Showing 40,461 - 40,480 results of 46,768 for search '"Design"', query time: 0.27s Refine Results
  1. 40461

    Analysis of a Benchmark Building Installed with Tuned Mass Dampers under Wind and Earthquake Loads by S. Elias, R. Rupakhety, S. Olafsson

    Published 2019-01-01
    “…However, if the device is designed with equal mass in every floor, it is less effective in controlling wind-induced floor acceleration. …”
    Get full text
    Article
  2. 40462

    Not Your Usual Analog Electronics Course—Generalized Analysis of Single-Transistor Amplifiers Uncovers Hidden Reciprocities and Equivalences by Brian Hong

    Published 2024-01-01
    “…Unlike the formulas that students typically learn and designers typically use, the equations presented in this tutorial assume the most general set of conditions: finite output resistance and base-collector current gain, a load resistor at each non-input terminal of the transistor, and a “feedback” resistor between the base and collector terminals. …”
    Get full text
    Article
  3. 40463

    Open-Source Telemedicine Platform for Wireless Medical Video Communication by A. Panayides, I. Eleftheriou, M. Pantziaris

    Published 2013-01-01
    “…Experimental results show that adequate diagnostic quality wireless medical video communications are realized using the designed telemedicine platform. HSPA cellular networks provide for ultrasound video transmission at the acquired resolution, while VFD algorithm utilization bridges objective and subjective ratings.…”
    Get full text
    Article
  4. 40464

    Automated issue assignment using topic modelling on Jira issue tracking data by Themistoklis Diamantopoulos, Nikolaos Saoulidis, Andreas Symeonidis

    Published 2023-06-01
    “…A methodology that extracts both textual and non‐textual features from different types of issues is designed, providing a Jira dataset that involves not only bugs but also new features, issues related to documentation, patches, etc. …”
    Get full text
    Article
  5. 40465

    UNIVERSITY TEACHERS’ READINESS TO APPLY THE MODERN EDUCATIONAL TECHNOLOGIES by Irina O. Kotlyarova

    Published 2015-03-01
    “…The research findings can be used as the basis of techniques and methods designing for its further development and measurement of the training, retraining and advanced training of the teaching staff of universities.…”
    Get full text
    Article
  6. 40466

    Multi-Scale Contrastive Learning with Hierarchical Knowledge Synergy for Visible-Infrared Person Re-Identification by Yongheng Qian, Su-Kit Tang

    Published 2025-01-01
    “…MCLNet is a novel two-stream contrastive deep supervision framework designed to train low-level details and high-level semantic representations simultaneously. …”
    Get full text
    Article
  7. 40467

    Warning people that they are being microtargeted fails to eliminate persuasive advantage by Fabio Carrella, Almog Simchon, Matthew Edwards, Stephan Lewandowsky

    Published 2025-01-01
    “…Using within subject-designs, Studies 1 (N = 666), 2a (N = 432), and 2b (N = 669) reveal a targeting effect, with targeted ads deemed more persuasive than non-targeted ones. …”
    Get full text
    Article
  8. 40468

    Implementation of the Article 32 of Government Regulation Number 24 of 2016 Concerning Land Deed Official’s Honorarium by Malik Hariyanto, Prija Djatmika, Diah Aju Wisnuwardhani

    Published 2024-11-01
    “…This research was conducted with the aim of revealing whether the implementation of the determination of PPAT honorarium carried out by a PPAT at the PPAT Office located in the Working Area in Situbondo is in accordance with the provisions of Law Number 24 of 2016 Article 32 concerning PPAT Honorarium and the factors that hinder the implementation of Article 32 of Law Number 24 of 2016 concerning PPAT honorarium. This research is designed using juridical-empirical research methods. …”
    Get full text
    Article
  9. 40469

    Time deterministic routing algorithm and protocol based on time-varying graph over the space-ground integrated network by Hongyan LI, Tao ZHANG, Jingqian ZHANG, Keyi SHI, Pengcheng ZENG

    Published 2020-10-01
    “…In terms of the difficulties to construct the end-to-end path and improve the utilization of network resources,caused by the time-varying multi-dimensional resources and diverse services over the space-ground integrated networks,the time-varying graph-based time deterministic routing algorithm and protocol for the space-ground integrated network was proposed.Firstly,a time-varying continuous graph model was constructed to describe the spatial and temporal attributes of multi-dimensional resources,such as the topology,link connectivity opportunities,node caching and so on.Then,a service-oriented time deterministic routing algorithm was proposed.According to the calculation rules of link cumulative traffic,and the constraints of node flow conservation and cache,the time-varying path with the shortest transmission delay was constructed.After that,a delay-guaranteed time deterministic routing protocol was designed by combining the proposed routing algorithm with both the segment routing technology and the time sensitive network technology,which supported the dynamic topology discovery,the efficient calculation of deterministic routing and the timing forwarding of data packets on the time-varying network.The simulation results show that,compared with the routing algorithm based on snapshot graph and contact graph,the proposed routing algorithm has higher link resource utilization rate and the packet successful delivery rate by jointly using link and node storage resources by association,and ensures the end-to-end transmission delay of services.…”
    Get full text
    Article
  10. 40470

    Developing a Model of Psychological and Social Consequences of Covid19 pandemic anxiety with the Mediating Role of Sense of Cohesion by Kamran Shivandi Chalicheh

    Published 2023-03-01
    “…The aim of this study was to "designing and developing a model of psychological and social consequences of Covid19 anxiety pandemic and to identify mediating role of sense of cohesion in nurses of Tehran hospitals”.This research in terms of purpose was applied and in terms of nature and method of data collection was descriptive-correlative research based on structural equation. …”
    Get full text
    Article
  11. 40471

    Predicted Anchor Region Proposal with Balanced Feature Pyramid for License Plate Detection in Traffic Scene Images by Hoanh Nguyen

    Published 2020-01-01
    “…Furthermore, this paper designs a multiscale region proposal network with a novel predicted location anchor scheme to generate high-quality proposals. …”
    Get full text
    Article
  12. 40472

    Effect of alloy composition on machining parameters and surface quality through comprehensive analysis by Shailesh Rao A., Srilatha Rao

    Published 2024-12-01
    “…Moreover, the cutting force influenced the chip length at a designated rotational speed. Conversely, aluminium alloys continuously generated continuous chip fragments irrespective of cutting speed or rake angle. …”
    Get full text
    Article
  13. 40473

    Dystopia, surveillance and the spaces of social control in Jenni Fagan’s The Panopticon (2012) by Claire Wrobel

    Published 2022-11-01
    “…Although the text explicitly reappropriates the Panopticon designed by Jeremy Bentham (1748-1832), an invention itself riven by the tension between utopia and dystopia, and echoes Michel Foucault’s strategic reading in Discipline and Punish (1975), the virulent critique it levels at the welfare state echoes some of the central issues to be found in George Orwell's attack on totalitarian states, particularly those related to memory and language. …”
    Get full text
    Article
  14. 40474

    Development and Efficiency Analysis of Dual Active Bridge Converter Employing SiC Devices Using TMS 320F280039 by T. Deepti, K. Deepa, Albert Alexander Stonier, Geno Peter, A. Anoop, Vivekananda Ganji

    Published 2025-01-01
    “…The paper presents an analytical method for designing the crucial elements of dual active bridge (DAB) with single-phase shift (SPS) modulation control. …”
    Get full text
    Article
  15. 40475

    Fault Diagnosis of Train Axle Box Bearing Based on Multifeature Parameters by Xiaofeng Li, Limin Jia, Xin Yang

    Published 2015-01-01
    “…In the third part, a fault classifier based on BP neural network is designed for automatic fault pattern recognition. A series of tests are carried out to verify the proposed method, which show that the accuracy is above 90%.…”
    Get full text
    Article
  16. 40476

    Tension - torsion fatigue tests on the proton exchange membrane Nafion 115 (Perfluorosulfonic acid) by Gonzalo Mariano DOMINGUEZ ALMARAZ, Luis M. TORRES DUARTE, Christian J. TORRES PACHECO

    Published 2019-06-01
    “…In order to carry out the fatigue tests on this polymeric material a self-designed  and self-constructed machine was used, working under the following conditions: from 0 to 50 degrees of torsion, 0 to 60 MPa of initial tensile stresses, from room temperature (22 to 25° C) to 80° C, and two values for relative humidity: environmental and saturated relative humidity. …”
    Get full text
    Article
  17. 40477

    Development of Energy Efficient Clustering Protocol in Wireless Sensor Network Using Neuro-Fuzzy Approach by E. Golden Julie, S. Tamil Selvi

    Published 2016-01-01
    “…Fuzzy rule is used in fuzzy logic part that inputs to form clusters. NFEACS is designed for WSN handling mobility of node. The proposed scheme NFEACS is compared with related clustering schemes, cluster-head election mechanism using fuzzy logic, and energy aware fuzzy unequal clustering. …”
    Get full text
    Article
  18. 40478

    ANALYST STUDY AND OPTIMIZATION OF LIGHT TRUCK CAB FLOOR STRENGTH by ZHAO MinQing, LU YuMing, CHEN WenGang, LIN ZhenWen, DONG YongFeng, CHEN MingLiang

    Published 2021-01-01
    “…Based on the background of frequent cracking failures of the cab floor of a light commercial truck,the cause analysis and optimization designs of the strength of the cab floor of this brand commercial vehicle were carried out. …”
    Get full text
    Article
  19. 40479

    Survival machine learning methods for mortality prediction after heart transplantation in the contemporary era. by Lathan Liou, Elizabeth Mostofsky, Laura Lehman, Soziema Salia, Francisco J Barrera, Ying Wei, Amal Cheema, Anuradha Lala, Andrew Beam, Murray A Mittleman

    Published 2025-01-01
    “…A cross-validation framework was designed in mlr. Model performance was also compared in a seasonally-matched pre-policy cohort. …”
    Get full text
    Article
  20. 40480

    Scheme on user identity attribute preserving based on ring signcryption for cloud computing by Shuan-bao LI, Jian-ming FU, Huan-guo ZHANG, Jing CHEN, Jing WANG, Bi-jun REN

    Published 2014-09-01
    “…Identity attribute leak as the most severe security threat of cloud computing,in order to solve this problem,a protection scheme of identity attributes based on ring signcryption was proposed.Focused on digital identity management in cloud service,which discusses user key parting management with decentralization.Users can choose some seeds for generation and storage of key,then integrated user key cannot be acquired by registrar,based on this payload on certifica-tion management is reduced.In addition,access-centric blindness ring signcryption verification for identity attribute is designed,which constitutes ring of users and CSP,combined with own attribute users can accomplish ring-oriented sub-linear blindness signcryption and non-interactive public ciphertext verifiability for messages so that integrity and confidentiality of identity attribute can be protected avoiding identity attribute leakage in collusion of multi-CSP.At last,strong blindness and unforgeability of ciphertext and attribute is proved in proposed model,three private key components can be generated by users and identity forgeability of ring member can be prevented successfully on the condition of DBDH difficult assumption and adaptive chosen-ciphertex tattacking.Effectiveness of proposed mechanism is verified via performance evaluation of blindness ring signcryption algorithm based on comprehensive payload in identity attribute protection,and optimization is confirmed compared with similar algorithms.…”
    Get full text
    Article