text
Article -
36482
Demagnetizer Frequency Converter
Published 2009-06-01“…The paper considers a power scheme and a control system of two-member frequency converter with voltage inverter which is designed for power supply of a bearing ring demagnetizer inductor. …”
Get full text
Article -
36483
La montagne artificielle : une nouvelle forme artialisée de la nature ?
Published 2017-06-01“…From a corpus of about forty realizations, real and imaginary, this paper studies how the designers of artificial mountains, mainly architects, are inspired by landscape models to introduce this mountainous nature into cities, but also how they are reinventing the idea of “the mountain”, by introducing new aesthetics and new features into renewed urban contexts.…”
Get full text
Article -
36484
Carrier-grade NTP clock synchronization scheme of SD-WAN network
Published 2022-08-01“…SD-WAN is developing rapidly, and telecom operators and Internet companies are constantly expanding their layout.As a technology with diverse forms, SD-WAN has not made a clear specification for clock synchronization.The importance of clock synchronization to SD-WAN technology implementation and business running was analyzed.The advantages and disadvantages of the clock synchronization scheme of Internet public NTP service widely used in SD-WAN realizations were sketched.Thus the clock synchronization scheme of self-built NTP service in different scenarios was discussed.Furthermore, a clock synchronization method using management tunnel to transmit encrypted NTP synchronization data was designed, which made SD-WAN platform and devices obtain higher security and stability in time synchronization.…”
Get full text
Article -
36485
De l’îlot à l’enclos : l’immigration chinoise à San Francisco comme espace poétique (1910-1940)
Published 2006-06-01“…From 1910 to 1940, the Chinese who applied for immigration were disembarked and penned in on Angel Island (San Francisco Bay) where they were submitted to a medical examination and a thorough interrogation designed to determine whether their request should be granted. …”
Get full text
Article -
36486
Cooperation mechanism of multi-agent system driven by utility
Published 2013-07-01“…A prototype system was designed at last to val te the proposed cooperative me-chanism. …”
Get full text
Article -
36487
Link prediction methods based on generalized common neighbor in directed network
Published 2020-10-01“…Link prediction aims to predict missing or future links through currently observed information of network.Existing mainstream methods are mostly applied to undirected network,and some methods designed for directed network ignored the diverse heterogeneous features of common neighbor.For this problem,a generalized common neighbor algorithm was proposed.Firstly,a generalized common neighbor was defined for the directed network.Then the degree of contribution of different structures was measured by the joint edge probability of the directed neighbor isomers,and the existing undirected local similarity index is improved by the new definition,redefining eight kinds of directed similarity indicators based on generalized common neighbor.Experiments on 12 datasets show that proposed method generally improves the performance of existing predictive indicators under two metrics.…”
Get full text
Article -
36488
Research of the Order Analysis Method for Vibration Signal of Automotive Rear Axle Main Reducer
Published 2015-01-01“…As the core component of automotive rear axle,the automotive main reducer undertake the function of slowdown and increase driving moment,its quality directly affects the safety and comfort of automotive.Taking the order analysis method as the core,the vibration signal analysis method of the automotive rear axle main reducer is designed based on the virtual instrument technology,the signal is collected by the data acquisition card and transmitted to the computer through the USB bus.The time point of vibration signal resampling is obtained through the processing of rotational speed signal,the order spectrum of the vibration signal is obtained by the frequency spectrum analysis of the vibration signal resampling,and the order spectrum is compared with the original vibration signal frequency spectrum,the clear frequency component is obtained,the problem of frequency alias produced by the speed fluctuation is solved.…”
Get full text
Article -
36489
Le domaine de Voisins (1892-2008) : essai de définition d’un lieu hors temps
Published 2009-01-01“…The objective is to figure out the articulations through a relative research, on one side on the gardens designed by Achille Duchêne and on the other one on the estate as hunting Park. …”
Get full text
Article -
36490
Research and implementation of reconfigurable SM4 cryptographic algorithm based on HRCA
Published 2020-10-01“…For the application scenarios that require high throughput and high security at the same time,based on HRCA,a high-performance scalable SM4 implementation scheme was proposed.Firstly,SM4 was formed to different calculation units of different granularity,and a general coarse-grained reconfigurable calculation unit was designed.Then,various mapping strategies were given for the purpose of satisfying different encryption modes,and the algorithm was mapped to the reconstructed computing unit according to different strategies.Finally,the SM4 overall architecture was optimized by dividing the control plane and the data plane.The experimental results show that using the proposed method,the SM4 algorithm has a significant improvement in throughput under lower resource consumption.…”
Get full text
Article -
36491
Precisely positioning method for roadheaders and robotic roadheader system
Published 2020-02-01“…To overcome the problems faced in underground positioning,the robotic roadheader mine Internet of things (IoT) was designed which connected multi sensors,surveying devices and industrial computers,and a novel positioning method was developed,based on which a robotic roadheader system was built.The robotic roadheader system was employed for real-world tunnel cutting.The experimental results verifies the high accuracy of the positioning method,which achieves an RMSE error less than 5 cm,and the robust running of the robotic roadheader indicates that the robotic roadheader system can precisely perceive the surrounding environment and make precise interaction with the working environment,which yield a safety,high efficiency,and precisely underground tunnel building and coal mining and an unmanned working surface.…”
Get full text
Article -
36492
CLASSIFICATION OF THE SEVERNAYA DVINA RIVER AND THE VYCHEGDA RIVER CHANNEL SECTIONS ACCORDING TO COMPLEXITY OF CHANNEL PROCESSES AND THEIR MANAGEMENT CONDITIONS
Published 2021-06-01“…The latter factor controls both possibility and features of regulative works when designing activities in water economics, navigation and construction. …”
Article -
36493
Impact of Conservation and Development on the Vicinity of Nanda Devi National Park in the North India
Published 2016-03-01“…The aim of this present study, carried out in villages adjacent to the Nanda Devi National Park in the Himalayan state of Uttarakhand in India, is to understand the linkages between conservation- and development-induced displacement and the process of designing compensation packages for the local community. …”
Get full text
Article -
36494
Adaptive Iterative Learning Control of Hybrid Drive Cable Parallel Manipulator
Published 2022-05-01“…For a HDCPM system with nonlinear, time-varying characteristics and repetitive time-varying disturbance, an adaptive iterative learning control strategy, which controls gain variations with the iterations, is designed. By means of Lyapunvo function, the stability of the controller is proved. …”
Get full text
Article -
36495
Password Based Circuit Breaker
Published 2023“…Therefore, it was necessary to provide a safely system of protection to avoid the accidents that may occurs in case of miss coordination between the lineman and station or control staff. This project designed to give a high security system and that in switching off the meanly line with entering a password with a help of keypad. …”
Get full text
Thesis -
36496
Pass Word Based Circuit Breaker.
Published 2023“…Therefore, it was necessary to provide a safely system of protection to avoid the accidents that may occurs in case of miss coordination between the lineman and station or control staff. This project designed to give a high security system and that in switching off the meanly line with entering a password with a help of keypad. …”
Get full text
Thesis -
36497
A Cross-Stage Focused Small Object Detection Network for Unmanned Aerial Vehicle Assisted Maritime Applications
Published 2025-01-01“…This study introduces an innovative detection framework, CFSD-UAVNet, designed to boost the accuracy of detecting minor objects within imagery captured from elevated altitudes. …”
Get full text
Article -
36498
Efficacy of the Foodbot Factory digital curriculum-based nutrition education intervention in improving children’s nutrition knowledge, attitudes and behaviours in elementary school...
Published 2025-01-01“…The Foodbot Factory intervention, consisting of serious game (ie, a digital game designed for education) and curriculum-based lesson plans, was developed to support teachers and children ages 8–12 with nutrition education. …”
Get full text
Article -
36499
Efficient and accurate tobacco leaf maturity detection: an improved YOLOv10 model with DCNv3 and efficient local attention integration
Published 2025-01-01“…In our study, we have advanced the YOLOv10 framework by integrating DCNv3 with C2f to construct an enhanced neck network, designated as C2f-DCNv3. This integration is designed to augment the model’s capability for feature integration, particularly concerning the morphological and edge characteristics of tobacco leaves. …”
Get full text
Article -
36500
Using a digital health intervention “INTERCEPT” to improve secondary prevention in coronary heart disease (CHD) patients: protocol for a mixed methods non-randomised feasibility st...
Published 2025-01-01“…The aim of this study is to determine the feasibility of “INTERCEPT”, a co-designed DHI developed to improve secondary prevention in hospitalised coronary heart disease patients (CHD). …”
Get full text
Article