Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
37241
System detecting network anomaly with visualization techniques
Published 2018-02-01“…With the fast development of information technology and computer network,the scale and complexity of network security data grows rapidly.Traditional visualization techniques are no longer suitable.In addition,it designs interactive functions based on the feature of network security analysis,in order to assist the network security analyst.The existing approaches for network security visualization have some defects,which fail to provide a good indication of network security data in terms of timing and also fail to display information completely and realize user-friendly interaction.A multi-view network security visualization system was proposed,which provided the analysts of both the static status and dynamic changes of the network by combining the force-oriented model and the staged animation.It provides comprehensive information with display and filter of protocols,IP segment and port.The system on Shanghai Network database were evaluated.…”
Get full text
Article -
37242
STUDY ON OPTIMIZATION OF REMANUFACTURING OF HYDRAULIC SUPPORT COLUMN
Published 2020-01-01“…The optimization model was set up and the optimization solution process was designed. The post column was taken as an example.The thickness of the coating is reduced by 0. 5 mm.The assembly temperature is reduced by 80 degree Celsius and the radial shrinkage force is increased by 0. 0195 N/mm~2. …”
Get full text
Article -
37243
A Fault Diagnosis Method and Experimental Verification of Automobile Gearbox based on BP Neural Network
Published 2019-01-01“…Based on the wavelet neural network algorithm,the vibration signals of the automobile gearbox is analyzed from the time domain and the frequency domain,and the values with time domain and frequency domain characterization are extracted,and a method of BP neural network algorithm for the fault diagnosis of the automobile gearbox is designed. The fault of the gearbox is analyzed and extracted by empirical mode decomposition method in of the time-frequency domain. …”
Get full text
Article -
37244
Handbook of Florida Water Regulation: Florida Everglades Forever Act
Published 2019-05-01“… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
Get full text
Article -
37245
Using Reclaimed Water to Irrigate Turfgrass – Lessons Learned from Research with Nitrogen
Published 2013-11-01“…Reclaimed water treated by filtration and chlorination is safe to use for designated purposes, such as residential landscape irrigation. …”
Get full text
Article -
37246
Coupling image denoising model based on total variation
Published 2016-04-01“…Then, wavelet was used to decompose coefficient in frequency domain, control based on the edge detection ability of Canny algorithm were designed. The control functions control energy spread direction, the advantages of TV model and trend fidelity term are maintained, edge and texture details were protected, and “staircase effect'' was also suppressed. …”
Get full text
Article -
37247
Analysis of Cooperative Defense System of Water Conservancy Network Security Based on Software Defined Security
Published 2023-01-01“…In view of the increasingly concealed,complicated,and intelligent network attacks,this paper analyzes the security protection status and network security problems faced by the water conservancy network.A cooperative defense system of water conservancy network security is proposed,and a cooperative defense control system of network security is designed according to the system.On the basis of software defined security architecture,the control layer and security layer of traditional hardware or virtualized security devices are separated.The security resource pool provides security protection,and the security control platform is responsible for management and command delivery.Furthermore,security services can be arranged according to different protection requirements to construct multiple security protection mechanisms,so as to provide technical support for realizing the cooperative defense capability of water conservancy network security featuring internal and external cooperation and linkage between the upper and lower levels.…”
Get full text
Article -
37248
Channel estimation for MIMO SC-FDE systems via time-domain based approaches
Published 2011-01-01“…Circularly orthogonal sequences were designed for the time-domain channel estimation in MIMO SC-FDE systems.Firstly,Chu sequences were chosen as the base sequences,which were added by cyclic prefix and cyclic postfix to construct circularly orthogonal training sequences.The channel impulse response can be estimated by calculating the cross-correlation between the received signal and the corresponding local sequence.Further,a new training sequence structure was presented,in which the original "long" training sequences were replaced by successive and identical "short" sequences.The corresponding estimation algorithm achieves the same performance as "long" sequences based method.Simulation results show that the proposed algorithms can offer good BER performance even at low SNR,due to the successful interference suppression between the antennas and the decrease in the noise variance.…”
Get full text
Article -
37249
Comment initier en mathématiques la production d’une notation et ses usages à partir de l’activité des élèves ?
Published 2011-10-01“…We will describe the initial stages of teaching fractions to 10 year-old pupils from primary school, and more specifically the pupils’ elaboration of a means to designate sizes much smaller than single units, such as the thickness of a sheet of paper (much less than a millimeter, requiring a slide rule for measurement), the mass of a nail (well below the level of sensitivity on the Roberval balance), or the capacity of a thimble etc. …”
Get full text
Article -
37250
Power control strategy with joint of multi-packet reception and fuzzy logic control
Published 2015-02-01“…In order to meet the needs of energy saving in wireless networks,a power control strategy with joint of multi-packet reception and fuzzy logic was proposed.Firstly,based on the power control with successive interference cancellation (SIC),transmission power was divided into several decodable power levels.Secondly,fuzzy logic control algorithm was adopted to select the optimal transmission power for SIC.In addition,three parameters were designed as fuzzy logic control inputs for power selection,which were the distance between transmitters and receivers,the number of neighboring nodes and the residual energy of transmitters.Simulation results show that power control strategy with joint of multi-packet reception and fuzzy logic control not only betters average network throughput than other power control strategy for SIC,but also saves more energy so that the network lifecycle would be significantly extended.…”
Get full text
Article -
37251
Research on the optimization method of emergency material post transportation model based on bi-level programming
Published 2020-09-01“…Emergency logistics is a special logistics activity that protects the need of personnel,materials and funds in the event of a major emergency.In the post transportation model of emergency supplies,how to quickly and accurately deliver a large amount of rescue materials to the place of need is a huge challenge to emergency logistics.The logistics cost and the logistics time in the entire logistics process could be minimized by the bi-level planning method while meeting the demand for emergency supplies at the demand point.The bi-level programming model was constructed with the minimum logistics cost of the upper layer and the shortest logistics time of the bottom layer as the goal,and a hybrid tabu search genetic algorithm (HTSGA) was designed to solve the model,which solved the problem of emergency logistics transportation route optimization after the disaster.Finally,the experimental result comparison verified the effectiveness of the model and algorithm.…”
Get full text
Article -
37252
Modeling and Simulation of Cuttlefish-imitating Underwater Sampling Manipulators
Published 2024-06-01“…In order to solve the problem of sample damage caused by excessive pressure exerted by the manipulator during underwater operation and the problem that sample cannot be saved after grasping, this study designs an underwater sampling manipulator driven by two coupling cylinder drivers that imitates the eating mode of acuttlefish. …”
Get full text
Article -
37253
Comparison Study of Resource Allocation Strategies for OFDM Multimedia Networks
Published 2012-01-01“…Advanced MAC scheduling schemes provide efficient support of multimedia services in multiuser OFDM wireless networks. Designed in a cross layer approach, they opportunistically consider the channel state and are well adapted to the wireless multipath fading environment. …”
Get full text
Article -
37254
Handbook of Florida Water Regulation: Florida Watershed Restoration Act
Published 2019-05-01“… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
Get full text
Article -
37255
Energy-aware path strategy for embedded network
Published 2017-10-01“…To combat energy consumption, we propose an energy-aware path strategy to achieve energy saving. It is designed for system level so as to early examine energy utilization. …”
Get full text
Article -
37256
Proposta de aclaração do “pacto sucessório” à luz de novos dados
Published 2017-10-01“…In an earlier work published in the Medievalista online Journal, the author considered that the designated “pacto sucessório” between the Counts Raymond and Henry could be a modern fake, although he had not been able to say that categorically. …”
Get full text
Article -
37257
Mellem Skylla og Charybdis – træk af legalitetsprincippets historie i dansk strafferet
Published 2017-02-01“…While the principle of legality was designed to secure the predictability of the criminal law, measures were also taken in order to secure flexibility in the application of the code by the courts. …”
Get full text
Article -
37258
Les cafés, reflets de la diversité des tiers-lieux contemporains : aperçu de Montréal
Published 2023-02-01“…Often presented as the archetype of the third place, the recent evolution of the café questions the relevance of this designation, even though its relationship to the territory and its identity are often neglected. …”
Get full text
Article -
37259
The Ambivalence of the Scientific Ethos Is Irresistible
Published 2021-05-01“…Is it possible to rid the ethics of science, designed to develop and represent moral norms for the scientific community, from this ambivalence? …”
Get full text
Article -
37260
Image Enhancement under Data-Dependent Multiplicative Gamma Noise
Published 2014-01-01“…The filter is equipped with three terms designed to perform three different tasks. The first term is an anisotropic diffusion term which is derived from a locally adaptive p-laplacian functional. …”
Get full text
Article