Showing 36,721 - 36,740 results of 46,768 for search '"Design"', query time: 0.20s Refine Results
  1. 36721

    Some New Transformation Properties of the Nielsen Generalized Polylogarithm by Nina Shang, Qinghua Feng, Huizeng Qin

    Published 2014-01-01
    “…By use of these transformation formulas presented, new fast algorithms for Nielsen generalized polylogarithm Sn,p(z) can be designed. For sn,p=Sn,p(1), a new recurrence formula is also given. …”
    Get full text
    Article
  2. 36722

    Research on algorithm for raster map multi-level sharing based on region incrementing color visual cryptography by Liguo FANG, Zhengxin FU, Hao HU, Gang SHEN, Bin YU

    Published 2019-09-01
    “…In view of the characteristics of raster map,important data of the map were divided into different map layers by using the idea of map segmentation.A regional incremental color visual cryptographic scheme for raster map sharing was designed,and a model based on this scheme was proposed.At the same time,the specific application process was given.In order to solve the problem of large pixel expansibility and poor visual effect of image recovery in traditional regional incremental visual cryptography scheme,random numbers and the access structure optimization were used.Construction of the method was simple and the additional overhead of generating and saving the encryption matrix was avoided.The experimental results show that the scheme can achieve multilevel raster map sharing with the map’s perfect recovery,meanwhile the extension of the scheme pixel is greatly reduced.…”
    Get full text
    Article
  3. 36723

    Robust Control of Wind Turbines by Using Singular Perturbation Method and Linear Parameter Varying Model by Yan Zhang, Zhengfan Liu, Zhong Yang, Haifei Si

    Published 2016-01-01
    “…Then stability and robust properties of the open-loop linear singularly perturbed system are analyzed using linear matrix inequalities (LMIs). An algorithm of designing a stabilizing state-feedback controller is proposed which can guarantee the robust property of the closed-loop system. …”
    Get full text
    Article
  4. 36724

    Chitosan-Based Nanogel Enhances Chemotherapeutic Efficacy of 10-Hydroxycamptothecin against Human Breast Cancer Cells by Hui Guo, Faping Li, Heping Qiu, Qi Zheng, Chao Yang, Chao Tang, Yuchuan Hou

    Published 2019-01-01
    “…In this work, a positively charged CS-based nanogel was designed and synthesized to inhibit the proliferation of breast cancer cell lines. …”
    Get full text
    Article
  5. 36725

    What Is the Role of Beta-Agonist Bronchodilators in the Day-to-Day Treatment of Chronic Asthma? by Pierre Ernst

    Published 1995-01-01
    “…New longer acting inhaled beta-agonists designed for regular use are being introduced and their exact role remains to be defined. …”
    Get full text
    Article
  6. 36726

    Fabrication of Customized Sectional Impression Trays in Management of Patients with Limited Mouth Opening: A Simple and Unique Approach by Vamsi Krishna CH, K. Mahendranadh Reddy, Nidhi Gupta, Y. Mahadev Shastry, N. Chandra Sekhar, Venkat Aditya, G. V. K. Mohan Reddy

    Published 2013-01-01
    “…The present case reports describe the fabrication of sectional custom trays designed for dentulous patients with chronic tobacco-induced submucous fibrosis.…”
    Get full text
    Article
  7. 36727

    Additive Consistency and Group Decision-Making Consensus Analysis of Hesitant-Intuitionistic Fuzzy Preference Relations by Xue Feng, Sheng Ling Geng, Yong Ming Li

    Published 2025-01-01
    “…Firstly, to preserve the original decision information effectively, the consistency improvement algorithm is designed to identify decision information requiring modification and subsequently execute a localized adjustment process. …”
    Get full text
    Article
  8. 36728

    Common Freshwater Fish Parasites Pictorial Guide: Flagellates by Deborah B. Pouder, Eric W. Curtis, Roy P. Yanong

    Published 2005-08-01
    “… This publication is one in a series of pictorial guides that is designed to assist in the identification of common freshwater fish parasites. …”
    Get full text
    Article
  9. 36729

    3D Large-Pose Face Alignment Method Based on the Truncated Alexnet Cascade Network by Qian Zhang, Hao Zheng, Tao Yan, Jiehui Li

    Published 2020-01-01
    “…Aiming at the low accuracy of large-pose face alignment, a cascade network based on truncated Alexnet is designed and implemented in the paper. The parallel convolution pooling layers are added for concatenating parallel results in the original deep convolution neural network, which improves the accuracy of the output. …”
    Get full text
    Article
  10. 36730

    Novel Constrained Dual Mobility Hip Prosthesis to Combat Instability in Revision Total Hip Arthroplasty whilst Preserving Normal Function by Michael Jiang, Anton Lambers, Rodney Richardson

    Published 2020-01-01
    “…With the patient’s long-term desire to return to work and ride a bicycle with his children, the patient agreed to proceed with a novel, custom-designed, constrained dual mobility liner which allowed unrestricted movement. …”
    Get full text
    Article
  11. 36731

    Application of 5.8 GHz optical fiber converged communication in transmission line monitoring system by Jie TONG, Yanli LIU, Delong YANG, Hongli LUO, Huan WANG

    Published 2016-07-01
    “…When in the depths of the mountains,2G/3G signal is weak or don't exist,or when the high definition video is needed,2G/3G couldn't meet requirements of such high bandwidth,so that communication is intermittent or interrupt,resulting in the condition monitoring data is difficult to transmit reliably to the master station.To solve this problem,2G/3G+5.8 GHz or 5.8 GHz +OPGW converged communication mode was proposed,the signal could be switched automatically to the 5.8 GHz communication mode,and transmits back to the master station after converging the main line and OPGW.Based on the optical fiber converged communication,the transmission line monitoring system and work flow were designed and the application example and the future development prospect were given finally.…”
    Get full text
    Article
  12. 36732

    Real-Time Control Strategy of Elman Neural Network for the Parallel Hybrid Electric Vehicle by Ruijun Liu, Dapai Shi, Chao Ma

    Published 2014-01-01
    “…Through researching the instantaneous control strategy and Elman neural network, the paper established equivalent fuel consumption functions under the charging and discharging conditions of power batteries, deduced the optimal control objective function of instantaneous equivalent consumption, established the instantaneous optimal control model, and designs the Elman neural network controller. Based on the ADVISOR 2002 platform, the instantaneous optimal control strategy and the Elman neural network control strategy were simulated on a parallel HEV. …”
    Get full text
    Article
  13. 36733

    A Novel Terminal Sliding Mode Variable Structure Model Reference Adaptive System Observer for Permanent Magnet Synchronous Motors by Yan Bai, Lei Zhang, Xiang-Min Meng, Jing Bai, Guang Han

    Published 2024-01-01
    “…In addition, a novel reaching law (NRL) is designed to replace the traditional exponential reaching law (TRL) to suppress the chattering phenomenon in the sliding mode control. …”
    Get full text
    Article
  14. 36734

    Analysis of the Dynamic Balance Condition of Crank-group Mechanism by Cao Jujiang, Wu Yao, Yan Weiliang

    Published 2016-01-01
    “…It is also proved that such institutions can achieve the balance of force and moment by adding the counterweight without inertia weight mechanism,the application of this dynamic balance method of crank- group mechanism has a theoretical significance for designing the physical prototype experiment and choosing the parameters of counterweight.…”
    Get full text
    Article
  15. 36735

    Damage identification in RC bridges by confronting two approaches: visual inspection and numerical analysis by Ayad Mohammed, Boumechra Nadir, Hamdaoui Karim

    Published 2023-04-01
    “…The present article aims to summarize the research study that was conducted the efficiency of methods and techniques designed for the detection and localization of faults in civil engineering structures, particularly in bridge structures. …”
    Get full text
    Article
  16. 36736

    Quantitative method for network security situation based on attack prediction by Hao HU, Run-guo YE, Hong-qi ZHANG, Ying-jie YANG, Yu-ling LIU

    Published 2017-10-01
    “…To predict the attack behaviors accurately and comprehensively as well as to quantify the threat of attack,a quantitative method for network security situation based on attack prediction was proposed.By fusing the situation factors of attacker,defender and network environment,the capability of attacker and the exploitability rate of vulnerability were evaluated utilizing the real-time detected attack events,and the expected time-cost for attack-defense were further calculated.Then an attack prediction algorithm based on the dynamic Bayesian attack graph was designed to infer the follow-up attack actions.At last,the attack threat was quantified as the security risk situation from two levels of the hosts and the overall network.Experimental analysis indicates that the proposed method is suitable for the real adversarial network environment,and is able to predict the occurrence time of attack accurately and quantify the attack threat reasonably.…”
    Get full text
    Article
  17. 36737

    Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain by Xuewang ZHANG, Zhihong LI, Jinzhao LIN

    Published 2022-08-01
    “…To solve the security hazards of identity information and transaction data and the time-consuming problem of traditional single-level encryption methods in the current application scenarios of consortium blockchain, a privacy protection scheme of consortium blockchain based on fair blind signature and hierarchical encryption was proposed.Considering the strong centrality and poor security of the existing fair blind signature scheme, it was redesigned with zero-knowledge proof technology to be applicable for consortium blockchain application scenario.Based on the Paillier homomorphic encryption algorithm, a supervisable hierarchical encryption method was designed, and the method realized the supervision of encrypted transaction data information and reduced the time cost of the encryption and decryption process.The security analysis and simulation results show that the proposed scheme can effectively resist malicious attacks such as tampering and eavesdropping and significantly improve the encryption efficiency.…”
    Get full text
    Article
  18. 36738

    Privacy-preserving scheme for logistics systems based on 2D code and information hiding by Wen-bo YAN, Yuan-zhi YAO, Wei-ming ZHANG, Neng-hai YU

    Published 2017-11-01
    “…With regard to the user privacy leakage problem in existing logistics systems,a privacy-preserving scheme for logistics systems based on 2D code and information hiding was proposed.The information hiding tech-nique was used in the proposed scheme to embed the user privacy information into the 2D code on the logistics waybill to achieve access control.To secure the user privacy information,a JPEG image stenographic algorithm for 2D code was designed.Experimental results demonstrate that this algorithm can guarantee the high undetectable performance and the stego 2D code can be correctly decoded.Using the proposed scheme,the institution or the per-son that has the access right can obtain the important privacy information so that the express can be delivered cor-rectly and the user privacy can be preserved.…”
    Get full text
    Article
  19. 36739

    Low pilot overhead parametric channel estimation scheme for RIS-assisted mmWave MIMO systems by LI Shuangzhi, YANG Ruiqi, GUO Xin, HUANG Sai

    Published 2024-09-01
    “…Firstly, a channel training mechanism with low pilot overhead was designed using a few passive reflection units and constructing a phase shift matrix. …”
    Get full text
    Article
  20. 36740

    Projective Synchronization of Nonidentical Fractional-Order Memristive Neural Networks by Chong Chen, Zhixia Ding

    Published 2019-01-01
    “…Firstly, based on the sliding mode control theory, a new fractional-order integral sliding mode controller is designed to ensure the occurrence of sliding motion. …”
    Get full text
    Article