Showing 37,141 - 37,160 results of 46,768 for search '"Design"', query time: 0.17s Refine Results
  1. 37141

    Analysis of Load Sharing Characteristics of the Thermoelastic Coupled Coaxial Face Gear Power Split Transmission System by Liu Li, Guo Hui, Zhao Ning

    Published 2024-01-01
    “…Considering the thermal deformation of the gear teeth caused by the temperature field, designing the appropriate clearance can effectively improve the load sharing performance of the transmission system, which is of great significance for improving the performance of the face gear transmission system.…”
    Get full text
    Article
  2. 37142

    The Global Finical Crisis from an Islamic Point Of View by Hewa Majeed Zangana

    Published 2021-04-01
    “…However, the paper will focus on the Islamic financial system and the financial instruments which are based and designed in compliance with Shariah Rules and Regulations, whether if practicing Islamic banking would cause such a crisis to accrue. …”
    Get full text
    Article
  3. 37143

    The examination of the relationship between stigma and self-efficacy in women undergoing infertility treatment by Yeter Durgun Ozan, Ugur Deger, Sumbul Di̇ncer

    Published 2024-04-01
    “…This research aimed to explore the connection between stigma and self-efficacy in women undergoing infertility treatment. The research was designed as a descriptive and correlational study. …”
    Get full text
    Article
  4. 37144

    Unmanned aerial vehicle enabled communication technologies and applications for Internet of things by Yalin LIU, Hongning DAI, Qubeijian WANG

    Published 2019-12-01
    “…The Internet of things (IoT) is designed to provide the wide coverage and the massive connectivity service for“things” node,and the collected “things” data can provide support for the intelligent decision-making at the application layer.However,due to the fixed deployment of the access point of the “things” node,the topology of the IoT network is not flexible,consequently making it difficult to dynamically cover the IoT node or regions with high mobility.In addition,the current IoT communication technology suffers from the remote blind area,which makes it impossible for a large number of “things” node to connect to establish the “network” in some geologically-complexed regions.UAV has high mobility,low cost and flexible deployment,which is suitable to solve the above issues.Studying the communication technology of UAV assisted IoT,help the IoT to extend the existing network coverage,enhance the flexibility of the IoT topology and provide more diverse IoT service.…”
    Get full text
    Article
  5. 37145

    Robust multi-dimensional trust model for improving the survivability of ad hoc networks by CHEN Shen-long1, ZHANG Yu-qing1

    Published 2010-01-01
    “…Attackers could perform the blended attack against ad hoc networks through utilizing several attack methods together.Under this circumstance,a robust multi-dimensional trust model(RMTM) to improve the survivability of ad hoc networks was proposed.RMTM was based on D-S theory.Nodes’ attack evidences were classified into several dimen-sions and the trust of each dimension was computed according to basic probability assignment function.Then RMTM implemented the comprehensive evaluation through the multi-dimensional trust fusion.In order to resist the attacks against trust models themselves,the corresponding tolerant algorithms were designed to enhance the RMTM’s robustness.The simulations show that RMTM can effectively defense against both ad hoc network blended attack and trust model attacks with limited overload and consequently it significantly improves the survivability of ad hoc networks.…”
    Get full text
    Article
  6. 37146

    4-H Livestock Judging: Activity 1, Parts is Parts by Chad Carr, Justin Crosswhite, Amanda Jhonson

    Published 2012-01-01
    “…It serves as a curriculum resource within the Florida 4-H program, specifically designed for teaching livestock judging to young people aged 11-18. …”
    Get full text
    Article
  7. 37147

    Handbook of Florida Water Regulation: Clean Water Act by Michael T. Olexa, Luke D'Isernia, Laura Minton, Dulcy Miller, Sarah Corbett

    Published 2019-05-01
    “… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
    Get full text
    Article
  8. 37148

    Jérusalem, entre attraction et répulsion migratoire by Irène Salenson

    Published 2024-03-01
    “…Similarly, despite the fact that Jerusalem is designated as capital city by the Hebrew State, and claimed as capital by the Palestinian Authority, the migration’s movements affecting Jerusalem are not exclusively political, even if political grounds may explain part of the flow. …”
    Get full text
    Article
  9. 37149

    Coding redundancy controlled data forwarding mechanism in opportunistic networks by Da-peng WU, Peng-wen LOU, Qiao-shou LIU, Yu XIONG, Ru-yan WANG

    Published 2015-03-01
    “…Further, a data forwarding mechanism for coding redun-dancy control with communication capacity estimating method is designed. It can make full use of the encounter duration between nodes to forward the data, which has more coding opportunity and less than the community capacity. …”
    Get full text
    Article
  10. 37150

    Handbook of Florida Agricultural Laws: Environmental and Conservation Regulations by Michael T. Olexa, Connor Brock

    Published 2022-06-01
    “… This revised document is part of the Handbook of Florida Agricultural Laws, which was designed to provide an accurate, current, and authoritative summary of the principal Florida laws that directly or indirectly relate to agriculture. …”
    Get full text
    Article
  11. 37151

    Le cirque de Lugdunum : données anciennes et récentes by Michèle Monin, Djamila Fellague

    Published 2010-12-01
    “…The masonry substructions uncovered underneath the street Henry-Le Chatelier may correspond to the west wing of the cavea and are figured by a range of four cells and the initial section of a fifth one, designed to support the seating tiers. By their measurements and mode of construction, they remind of modules, which are characteristic of circus architecture in Antiquity. …”
    Get full text
    Article
  12. 37152

    Concevoir l’espace domestique pour contrôler la main-d’œuvre : l’action de la Société mulhousienne des cités ouvrières durant la seconde moitié du XIXe siècle by Lucie Prohin

    Published 2021-10-01
    “…This study examines the spatial and economic devices designed to control the workers within their own domestic space. …”
    Get full text
    Article
  13. 37153

    Birdfeeders: What to Consider When Selecting by Mark E. Hostetler, Martin B. Main, Maena Voigt

    Published 2003-10-01
    “…In 1926, the first commercially made birdfeeder, designed for hummingbirds, went on the market. Today, more than 50 million Americans put out a billion pounds of birdfeed each year. …”
    Get full text
    Article
  14. 37154

    Self-corrected coefficient smoothing method based network security situation prediction by Hongyu YANG, Xugao ZHANG

    Published 2020-05-01
    “…In order to solve the problem of insufficient accuracy of current network security situation prediction methods,a new network security situation prediction model was proposed based on self-correcting coefficient smoothing.Firstly,a network security assessment quantification method was designed to transform the alarm information into situation real value time series based on the entropy correlation degree.Then,the adaptive solution of the static smoothing coefficient was calculated and the predicted initial value was obtained by using the variable domain space.Finally,based on the error category,the time-changing weighted Markov chain was built to modify the initial network situation prediction result and the prediction accuracy was further raised.The prediction model was tested with LL_DOS_1.0 dataset and the experimental results show that the proposed model has higher adaptability and prediction accuracy for network situation time series.…”
    Get full text
    Article
  15. 37155

    Orchestration mechanism for VNF hardware acceleration resources in SDN/NFV architecture by Tong DUAN, Julong LAN, Yuxiang HU, Hongwei FAN

    Published 2018-06-01
    “…The hardware acceleration mechanism for VNF (virtual network function) is recently a hot research topic in SDN/NFV architecture because of the low processing performance of VNF.Once hardware acceleration resources have been plugged into the network,how to optimally mange and orchestrate these resources under service requirements remains a question to be solved.Firstly,a unified management architecture based on separated control for hardware acceleration resources was proposed.Then,traditional network topology together with hardware acceleration resources were modeled into a unified network model and then the hardware acceleration resource orchestration problem was transferred into a multi-objective linear programming problem.Finally,a hardware-accelerator-card-prior’ heuristic algorithm was designed.Experimental results show that compared with existing methods,the proposed orchestration mechanism can efficiently manage hardware acceleration resources and reduce the processing latency by 30%.…”
    Get full text
    Article
  16. 37156

    Systematic evaluation of the adsorption of organic vapors onto a miniaturized cartridge device using breakthrough tests in parallel experiment with a full size respirator cartridge by Florence Janvier, Ludovic Tuduri, Daniel Cossement, Daniel Drolet, Jaime Lara

    Published 2016-06-01
    “…In an effort to gain better control over environmental conditions in breakthrough tests and to obtain reliable data, a novel experimental approach using a miniaturized (Mini) cartridge was designed to replicate a small section of a respiratory cartridge. …”
    Get full text
    Article
  17. 37157

    Common Freshwater Fish Parasites Pictorial Guide: Acanthocephalans, Cestodes, Leeches, & Pentastomes by Deborah B. Pouder, Eric W. Curtis, Roy P. Yanong

    Published 2005-08-01
    “… This publication is one in a series of pictorial guides that is designed to assist in the identification of common freshwater fish parasites. …”
    Get full text
    Article
  18. 37158

    Aesthetic evaluation and the perceived properties of Chinese characters. by Qinjing Zhang, Hiroyuki Mitsudo

    Published 2025-01-01
    “…To answer this question, we designed experiments in which users of Chinese characters were asked to rate the perceived symmetry, complexity, prototypicality, and beauty of Chinese characters. …”
    Get full text
    Article
  19. 37159

    Information Structure Affects the Resolution of the Subject Pronouns Er and Der in Spoken German Discourse by Miriam Ellert

    Published 2013-07-01
    “…Two visual-world eye-tracking experiments were designed to investigate the resolution of ambiguous German pronouns, the personal pronoun (er) and the d-pronoun (der) in spoken discourse. …”
    Get full text
    Article
  20. 37160

    Decentralized internet infrastructure by Bingyang LIU, Fei YANG, Shoushou REN, Xinpeng WEI, Xue YANG, Chuang WANG, Zhiwei YAN

    Published 2019-08-01
    “…Inter-domain routing system,domain name system (DNS) and public key infrastructure (PKI) are the fundamental infrastructures of the internet.These infrastructures help to provide network connectivity,service availability and communication trusts between different internet entities.However,these infrastructures are all designed based on a centralized system architecture or a trusted model,which suffers from many vulnerabilities.An architecture called decentralized internet infrastructure (DII) based on decentralization techniques was proposed.The DII architecture consists of three layers.The underlying layer was the distributed ledger layer,providing decentralized trusted foundation for DII.The intermediate layer,called name space management layer,fulfills the management of internet core resources (such as IP addresses,AS numbers and domain names) and provides trustworthy mapping information between different resources.The top layer was an open application layer that could support trustworthy decentralized internet applications.…”
    Get full text
    Article