Showing 37,321 - 37,340 results of 46,768 for search '"Design"', query time: 0.17s Refine Results
  1. 37321

    Temporal filtering for target detection algorithm based on static background elimination by WANG Bo, LIU De-lian, ZHANG Jian-qi

    Published 2009-01-01
    “…A new temporal based target detection algorithm was presented by using static background elimination to deal with the drawback of large scale data processing and real-time implementation in temporal filtering.Firstly,a uniform model was developed based on the temporal behavior of different types of pixels.And the parameter of the model was estimated by introducing least square method.Using the new model,static background pixels could be eliminated.Secondly,a minimum filer was designed to obtain the baseline of the temporal profile.Finally,the deviation of the temporal profile and its baseline was analyzed,which led to a detection criterion.Since the target signal was well preserved during the static background elimination and large sale tracking data was eliminated,the method could have higher speed and computational efficiency.Experiments with real image sequences have proved the validity of the new approach.…”
    Get full text
    Article
  2. 37322

    Trusted auditing method of virtual machine based on improved expectation decision method by Junfeng TIAN, Yongchao ZHANG

    Published 2018-06-01
    “…Whether the cloud computing environment is credible is the key factor in the promotion and effective use of cloud computing.For this reason,the expected value decision method in risk decision-making was improved.The usage scenarios was redefined,the cost and benefit of audit scheme was digitized,and a virtual machine trusted auditing strategy based on improved expectation decision method was proposed.Several levels of security protection for the user virtual machine was provided,and the optimal audit scheme was selected autonomously according to the security protection level chosen by the user for the virtual machine.The virtual machine introspection (VMI) technology was used to obtain the virtual machine information that needs to be audited.The designed encryption mechanism was used to protect the security of users selected security protection level,so as to ensure the security of user virtual machine selection audit strategy.Finally,the simulation results show that the scheme has good performance and validity.…”
    Get full text
    Article
  3. 37323

    Handbook of Florida Agricultural Laws: Index by Michael T. Olexa, Connor Brock

    Published 2022-06-01
    “… This revised document is part of the Handbook of Florida Agricultural Laws, which was designed to provide an accurate, current, and authoritative summary of the principal Florida laws that directly or indirectly relate to agriculture. …”
    Get full text
    Article
  4. 37324

    Self-adaptive price adjustment strategy based on market mechanism in distributed environment by Chang-song DING, Zhi-ying WANG, Zhi-gang HU

    Published 2016-02-01
    “…The theoretical ana is proved the effectiveness of the pricing strategy, and the algorithm of the pricing strategy was designed. Resources information in the real distributed systems was used as the performance parameters of experimental node in the sim lation experiments, and the performance of the adaptive pricing strategy was tested in a large-scale grid mission. …”
    Get full text
    Article
  5. 37325

    Rule and perception based MAC protocol for UAN by Chong LI, Xiujuan DU, Lijuan WANG, Xiaojing TIAN

    Published 2022-02-01
    “…Aiming at the problem of low channel utilization and network throughput resulted by RTS/CTS handshakes in the conventional media access control (MAC) protocol for underwater acoustic network (UAN), a rule and perception based (RP-MAC) MAC protocol was proposed to avoid packet collision in underwater acoustic networks.Only when the designated receiving node was neither in sending nor receiving state, and other neighboring nodes were not in receiving state, a sending node could send one or more packets to the receiving node, which avoided the interaction of handshake control packets while reducing collision and retransmission.The status of the neighbor nodes was sensed according to the channel rules and the fields from the packets overheard.Theoretical analysis and simulation experiments show that the performance of RP-MAC protocol outperforms the Slotted FAMA and R-MAC protocol in terms of throughput and energy-consumption.…”
    Get full text
    Article
  6. 37326

    Power saving techniques for 5G RRC_Idle mode UE by Tuo YANG, Lijie HU, Fei WANG, Jianjun LIU, Nan HU, Nan LI, Zhenping HU

    Published 2021-04-01
    “…The power consumption of 5G UE is much serious than 4G UE due to larger bandwidth, massive MIMO, and higher data rate and has been one of the important reason affecting users’ experience of 5G network.3GPP has promoted the study and standardization of NR UE power saving techniques, which the R16 techniques is designed for RRC_connected mode and the started R17 techniques focus on RRC_idle mode.The power consumption of NR UE in RRC_idle was analyzed and compared with LTE UE.The power saving techniques to solve the power consumption in paging and tracking procedure were proposed and the power saving gain were also evaluated.The proposed techniques can reduce 5G UE power consumption and be applicable to future 5G commercial UE.…”
    Get full text
    Article
  7. 37327

    Handbook of Florida Water Regulation: Florida Department of Agriculture and Consumer Services by Michael T. Olexa, Luke D'Isernia, Laura Minton, Dulcy Miller, Sarah Corbett

    Published 2019-05-01
    “… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
    Get full text
    Article
  8. 37328

    Lite mer än bara könsorgan by Simon Ceder, Stina Westerlund

    Published 2025-01-01
    “…The study is based on a craft teacher’s experiences from a teaching sequence in grade 9, where students designed and carved symbols related to sexuality, consent, and relationships in wood. …”
    Get full text
    Article
  9. 37329

    Handbook of Florida Water Regulation: Private Regulation by Michael T. Olexa, Luke D'Isernia, Laura Minton, Dulcy Miller, Sarah Corbett

    Published 2019-05-01
    “… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
    Get full text
    Article
  10. 37330

    Enjeux de professionnalisation et rapport à la formation des artistes équestres : approche d’un objet « complexe » soutenue par deux niveaux d’analyse by Thérèse Perez-Roux

    Published 2021-09-01
    “…The contribution focuses on the relationship of AEs to training and is based on a plural data collection: semi-directive interviews (n=31), and interviews carried out on the basis of traces of the activity in a prototypical training course. The latter, designed by a team of researchers in the context of technological research, was experienced in total immersion for a week (researchers and AEs). …”
    Get full text
    Article
  11. 37331

    Research on Influence of Main Bearing Preload of Precision Planetary Cycloidal Reducers for Robots on Tipping Stiffness by Cui Jiajun, Zhang Yinghui, He Weidong

    Published 2024-06-01
    “…Under this condition, aiming at the high tipping stiffness requirement of precision reducers, based on the Romax Designer simulation analysis software, the equivalent model of the reducer is established. …”
    Get full text
    Article
  12. 37332

    Spatio-frequency domain opportunistic access in CR-MIMO system based on primary transmission mode information by Zhao LI, Jian-dong LI, Li-yuan XIAO

    Published 2012-01-01
    “…An opportunistic spatio-frequency access (OSFA) strategy for CR-MIMO system was designed.When spectrum holes exist,cognitive service was implemented applying overlay approach.While there was no idle spectrum available,primary transmission mode information (PTMI) and inter-system interference channel information were exploited.And cognitive service was implemented using underlay approach.The method utilizes both spatial correlation and eigenmode transmission gain in spatial resource quality aluation.Consequently,selection diversity of both authorized channel and cognitive eigenmode was achieved.Moreover,PTMI based signal processing reduced the antenna requirement for cognitive system as well as the power loss of cognitive signal.Simulation results indicate that the proposed method could achieve significant improvement of cognitive service and near-optimal cognitive throughput on the premise that no interference is imposed on the primary.…”
    Get full text
    Article
  13. 37333

    Les vitraux de l’École de Pharmacie de Paris by Françoise Gatouillat

    Published 2011-12-01
    “…Laisné intended to complete the decoration of this hall with eight new windows, representating animals in their natural surroundings. Designed in 1889 by Albert Besnard, the painter who decorated the walls of this room, they were in fact not executed. …”
    Get full text
    Article
  14. 37334

    Handbook of Florida Water Regulation: Water Management Districts by Michael T. Olexa, Luke D'Isernia, Laura Minton, Dulcy Miller, Sarah Corbett

    Published 2019-05-01
    “… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
    Get full text
    Article
  15. 37335

    Handbook of Florida Water Regulation: Environmentally Safe Practices by Michael T. Olexa, Luke D'Isernia, Laura Minton, Dulcy Miller, Sarah Corbett

    Published 2019-05-01
    “… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
    Get full text
    Article
  16. 37336

    Understanding Material Safety Data Sheet Language by Frederick M. Fishel

    Published 2005-04-01
    “…People who are primary users of a MSDS would include employees who handle a certain material in their daily occupations, those who store chemicals at their place of business, and emergency response crews who need to understand procedures associated should an emergency happen to occur. The MSDS is not designed for someone who may apply a lawn and garden pesticide once or twice a year. …”
    Get full text
    Article
  17. 37337

    Spectral deviations of graphs by Stanić Zoran

    Published 2025-02-01
    “…For the graphs GG and HH, the spectral deviation of HH from GG is defined as ϱG(H)=∑μ∈Hminλ∈G∣λ−μ∣,{\varrho }_{G}\left(H)=\sum _{\mu \in H}\mathop{\min }\limits_{\lambda \in G}| \lambda -\mu | , where ∈\in designates that the given number is an eigenvalue of the adjacency matrix of the corresponding graph. …”
    Get full text
    Article
  18. 37338

    Generalized approximate message passing based SrCMA satellite receiver by Le YU, Lidong ZHU, Liang JIN, Jiali LI, Yilun LIU, Cheng GUO

    Published 2022-04-01
    “…In order to satisfy the requirements of the transmission rate and spectrum resource for various terminals and equipment in the satellite internet, a generalized approximation-based message passing optimization satellite receiver was designed.Considering the multi-user detection in the satellite network using the non-orthogonal multiple access, a factor graph was established based on the graph model, and the factor graph was used to analyze the message passing model of the system and a message passing algorithm was proposed.Based on the generalized approximate message passing method, the complexity of the traditional multi-user detector based on message passing was further reduced.Under satellite channel condition, generalized approximate messaging satellite receivers were studied.The simulation results show that the proposed algorithm can effectively solve the signal coexistence problem of multi-users, and reduce the computational complexity of the algorithm.…”
    Get full text
    Article
  19. 37339

    Building an Open Sharing Platform for ELT Courses: The Example of MOOC Network by Na Li, Yitian Zhang

    Published 2022-01-01
    “…However, developing an open sharing platform around MOOC networks is still challenging, especially for English courses, where various course designs significantly increase the difficulty of tracking students’ learning status. …”
    Get full text
    Article
  20. 37340

    La Loi sur le tabac (décembre 1999) et les paradoxes de son application dans les milieux usiniers by Julie Dussault

    Published 2005-05-01
    “…The Tobacco Act (1999), which is intended to reduce smoking by banning the use of tobacco at work, has emphasized the urgent need to question the Act’s repercussions in various workplaces.A review of the literature on restrictions on the use of tobacco at work shows that recent, primarily quantitative studies are designed to measure the efficiency of bans and restrictions, or to identify work characteristics related to smoking. …”
    Get full text
    Article