Showing 37,241 - 37,260 results of 46,768 for search '"Design"', query time: 0.18s Refine Results
  1. 37241

    System detecting network anomaly with visualization techniques by Haocheng ZHANG, Xiaojie WU, Xiang TANG, Runxuan SHU, Tianchen DING, Xiaoju DONG

    Published 2018-02-01
    “…With the fast development of information technology and computer network,the scale and complexity of network security data grows rapidly.Traditional visualization techniques are no longer suitable.In addition,it designs interactive functions based on the feature of network security analysis,in order to assist the network security analyst.The existing approaches for network security visualization have some defects,which fail to provide a good indication of network security data in terms of timing and also fail to display information completely and realize user-friendly interaction.A multi-view network security visualization system was proposed,which provided the analysts of both the static status and dynamic changes of the network by combining the force-oriented model and the staged animation.It provides comprehensive information with display and filter of protocols,IP segment and port.The system on Shanghai Network database were evaluated.…”
    Get full text
    Article
  2. 37242

    STUDY ON OPTIMIZATION OF REMANUFACTURING OF HYDRAULIC SUPPORT COLUMN by XIE Miao, CAO LiPing, TIAN Bo, LIU Xuan

    Published 2020-01-01
    “…The optimization model was set up and the optimization solution process was designed. The post column was taken as an example.The thickness of the coating is reduced by 0. 5 mm.The assembly temperature is reduced by 80 degree Celsius and the radial shrinkage force is increased by 0. 0195 N/mm~2. …”
    Get full text
    Article
  3. 37243

    A Fault Diagnosis Method and Experimental Verification of Automobile Gearbox based on BP Neural Network by Yang Jiayin

    Published 2019-01-01
    “…Based on the wavelet neural network algorithm,the vibration signals of the automobile gearbox is analyzed from the time domain and the frequency domain,and the values with time domain and frequency domain characterization are extracted,and a method of BP neural network algorithm for the fault diagnosis of the automobile gearbox is designed. The fault of the gearbox is analyzed and extracted by empirical mode decomposition method in of the time-frequency domain. …”
    Get full text
    Article
  4. 37244

    Handbook of Florida Water Regulation: Florida Everglades Forever Act by Michael T. Olexa, Luke D'Isernia, Laura Minton, Dulcy Miller, Sarah Corbett

    Published 2019-05-01
    “… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
    Get full text
    Article
  5. 37245

    Using Reclaimed Water to Irrigate Turfgrass – Lessons Learned from Research with Nitrogen by George Hochmuth, Jinghua Fan, Jason Kruse, Jerry Sartain

    Published 2013-11-01
    “…Reclaimed water treated by filtration and chlorination is safe to use for designated purposes, such as residential landscape irrigation. …”
    Get full text
    Article
  6. 37246

    Coupling image denoising model based on total variation by Mei-ling WANG, Xian-chun ZHOU, Lin-feng ZHOU, Lan-fang SHI

    Published 2016-04-01
    “…Then, wavelet was used to decompose coefficient in frequency domain, control based on the edge detection ability of Canny algorithm were designed. The control functions control energy spread direction, the advantages of TV model and trend fidelity term are maintained, edge and texture details were protected, and “staircase effect'' was also suppressed. …”
    Get full text
    Article
  7. 37247

    Analysis of Cooperative Defense System of Water Conservancy Network Security Based on Software Defined Security by XIAO Yaoxuan, MU Duo, QIN Zening, GUO Dongbao

    Published 2023-01-01
    “…In view of the increasingly concealed,complicated,and intelligent network attacks,this paper analyzes the security protection status and network security problems faced by the water conservancy network.A cooperative defense system of water conservancy network security is proposed,and a cooperative defense control system of network security is designed according to the system.On the basis of software defined security architecture,the control layer and security layer of traditional hardware or virtualized security devices are separated.The security resource pool provides security protection,and the security control platform is responsible for management and command delivery.Furthermore,security services can be arranged according to different protection requirements to construct multiple security protection mechanisms,so as to provide technical support for realizing the cooperative defense capability of water conservancy network security featuring internal and external cooperation and linkage between the upper and lower levels.…”
    Get full text
    Article
  8. 37248

    Channel estimation for MIMO SC-FDE systems via time-domain based approaches by LI Dan-ping, LIU Yi, ZHANG Hai-lin

    Published 2011-01-01
    “…Circularly orthogonal sequences were designed for the time-domain channel estimation in MIMO SC-FDE systems.Firstly,Chu sequences were chosen as the base sequences,which were added by cyclic prefix and cyclic postfix to construct circularly orthogonal training sequences.The channel impulse response can be estimated by calculating the cross-correlation between the received signal and the corresponding local sequence.Further,a new training sequence structure was presented,in which the original "long" training sequences were replaced by successive and identical "short" sequences.The corresponding estimation algorithm achieves the same performance as "long" sequences based method.Simulation results show that the proposed algorithms can offer good BER performance even at low SNR,due to the successful interference suppression between the antennas and the decrease in the noise variance.…”
    Get full text
    Article
  9. 37249

    Comment initier en mathématiques la production d’une notation et ses usages à partir de l’activité des élèves ? by Serge Quilio, Dominique Forest

    Published 2011-10-01
    “…We will describe the initial stages of teaching fractions to 10 year-old pupils from primary school, and more specifically the pupils’ elaboration of a means to designate sizes much smaller than single units, such as the thickness of a sheet of paper (much less than a millimeter, requiring a slide rule for measurement), the mass of a nail (well below the level of sensitivity on the Roberval balance), or the capacity of a thimble etc. …”
    Get full text
    Article
  10. 37250

    Power control strategy with joint of multi-packet reception and fuzzy logic control by Jiang-hong HAN, Song-hua HU, Bin LIU, Zhen CHEN, Lei LIU

    Published 2015-02-01
    “…In order to meet the needs of energy saving in wireless networks,a power control strategy with joint of multi-packet reception and fuzzy logic was proposed.Firstly,based on the power control with successive interference cancellation (SIC),transmission power was divided into several decodable power levels.Secondly,fuzzy logic control algorithm was adopted to select the optimal transmission power for SIC.In addition,three parameters were designed as fuzzy logic control inputs for power selection,which were the distance between transmitters and receivers,the number of neighboring nodes and the residual energy of transmitters.Simulation results show that power control strategy with joint of multi-packet reception and fuzzy logic control not only betters average network throughput than other power control strategy for SIC,but also saves more energy so that the network lifecycle would be significantly extended.…”
    Get full text
    Article
  11. 37251

    Research on the optimization method of emergency material post transportation model based on bi-level programming by Haixia ZHOU, Yurong MEI, Furu LYU, Zhixin SUN

    Published 2020-09-01
    “…Emergency logistics is a special logistics activity that protects the need of personnel,materials and funds in the event of a major emergency.In the post transportation model of emergency supplies,how to quickly and accurately deliver a large amount of rescue materials to the place of need is a huge challenge to emergency logistics.The logistics cost and the logistics time in the entire logistics process could be minimized by the bi-level planning method while meeting the demand for emergency supplies at the demand point.The bi-level programming model was constructed with the minimum logistics cost of the upper layer and the shortest logistics time of the bottom layer as the goal,and a hybrid tabu search genetic algorithm (HTSGA) was designed to solve the model,which solved the problem of emergency logistics transportation route optimization after the disaster.Finally,the experimental result comparison verified the effectiveness of the model and algorithm.…”
    Get full text
    Article
  12. 37252

    Modeling and Simulation of Cuttlefish-imitating Underwater Sampling Manipulators by Zhang Xuehai, Yang Zehui, Wang Rugui, Zeng Qineng

    Published 2024-06-01
    “…In order to solve the problem of sample damage caused by excessive pressure exerted by the manipulator during underwater operation and the problem that sample cannot be saved after grasping, this study designs an underwater sampling manipulator driven by two coupling cylinder drivers that imitates the eating mode of acuttlefish. …”
    Get full text
    Article
  13. 37253

    Comparison Study of Resource Allocation Strategies for OFDM Multimedia Networks by Cédric Guéguen, Sébastien Baey

    Published 2012-01-01
    “…Advanced MAC scheduling schemes provide efficient support of multimedia services in multiuser OFDM wireless networks. Designed in a cross layer approach, they opportunistically consider the channel state and are well adapted to the wireless multipath fading environment. …”
    Get full text
    Article
  14. 37254

    Handbook of Florida Water Regulation: Florida Watershed Restoration Act by Michael T. Olexa, Luke D'Isernia, Laura Minton, Dulcy Miller, Sarah Corbett

    Published 2019-05-01
    “… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
    Get full text
    Article
  15. 37255

    Energy-aware path strategy for embedded network by Yang-Hsin Fan

    Published 2017-10-01
    “…To combat energy consumption, we propose an energy-aware path strategy to achieve energy saving. It is designed for system level so as to early examine energy utilization. …”
    Get full text
    Article
  16. 37256

    Proposta de aclaração do “pacto sucessório” à luz de novos dados by Abel Estefânio

    Published 2017-10-01
    “…In an earlier work published in the Medievalista online Journal, the author considered that the designated “pacto sucessório” between the Counts Raymond and Henry could be a modern fake, although he had not been able to say that categorically. …”
    Get full text
    Article
  17. 37257

    Mellem Skylla og Charybdis – træk af legalitetsprincippets historie i dansk strafferet by Morten Kjær

    Published 2017-02-01
    “…While the principle of legality was designed to secure the predictability of the criminal law, measures were also taken in order to secure flexibility in the application of the code by the courts. …”
    Get full text
    Article
  18. 37258

    Les cafés, reflets de la diversité des tiers-lieux contemporains : aperçu de Montréal by Sandra Breux, Mario Bédard

    Published 2023-02-01
    “…Often presented as the archetype of the third place, the recent evolution of the café questions the relevance of this designation, even though its relationship to the territory and its identity are often neglected. …”
    Get full text
    Article
  19. 37259

    The Ambivalence of the Scientific Ethos Is Irresistible by I. Т. Kasavin

    Published 2021-05-01
    “…Is it possible to rid the ethics of science, designed to develop and represent moral norms for the scientific community, from this ambivalence? …”
    Get full text
    Article
  20. 37260

    Image Enhancement under Data-Dependent Multiplicative Gamma Noise by Jidesh Pacheeripadikkal, Bini Anattu

    Published 2014-01-01
    “…The filter is equipped with three terms designed to perform three different tasks. The first term is an anisotropic diffusion term which is derived from a locally adaptive p-laplacian functional. …”
    Get full text
    Article