Showing 36,701 - 36,720 results of 46,768 for search '"Design"', query time: 0.21s Refine Results
  1. 36701

    Study on a Moving Mechanism of Movable Disk of Steel Bar Cage Rolling Welder in Construction by Wang Demin, Wang Pengyu, Liu Rongshuai, Wu Honggang

    Published 2018-01-01
    “…In order to improve the machining accuracy and stability of the steel cage welding machine and reduce the production cost of the transmission parts,a movable disk walking device is designed. The main core component of the device is a chain transmission mechanism,comprises two chains fixed on the lower track of the movable disk and two groups of sprockets arranged on the side wall of the movable disk base and are mutually mirror symmetrical,wherein each group of sprocket wheels comprises a driving sprocket and two supporting sprockets. …”
    Get full text
    Article
  2. 36702

    Mejores Prácticas de Manejo en el Area Agrícola de los Everglades: Control de la Aplicación de Fertilizantes by Timothy A. Lang, Samira H. Daroub, Orlando A. Diaz, Viviana M. Nadal, Ming Chen

    Published 2007-07-01
    “…It provides current implementation guidelines for this BMP designed to reduce drainage P loads in the Everglades Agricultural Area (EAA) by controlling the timing and placement of fertilizer applications. …”
    Get full text
    Article
  3. 36703

    Investigation of RF Signal Energy Harvesting by Soudeh Heydari Nasab, Mohammad Asefi, Lutfi Albasha, Naser Qaddoumi

    Published 2010-01-01
    “…An RF harvesting system has been specifically designed, built, and shown to successfully pick up enough energy to power up circuits. …”
    Get full text
    Article
  4. 36704

    Research on Multi-Function Pipeline Integrate Cloud Computing Monitoring System Based on OpenStack Structure by Lei Li, Lianwen Jin, Desheng Li, Wanwan Tang

    Published 2014-01-01
    “…To deal with the increasing of computer clusters which the increasing needs of cloud computing brings and guarantee stability and reliability of the service, a cloud computing monitoring system based on OpenStack structure to satisfy the needs of cloud computing monitor was designed. The system structure and key technologies were described, including factory model, Paste Deploy, pipeline, Eventlent green thread and object-oriented SQL Alchemy model, so the system has modularity, layering and pipeline. …”
    Get full text
    Article
  5. 36705

    Penser la cueillette de plantes médicinales sauvages dans des sociétés en transition : le cas guyanais by Marc-Alexandre Tareau, Lucie Dejouhanet, Guillaume Odonne, Marianne Palisse, Clarisse Ansoe

    Published 2019-04-01
    “…This paper aims to characterise these medicinal plants’ collection practices, their diversity and their relevance for questioning the functioning of societies, which are subjected to rapid transformations and are therefore designed here as “transitional”. Through two case studies, one on urban collection in Cayenne city and one in the rural area along the low Maroni river, this paper analyses the connection between societies, nature and urban dynamics. …”
    Get full text
    Article
  6. 36706

    A Solid Binding Matrix/Mimic Receptor-Based Sensor System for Trace Level Determination of Iron Using Potential Measurements by Ayman H. Kamel, Felismina T. C. Moreira, Tamara I. Silva, M. Goreti F. Sales

    Published 2011-01-01
    “…Potentiometric chemical sensors were designed by dispersing the iron(II)-imprinted polymer particles in 2-nitrophenyloctyl ether (o-NPOE) plasticizer and then embedded in poly vinyl chloride (PVC) matrix. …”
    Get full text
    Article
  7. 36707

    A management of patients achieving clinical complete response after neoadjuvant therapy and perspectives: on locally advanced rectal cancer by Yu-Xin Liu, Xin-Rong Yang, Lan-Qing Peng, Zhuo-Hong Li

    Published 2025-01-01
    “…The management of complete clinical remission (cCR) lacks international consensus, leading scholars to develop their own perspectives based on well-designed studies and long-term data from large multicenter cohorts. …”
    Get full text
    Article
  8. 36708

    Capital adequacy assessment and risks of Russian banks in an unstable economic situation by T. Yu. Mazurina, E. I. Shamanina

    Published 2020-10-01
    “…The problems, with which Russian banks may face in the process offurther transition to international standards for assessing capital adequacy have been designated. Recommendations taking into account the peculiarities of banks functioning in the current conditions, aimed at ensuring the financial stability of the banking business at the level of both the individual Bank and the banking sector as a whole, as well as at limiting the concentration of risks and preventing the emergence of new concomitant or specific risks have been given.…”
    Get full text
    Article
  9. 36709

    Digital transition in facility management. BIM, CMMS and diagnostic maintenance by Mario Claudio Dejaco, Chiara Scanagatta, Antonino Mannino, Massimiliano Condotta

    Published 2022-12-01
    “… Managing a building’s life cycle is a fundamental part of designing sustainable constructions and implementing efficient management strategies. …”
    Get full text
    Article
  10. 36710

    Dynamic defense decision method for network real-time confrontation by Qiang LENG, Yingjie YANG, Dexian CHANG, Ruixuan PAN, Ying CAI, Hao HU

    Published 2019-12-01
    “…How to implement defense decision based on network external threat is the core problem of building network information defense system.Especially for the dynamic threat brought by real-time attack,scientific and effective defense decision is the key to construct network dynamic emergency defense system.Aiming at the problem of dynamic defense decision-making,firstly a network survivability game model based on attribute attack graph theory is designed.The attack and defense matrix is used to represent the attack and defense strategy and path,and the attack and defense strength and network survivability quantification method are given.Secondly,the single step and the multi-step attack and defense strategy payoff calculation method is proposed,and the defense decision is based on the attack and defensive strategy payoff.Finally,the effectiveness of the defense decision technology is verified through experiments.…”
    Get full text
    Article
  11. 36711

    Structure Preserving Numerical Analysis of Reaction-Diffusion Models by Nauman Ahmed, Muhammad Aziz-ur Rehman, Waleed Adel, Fahd Jarad, Mubasher Ali, Muhammad Rafiq, Ali Akgül

    Published 2022-01-01
    “…Furthermore, we applied proposed NSFD splitting methods on several numerical examples to validate all the attributes of the proposed numerical designs.…”
    Get full text
    Article
  12. 36712

    “I Want That”: Human-in-the-Loop Control of a Wheelchair-Mounted Robotic Arm by Katherine M. Tsui, Dae-Jin Kim, Aman Behal, David Kontak, Holly A. Yanco

    Published 2011-01-01
    “…Instead of manual task decomposition and execution, the user explicitly designates the end goal, and the system autonomously retrieves the object. …”
    Get full text
    Article
  13. 36713

    The Impact of Pedagogical Approaches for Forming Digital Competence in Students by Aigul Medeshova, Nurya Adelbaeva, Alman Kushekkaliev, Saule Akimova, Gulnar Khazhgaliyeva, Lyazzat Ramazanova, Аkmaral Kassymova

    Published 2025-01-01
    “…The resulting methodology is designed to establish a digital ecosystem within higher education, enabling students to thrive in the digital age and contributing to the broader academic discourse on digital competence. …”
    Get full text
    Article
  14. 36714

    Secure relay node selection method based on Q-learning for fog computing in 5G network by Shanshan TU, Jinliang YU, Yuan MENG, M WWAQAS, Lei LIU

    Published 2019-07-01
    “…Firstly, a security fog computing structure model based on social awareness was constructed, and then an optimal dual-relay node selection method based on Q-learning algorithm was designed under this model, which achieved the selection of optimal dual-relay nodes in dynamic environment. …”
    Get full text
    Article
  15. 36715

    Evidence for Bone Marrow Adult Stem Cell Plasticity: Properties, Molecular Mechanisms, Negative Aspects, and Clinical Applications of Hematopoietic and Mesenchymal Stem Cells Trans... by Ivana Catacchio, Simona Berardi, Antonia Reale, Annunziata De Luisi, Vito Racanelli, Angelo Vacca, Roberto Ria

    Published 2013-01-01
    “…Recently, surprising new findings have contradicted central dogmas of commitment of ASCs by showing their plasticity to differentiate across tissue lineage boundaries, irrespective of classical germ layer designations. The present paper supports the plasticity of the bone marrow stem cells (BMSCs), bringing the most striking and the latest evidences of the transdifferentiation properties of the bone marrow hematopoietic and mesenchymal stem cells (BMHSCs, and BMMSCs), the two BM populations of ASCs better characterized. …”
    Get full text
    Article
  16. 36716

    Research of the Influence of Bearing Clearance on the Transmission Efficiency of Gearbox by Mo Yimin, Xu Wei, Hu Jie, Dong Jixing, Li Lusheng

    Published 2018-01-01
    “…By changing the size of the bearing clearance to reduce the friction power loss is also proposed and a bench test to explore the influence of the bearing clearance on the transmission efficiency of the gearbox is designed. Finally,the experiments of the whole vehicle taxiing resistance and fuel consumption are verified. …”
    Get full text
    Article
  17. 36717

    Co-plane coupling-feed compact wideband E-E shaped and half E-E shaped microstrip antenna by Fang YANG, Mingfei WEI, Junni ZHOU, Chun WANG, Min WANG

    Published 2017-07-01
    “…A compact and wideband microstrip patch antenna for multi-band wireless communications was proposed and designed.The antenna is fed by co-plane capacitive coupling method to compensate the inductance of the feeding probe,using stacked substrate of FR4 and air,an E-E or half E-E shaped radiating patch to reduce the size of the antenna.The results show that the bandwidths of the E-E and half E-E shape microstrip antennas are 1.85~2.57 GHz (relative bandwidth 32.6%) and 1.85~2.50 GHz (relative bandwidth 29.9%),respectively.Compared with ordinary E-shaped microstrip antenna,the area of E-E and half E-E microstrip antenna reducts by 47% and 61% patch.…”
    Get full text
    Article
  18. 36718

    Customizable Restoration in Multi-Degradation Scenarios: Joint Deraining and Low-Light Image Enhancement via Perceptual Decoupling by Zhiyong He

    Published 2025-01-01
    “…To address this challenge, we propose the Perceptual Decoupling-based Learning Network (PDLN), designed to separate these degradations by leveraging their distinct physical properties. …”
    Get full text
    Article
  19. 36719

    Pedagogical affordances of Extended Reality for education to territory: A literature review by Damiana Luzzi, Stefano Scippo, Stefano Cuomo, Maria Ranieri

    Published 2024-12-01
    “…However, future research should prioritize empirical studies with experimental or quasi-experimental designs to provide robust evidence of XR benefits in these dimensions. …”
    Get full text
    Article
  20. 36720

    Inter-domain routing security mechanism for crossing autonomous system alliance by Ling-jing KONG, Hua-xin ZENG, Jun DOU, Yao LI

    Published 2014-10-01
    “…Through studying and analyzing SE-BGP (security enhanced BGP),it was found that it couldn’t validate the cross-alliance AS (autonomous system) and defense the self-launched active attack.To solve the security problems,two-layer cross-alliance hierarchical structure CAHS (cross-alliance hierarchical structure) was designed.Based on CAHS,using the idea of passport visa and the features of AdHASH (additive hash),a cross-alliance BGP security mechanism SCA-BGP (secure crossing alliance for BGP) was proposed.The mechanism has higher security,which is able to effectively validate the identities and behavior authorization of the cross-alliance AS as well as the message carried by them.The experiment results show that SCA-BGP can effectively reduce the certificate scale and extra time overhead to get better scalability and convergence performance.…”
    Get full text
    Article