Showing 36,941 - 36,960 results of 46,768 for search '"Design"', query time: 0.19s Refine Results
  1. 36941

    Key technology and application of intelligent connected patrol vehicles for security scenario by Yuchao LIU, Ziyue LI

    Published 2020-04-01
    “…Practical applications combined with industry scene is a common problem in the present artificial intelligence technology.Facing the security application scenario,the practice landing of unmanned technology -- intelligent connected patrol vehicle was studied.Integrating different sensors such as camera,LiDAR,inertial navigation system (INS),etc,the awareness system can accurately identify the platform itself,road conditions and target behavior using key technology such as artificial intelligence (AI),data fusion.Combining human intelligence (HI) in scene cognition of human experience and artificial intelligence (AI) in cognition of computing,a hybrid intelligent cognitive system using to security scene was built.Based on human in the loop system architecture and technology such as 5G ,vehicle to everything (V2X),edge computing,etc,different interactions between human ,machine and environment were designed,which ensured the safe and reliable operation of the system and increased the work efficiency by a wide margin.…”
    Get full text
    Article
  2. 36942

    Elisabeth of Bohemia on the Soul by Eric Stencil

    Published 2023-03-01
    “…While Elisabeth clearly offers the problem of interaction, it is only one of several worries each of which is designed to show that Descartes’ account of the soul is insufficient. …”
    Get full text
    Article
  3. 36943

    Dinâmicas territoriais do espaço agrário na Amazônia: a dendeicultura na microrregião de Tomé-Açu (PA) by João Santos Nahum, Antonio Tiago Corrêa Malcher

    Published 2012-11-01
    “…We analyzed this space how the uses are designed from the territory controlled by private interests of palm culture; uses that threaten their production of the peasant way of life, especially with the formation of the land market and also the association between of palm oil agribusiness and family farming. …”
    Get full text
    Article
  4. 36944

    Représentation sociale du milieu marin et iconographie du territoire chez des élus de communes littorales françaises by Béatrice Le Moel, Pascal Moliner, Thierry Ramadier

    Published 2015-06-01
    “…Participants were asked to perform two verbal association tasks designed to explore their representations of the coastal part of their municipality. …”
    Get full text
    Article
  5. 36945

    Risk control method for power data support based on embedded technology by Chengyue YANG, Zhou YU, Yuanyuan ZHAO, Changlong CHEN

    Published 2024-02-01
    “…In order to improve the ability of bad data identification and fault location accuracy in power system risk control, a new risk control method for power systems using embedded technology was designed.S3C2440 chip was used as the central processing unit, the phasor measurement unit (PMU) technology was used to identify bad data in the power system, improving the efficiency of identification.Improved on the basis of traditional multiverse algorithms, fault localization was based on data collected by PMU, effectively improving the accuracy of fault localization.In the simulation experiment, the efficiency of identifying bad data by the proposed method has been improved by at least 33.76%, the accuracy of fault localization has been improved by 26.33%, and the efficiency has been improved by at least 43.4%.The proposed method has good risk control capabilities in the power system.…”
    Get full text
    Article
  6. 36946

    Status Data and Communication Aspects in Dynamically Clustered Network-on-Chip Monitoring by Ville Rantala, Pasi Liljeberg, Juha Plosila

    Published 2012-01-01
    “…The analysis shows that the monitoring system should be carefully designed in terms of data diffusion and routing and monitoring algorithms to obtain the potential performance improvement.…”
    Get full text
    Article
  7. 36947

    DZENBUDIZMO FENOMENOLOGIJA by Algis Mickūnas

    Published 2001-01-01
    “…Within the latter context, these structures open what for Zen is emptiness, pointing to a level of experience for whose designation we lack words. For phenomenology this level is prior to active or passive constitution and thematization. …”
    Get full text
    Article
  8. 36948

    Handbook of Florida Water Regulation: Pollutant Storage Tank Systems by Michael T. Olexa, Luke D'Isernia, Laura Minton, Dulcy Miller, Sarah Corbett

    Published 2019-05-01
    “… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
    Get full text
    Article
  9. 36949

    Un prince français en Suède. Les stratégies de légitimation dans l’édification de la dynastie Bernadotte (1810-1844) by Lisa Castro

    Published 2020-10-01
    “…His coronation as the ruler of the Kingdoms of Sweden and Norway, founded in 1814, marked the birth of a new dynasty since his son, Oscar I, was designated Crown Prince of the unified Kingdom. As soon as he was elected to the throne, Jean-Baptiste Bernadotte realized the benefits of having his son at his side to legitimize his reign. …”
    Get full text
    Article
  10. 36950

    Les références spatiales et temporelles des paysages forestiers du rewilding en Europe : imaginaires, discours et projets by Régis Barraud

    Published 2020-07-01
    “…Moreover, while the proponents of rewilding "look" to the past, they also develop futuristic projects designed over long periods of time. The implementation of rewilding operations integrates simple transpositions of these models as well as the complexity of local histories. …”
    Get full text
    Article
  11. 36951

    4-H Livestock Judging: Introduction and Leader's Guide by Chad Carr, Justin Crosswhite, Amanda Johnson

    Published 2012-01-01
    “…It serves as a curriculum resource within the Florida 4-H program, specifically designed for teaching livestock judging to young people aged 11-18. …”
    Get full text
    Article
  12. 36952

    PFM:a SMS4 algorithm against high-order power analysis attacks by LI Lang1, LI Ren-fa1, LI Jing1, WU Ke-shou3

    Published 2010-01-01
    “…A fixed-value mask algorithm for SMS4 was proposed in order to resist power analysis attack based SMS4.Firstly,an atomic mask algorithm of SMS4 was designed to resist against high-order power analysis attack based on the study of the structure of SMS4 algorithm,the intermediate variables were masked in the method.Secondly,pseudo-random fixed-value mask method(PFM) was proposed based on the above method,when its hardware implementation aiming at low power and less areas was considered about.Moreover,PFM has the ability to resist against high-order power analysis attacks when applied to the sensor node of special environment of communication.Finally,the experimental results show that the proposed algorithm has the ability to effectively resist second high-order differential power analysis attack without increasing much power and hardware resources.…”
    Get full text
    Article
  13. 36953

    Handbook of Florida Water Regulation: State Regulatory Powers by Michael T. Olexa, Luke D'Isernia, Laura Minton, Dulcy Miller, Sarah Corbett

    Published 2019-05-01
    “… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
    Get full text
    Article
  14. 36954

    „Momenty wychowawcze” w projektowaniu procesu kształcenia kulturowej kompetencji dzieci by Monika Wiśniewska-Kin

    Published 2019-09-01
    “…The aim of the study was to diagnose Janusz Korczak’s “educational moments” in designing the process of developing cultural competence. …”
    Get full text
    Article
  15. 36955

    Handbook of Florida Water Regulation: Florida Department of Health by Michael T. Olexa, Luke D'Isernia, Laura Minton, Dulcy Miller, Sarah Corbett

    Published 2019-05-01
    “… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
    Get full text
    Article
  16. 36956

    Multidimensional QoS cloud computing resource scheduling method based on stakeholder perspective by Mingfeng SU, Guojun WANG, Renfa LI

    Published 2019-06-01
    “…A multidimensional cloud computing architecture is designed and a multidimensional cloud resource scheduling model is constructed based on the stakeholder perspective of cloud users and cloud service providers to meet the high QoS requirements of cloud users (such as task execution time and task completion time) with low computing costs (such as energy consumption,economic costs and system availability).For the second-level cloud resource scheduling,an MQoS cloud resource scheduling algorithm based on multiple Greedy algorithm is proposed.The experimental results show that under the four cloud computing application scenarios with no aftereffects,the MQoS cloud resource scheduling algorithm has an overall increase of 206.42%~228.99% and 34.26%~56.93 in terms of multidimensional QoS degree compared with FIFO and M2EC algorithms.It has an average overall reduction of 0.48~0.49 and 0.20~0.27 in terms of cloud data center load balance difference.…”
    Get full text
    Article
  17. 36957

    Active deception defense method based on dynamic camouflage network by Shuo WANG, Jianhua WANG, Qingqi PEI, Guangming TANG, Yang WANG, Xiaohu LIU

    Published 2020-02-01
    “…In view of the problem that the existing honeypots often fail to resist the penetration attack due to the lack of confidentiality,an active deception defense method based on dynamic camouflage network (DCN) was presented.The definition of DCN was given firstly,and then the attacker-defender scenario of active deception based on DCN was described.Next,the interaction process of the attacker-defender scenario was modeled by using a signaling game,whose equilibrium can guide the selection of optimal deception strategy.Furthermore,to quantify the payoffs accurately,the two-layer threat penetration graph (TLTPG) was introduced.Finally,the solution for game equilibrium was designed,through which pure strategy and mixed strategy could be calculated simultaneously.The experimental results show that,based on the dynamic camouflage network,the perfect Bayesian equilibrium can provide effective guidance for the defender to implement the optimal defense strategy and maximize the benefits of the defender.In addition,the characteristics and rules of active deception defense DCN-based are summarized.…”
    Get full text
    Article
  18. 36958

    Handbook of Florida Water Regulation: Toxic Substances Control Act by Michael T. Olexa, Luke D'Isernia, Laura Minton, Dulcy Miller, Sarah Corbett

    Published 2019-05-01
    “… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
    Get full text
    Article
  19. 36959

    Risk assessment of autonomous vehicle based on six-dimensional semantic space by Yanan CHEN, Ang LI, Dan WU

    Published 2024-01-01
    “…To address the problems of inadequate extraction of risk elements and low robustness of risk scenario assessment in autonomous vehicles, a risk assessment framework based on six-dimensional semantic space was proposed, which included risk element extraction based on six-dimensional semantic space and risk scenario assessment based on knowledge graph.Formerly, the semantic space was constructed with RGB and IR data mapped, and rich features were extracted using inter-modal correlations for explicit and potential risk elements.Subsequently, risk elements were distilled into a knowledge graph by semantic role annotation and entity fusion, and an inference method was designed by combining node completion and risk level function for accurate risk assessment.Simulations show that the proposed method surpasses current MSMatch and iSQRT-COV-Net in accuracy, false/missed alarm rate, and processing time.…”
    Get full text
    Article
  20. 36960

    Strategies for trading in money markets by Fabian Beck

    Published 2025-01-01
    “…From the interviews with banking experts, some basic requirements for the job profile of money market traders were defined, 5 strategies for money trading designed and related risks identified. …”
    Get full text
    Article