Showing 42,381 - 42,400 results of 46,768 for search '"Design"', query time: 0.16s Refine Results
  1. 42381

    FlowMFD: Characterisation and classification of tor traffic using MFD chromatographic features and spatial–temporal modelling by Liukun He, Liangmin Wang, Keyang Cheng, Yifan Xu

    Published 2023-07-01
    “…Then MFD chromatographic features (MFDCF) are designed to represent the pattern. Those features integrate multiple low‐dimensional TSFs into a single plane and retain most pattern information. …”
    Get full text
    Article
  2. 42382

    Highly Efficient Dual-Band Rectifier Based on Symmetric Impedance Control Network by Eojin Kim, Yeonsoo Kim, Juntaek Oh

    Published 2025-01-01
    “…The proposed rectifier is designed and fabricated with a compact size of <inline-formula> <tex-math notation="LaTeX">$28.9\times 38.9$ </tex-math></inline-formula> mm2. …”
    Get full text
    Article
  3. 42383

    Analysis of Debris Flow Reduction Effect of Check Dam Types considering the Mountain Stream Shape: A Case Study of 2016 Debris Flow Hazard in Ulleung-do Island, South Korea by Man-Il Kim, Namgyun Kim

    Published 2021-01-01
    “…Hence, the installation of check dams designed to reflect the area’s local conditions is required to avoid further damage. …”
    Get full text
    Article
  4. 42384

    Electronic invoice public verification scheme based on SM2 coalition signature algorithm by Yurong LUO, Jin CAO, Hui LI, Xingwen ZHAO, Chao SHANG

    Published 2022-04-01
    “…In order to solve the current problems of electronic invoices, such as anti-counterfeiting, privacy leakage and low verification efficiency, an electronic invoice public verification architecture based on the national signature algorithm was proposed.Electronic invoice documents have complex data sources, sensitive user information on the ticket surface, frequent data flow and other characteristics as well as the demand for efficient public verification.Based on these motivations, the e-invoice generation and verification protocol was designed.Besides, a signature code generation scheme for invoice anti-counterfeiting was proposed based on certificate-free joint signature.Then multiple data verification and signatures of the invoicing party and the taxation authority can be realized.All kinds of invoice holders can not only verify the authenticity and data integrity of electronic invoices, but also publicly check the authenticity and data integrity of electronic invoices.The integration of data encryption algorithms protects user privacy data in electronic invoices, and at the same time can fulfill the requirements for authenticity or status verification under various invoice application scenarios.The checking party only needs to verify one signature to confirm the authenticity of the electronic invoice signed by both parties.Scyther security simulation tools were used to analyze the security of the proposed solution, which can verify the integrity and authenticity of the data source and check the confidentiality of the privacy data under various types of attacks.Compared with a typical overseas e-invoice checking scheme and a similar digital signature-based e-invoice checking scheme, the proposed scheme has obvious advantages in terms of checking efficiency and invoice file size.…”
    Get full text
    Article
  5. 42385

    Research ethics in social science research during health pandemics: what can we learn from COVID-19 experiences? by Tejendra Pherali, Sara Bragg, Catherine Borra, Phil Jones

    Published 2025-01-01
    “…The research involved interviews and workshops with University College London (UCL) academics, professional staff and graduate students and encompassed those involved in reviewing ethics applications, researchers dealing with ethics in projects that continued despite disruptions caused by COVID-19, and successful research projects specifically designed to study the effects of COVID-19 in various contexts. …”
    Get full text
    Article
  6. 42386

    Tourism and Erotic Imaginaries in Wartime Paris: French and Germans during the Occupation, 1940-1944 by Bertram M. Gordon

    Published 2018-05-01
    “…War, however, can produce its own tourism, as was true of German soldiers in occupied Paris during the Second World War. A specially designated unit of the Wehrmacht arranged tours for thousands of its young soldiers, many of whom had never before left their native towns and villages. …”
    Get full text
    Article
  7. 42387

    DNCCLA: Discrete New Caledonian Crow Learning Algorithm for Solving Traveling Salesman Problem by Ali H. Alsaidi, Wedad Al-Sorori, Abdulqader M. Mohsen

    Published 2024-01-01
    “…Bioinspired optimization algorithms like the New Caledonian crow learning algorithm (NCCLA) are primarily designed to address continuous problems. As most real-world problems are discrete, some operators have been proposed to convert continuous algorithms into discrete ones to address these problems. …”
    Get full text
    Article
  8. 42388

    L1 Adaptive Fault-Tolerant Attitude Tracking Control of UAV Systems Subject to Faults and Input Saturation by Yan Zhou, Huiying Liu, Huijuan Guo, Yongjian Chen

    Published 2024-01-01
    “…Second, a L1 neural network adaptive fault-tolerant controller is designed to deal with uncertainties, where radial basis function neural networks (RBFNNs) are applied to approximate the nonlinear function in the system model. …”
    Get full text
    Article
  9. 42389

    Security protection method based on mimic defense and Paillier encryption for smart IoT terminals by GU Tiansheng, ZENG Fukang, SHAO Sisi, NIE Yijun, JI Zongkai, ZHENG Yulu, SHI Yuchen, LIU Shangdong, JI Yimu

    Published 2024-12-01
    “…Then, a secure blind signature with Paillier encryption (SBSPE) algorithm was designed in this architecture to safeguard the data and privacy of the edge-area smart terminals throughout the data processing lifecycle of edge-area smart terminals. …”
    Get full text
    Article
  10. 42390
  11. 42391

    Sugar Profile, Mineral Content, and Rheological and Thermal Properties of an Isomerized Sweet Potato Starch Syrup by Brunson Dominque, Peter N. Gichuhi, Vijay Rangari, Adelia C. Bovell-Benjamin

    Published 2013-01-01
    “…Further and more detailed studies should be designed to further enhance the fructose content of the syrup and observe its stability beyond 70 days. …”
    Get full text
    Article
  12. 42392

    Learning-based page replacement scheme for efficient I/O processing by Hwajung Kim

    Published 2025-02-01
    “…In this paper, we introduce a Learning-based Page Replacement (LPR) scheme designed for efficient I/O processing. We propose a model that learns the memory reference patterns of a given algorithm, enabling real-time determination of the optimal replacement policy. …”
    Get full text
    Article
  13. 42393

    Wpływ nowożytnego antropocentryzmu na relację człowieka do przyrody. Część pierwsza by Anita Ganowicz-Bączyk

    Published 2011-03-01
    “…God-Creator was replaced by man-designer. A new type of anthropocentrism appeared, which tried to find the answer to the fundamental questions in the human being himself. …”
    Get full text
    Article
  14. 42394

    Do orthodontists consider endodontic complications in their orthodontic management of teeth with a history of dental trauma? A vignette survey by Kinda Awad, Ammar Al Hourani, Dariusz Kasperek, Fadi Jarad, Sondos Albadri

    Published 2025-01-01
    “…Method A mixed methods vignette survey was designed, piloted, and distributed online to UK registered specialist orthodontists. …”
    Get full text
    Article
  15. 42395

    Relationship between Musculoskeletal Disorders and Level of Stress among Homemakers in Gujarat State: An Observational Study by Dhvani J. Teraiya, Krupa Tank

    Published 2024-12-01
    “…Materials and Methods: After the ethical clearance, for data collection a designed Google Forms was spread across the Gujarat state through E-mail and social media platforms. …”
    Get full text
    Article
  16. 42396

    What is the difference between thus and thusly? by Morana LUKAČ

    Published 2018-06-01
    “…Most of the prescriptive usage guides treat thusly critically and describe it as “best-avoided” and replaced by thus or they even designate it as a “non-word” (Lukač and Tieken-Boon van Ostade forthcoming).To find out what the acceptability ratings for the word are currently, together with Ingrid Tieken-Boon van Ostade, I conducted an online survey made available between July and September 2015, in which we asked the participants to rate the word on a six-fold acceptability scale (informal speech, formal speech, informal writing, formal writing, netspeak, and unacceptable under any circumstances).In this paper, with the survey findings as my starting point, I aim to establish whether a current change in progress correlates with higher acceptability ratings among younger speakers. …”
    Get full text
    Article
  17. 42397

    The PIT: SToPP Trial—A Feasibility Randomised Controlled Trial of Home-Based Physiotherapy for People with Parkinson's Disease Using Video-Based Measures to Preserve Assessor Blind... by Emma Stack, Helen Roberts, Ann Ashburn

    Published 2012-01-01
    “…We advocate a fully powered trial, designed to minimise dropouts and preserve assessor blinding, to evaluate this intervention.…”
    Get full text
    Article
  18. 42398

    Everyday activity strategies perceived by people with advanced cancer: a qualitative explorative study by Karen la Cour, Lisa Gregersen Oestergaard, Marc Sampedro Pilegaard

    Published 2025-01-01
    “…Methods The qualitative study was designed with an explorative approach. Data from 28 people with advanced cancer was drawn from a trial including qualitative interviews to elicit participants’ perceptions about managing their everyday activities. …”
    Get full text
    Article
  19. 42399

    Multi-Objective Dynamic Path Planning with Multi-Agent Deep Reinforcement Learning by Mengxue Tao, Qiang Li, Junxi Yu

    Published 2024-12-01
    “…Finally, based on the OpenAI Gym platform, environments such as simple multi-objective environment and complex multi-objective environment were designed to analyze the rationality and effectiveness of the multi-objective dynamic path planning through minimum cost and collision risk assessments. …”
    Get full text
    Article
  20. 42400

    Confirmation bias in law enforcement and how debiasing interventions and mitigation strategies might help rebuild public trust: A thematic review by Segovia Richard Odin

    Published 2025-01-01
    “…This review shows the need for thorough research to validate the effectiveness of strategies designed to mitigate confirmation biases in law enforcement. …”
    Get full text
    Article