Showing 37,801 - 37,820 results of 46,768 for search '"Design"', query time: 0.20s Refine Results
  1. 37801

    Derived Categories and the Analytic Approach to General Reciprocity Laws—Part II by Michael C. Berg

    Published 2007-01-01
    “…Upon assigning properly designed t-structures to three of seven specially chosen derived categories, the collapse just mentioned is enough to yield n-Hilbert reciprocity.…”
    Get full text
    Article
  2. 37802

    Sostenibilità del ‘classico’ nell’educazione musicale scolastica by Luca Aversano

    Published 2024-12-01
    “…This locution is both generic in terms of stylistic evaluation and specific in designating a series of compositions from the past that are still alive in the public memory. …”
    Get full text
    Article
  3. 37803

    STUDENT AS “AN EDUCATION CONSUMER”: CONTENT OF THE CONCEPT by Olga K. Krokinskaya, Sergey Yu. Trapitsin

    Published 2016-12-01
    “…The students’ opinion is presented as a competent position to account for their views for designing educational politics of the University. The dynamics of the post!…”
    Get full text
    Article
  4. 37804

    Publication ethics statement for the year 2025 by Nebojša N. Gaćeša

    Published 2025-01-01
    “…This document is part of the UNESCO Open Science Toolkit, designed to support implementation of the UNESCO Recommendation on Open Science. …”
    Get full text
    Article
  5. 37805

    Container Security Device Chain Network for Safe Railway Transportation by Sungryul Kim, Jeonghyun Kim, Younghwan Yoo

    Published 2014-11-01
    “…The proposed protocol, CSD Chain Network Protocol (CCNP), was designed for a chain-form network of CSDs, each of which is attached to a container. …”
    Get full text
    Article
  6. 37806

    Integrated Weighted Distance Measure for Single-Valued Neutrosophic Linguistic Sets and Its Application in Supplier Selection by Erhua Zhang, Fan Chen, Shouzhen Zeng

    Published 2020-01-01
    “…Finally, an illustrative numerical case regarding selecting low-carbon supplier is used to test the performance of the designed method.…”
    Get full text
    Article
  7. 37807

    The effect of algoritmics government, artificial intelligence, and tax service on tax compliance by Akbari Adha, Rulinawaty Rulinawaty, Faizal Madya

    Published 2024-09-01
    “…The research instrument used was a questionnaire designed on a Likert scale with five response options. …”
    Get full text
    Article
  8. 37808

    واقع الهندرة فى مکتبات الکلیات بجامعة سوهاج دراسة استکشافیة تخطیطیة by د. ممدوح على محمود

    Published 2016-04-01
    “…Amongst them arethe following: reinforcing the concept of managerial operationsreengineering, developing librarians' capacities, determining a clearmanagerial policy, and using IT skills in designing all managerialoperations reengineering…”
    Get full text
    Article
  9. 37809

    Following are the abstracts from the Fourth Annual Meeting of the Society for Molecular Imaging

    Published 2005-07-01
    “…Declaration of Financial Interests or Relationships To insure balance, independence, objectivity and scientific rigor in all CME programs it is the policy of the meeting's joint sponsors that any speaker or poster presenter who makes a presentation at a program designated for AMA Physician's Recognition Award (PRA) Category 1 or 2 credit must disclose any real or apparent financial interest or other relationship (i.e., grants, research support, consultant, honoraria) that the presenter may have with the manufacturers, distributors or providers of any commercial products or services that may be discussed in the presentation. …”
    Get full text
    Article
  10. 37810

    Time Division Switching Scheme and Performance Analysis of Low Orbit Quantum Satellite Communication by Guang Yang, Min Nie, Fan Jiang

    Published 2014-04-01
    “…In certain channel conditions, by rational designing of these parameters, the quantum satellite communication system can meet the demanded service requirements.…”
    Get full text
    Article
  11. 37811

    Research and application of 5G lightweight hardware encryption module for power terminals by Chen ZHANG, Hongkai WANG, Dong MAO, Sichen PAN, Shuai ZHAO

    Published 2023-06-01
    “…With the accelerated deployment of 5G new infrastructure, terminal application business has been gradually extended to various vertical industries.Although 5G technology can also adapt to the differentiated communication requirement for power industry, the power industry currently lacks a kind of 5G module that not only meets the security access requirement for power grid, but also has the advantage of low hardware upgrade cost, flexibility and scalability.Therefore, a 5G lightweight hardware encryption module for power terminals was designed and developed.The module is connected with the power terminal in the form of pluggable interface, and the capability of 5G communication and encryption authentication could be quickly realized just by terminal software upgrade.The test results show that the module has chip-level security authentication capability, and can take into account 5G communication and security mechanism, which not only improves the security of terminal access to the power intranet, but also reduces the difficulty of terminal transformation and 5G communication hardware upgrade cost.…”
    Get full text
    Article
  12. 37812

    Robust deepfake detection method based on siamese network by LIN Shanhe

    Published 2024-04-01
    “…A novel approach leveraging a Siamese network was proposed, designed to learn common forgery features across both high-quality and low-quality images. …”
    Get full text
    Article
  13. 37813

    Finding provenance, seeking context by Peter Mark

    Published 2020-09-01
    “…Likewise, the term used to identify the culture of the artists, ‘Sapes’, does not correspond to any contemporary group using that designation.The objects are richly documented in late 16th- and 17th-century Portuguese sources. …”
    Get full text
    Article
  14. 37814

    Cache timing attack on SMS4 by ZHAO Xin-jie, WANG Tao, ZHENG Yuan-yuan

    Published 2010-01-01
    “…Two access driven Cache timing analysis methods on both first four rounds and last four rounds of SMS4 encryption were proposed and discussed.On the precondition of not interfering SMS4 encryption,a spy process was designed to gather the un-accessed lookup table related Cache sets during first four rounds and last four rounds of SMS4 encryption,then transferred them into impossible lookup table indices,combing plaintext or cipher text to analyze the impossible key byte candidates,finally the initial SMS4 key was recovered.Experiment results demonstrate that multi-process sharing Cache space feature and SMS4 lookup table structure decide that SMS4 is vulnerable to Cache timing attack,for about 80 samples are enough to recover full 128bit SMS4 key during both first four rounds attack and last four rounds attack,so it’s necessary to take certain countermeasures to prevent this kind of attack.…”
    Get full text
    Article
  15. 37815

    The problems of economic accounting components disunity in Russian companies in the economy digitalisation by Z. V. Chebotareva, Ya. S. Matkovskaya, E. V. Shapoval

    Published 2022-06-01
    “…It not only determined the relevance of the study, but it creates a precedent for discussion about the advisability of creating in an organisation a separate set of statistical information from accounting, designed to fill in and control reports of federal statistical observation.…”
    Get full text
    Article
  16. 37816

    KNOWLEDGE, ATTITUDE AND PRACTICES OF CONSUMPTION OFCARBONATED BEVERAGES: A CROSS SECTIONAL STUDY by Talha Mufeed Siddiqui et al

    Published 2024-10-01
    “…A questionnaire with 26 closed ended questions was designed for the present study which consists of questions regarding knowledge, attitude and practice of consumption of sweetened carbonated beverages. …”
    Get full text
    Article
  17. 37817

    Debt Relief as a Last Resort for the Lender of Last Resort? by Arne Hansen, Dirk Meyer

    Published 2021-08-01
    “…While the Pandemic Emergency Purchase Programme, which is designed as a monetary policy instrument, is regarded by some as a violation of the prohibition of monetary financing, the Next Generation EU recovery fund is likely to direct the fundamental structures of the European Union towards a fiscal union with considerable redistribution elements. …”
    Get full text
    Article
  18. 37818

    Trajectory Planning of Crossed Roller Bearing Automatic Assembly Robotic Arms Based on the Improved Gray Wolf Optimizer by Hu Jiangtao, Dang Yugong, Zhou Zhigang, Zhang Yupeng

    Published 2024-11-01
    “…For crossed roller bearings, manual assembly has problems such as low efficiency, high cost and large error, a four-degree-of-freedom robotic arm was designed to automatically assemble cross roller bearings. …”
    Get full text
    Article
  19. 37819

    A Storage System for Image File in Cloud Computing by Hongfa Wang

    Published 2014-02-01
    “…As cloud computing enters the mainstream,the numbers of virtual machine in one cloud pool is becoming more and more.So,how to quickly and cheaply migrate virtual machines between different hosts for load balance and power savings is becoming one of the hot and tough problems in this filed for the researchers.A distributed storage system was presented,which was called IFSpool.The system was based on Lustre and was designed to achieve the following three goals:high capacity and high extensibility to support thousands of VM images,high I/O throughput for data access,and booting optimization for boot storm.IFSpool combined a queue mechanism and a cache mechanism in a seamless way,to improve I/O throughput and lighten the boot storm by coordinating data access order.The I/O bandwidth and storage capacity of IFSpool can be easily aggregated and extended by adding storage nodes and servers dynamically.The experimental results show that IFSpool is effective and efficient for VM migration.…”
    Get full text
    Article
  20. 37820

    Force/Position Hybrid Control for Cable-driven Parallel Robots Based on the System Stiffness by Chen Keju, Zhang Shangying, Zhang Jilei, Luo Shiyang, Zhang Bowei

    Published 2023-08-01
    “…The simulation results show that the position error of the mobile platform is effectively reduced by the force/position hybrid control strategy, which is designed based on the stiffness analysis. Finally, the accuracy and effectiveness of the stiffness model and the force/position hybrid control strategy are verified by experiments.…”
    Get full text
    Article