Showing 38,441 - 38,460 results of 46,768 for search '"Design"', query time: 0.22s Refine Results
  1. 38441

    Abrasive Testing of the Gearbox Lubricating Oil Based on Electromagnetic Induction by Wang Liangjian, Chen Qi, Zhang Daocheng, Xia Tongliang, Song Hui, Huang Liyuan

    Published 2024-02-01
    “…In order to explore the negative influence rule of the iron debris abrasive particles in the gearbox on the original lubrication system, based on the principle of electromagnetic induction and STM32F103ZET6 microcontroller as the control unit, a set of gearbox lubricating oil abrasive particles online detection system is designed, and the abrasive particle volume and quantity measurement results of the sample oil and a gearbox oil are compared. …”
    Get full text
    Article
  2. 38442

    Four-Port Dual-Mode Diplexer with High Signal Isolation by Jessada Konpang, Natchayathorn Wattikornsirikul

    Published 2020-01-01
    “…The simulated and measured four-port dual-mode diplexers are designed at the centre frequency of Rx/Tx at 1.95 GHz and 2.14 GHz, respectively. …”
    Get full text
    Article
  3. 38443

    Effort de conservation et Aires marines protégées : quatre illusions et un changement de perspective by Jean-Eudes Beuret, Anne Cadoret

    Published 2021-05-01
    “…An interdisciplinary international comparative analysis (geography and economy), based on 13 cases studied in highly differentiated geographical and societal contexts, leads us to return to four founding illusions according to which: a) the status marks the institutionalization of the MPA and offers protection; b) the perimeter of the MPA corresponds to the managed and protected surface; c) specific rules are necessary for conservation action and are designed to be enforced through sanctions; and d) the implementation of the territorial conservation policy implies a centrality, with a manager with or without authority. …”
    Get full text
    Article
  4. 38444

    Pricing Decisions on Reward-Based Crowdfunding with Bayesian Review System Facing Strategic Consumers by Yuting Chen, Rong Zhang, Bin Liu

    Published 2019-01-01
    “…However, the crowdfunding nowadays lacks a form type of review system. This paper is designed to extend research on the optimal pricing decision with review system for the reward-based crowdfunding. …”
    Get full text
    Article
  5. 38445

    Place et contrat institutionnels des discussions à visée philosophique pratiquées à l’école primaire by Emmanuèle Auriac-Slusarczyk

    Published 2011-10-01
    “…Three scientific projects currently addressing this issue are designed to open a fairway for scientific work and help drive these novel dialogs between keen teachers and unwittingly pioneering pupils out of an institutional bunker.…”
    Get full text
    Article
  6. 38446

    Investigating the Effect of Viscous Yield Dampers on Concrete Structure Performance by Nima Marzban, Parisa Esmaeiltabar Nesheli

    Published 2021-01-01
    “…To study them, 5- and 10-story structures have been designed using FE method and have been subjected to earthquake records. …”
    Get full text
    Article
  7. 38447

    THE ROLE OF TEENAGEERS’ LIFE EXPERIENCE ACTUALIZATION IN THE FRAMEWORK OF THE SAFE SOCIAL ENVIRONMENT FORMATION by O. A. Selivanov

    Published 2015-03-01
    “…The paper looks at the problem of social security and emphasizes the urgent need for developing the general theory of social security, its concepts and models designed to meet the requirements of time and specify different aspects and levels of socialization process – federal, regional and municipal. …”
    Get full text
    Article
  8. 38448

    Privacy-preserving digital rights management scheme in cloud computing by Qin-long HUANG, Zhao-feng MA, Jing-yi FU, Yi-xian YANG, Xin-xin NIU

    Published 2014-02-01
    “…The framework of digital content copyright lifecycle protection and user privacy protection in cloud computing was firstly designed, which includes four protocols: system setup, content encryption, license acquisition and content decryption, and then a content encryption key protection and distribution mechanism based on attribute-based encryption and additively homomorphic encryption was proposed, which ensures the security of content encryption key. …”
    Get full text
    Article
  9. 38449

    AI-assisted super-resolution cosmological simulations IV: An emulator for deterministic realizations by Xiaowen Zhang, Patrick Lachance, Ankita Dasgupta, Rupert A. C. Croft, Tiziana Di Matteo, Yueying Ni, Simeon Bird, Yin Li

    Published 2025-02-01
    “…In this study, we develop an emulator designed to reproduce the small-scale structures of target HR simulation with high fidelity. …”
    Get full text
    Article
  10. 38450

    Alternative Exercise Technologies to Fight against Sarcopenia at Old Age: A Series of Studies and Review by Wolfgang Kemmler, Simon von Stengel

    Published 2012-01-01
    “…On the contrary, although the majority of studies with elderly subjects confirmed the positive effect of WBV on strength and power parameters, a corresponding relevant effect on muscle mass was not reported. However, well-designed studies with adequate statistical power should focus more intensely on this issue.…”
    Get full text
    Article
  11. 38451

    Processing Chip for Thin Film Bulk Acoustic Resonator Mass Sensor by Pengcheng Jin, Shurong Dong, Hao Jin, Mengjun Wu

    Published 2012-01-01
    “…The FBAR oscillator, based on the current-reuse structure, is designed with Modified Butterworth Van Dyke (MBVD) model. …”
    Get full text
    Article
  12. 38452

    Failure evidences of reduced span bridges in case of extreme rainfalls - The case of Livorno by Mario Lucio Puppio, Sara Novelli, Mauro Sassu

    Published 2018-10-01
    “…The Italian territory has about 460.000 small bridges, mostly designed without the support of technical codes or a proper interaction between the hydraulic and structural aspects. …”
    Get full text
    Article
  13. 38453

    Chemical Control for Host-Parasitoid Model within the Parasitism Season and Its Complex Dynamics by Tao Wang, Youtang Zhang

    Published 2016-01-01
    “…Finally, the uncertainty and sensitivity of all the parameters on the solutions of both the host and parasitoid populations are investigated, which can help us to determine the key parameters in designing the pest control strategy. The present research can help us to further understand the importance of timings of pesticide application in the pest control and to improve the classical chemical control and to make management decisions.…”
    Get full text
    Article
  14. 38454

    Technical Features and Development Trends of Liquid Air Energy Storage by Wang Yuting

    Published 2025-01-01
    “…Future advancements in thermal management and modular designs are expected to address existing challenges, placing LAES as a feasible solution for grid stability and renewable energy integration.…”
    Get full text
    Article
  15. 38455

    Extended DEMATEL method with intuitionistic fuzzy information: A case of electric vehicles. by Qiwen Ye

    Published 2024-01-01
    “…The paper aggregates the intuitionistic fuzzy correlation information from each decision-maker, employing operators designed for managing intuitionistic fuzzy numbers. …”
    Get full text
    Article
  16. 38456

    Analyse du traitement médiatique du silure glane (Silurus glanis), une espèce au centre de controverses by Jean-Marie Bodt, Frédéric Santoul, Muriel Lefebvre

    Published 2017-05-01
    “…Then, through a qualitative exploration of the texts, we listed the different ways to designate catfish and its impact on aquatic environments. …”
    Get full text
    Article
  17. 38457

    Node selection method in federated learning based on deep reinforcement learning by Wenchen HE, Shaoyong GUO, Xuesong QIU, Liandong CHEN, Suxiang ZHANG

    Published 2021-06-01
    “…To cope with the impact of different device computing capabilities and non-independent uniformly distributed data on federated learning performance, and to efficiently schedule terminal devices to complete model aggregation, a method of node selection based on deep reinforcement learning was proposed.It considered training quality and efficiency of heterogeneous terminal devices, and filtrate malicious nodes to guarantee higher model accuracy and shorter training delay of federated learning.Firstly, according to characteristics of model distributed training in federated learning, a node selection system model based on deep reinforcement learning was constructed.Secondly, considering such factors as device training delay, model transmission delay and accuracy, an optimization model of accuracy for node selection was proposed.Finally, the problem model was constructed as a Markov decision process and a node selection algorithm based on distributed proximal strategy optimization was designed to obtain a reasonable set of devices before each training iteration to complete model aggregation.Simulation results demonstrate that the proposed method significantly improves the accuracy and training speed of federated learning, and its convergence and robustness are also well.…”
    Get full text
    Article
  18. 38458

    Efficacy of Frontal Sinus as a Reliable Tool for Sex Differentiation – A Cross-Sectional Study by Ridhi Bhola, Shreya Chatterjee, Mala Kamboj, Anjali Narwal, Anju Devi, Manisha Kamal Kukreja

    Published 2023-10-01
    “…Keeping this in mind, a study was designed to analyse the efficacy of morphometric assessment of the frontal sinus for gender determination in the North Indian population. …”
    Get full text
    Article
  19. 38459

    Secure two-party line segments intersection scheme and its application in privacy-preserving convex hull intersection by Mao-hua SUN, Shou-shan LUO, Yang XIN, Yi-xian YANG

    Published 2013-01-01
    “…The model and framework of secure multi-party computational geometry were presented based on the existing protocols.The new framework has three dimensions,the math model,the security model and the communication model.Using the new model and framework,a secure two-party line segments intersection protocol based on Paillier homomorphic encryption scheme is proposed.This protocol solves the problem that the existing secure two party intersect-determination schemes of line segments cannot output the exact coordinates of the intersection.The security of the protocol is demonstrated using Goldreich method.The results show that this protocol has better efficiency than the existing ones.In addition,the secure two-party line segments intersection in malicious model is also designed.As an application,a privacy-preserving convex hull intersection protocol is proposed based on the O’Rourke scheme.This application makes up for the gap in privacy-preserving convex hull intersection protocol in the area of secure multi-party computational geometry.…”
    Get full text
    Article
  20. 38460

    Proposed Reference Model for Guiding Teachers to Perform Ward Round Teaching by Luís Alberto Corona Martínez

    Published 2014-06-01
    “…Raúl Dorticós Torrado Faculty of Medical Sciences in Cienfuegos has designed a model or representation of ward round teaching to be used as a guide. …”
    Get full text
    Article