Showing 37,041 - 37,060 results of 46,768 for search '"Design"', query time: 0.17s Refine Results
  1. 37041

    Common Freshwater Fish Parasites Pictorial Guide: Dinoflagellates, Coccidia, Microsporidians, & Myxozoans by Deborah B. Pouder, Eric W. Curtis, Roy P. Yanong

    Published 2005-08-01
    “… This publication is one in a series of pictorial guides that is designed to assist in the identification of common freshwater fish parasites. …”
    Get full text
    Article
  2. 37042

    Handbook of Florida Water Regulation: Florida Pollutant Discharge Prevention and Control Act by Michael T. Olexa, Luke D'Isernia, Laura Minton, Dulcy Miller, Sarah Corbett

    Published 2019-05-01
    “… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
    Get full text
    Article
  3. 37043

    Passages adolescents : leurs matérialisations dans les espaces et les temps informels des institutions éducatives by Aurélie Maurin

    Published 2010-04-01
    “…On the other hand, the ‘informal’ designates spaces that are left out of the formal rule, spaces that are not thought through or organized within the educational frame, but that teenagers occupy, thereby conferring new functions and attributes to those spaces left vacant. …”
    Get full text
    Article
  4. 37044

    Le développement professionnel en évaluation des apprentissages d’enseignants du supérieur by Isabelle Nizet, Josée-Anne Côté, Christelle Lison

    Published 2022-09-01
    “…This course is part of a microprogram designed from the perspective of the Scholarship of Teaching and Learning (Bélisle et al., 2016). …”
    Get full text
    Article
  5. 37045

    Handbook of Florida Water Regulation: Food Quality Protection Act by Michael T. Olexa, Luke D'Isernia, Laura Minton, Dulcy Miller, Sarah Corbett

    Published 2019-05-01
    “… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
    Get full text
    Article
  6. 37046

    A Cleaner Production Scheduling Model with Green Investment and Pandemic Effects by S. Priyan, Mukesh Joshi, Rashmi Priya, Amit Garg, Sonal Pathak, Suhail Javed Quraishi

    Published 2024-01-01
    “…This article designs a cleaner production scheduling model for defective products with flexible rework rate and shortages by considering the transportation cost as proportional to pandemic intensity. …”
    Get full text
    Article
  7. 37047

    Off-line emergency communication method of power internet of things based on edge computing by Donghong FU, Dan LIU, Guijun SHI, Anxin WANG, Chunxue FAN, Haijun WANG, Yiying ZHANG

    Published 2018-03-01
    “…A new multi-mode node was designed for the emergency communication with the demand of electricity.The node had the multi-mode communication capability of the private network and the public network technology,which could switch smoothly in three modes:the power private network,the wireless Ad Hoc network and the wireless public network.Data were automatically uploaded to the multi-mode terminal,multi-mode terminal through the mode of rapid switching,with the public network resources to achieve rapid network recovery and continuous transmission of data to achieve off-line emergency communications.Meanwhile,an intelligent routing algorithm based on smoothness was proposed,and the three principles of edge network communication were defined.Through the edge calculation method,the calculation and updating of the smoothness were realized to ensure the intelligent,efficient and reliable operation of the edge network in the offline state.…”
    Get full text
    Article
  8. 37048

    Research and Implementation of Agreement on a Recording Control by Yanchao Wu, Zhihui Xiao, Yishan Chen

    Published 2013-02-01
    “…Focusing on how to achieve the broadband multimedia cluster communication system in rea1-time media,and scheduling co11ege storage of information,an audio and video recording contro1 mechanism was researched and designed for efficient storage of multimedia data,through the coordination between switch &contro1 center and record server.…”
    Get full text
    Article
  9. 37049

    Quand l’anthropologie des mondes contemporains remonte le moral de l’anthropologie de la communication by Emmanuelle Lallement, Yves Winkin

    Published 2015-04-01
    “…While Emmanuelle Lallement portrays research on market exchanges, Yves Winkin synthesizes how he designs the notion of enchantment. Yves Winkin deplores that, even when communication anthropology is taught, it is rarely taken into consideration by communication researchers, at least in France, while Emmanuelle Lallement proposes combining their efforts to address an urban anthropology which would assume an analysis of urban policies as festive and ephemeral projects. …”
    Get full text
    Article
  10. 37050

    Les Songes de la nef, pour une « prise de site » musicale et sonore by Alain Bonardi

    Published 2018-10-01
    “…Opposite to the hanging up, the “site taking” enables to think of the reception of contemporary works in heritage monuments as a dynamical relationship between both, as a “criticism” in the meaning of a remote comment between musics proposed by composer Luciano Berio. We have designed the sound installation Les Songes de la nef first of all as an instrument to build, referring to composer Helmut Lachenmann. …”
    Get full text
    Article
  11. 37051

    Optimum response scheme of intrusion detection based on information theory by Youliang TIAN, Yulong WU, Qiuxian LI

    Published 2020-07-01
    “…Intrusion detection system (IDS) often inevitably presents major security risks caused by FPs and FNs.However,at present,an effective solution has not been found.In order to solve this problem,an optimal response model of intrusion detection based on information theory was proposed.Firstly,the intruder and IDS in the process of intrusion detection were abstracted into random variables,and the attack and defense model of intruder and IDS was constructed according to the results of the confrontation.Secondly,the defense channel of IDS was designed according to the attack and defense model,then the correct detection of IDS was transformed into the problem of successful transmission of 1 bit information in defensive channel.Finally,the defensive capability of the system was measured by analyzing the channel capacity of the defensive channel,the maximum mutual information of the defensive channel was the defensive limit capability of the IDS,and the corresponding strategy distribution was the optimal response strategy of the defensive capability of the system.The experimental results show that the scheme can effectively reduce the loss caused by FPs and FNs.…”
    Get full text
    Article
  12. 37052

    Handbook of Florida Water Regulation: Florida Department of Agriculture and Consumer Services by Michael T. Olexa, Luke D'Isernia, Laura Minton, Dulcy Miller, Sarah Corbett

    Published 2019-05-01
    “… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
    Get full text
    Article
  13. 37053

    4-H Livestock Judging: Activity 4, What You See Is What You Get! by Chad Carr, Justin Crosswhite, Amanda Jhonson

    Published 2012-01-01
    “…It serves as a curriculum resource within the Florida 4-H program, specifically designed for teaching livestock judging to young people aged 11-18. …”
    Get full text
    Article
  14. 37054

    Using Reclaimed Water to Irrigate Turfgrass – Lessons Learned from Research with Nitrogen by George Hochmuth, Jinghua Fan, Jason Kruse, Jerry Sartain

    Published 2013-11-01
    “…Reclaimed water treated by filtration and chlorination is safe to use for designated purposes, such as residential landscape irrigation. …”
    Get full text
    Article
  15. 37055

    Re-performing African Literature: A Review of Owonibi’s Translation of three Yoruba Literary works into English – Chief Gaa, Delusion of Grandeur and The Tight Game by Titilope Oluwaseun Oriola

    Published 2022-07-01
    “…The dataset include Adébáyọ Fálétí’s Basọrun Gáà, Ọládẹjọ Òkédìjí’s Àjà Ló lerù, and Akínwùmí Ìsọlá’s Ó Le Kú. This is designed to investigate level of re-performance through linguistic equivalence and socio-cultural thematic preservation. …”
    Get full text
    Article
  16. 37056

    Socio-Cultural Dynamics of Education in the Context of the Post-Non-Classical Science by V. A. Ignatova

    Published 2015-02-01
    “…The author emphasizes its inevitably rising priority due to sustained development of civilization bringing about the new environmentally-oriented meta-culture.The obtained results can be used in pedagogic research methodology, designing and modeling the educational process, its content, technology and organization.…”
    Get full text
    Article
  17. 37057

    Mimic defense authentication method for physical access control by Qinglei ZHOU, Shaohuan BAN, Yingjie HAN, Feng FENG

    Published 2020-06-01
    “…To address the security problem of the vulnerability of the authentication methods of traditional physical access control systems,a mimic defense authentication method was designed based on the principle of mimic defense technique and its dynamic heterogeneous redundant architecture (DHR),using mobile 2D code as the interface and dynamic password as the core.First,the actuator pool of the authentication server was constructed.Then,a central controller consisting of functional modules such as input distribution agent,selector and voter was used to dynamically schedule heterogeneous redundant actuators from the actuator pool.Finally,a multimode ruling on the heterogeneous redundant actuator output to determine the authentication result was made by the voter.The experimental results show that the proposed authentication method has higher security and reliability compared to the traditional physical access control system authentication method,and at the same time,it can be used in combination with other authentication methods.…”
    Get full text
    Article
  18. 37058

    Study on privacy preserving encrypted traffic detection by Xinyu ZHANG, Bingsheng ZHANG, Quanrun MENG, Kui REN

    Published 2021-08-01
    “…Existing encrypted traffic detection technologies lack privacy protection for data and models, which will violate the privacy preserving regulations and increase the security risk of privacy leakage.A privacy-preserving encrypted traffic detection system was proposed.It promoted the privacy of the encrypted traffic detection model by combining the gradient boosting decision tree (GBDT) algorithm with differential privacy.The privacy-protected encrypted traffic detection system was designed and implemented.The performance and the efficiency of proposed system using the CICIDS2017 dataset were evaluated, which contained the malicious traffic of the DDoS attack and the port scan.The results show that when the privacy budget value is set to 1, the system accuracy rates are 91.7% and 92.4% respectively.The training and the prediction of our model is efficient.The training time of proposed model is 5.16 s and 5.59 s, that is only 2-3 times of GBDT algorithm.The prediction time is close to the GBDT algorithm.…”
    Get full text
    Article
  19. 37059

    Esthétique de la trace dans No Country for Old Men (Ethan et Joel Coen, 2007) by Christophe Gelly

    Published 2023-01-01
    “…Secondly, we will see that this system does not only designate a breach in the approach to reality, i.e. on a diegetic level, but that it influences the whole filmic enunciation, and particularly editing. …”
    Get full text
    Article
  20. 37060

    Program profilaktyki nadużywania Internetu i mediów elektronicznych: komunikat z badań ewaluacyjnych by Bartłomiej Walczak, Marcin Sochocki

    Published 2021-09-01
    “…The risk of smartphone overuse is higher among youngsters; therefore, prevention programs should address this particular group. The evaluation was designed in a quasi-experimental scheme. Two measurements were conducted on a sample of 1207 students. …”
    Get full text
    Article