Showing 36,681 - 36,700 results of 46,768 for search '"Design"', query time: 0.22s Refine Results
  1. 36681

    Rebuilding Bailey Bridge to Bridge With Bascule Span – A Case Study by Andrzej Ambroziak, Maciej Malinowski, Mirosław Wałęga

    Published 2024-03-01
    “…This paper can provide scientists, engineers, and designers the basis for structural analysis in the field of foldable Bailey-type bridge constructions and numerical simulations. …”
    Get full text
    Article
  2. 36682

    Simulation of Worm Pair Transmission Accuracy of TK13250E NC Rotary Table based on Adams by Wang Feng, Chen Jie, Hong Rongjing

    Published 2020-03-01
    “…In order to study the law of accuracy deterioration of NC under excessive load,the accelerated wear test of precision decline of NC rotary table is designed. The test shows that with the increase of worm gear wear,the positioning accuracy and repetitive positioning accuracy of NC rotary table begin to decline.…”
    Get full text
    Article
  3. 36683

    Requirements-driven and multi-homed-based multipath TCP congestion control algorithm for vehicular network by Nan DING, Tao LIN, Cai-xia SONG, Guo-zhen TAN

    Published 2016-07-01
    “…Finally, the algorithm of PTLIA was accordingly designed to adjust, dynamically, the window of the con-gestion time on demand. …”
    Get full text
    Article
  4. 36684

    Narrowband-to-Narrowband Frequency Reconfiguration with Harmonic Suppression Using Fractal Dipole Antenna by S. A. Hamzah, M. Esa, N. N. N. A. Malik, M. K. H. Ismail

    Published 2013-01-01
    “…Furthermore, the antenna is designed, built, and tested. Simulation and measurement results show that the antenna operates well at the specific frequency range. …”
    Get full text
    Article
  5. 36685

    Good Worker Health and Hygiene Practices: Training Manual for Produce Handlers by Amy Simonne, Jeffrey Brecht, Steve Sargent, Mark Ritenour, Keith Schneider

    Published 2005-06-01
    “…Drawn from many sources in the subject area including the FDA-GAPs, FDA-GMPs, FDA Model Food Code, recommendations from the American College of Occupational and Environmental Medicine, and other publications from federal government agencies, this manual is designed to be a reference to accompany the other educational materials included in the UF/IFAS Worker Health and Hygiene Training Program.  …”
    Get full text
    Article
  6. 36686

    Coordinated Optimization of Departure Time Domains of Multiple Trains at a Station Based on Passenger Satisfaction by Zhiqiang Tian, Rui Zhang, Guofeng Sun, Di Cheng

    Published 2020-01-01
    “…In order to optimize the passenger train working diagram and improve the passenger satisfaction towards a coordinated optimization problem of departure time domains of multiple passenger trains at a station, the optimization model is designed to maximize the overall passenger travel satisfaction based on the quantification of the level of passenger travel satisfaction. …”
    Get full text
    Article
  7. 36687

    Statistical Analysis of Video Frame Size Distribution Originating from Scalable Video Codec (SVC) by Sima Ahmadpour, Tat-Chee Wan, Zohreh Toghrayee, Fariba HematiGazafi

    Published 2017-01-01
    “…Designing an effective and high performance network requires an accurate characterization and modeling of network traffic. …”
    Get full text
    Article
  8. 36688

    Sensitive information leakage awareness method for big data platform based on multi-attributes decision-making and taint tracking by Le-tian SHA, Fu XIAO, Wei CHEN, Jing SUN, Ru-chuan WANG

    Published 2017-07-01
    “…Based on multiple-attribute-decision-making and taint tracking,a sensitive-information leakage awareness method was proposed,some relative known vulnerabilities in big data platform was analyzed,target database was extracted and extended,multiple attribute model was built combined with operation semantic,a grey-correlation-analysis and technique for order preference by similarity to an ideal solution based sensitivity measurement was designed in combination of regular operation semantic for sensitive information.A prototype was built based on taint tracking,sensitive-information leakage vulnerabilities could be verified and discovered across big data platforms in this method.The experiment shows that verification for known bugs and discovery for unknown vulnerabilities can be accomplished based on leakage scenarios,which can be regarded as a support for protection in dynamic sensitive information data flow.…”
    Get full text
    Article
  9. 36689

    Real-Time Evaluation of Compaction Quality by Using Artificial Neural Networks by Weidong Cao, Shutang Liu, Xuechi Gao, Fei Ren, Peng Liu, Qilun Wu

    Published 2020-01-01
    “…At first, a field compaction experiment is designed and performed in a construction site, and the degree of compaction and the vibration are measured. …”
    Get full text
    Article
  10. 36690

    PGMweb: an online tool for visualizing the X-ray beam path through plane grating monochromators by Patrick Yuheng Wang, Murilo Bazan da Silva, Matthew Hand, Hongchang Wang, Peter Chang, Victoria Beilsten-Edmands, Timur K. Kim, Tien-Lin Lee, Kawal Sawhney, Andrew C. Walters

    Published 2025-01-01
    “…PGMweb is distributed as a web-based application that can be run in any modern browser without installation, making its use very straightforward for X-ray beamline designers and beamline scientists alike.…”
    Get full text
    Article
  11. 36691

    Dynamic Characteristics of Magnetic Suspended Dual-Rotor System by Riccati Transfer Matrix Method by Dongxiong Wang, Nianxian Wang, Kuisheng Chen, Chun Ye

    Published 2019-01-01
    “…In this research, a MSDS with the outer rotor supported by two active magnetic bearings (AMBs) is designed, and the PID control is employed. The Riccati transfer matrix method using complex variables is adopted to establish the MSDS dynamic model. …”
    Get full text
    Article
  12. 36692

    Heterogeneous resource cooperative game in space-ground computing power network by Yutong ZHANG, Yuming PENG, Boya DI, Lingyang SONG

    Published 2023-12-01
    “…To deal with the resource competition among satellites in the multi-satellite space-ground computing network, a space-ground heterogeneous resource cooperative game mechanism was designed in terms of the computing and spectrum domains.Each satellite published a computing task which was independent of other tasks and relied on UE to generate raw data.By competing the resources of user terminals and UE, the task offloading and processing was achieved.To provide real-time data services, a distributed scheme was proposed based on multi-agent reinforcement learning to coordinate the computing and spectrum resource competition among satellites, thereby minimizing the system latency.Simulation results indicated that, compared with the existing schemes, the proposed algorithm achieves a lower system latency by fully utilizing the computing and spectrum resources and coordinating the resource competition.…”
    Get full text
    Article
  13. 36693

    The Bologna Process and Learner Autonomy: Russian Specifics by M. A. Ivanova

    Published 2018-04-01
    “…As the result of the research done, the author comes to the conclusion that the majority of Russian freshmen are not ready to study in the terms of credit-modular system because of the lack of necessary study skills and inability to work ndependently. Hence, the designers of new State educational standards of both secondary and higher education should focus their attention on the process of learner autonomy development…”
    Get full text
    Article
  14. 36694

    Distributed storage causal consistency model with trusted constraint by Junfeng TIAN, Juntao ZHANG, Yanbiao WANG

    Published 2021-06-01
    “…At present, there are few mature solutions to consider security risks in the research field of distributed storage causal consistency.On the basis of hybrid logic clock and HashGraph, combined with trusted cloud alliance technology in trusted cloud platform, a distributed storage causal consistency model (CCT model) with trust constraints was proposed.The CCT model designed identity authentication and consistent data trust verification mechanism on the client side and the server side respectively, and imposed security constraints on the process of data synchronization between data replicas in the cloud storage cluster.Through the simulation experiment, CCT model can identify and verify the identity signature forgery, illegal third party and other security risks in the client and server, and provide the trusted constraint for the system on the premise of causing small performance cost.…”
    Get full text
    Article
  15. 36695

    Parametric Studies of Polyacrylamide Adsorption on Calcite Using Molecular Dynamics Simulation by Keat Yung Hue, Jin Hau Lew, Omar K. Matar, Paul F. Luckham, Erich A. Müller

    Published 2025-01-01
    “…The simulation outcomes correspond closely with experimental results, offering valuable insights for designing and optimizing polymer-based strategies aimed at controlling solids production in carbonate reservoirs.…”
    Get full text
    Article
  16. 36696

    Communication topology reconstruction method for multi-agent cooperative control in polymorphic networks by Ruyun ZHANG, Geyang XIAO, Qihe SHAN, Tao ZOU, Dan LI, Fei TENG

    Published 2022-04-01
    “…As the task objectives and working environment become more and more complex and changeable, considering the limitations of the cooperative control of a single multi-agent system under the unilateralism communication network, a communication topology reconstruction method for multi-agent cooperative control in polymorphic networks was studied.Firstly, the multi-lateral distributed cooperative control framework was constructed based on multi-agent system in the polymorphic network environment.Secondly, a communication topology reconstruction method was proposed for multiple multi-agent systems with different functions after networking, and a distributed control protocol was designed to achieve multi-consensus.Finally, a simulation example was given to verify that the proposed method can complete the communication topology reconstruction of multi-agent cooperative control in polymorphic network.…”
    Get full text
    Article
  17. 36697

    Multislot Antenna with a Screening Backplane for UWB WBAN Applications by Yun-fei Wei, Christophe Roblin

    Published 2012-01-01
    “…A novel multislot antenna with a conducting backplane reflector (MSA-BP) designed for ultrawideband wireless body area networks (WBANs) applications is presented. …”
    Get full text
    Article
  18. 36698

    Parasites specific to centipedes form a new major lineage of terrestrial gregarines by Tatiana S. Miroliubova, Kirill V. Mikhailov, Timur G. Simdyanov, Vladimir V. Aleoshin, Đinh Thế Dũng, Aleksandra I. Kudriavkina

    Published 2025-01-01
    “…This clade appears sister to the clade of the Actinocephaloidea and Stylocephaloidea, and represents a new major lineage of terrestrial gregarines that we designate as a new superfamily Dactylophoroidea.…”
    Get full text
    Article
  19. 36699

    RESEARCH ON CRASHWORTHINESS OF BIONIC PENTACLE THIN-WALLED STRUCTURE INSPIRED BY CARAMBOLA by SUN YuZhou, YANG ZhuoRan, XIA Yan, JIANG Han

    Published 2024-02-01
    “…Inspired by carambola fruit with excellent crashworthiness, the bio-inspired pentacle thin-walled structure was designed. The deformation and energy absorption mechanism of the struct were analyzed by finite element simulation, experiment and theory. …”
    Get full text
    Article
  20. 36700

    Northward expansion of the Critically Endangered Arabian leopard in Dhofar, Oman by Hadi Al Hikmani, Khalid Al Hikmani

    “…To improve detection probability, we recommend that camera-trap surveys for the leopard in the Arabian Peninsula are of at least 18 weeks duration. We advocate the designation of central and western areas of the Nejd as a National Nature Reserve, to protect critical habitat for the Arabian leopard and for other species in this region.…”
    Get full text
    Article