Showing 37,921 - 37,940 results of 46,768 for search '"Design"', query time: 0.21s Refine Results
  1. 37921

    Transportes e circulação: Fixos, fluxos e dinâmicas econômicas no estado de Mato Grosso do Sul - Brasil by Ana Paula Camilo Pereira

    Published 2018-05-01
    “…This research project intends to analyze and identify the dynamics of fluidity through fixed in the Brazilian state of Mato Grosso do Sul, its role in the national economy, as well as its relationship with the other countries that are part of the Bioceanic Road, designed from the Brazilian cities of Campo Grande-MS to Porto Murtinho-MS, towards the ports of northern Chile. …”
    Get full text
    Article
  2. 37922

    Modification and Control Technology of Contact Zone of the Straight Bevel Gear by Li Yufan, Nan Boru, Gao Bin

    Published 2020-07-01
    “…During developing a high lift straight bevel gear pair for a large passenger aircraft,the straight bevel gear pair designed according to ANSI/AGMA 2009-B01 standard,the figure of the tooth contact pattern is clearly marked in the drawing,the length,position,shape and other information,in the manufacturing process control of bevel gears also have certain requirements,a good contact state of the gearbox under any working load is finally realized,and the interchangeability of the gear pair is realized,and the concept of master gear and control gear is proposed. …”
    Get full text
    Article
  3. 37923

    Students’ social representations about world culture by E. V. Zvonova, A. S. Gruzdeva

    Published 2022-01-01
    “…The findings suggest that there are differences in the concepts that American and Russian students are willing to designate as categories reflecting their perceptions of world culture. …”
    Get full text
    Article
  4. 37924

    Web plug-in paradigm for anti-DoS attack based on end hopping by Le-yi SHI, Hui SUN, Yu-wen CUI, Hong-bin GUO, Jian-lan LI

    Published 2017-10-01
    “…The end hopping technology is a proactive network defense technology proposed to mitigate the network attack.By changing the IP address,port and other information in the communication pseudo-randomly to achieve the purpose of confusing the attacker.The plug-in mechanism based on the end hopping technology was introduced,and it was applied to the field of Web protection.This plug-in was designed to confuse and interfere with attackers.The plug-in model was divided into two working modes,which are non-end-hopping mode and end hopping mode.The plug-in according to the instructions of the UDP spokesman to switch its own work mode and when the communication link is safe and reliable,it choose the fist mode which can reduce the cost of services.Another,when the network is attacked,the plug-in switches to the end hopping mode to ensure the safety of communications.The experimental results show that the plug-in mechanism based on end hopping has high service and security performance under SYN Flood attack and UDP Flood attack.…”
    Get full text
    Article
  5. 37925

    BICO MPPT: A Faster Maximum Power Point Tracker and Its Application for Photovoltaic Panels by Hadi Malek, YangQuan Chen

    Published 2014-01-01
    “…In particular, a novel extremum seeking controller (ESC), which uses a Bode ideal cutoff (BICO) filter in its structure, is designed and tested on a simulated PV array. The new algorithm is compared against the commonly used ESC MPPT algorithm with first-order filters. …”
    Get full text
    Article
  6. 37926

    Encoding Disappearing Characters: The Case of Twentieth-Century Japanese-Canadian Names by Stewart Arneil

    Published 2019-08-01
    “…This report documents our efforts with two technologies designed to address this situation. The first is the Standardized Variation Sequence (SVS) feature of Unicode. …”
    Get full text
    Article
  7. 37927

    Fracture precursor phenomena in marble specimens under uniaxial compression by means of Acoustic Emission data by Dimos Triantis, Stavros K. Kourkoulis

    Published 2019-10-01
    “…Marble specimens are subjected to a specially designed stepwise loading protocol, in an attempt to detect fracture precursor phenomena taking advantage of Acoustic Emission (AE) data. …”
    Get full text
    Article
  8. 37928

    A novel LTE indoor location system based on multiple antenna clusters by Yajuan LV, Shan LIU, Rongyi HU, Wenhao ZHANG

    Published 2017-03-01
    “…Then, a new location algorithm was designed which could support flexible antenna configuration. …”
    Get full text
    Article
  9. 37929

    STUDY ON MECHANICAL CHARACTERISTICS OF LPG TANK CAR WITH WALL-CLIMBING JET CLEANING by XING XiQuan, ZHU HaiQing, ZHANG ChunBo, ZHANG Xiong

    Published 2020-01-01
    “…According to the requirement of LPG tank car inner wall cleaning,a wall-climbing jet cleaning trolley was designed,which combined high-pressure water jet and mechanical brushing. …”
    Get full text
    Article
  10. 37930

    Robust resource allocation algorithm for multicarrier NOMA security communication system by Yu ZHANG, Xiongwen ZHAO, Xiaoqing WANG, Suiyan GENG, Peng QIN, Zhenyu ZHOU

    Published 2022-03-01
    “…To improve the spectrum efficiency and enhance the information security of wireless network, a sum secrecy rate maximization-based robust resource allocation algorithm was proposed for a downlink multicarrier NOMA security communication system.Firstly, the artificial noise (AN) precoding vector was designed to be orthogonal to the legitimate channel, so that the legitimate transmission would not be affected by the AN.Then, considering the constraints of rate requirement of each user and the maximum transmit power of base station, a joint AN precoding, downlink data precoding and subcarrier allocation optimization problem was formulated under eavesdropping channel uncertainties.To solve that non-convex problem, it was decomposed into two joint optimization subproblems: precoding optimization and subcarrier allocation.The former was solved based on S-procedure and block coordinate descent (BCD) algorithm, the latter was solved by dynamic matching theory.Simulation results demonstrate that the proposed algorithm has good robustness and can effectively improve the sum secrecy rate.…”
    Get full text
    Article
  11. 37931

    Prostaglandin-Induced Cystoid Macular Edema Following Routine Cataract Extraction by Negin Agange, Sameh Mosaed

    Published 2010-01-01
    “…Definitive conclusions about causal relationships cannot be made without well-designed, prospective clinical trials addressing this issue.…”
    Get full text
    Article
  12. 37932

    Research on real-time fusion method of multi-source heterogeneous flight trajectory data stream by Zhuxi ZHANG, Wang TIAN, Shaochuan ZHU, Hongyan LIU, Xi ZHU

    Published 2020-09-01
    “…Secondary surveillance radar (SSR) and automatic dependent surveillance-broadcast (ADS-B) are the two main surveillance methods coexisting in the airspace surveillance system.In order to improve the accuracy and stability of surveillance,real-time fusion of SSR and ADS-B trajectory is crucial.In view of the fact that the existing methods are difficult to meet the real-time fusion requirements of large-scale trajectories,a real-time fusion method of SSR and ADS-B data streams was designed with big data technology.This method was based on the big data processing framework of micro-batch processing and followed the MapReduce programming model.While obtaining a fusion trajectory of high quality,it ensured high concurrency and real-time data processing capability of the system.Finally,a real-time flight simulation experiment based on real flight data was carried out to verify the feasibility of the method.…”
    Get full text
    Article
  13. 37933

    Energy as the Mediator between Natural and Supernatural Realms by Kristel Kivari

    Published 2013-01-01
    “…In these examples ‘energy’ designates the position of the individual, in which the participative relationship with the environment works as a form of folk epistemology within the limits of cultural understanding.…”
    Get full text
    Article
  14. 37934

    Attention and sentiment of Chinese public toward rural landscape based on Sina Weibo by Jinji Zhang, Guanghu Jin, Yang Liu, Xiyue Xue

    Published 2024-06-01
    “…It will also aid relevant scholars and designers in providing targeted solutions, which hold significant importance for policy formulation and the exploration of specific development patterns.…”
    Get full text
    Article
  15. 37935

    The analysis of social appearance anxiety levels of physical education teacher candidates in terms of different variables by Metin Yuceant, Huseyin Unlu

    Published 2017-04-01
    “…Participated in the current study 600 physical education teacher candidates studying at physical education and sports departments which were designed using a screening model. As a data collection tool, the Social Appearance Anxiety Scale was used in the study. …”
    Get full text
    Article
  16. 37936

    Performance assessment approach based on change-point detection for network moving target defense by Cheng LEI, Duo-he MA, Hong-qi ZHANG, Ying-jie YANG, Miao WANG

    Published 2017-01-01
    “…A performance assessment approach based on change-point detection for network moving target defence was proposed.Directed to the problem of network resource graph not being able to present the effect of network resource vulnerabilities to network nodes,a conversion relationship between resource vulnerability changes and node security states was established by defining the concept of a hierarchical network resource graph and the efficiency of resource graph construction and updating were improved.Furthermore,directed to the problem of static detection algorithm not being able to precisely measure the dynamic change of network moving target defense,a change-point detection algorithm and standard degree measurement algorithm was designed.The security cost and benefit of network moving target defense in real-time and dynamically on the basis of unified metrics were defected and measured,which improved the evaluation accuracy.The analysis result of typical examples has proved the feasibility and the effectiveness of the proposed approach.…”
    Get full text
    Article
  17. 37937

    Accelerated computational implementation of reconciliation for continuous variable quantum key distribution on GPU by Shao-ting LIU, Xiao-kai WANG, Da-bo GUO

    Published 2017-11-01
    “…For the low computing speed of reconciliation for current continuous variable quantum key distribution, CPU&amp;GPU-parallel reconciliation algorithms was designed based on LDPC of SEC protocol to speed up decoding computing.In order to raise decoding speed without sacrifice reconciliation efficiency,a static two-way cross linked list to efficiently store large scale sparse parity matrix was employed.The simulation experimental results show that the speed of the decoding rate reaches 16.4 kbit/s when the channel SNR is over 4.9 dB and the reliability of the 2×10<sup>5</sup>continuous variable quantum sequence,with reconciliation efficiency of 91.71%.The experimental based on the Geforce GT 650 MB GPU and the 2.5 GHz and 8 GB memory CPU hardware platform.Relative to the only CPU platform,computing speed increased by more than 15 times.…”
    Get full text
    Article
  18. 37938

    Automatic Classification Method of Music Genres Based on Deep Belief Network and Sparse Representation by Lina Pan

    Published 2022-01-01
    “…Based on the deep belief network model after fine-tuning training, the structure of the music genre classification network model is designed. Combined with the classification algorithm of sparse representation, for the training samples of sparse representation music genre, the sparse solution is obtained by using the minimum norm, the sparse representation of test vector is calculated, the category of training samples is judged, and the automatic classification of music genre is realized. …”
    Get full text
    Article
  19. 37939

    Two-layer distributed cache in D2D integrated fog-RAN by Chengyu XIA, Yanxiang JIANG

    Published 2018-04-01
    “…With the development of mobile communications,people’s demands for low-latency transmission networks are rapidly increasing.Fog-RAN,as a new architecture suitable for 5G/B5G communication networks,has broad application prospects.Considering the fog network of device-to-device communication,a two-layer distributed cache based on device-to-device communication and fog-RAN was proposed to reduce the delay for users to download files.Firstly,a closed-form solution of the download delay of the two-layer cache and a closed-form solution of the delay gain were obtained.On this basis,a distributed algorithm was designed to obtain the best cache strategy,so that each fog-based wireless access point (F-AP) or user equipment (UE) only needed to use the information of the neighboring devices to complete the caching.The simulation results show that the two-layer distributed cache can effectively reduce the download delay.…”
    Get full text
    Article
  20. 37940

    Sorry it took me so long: Latin America and rapid governments’ response to COVID-19 by Ian Rebouças Batista, Amanda Domingos, Rodrigo Lins

    Published 2020-01-01
    “…We deploy an explanatory work on which institutional designs collaborates with higher delay in governments’ adoption of these measures. …”
    Get full text
    Article