Showing 38,041 - 38,060 results of 46,768 for search '"Design"', query time: 0.20s Refine Results
  1. 38041

    Le site emporté par l’image ? by Lucinda Groueff, Sonia Keravel

    Published 2024-07-01
    “…These notions will be developed in the light of the experience of the last three years of teaching (2021-2024) at the École nationale supérieure de paysage de Versailles, specifically through the productions of and the process designed for the Fond d’écran workshop. We will demonstrate how, by working the image, students initiate a landscape project and discuss contemporary representations of a new city using digital practices.…”
    Get full text
    Article
  2. 38042

    Research on RTF array overflow vulnerability detection by De-guang LE, Sheng-rong GONG, Shao-gang WU, Feng XU, Wen-sheng LIU

    Published 2017-05-01
    “…When the virtual function was executed,it could cause array overflow vulnerability due to error operation of the virtual function table of C++ object.By attacking the virtual function,it could cause the system crash,or even the attacker to control the execution of program directly was allowed,which threatened user’s security seriously.In order to find and fix this potential security vulnerability as soon as possible,the technology for detecting such security vulnerability was studied.Based on the analysis of the virtual function call during the MS Word parsing RTF files,the array overflow vulnerability generated by MS Word parsing abnormal RTF files,and a new RTF array overflow vulnerability detection method based on the file structure analytical Fuzzing was proposed.Besides,an RTF array overflow vulnerability detection tool (RAVD,RTF array vulnerability detector) was designed.The test results show RAVD can detect RTF array overflow vulnerabilities correctly.Moreover,the Fuzzing results show RAVD has higher efficiency in comparison with traditional file Fuzzing tools.…”
    Get full text
    Article
  3. 38043

    A hybrid unsupervised machine learning model with spectral clustering and semi-supervised support vector machine for credit risk assessment. by Tao Yu, Wei Huang, Xin Tang, Duosi Zheng

    Published 2025-01-01
    “…Furthermore, a multi-view combined unsupervised method is designed to thoroughly mine data and enhance the robustness of label predictions. …”
    Get full text
    Article
  4. 38044

    Bedside Teaching in Undergraduate Surgical Education: A Pilot Study of Students’ Perspective by Mohammed Alfehaid

    Published 2024-03-01
    “…An anonymous questionnaire was designed and students were requested to register the response offline. …”
    Get full text
    Article
  5. 38045

    ABOUT THE POSSIBILITY FOR MEDICAL UNIVERSITIES TO ENTER WORLD UNIVERSITY RANKINGS by V. V. Fursov

    Published 2017-06-01
    “…Leading ranking positions of the Russian higher education institutions in the world university rankings is designated as one of the priorities of the Russian universities in the concept of modernization of the Russian higher professional education. …”
    Get full text
    Article
  6. 38046

    John Dewey : la démocratie comme forme de vie et ses implications éducatives. by Michel Fabre

    Published 2024-12-01
    “…It receives three fundamental meanings from him. It designates a political regime, but also a way of life and even more fundamentally, it is confused with education as self-contrôle. …”
    Get full text
    Article
  7. 38047

    Effect of Rotor Faults on Wind Turbine Shutdown or Continued Operation by Dariush Biazar, Hamid Khaloozadeh, Mehdi Siahi

    Published 2024-01-01
    “…Understanding these impacts provides control system designers with valuable insights to develop strategies for mitigating faults and enhancing WT performance. …”
    Get full text
    Article
  8. 38048

    Downlink hierarchical scheduling method for relay-enhanced cellular network based on TG-PF by Hua QU, Ya-lan SONG, Ji-hong ZHAO, Yi-wei LI

    Published 2013-12-01
    “…Hierarchical scheduling model for relay-enhanced cellular network was designed to divide the w e process of resource scheduling in relay-enhanced cell into two parts,which are high-level scheduling accomplished by eNode B and low-level scheduling accomplished by Relay Node.Based on this,a throughput guaranteed proportional fair (TG-PF) scheduling algorithm was also proposed.The algorithm fully takes the advantages of Max C/I algorithm and PF algorithm consideration,so that it can effectively improve cell lay-enhanced cellular network based on TG-PF,PF algorithm and TG-PF algorithm are separately used in high-level and low-level scheduling process to satisfy the system throughput and scheduling fairness requirements of relay-enhanced cell.Simulation results suggest that the proposed method can tremendously improve cell edge throughput with a small size sa-crifice in scheduling fairness.…”
    Get full text
    Article
  9. 38049

    Handbook of Florida Water Regulation: Emergency Planning and Community Right-to-Know Act by Michael T. Olexa, Luke D'Isernia, Laura Minton, Dulcy Miller, Sarah Corbett

    Published 2019-05-01
    “… This handbook is designed to provide an accurate, current, and authoritative summary of the principle Federal and Florida laws that directly or indirectly relate to agriculture. …”
    Get full text
    Article
  10. 38050

    Hybrid precoding with sub-connected architecture for millimeter wave massive MIMO system by Haiyan CAO, Xiaohui YANG, Wenjuan HU, Zichang MA, Fangmin XU, Xin FANG

    Published 2020-02-01
    “…A hybrid precoding scheme in the millimeter wave massive MIMO system was proposed with sub-connected architecture at the transmitter and digital combining at the receiver.In this scheme,the digital precoder and combiner were designed based on the singular value decomposition (SVD) of the equivalent channel matrix,while the optimal analog precoder was obtained by blocking the equivalent channel to maximize spectral efficiency according to the block diagonalization.Considering the hardware cost and power consumption,the precoding scheme with sub-connected architecture at the receiver was further proposed.Otherwise,the analog precoder and combiner were iteratively updated.Simulation results show that the proposed scheme which focuses on the digital combining at the receiver has better performance than successive interference cancelation (SIC)-based hybrid precoding.In addition,though the proposed scheme which focuses on the hybrid combining with sub-connected architecture at the receiver has worse performance than SIC-based hybrid precoding,the power consumption and hardware cost are greatly reduced.…”
    Get full text
    Article
  11. 38051

    Avian Paramyxovirus Serotype-1: A Review of Disease Distribution, Clinical Symptoms, and Laboratory Diagnostics by Nichole L. Hines, Cathy L. Miller

    Published 2012-01-01
    “…Classification systems have been designed to group isolates based on their genetic composition. …”
    Get full text
    Article
  12. 38052

    Ce qu’observer veut dire by Cyrille Marlin

    Published 2016-12-01
    “…To be able to read this article properly, it is necessary to set aside theoretical approaches which have already revealed the existence of some variations in landscaping practices such as landscape designer, landscape developer, landscape mediator, landscape planner, and landscape gardener. …”
    Get full text
    Article
  13. 38053

    Cross-Border Cooperation and the European Administrative Space – Prospects from the Principle of Mutual Recognition by Joachim Beck

    Published 2015-06-01
    “…Four fields of application are designed, allowing for a new quality of transnational administrative cooperation and a new understanding of the laboratory role that cross-border territories might play both for the EAS and further European integration. …”
    Get full text
    Article
  14. 38054

    Adaptive multiple-modalities data compression algorithm using wavelet for wireless sensor networks by ZHU Tie-jun 1, LIN Ya-ping1, ZHOU Si-wang2, XU Xiao-long 1

    Published 2009-01-01
    “…Wireless sensor networks usually have limited resources, such as energy, bandwidth and processing and so on.And they can’t match the transmission of a large number of data.So, it is necessary to perform in-network compression of the raw data sampled by sensors.The data sensor node collected normally have multiple-modalities pertinence.Multiple-modalities pertinence refers to the different types of data which the same node sampled have some correlation.A adaptive multiple-modalities data compression algorithm using wavelet was designed.In a given threshold of the correlation, the data can be adaptive classified using this algorithm.the relevant data can be estimated using the least square estimation.The characteristics data are abstracted as a matrix, then can be exploited the spatial and temporal corrections using wavelet transform.Theoretically and experimentally, the proposed algorithm can effectively exploit the correlation of the data, the compression ratio of the algorithm has improved.Effectively, it can provide a significant reduction in energy consumption.…”
    Get full text
    Article
  15. 38055

    Psychotherapeutic Effect of Listening to Quran Recitation on Dental Anxiety: A Randomized Controlled Trial by Abrar N. Alattar, Baydaa F. Hamzah

    Published 2024-12-01
    “…Methods: This research was designed as a randomized controlled trial in which 30 participants (20 females and 10 males) were assigned randomly to either an experimental (Quran listening) or a control group. …”
    Get full text
    Article
  16. 38056

    Børns møde med det danske straffesystem by Kasper Jørgensen, Annette Olesen, Lene Wacher Lenz, Birgit Feldtmann

    Published 2023-10-01
    “…Children in conflict with the law are treated within the same system as adults, albeit with specific regulations and sanctions designed specifically for them. The fact that children are handled within the same system as adults raises the question of whether and how the ‘punitive turn, Nordic style’, which, according to criminological scholars, emerged during the 1990s, has influenced the treatment and punishment of children within the criminal justice system. …”
    Get full text
    Article
  17. 38057

    MODELLING ROUNDABOUT ENTRY CAPACITY FOR MIXED TRAFFIC FLOW USING ANN: A CASE STUDY IN INDIA by Aarohi Kumar MUNSHI, Ashish Kumar PATNAIK

    Published 2024-06-01
    “…Roundabouts, as an unsignalized intersection, have an effective preventative measure designed to control straight-line crashes. Efficient traffic flow in cities depends upon appropriate capacity estimation of roundabouts. …”
    Get full text
    Article
  18. 38058

    Research and realization of the Trojan detection engine based on Android by Bin XIA, Feng QIU

    Published 2016-10-01
    “…The Trojan detection engine called TDE, with the assistance of this feature code library, would be able to take out a quick scan among the files in the cell phone and detect malicious programs in mobile applications. Finally, the designed Trojan detection engine provided a secure environment for the user of the phone.…”
    Get full text
    Article
  19. 38059

    Network Simulation of Low Earth Orbit Satellite Communication System Based on SNS3 by WU Fengwei, LIU Chuan, SHANG Dan, GENG Min

    Published 2024-12-01
    “…On the basis of SNS3, by constructing an accurate satellite orbit model, physical layer link model and network protocol model, an antenna model suitable for LEO satellite communication system was proposed and designed, and a network simulation platform suitable for low-orbit satellite communication was built, which realized the comprehensive simulation of low-orbit satellite communication network. …”
    Get full text
    Article
  20. 38060

    Le théâtre baroque du corps démembré dans The Duchess of Malfi by Line Cottegnies

    Published 2019-01-01
    “…Webster plays on the over-determination of these images, as the text consistently draws attention to these repetitions; the words used to designate body parts become unstable, potentially proleptic signs pointing to imminent death and foreshadowing the sudden appearance of actual, dismembered bodies. …”
    Get full text
    Article