Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
37841
Building for Birds Evaluation Tool: Forest Fragments Used as Stopover Sites by Migrant Birds
Published 2017-02-01“…This evaluation tool is most useful for small developments or developments in already fragmented landscapes. The tool is designed for use when no opportunity is available to conserve large forest areas of 125 acres or more within a proposed development. …”
Get full text
Article -
37842
Dynamic privacy measurement model and evaluation system for mobile edge crowdsensing
Published 2021-02-01“…To tackle the problems of users not having intuitive cognition of the dynamic privacy changes contained in their sensing data in mobile edge crowdsensing (MECS) and lack of personalized privacy risk warning values in the data uploading stage, a dynamic privacy measurement (DPM) model was proposed.A structured representation of data obtained by a user participating in a sensing task was introduced and was transformed it into a numerical matrix.Then privacy attribute preference and timeliness were presented to quantify the dynamic privacy changes of data.With this, personalized privacy thresholds of users based on the numerical matrix were reasonably calculated.Finally, differential privacy processing was performed on the numerical matrix, and a model evaluation system was designed for the proposed model.The simulation results show that the DPM model was effective and practical.According to the given example, a data utility of approximately 0.7 can be achieved, and the degree of privacy protection can be significantly improved as the noise level increases, adapting to the MECS of IoT.…”
Get full text
Article -
37843
Multidimensional Heterogeneous Medical Data Push in Intelligent Cloud Collaborative Management System
Published 2020-01-01“…First of all, the logical architecture of the multidimensional heterogeneous data push system was determined, and the data push function was designed; secondly, redundant data removal and noise reduction preprocessing were conducted against the push data, correlation rules were used to integrate multidimensional heterogeneous medical data, the weight of medical data was calculated, the heterogeneous data matrix was constructed, and the integrated medical data were weighted to eliminate multidimensional heterogeneous interference. …”
Get full text
Article -
37844
Effects of Equipment-Structure-Soil Interaction on Seismic Response of Equipment and Structure via Real-Time Dynamic Substructuring Shaking Table Testing
Published 2017-01-01“…A scale model of the ESS system was designed and underwent an RTDSST test. The experimental data were found to be consistent with the numerical calculation results, which corroborates the reliability and validity of the proposed testing method. …”
Get full text
Article -
37845
Study on Structure Review of Emptying Bottom Outletfor Raising Water Retaining Level of Goupitan Arch Dam
Published 2020-01-01“…During the normal operation of Goupitan Reservoir, the emptying bottom outlet is blockedby the inlet water retaining gate, or by the working gate at the outlet of the bottom outlet ifthe water retaining gate needs to be repaired. The designed water retaining level of the workinggate and gate support structure is 590 m of dead water level. …”
Get full text
Article -
37846
Influence of Inlet and Outlet Area Ratio on Intake Port Flow Capacity
Published 2024-01-01“…When the intake port is designed, the optimal area ratio under the working condition of a smaller relative pressure difference should be applied in order to ensure the discharge coefficient is optimal under all working conditions.…”
Get full text
Article -
37847
Building method of distributed COW disk on network computing environment
Published 2012-07-01“…Aiming to distributed computing and data centralizing storage in large-scale network computing environments and combining sparse and bursting characteristic of COW(copy-on-write) disk storing modified data blocks,the distributed COW network disk architecture was presented.The system building process of network computing environments was speeded up by apportioning the aggregation spending that server manages all related COW disks of client hosts to each client host.A improving 64bit bitmap compress arithmetic was designed to reduce the size of COW disk’s bitmap,so server disk space was saved and the network communication spending of distributed COW disk was less.The modified prefetching arithmetic based on COW bursting blocks was presented to improve the hit rate of Cache relating with distributed COW disk.Experiments on the prototype show that the distributed COW mechanism can effectively reduce system building latency of multi-client hosts network computing environment based on improving COW bitmap compress and prefetching arithmetic.…”
Get full text
Article -
37848
Research of Test Method of Single Tooth Bending Fatigue Loading of Involute Helical Gear
Published 2019-07-01“…For the problem of bending fatigue strength test of involute helical gear, the change regulations of bending stress and load distribution relation of helical gears with different tooth width and helical angle are researched by using RomaxDesigner. The contact line positions and the maximum stress are got, and it can be used to determine the loading position and load of helical gear in single tooth bending fatigue test. …”
Get full text
Article -
37849
Pouvoir d’agir et capacités d’agir : une perspective méthodologique ?
Published 2012-11-01“…The innovation we propose is the development of an assessment instrument, “Questioning the Power to Act” (QPA), a tool based on a questionnaire from Quebec, designed to measure the power to act in different areas and use questioning techniques to make a qualitative analysis of the capacity and power to act of the agents involved. …”
Get full text
Article -
37850
English curriculum analysis and its relevance to Islamic boarding school goals
Published 2023-06-01“…The qualitative data were derived from curriculum 2013 and the curriculum complementary documents designed by the curriculum development department of the school. …”
Get full text
Article -
37851
Plautus’ Casina and its uses in General Education-Level Gender History
Get full text
Article -
37852
Altai alphabet with cyrillic graphics
Published 2024-12-01“…In Siberia, unlike many living peoples, writing in the Altai language began in the 40s of the 19th century appeared and acertain part of the literature written in this script was formed.The writing of the Altai language was compiled by representatives of the Altai spiritual mission. When designing the Altai alphabet, representatives of the Altai spiritual mission they had one main goal in mind. …”
Get full text
Article -
37853
Research on optimal channel access method for distributed wireless network based on reliable multicast communication
Published 2022-12-01“…To address the low spectrum utilization issue of the distributed network due to multi-user collision and channel time-varying nature, the distributed channel access problem for multicast communication was investigated.Based on the optimal stopping theory, a statistical model of distributed channel access under wireless multicasts was established, and an optimal distributed wireless channel access method under reliable multicast communication was proposed.Each source competes for the channel in a distributed manner, the winner source determines whether to access the shared channel by comparing the reliable multicast access rate with a pure threshold to complete the reliable multicast communication from the winner source to all the sinks.Theoretic optimality of the method was proved rigorously.A corresponding low-complexity algorithm was designed, which has a pure threshold structure and good engineering practicability.Numerical results show that the proposed channel access method can effectively improve the average throughput of the system.…”
Get full text
Article -
37854
STUDY ON THE MECHANICAL PROPERTIES OF TRUSS LATTICE STRUCTURES BY MJF 3D PRINTING (MT)
Published 2023-01-01“…Seven truss lattice cells were designed by the combined superposition method, and the specimens with the same porosity of seven lattice structures were prepared by the Multi Jet Fusion(MJF) 3D printing technique. …”
Get full text
Article -
37855
What Policy Evidence for a European Strategy of Sustainable Development in Mountain Regions?
Published 2016-12-01“…The aspiration to implement evidence-based policies has led to an increased focus on quantitative indicators and targets defined at the European level as instruments for designing policy measures and assessing their impact. …”
Get full text
Article -
37856
Research on New SMA Actuator and Bionic Hand
Published 2021-06-01“…A modular underactuated five-finger bionic hand based on polygon SMA actuator is designed. The overall mass is 260 g,each finger can be disassembled and driven independently. …”
Get full text
Article -
37857
A Novel Drug-Drug Salt of Naproxen and Vortioxetine: Synthesis, Characterization, and Solubility Study
Published 2023-01-01“…In this study, a new 1 : 1 drug-drug salt of NAP and VOT (namely, NAP-VOT) was designed and synthesized by liquid-assisted grinding and slow evaporation. …”
Get full text
Article -
37858
Localized wrinkling of metal films on elastic and liquid substrates
Published 2019-04-01“…In this review, we focus on the formation and evolution mechanisms of these localized wrinkle patterns, and we aim to provide some useful guidance for future studies on designing the localized wrinkling patterns with real-time controllable dimension, orientation and morphology in the films/substrates.…”
Get full text
Article -
37859
SQLMVED: SQL injection runtime prevention system based on multi-variant execution
Published 2021-04-01“…The effectiveness of combining SQL statement parsing with randomization to defend against SQL injection attack (SQLIA) was based on the fact that attackers did not know about the current method of randomization adopted by system.Therefore, once attackers had mastered the current method of randomization who can launch effective SQLIA.In order to solve this problem, a SQL injection runtime prevention system based on multi-variant execution was designed, the multi-variant apply randomization methods from any other, so that illegal SQL statements could not be parsed successfully by all variants.Even if attackers had mastered the method of randomization, illegal SQL statements could only be parsed successfully by a certain variant at most, meanwhile the parsing results of multiple variants were voted to find the abnormality in time and block attack path.The prototype system SQLMVED is implemented for Web services and experiments show that the prototype can effectively defeat SQLIA.…”
Get full text
Article -
37860
Compact RFID tag antenna based on square spiral resonator
Published 2024-03-01“…A miniaturized ultra-high frequency (UHF) radio frequency identification (RFID) tag antenna was designed.The antenna was composed of two square spiral resonators shorted inside and outside.By adjusting the edge length of the outer ring spiral resonator and the spacing between the inner and outer ring spiral resonators, the resonant frequency of the proposed tag antenna could be effectively tuned.The simulation results show that the proposed tag antenna has good impedance matching and the frequency band range covers the whole UHF band (840~960 MHz).It has a dimension of 7.60 mm×7.60 mm×0.05 mm, which is 96% smaller than the traditional spiral resonator (SR) antenna.The measure result shows that the proposed tag antenna achieves the maximum reading distance at 910 MHz in 4 W effective isotropic radiated power.The proposed UHF RFID tag antenna has some advantages of small size, wide frequency band, low cost and easy batch fabrication, and is suitable for applications with small size requirements.…”
Get full text
Article