Showing 12,961 - 12,980 results of 46,768 for search '"Design"', query time: 0.13s Refine Results
  1. 12961

    Podcasting as an Innovative Pedagogical Tool in Social Work Education by Mim Fox, Jonathan B. Singer

    Published 2025-01-01
    “…In this article, the authors, both international podcasting social work academics, present an innovative framework for podcasting pedagogy and discuss co-production of podcasts as a form of teaching and learning co-design that is grounded in social work approaches to knowledge creation, dissemination, and scholarship.…”
    Get full text
    Article
  2. 12962

    Research of Fragment Mechanism Security in IPv6 Network Protocol by Xianglin Wang, Chen Zhu, Dongmei Sun, Mingyue Li, Qingzi Shen

    Published 2013-10-01
    “…Based on open source Snort platform,the packet block mechanism in IPv6 network was discussed.The behavior using IPv6 packet fragment to attack network was studied.Against to the problems,such as too little for IPv6 packet segment,overlapping section and so on,it put forward the corresponding countermeasures.The intrusion detection system were designed and implemented for piecewise leak testing.The experiments show that the design of intrusion detection system can detect the abnormal IPv6 packet,and Snort to support for IPv6 function was improved and optimized.…”
    Get full text
    Article
  3. 12963
  4. 12964

    Analisis Geometris Sistem Kendali Elevator Pesawat Udara N219 by Lenny Iryani, Arie S Ramadhan

    Published 2021-10-01
    “…The study of this analysis was using N219 airplane designed by PT. Dirgantara Indonesia. The preliminary design of the force that should be inputted by a pilot are in 495 kN.mm. …”
    Get full text
    Article
  5. 12965

    Oxygen Mass Transfer in an Aerated Stirred Tank with Double Impellers: A Generalized Correlation Including Spacing Impact by Hayder Mohammed Issa

    Published 2016-01-01
    “…The spacing between the impellers is considered to be a design factor of such industrial equipment due to its remarkable impact on the oxygen mass transfer.…”
    Get full text
    Article
  6. 12966

    Coordinated beamforming algorithm assisted by receive beamforming vector estimation by Ying HUANG, Gang-ming LV, Shi-hua ZHU

    Published 2014-02-01
    “…By sharing a small amount of information among cooperated base stations(BSs), the proposed algorithm estimates the receive vectors of related users at the BSs based on MVDR criterion, which are then utilized to optimize the design of transmit beamforming vectors. The simula-tion results and analysis show that the proposed distributed scheme can achieve the performance close to that in the cen-tralized scheme with lower overhead and complexity. …”
    Get full text
    Article
  7. 12967

    DINAMIKA POLITIK PEMBANGUNAN PADA MASA ORDE BARU (Studi Tentang Industrialisasi Ketergantungan dan Peran Modal Jepang) by Beby Masitho

    Published 2016-03-01
    “…Politic development Indonesia country at Orde Baru time to create industrialization hanging down, cause any problem can not to completion by Soeharto Politic rezim to manage development project/ industrialization, inter problem is economy domestic structure to colonial inheritance, so that industrial aspec, to be come problem at powerless exsistantion bourgeois class in domestic. Horizontal design from grouping in base culture for line (social stratification based on etnic line). …”
    Get full text
    Article
  8. 12968

    Research on the Architecture of Cold Chain Logistics Multimedia Monitoring and Tracking Service Platform Based on Fuzzy Sorting and Heuristic Algorithm by Qi Zhang

    Published 2021-01-01
    “…Aiming at the features such as fragility of fruits and vegetables and high storage requirements, in this paper, a cold chain logistics multimedia monitoring and tracking service platform is built in an attempt to monitor the preservation environment and safety status of agricultural products relying on fuzzy sorting and heuristic algorithms, trace agricultural products with labels, and design the direction of the key data. The practice results show that the system is effective.…”
    Get full text
    Article
  9. 12969

    New cross-layer reputation mechanism for mobile cloud computing by Mengyang YU, Hui LIN, Youliang TIAN

    Published 2018-03-01
    “…Users are facing increasingly serious security threats such as data leakage and privacy exposure while using various mobile cloud services.Based on the data security and privacy protection for mobile cloud computing research background,combining the cross-layer design and credit mechanism,in the node between the introduction of the MAC layer and network layer in the process of credit evaluation of factors affecting user reputation,to identify and manage internal malicious nodes.The credibility of the simulation results show that the proposed mechanism can effectively resist the internal defamation and multilayer attack,enhance the credibility of mobile terminals,thus improve the mobile cloud service data security and privacy protection.…”
    Get full text
    Article
  10. 12970

    Dynamics Simulation Analysis of the Slewing Gear Meshing of Anti-radiation Hydraulic Excavator by Liu Jun, Zou Shuliang, Tang Dewen, Yuan Lianxiong

    Published 2016-01-01
    “…The simulation results can provide the basis of the calculation for strength check and optimization design of slewing gear.…”
    Get full text
    Article
  11. 12971

    Dimensional Optimization of Spherical 5R Parallel Mechanism with Maximum Transmission Workspace by Che Linxian, Chen Guowang, Du Li, Wen Shikun

    Published 2020-06-01
    “…The 2-degree-of-freedom spherical 5R parallel mechanism is taken as the research object, and teaching-learning-based optimization (TLBO) algorithm is applied to solve the optimization design problem of mechanism dimensional parameters. …”
    Get full text
    Article
  12. 12972

    Sensory Gardens by Eva C. Worden, Kimberly A. Moore

    Published 2004-07-01
    “…In sensory gardens, plants and other design elements are selected with intention to provide experiences for seeing, smelling, hearing, touching, and tasting. …”
    Get full text
    Article
  13. 12973

    Calculation and Research of Transmission Efficiency of Gear with Addendum Modification based on Roll-off Angle by Wang Yixinyu, Tang Jinyuan

    Published 2015-01-01
    “…Based on the power method,the roll-off angle is introduced to measure the position of meshing point,and the function relation formula between the modification coefficient and meshing efficiency is derived.The calculation formulation of modification coefficient of the maximum transmission efficiency is put forward through deriving the relation on the basis of extremism value principle for functions.Through the comparing with the experimental results of available literatures,can get to know that the numerical results of the calculation of modification coefficient and transmission efficiency are in good agreement with the experimental results of available literatures.A base for quantitative calculation of the initiative design of gear with addendum modification transmission efficiency is provided through the research work,and it has a certain reference value to the research and application for the gear with addendum modification.…”
    Get full text
    Article
  14. 12974

    Energy efficient beamforming scheme for wireless sensor networks by Zhi-chao QIN, Zheng ZHOU, Xiao-chuan ZHAO

    Published 2013-04-01
    “…Aiming at the limitation of energy and communication distance for nodes in wireless sensor networks and the characteristics of premature death due to ignoring the energy balance for traditional beamforming schemes,an energy efficient beamforming scheme was proposed.First the impact of the number of nodes,the transmission coefficients,the limited power,and the arrival phase on the network energy consumption is analyzed,and the corresponding design principles are given.Then,the nodes which participate the beamforming are selected based on these principles their transmission coefficients are adjusted according to their residual energy and phase.The analysis and simulation results show that the proposed scheme can effectively increase the number of successful transmission,balance the energy consumption among the nodes and prolong the network lifet me.…”
    Get full text
    Article
  15. 12975

    Numerical simulation of galvanized rebars pullout by H.F.S.G. Pereira, V.M.C.F. Cunha, J. Sena-Cruz

    Published 2014-12-01
    “…The usage of rebars in construction is the most common method for reinforcing plain concrete and thus bridging the tensile stresses along the concrete crack surfaces. Usually design codes for modelling the bond behaviour of rebars and concrete suggest a local bond stress – slip relationship that comprises distinct reinforcement mechanisms, such as adhesion, friction and mechanical anchorage. …”
    Get full text
    Article
  16. 12976

    Priority-based routing and wavelength assignment algorithm of multi-objective in WDM network by Xiang-xuan TIAN, Jun-gang YANG, Ya-liang CHE, Wen-zheng SUN, Gu-jing LIU

    Published 2014-03-01
    “…An effective algorithm aiming at the multi-objective routing and wavelength assignment through priority in dynamic WDM optical network was proposed.The objective of the design is to maximize the number of accepted communication requests subjected to a limited number of wavelength channels.The relation between path type was adopted and the traffic volume was used to determine the priority of the connection requests,and the network state was incorporated into the routing decisions and wavelength assignment.The simulation results conclusively demonstrate that the proposed algorithm can greatly improve the blocking performance and utilization of the optical network resource.…”
    Get full text
    Article
  17. 12977

    Research on control plane technology for wide-area deterministic networking by Hongwei SHI, Qingqiang CHEN, Zhiwei CHENG, Tao HUANG

    Published 2023-11-01
    “…The efficient allocation of data elements is particularly important for achieving digital transformation in traditional industries.Network supply capabilities not only require low latency and high bandwidth for data packets, but also require low jitter and certainty in data packets.Deterministic networking technology is the key to build lossless, reliable, and deterministic wide-area communication capabilities.The key control technologies and design concepts for wide-area deterministic networking were proposed, and the specific plans for achieving deterministic networking perception, service planning, and traffic scheduling were elaborated on.Through experimental verification and application testing, the effectiveness of the system structure is proven and it meets the management and scheduling needs of deterministic networking.…”
    Get full text
    Article
  18. 12978

    Simple criterion for predicting fatigue life under combined bending and torsion loading by K. Slámecka, J. Pokluda

    Published 2017-06-01
    “…Multiaxial fatigue is a challenging problem and, consequently, a number of methods has been developed to aid in design of components and assemblies. Following the complexity of the problem, these approaches are often elaborate and it is difficult to use them for simple loading cases. …”
    Get full text
    Article
  19. 12979

    RESEARCH ON STRESS AND STRENGTH OF WO-STAGE CYCLOID BALL PLANETARY TRANSMISSION by ZHANG XiaoMei, AN ZiJun, XUE Jin

    Published 2016-01-01
    “…This research provides important theory basis for the design application of the cycloid ball planetary transmission.…”
    Get full text
    Article
  20. 12980

    Network architecture with intrinsic security by Weiyu JIANG, Bingyang LIU, Chuang WANG

    Published 2019-09-01
    “…IP network brings big benefits for human’s life by connecting most devices all over the world,but its security and privacy issues make people frustrating when using end to end communication.Without intrinsic security design of the network,it is difficult for patch-like solutions to cure stubborn security issues (IP spoofing,privacy leakage,MITM attack,DDoS,etc.).On the basis of surveying different kinds of security threats and related security techniques,an overview of the security weakness analysis was given,and network architecture with intrinsic security (NAIS) was presented,including dynamic ID/IP with intrinsic security,security verification and audit protocols,and cross-domain cooperation defense mechanism,which could provide security and trustworthiness for end to end communication.…”
    Get full text
    Article